AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE
|
|
- Diana James
- 6 years ago
- Views:
Transcription
1 AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity of Rocheste, Rocheste, NY 1467 USA {numanogl, tavli, ABSTRACT In this pape, we pesent an analysis of the effects of channel noise on the pefomance of coodinated and noncoodinated MAC potocols. In ode to obseve the degadation in the pefomance of a coodinated MAC potocol (MH-TRACE) with inceasing BER level, we ceated an analytical model to estimate MH-TRACE s pefomance. This analytical model is validated though simulation expeiments. Ou esults show that despite its highe level of vulneability, the coodinated MAC potocol s pefomance loss is compaable to the pefomance loss of the noncoodinated MAC potocol (IEEE 8.11) fo low to mid BER levels (i.e., BER < 1 4 ). On the othe hand, fo extemely high BER levels (i.e., BER 1 4 ) the pefomance loss of the coodinated MAC potocol is compaatively highe than the pefomance loss of the non-coodinated MAC potocol due to its dependence on contol taffic, which is also affected by the BER level. INTRODUCTION Medium Access Contol (MAC) potocols ae employed to contol access to the channel in ode to egulate tansmissions to avoid o minimize collisions [1]. Futhemoe, the MAC potocol is the key element in detemining many featues of a wieless netwok, such as thoughput, Quality of Sevice (QoS), enegy dissipation, fainess, stability, and obustness [], [3], [4]. In othe wods, the pefomance of a paticula netwok highly depends on the choice of the MAC potocol. MAC potocols can be classified into two categoies based on the collaboation level of the netwok in egulating the channel access: coodinated and non-coodinated. A coodinated MAC potocol opeates with explicit coodination among the nodes and is geneally associated with coodinatos, channel access schedules and clustes. A noncoodinated MAC potocol, on the othe hand, opeates without any explicit coodination among the nodes in the netwok. Fo example, IEEE 8.11 is a non-coodinated Abstact ID: 589. This wok was suppoted in pat by the Univesity of Rocheste Cente fo Electonic Imaging Systems and in pat by Hais Copoation, RF Communications Division. N 1 N 3 N Schedule N 3 N N N 1 N 3 N N 1 N 3 N Collision N N 1 N 3 N 1 Fig. 1. Illustation of coodinated and non-coodinated MAC potocols. The uppe left and ight panels show the node distibutions fo nodes N -. The lowe left panel shows the medium access fo the coodinated scheme, whee node N is the coodinato and the channel access is egulated though a schedule tansmitted by N. The lowe ight panel shows the channel access fo the non-coodinated scheme (e.g., CSMA). Ovelapping data tansmissions of N 1 and N 3 lead to a collision. MAC potocol when opeating in the boadcast mode (i.e., in boadcasting mode, IEEE 8.11 becomes plain CSMA without any handshaking) [5]. Figue 1 illustates the channel access mechanism fo geneic coodinated and non-coodinated MAC potocols. In the coodinated MAC potocol, node N is the clustehead (coodinato) fo the potion of the netwok consisting of five nodes. Channel access is egulated though a schedule that is boadcast by the coodinato. Upon eception of the schedule, nodes tansmit thei data at thei allocated time, and thus collisions among nodes within the same cluste ae eliminated. Time is oganized into cyclic time fames, and the tansmission schedule is dynamically updated at the beginning of each time fame. IEEE is a ecent example of such a coodinated MAC potocol [5]. In the non-coodinated MAC potocol, each node detemines its own tansmission time based on feedback obtained though caie sensing on the channel. Thus, conflicts in data tansmission attempts (i.e., collisions, captue) ae unavoidable in the non-coodinated scheme. IEEE 8.11 is a well-known example of a noncoodinated MAC potocol when it is used fo boadcasting. MH-TRACE (Multi-Hop Time Resevation Using Adaptive
2 Contol fo Enegy Efficiency) is a ecent example of a coodinated MAC potocol that elies on contol packet exchanges fo its opeation. A compaative evaluation of IEEE 8.11 and MH-TRACE fo eal-time data boadcasting using a pefect channel showed that the pefomance of MH-TRACE is bette than IEEE 8.11 in tems of thoughput and enegy efficiency unde vaious netwok conditions [6]. Howeve, due to the elatively complicated design of MH-TRACE, which elies on obust contol packet exchange, the advantages of MH-TRACE ove IEEE 8.11 ae questionable unde a ealistic channel eo model. In ou pevious wok we pesented a compaative pefomance evaluation of IEEE 8.11 and MH-TRACE when they ae utilized fo single hop data boadcasting. The oveall pefomance (e.g., QoS, enegy dissipation) of these potocols is diectly detemined by the pefomance of the MAC potocol fo a elatively low bit eo ate (BER) level (i.e., BER = 1 4 ) though ns- simulations [7]. We used a single-hop boadcasting scenaio to clealy assess the pefomance of the MAC laye without being affected by the uppe layes. Ou analysis evealed that the pefomance of MH-TRACE is still bette than the pefomance of IEEE 8.11 in tems of thoughput and enegy efficiency fo a channel BER of 1 4. In this study we pesent an analysis of the effects of channel noise fo IEEE 8.11 and MH-TRACE fo a wide ange of BER levels though mathematical models suppoted by ns- simulations. BACKGROUND In this section we pesent an oveview of IEEE 8.11 and MH-TRACE when they ae used fo single-hop data boadcasting. IEEE 8.11 In boadcasting mode, IEEE 8.11 uses p-pesistent CSMA with a constant defe window length (i.e., the default minimum defe peiod) [5]. When a node has a packet to boadcast, it picks a andom defe time and stats to sense the channel. When the channel is sensed idle, the defe time counts down fom the initially selected defe time at the end of each time slot. When the channel is sensed busy, the defe time is not decemented. Upon the expiation of the defe time, the packet is boadcast. MH-TRACE Multi-Hop Time Resevation Using Adaptive Contol fo Enegy Efficiency (MH-TRACE) is a MAC potocol designed fo enegy-efficient eal-time data boadcasting [6]. C C 1 C 3 Fame 1 Fame Fame 3 Fame 4 Fame 5 Fame 6 Fame 7 Supefame N - 1 Supefame N Supefame N + 1 C 4 C 5 C 7 C 6 Fig.. A snapshot of MH-TRACE clusteing and medium access fo a potion of an actual distibution of mobile nodes. Nodes C 1 - C 7 ae clustehead nodes. Figue shows a snapshot of MH-TRACE clusteing and medium access. In MH-TRACE, the netwok is patitioned into ovelapping clustes though a distibuted algoithm. Time is oganized into cyclic constant duation supefames consisting of seveal fames. Each clustehead chooses the least noisy fame to opeate within and dynamically changes its fame accoding to the intefeence level of the dynamic netwok. Nodes gain channel access though a dynamically updated and monitoed tansmission schedule ceated by the clusteheads. Each fame consists of a contol sub-fame fo tansmission of contol packets and a contention-fee data sub-fame fo data tansmission (see Figue 3). Beacon packets ae used fo the announcement of the stat of a new fame; Clustehead Announcement (CA) packets ae used fo educing co-fame cluste intefeence; contention slots ae used fo initial channel access equests; the heade packet is used fo announcing the data tansmission schedule fo the cuent fame; and Infomation Summaization (IS) packets ae used fo announcing the upcoming data packets. IS packets ae cucial in enegy saving. Each scheduled node tansmits its data at the eseved data slot. Fig. 3. CA Slot Beacon Contol sub-fame sub-fame Contention Slot Heade IS Slot Slots - MH-TRACE fame stuctue.
3 TABLE I SIMULATION PARAMETERS Aconym Desciption Value T SF Supefame duation 5.17 ms N F Numbe of fames 7 N DS Numbe of data slots pe fame 7 N C Numbe of cont. slots pe fame 6 T H Heade slot duation 9 s T B,CA,C,IS Beacon, CA, Cont., IS slot du. 3 s T D slot duation 43 s N/A packet size 14 B N/A Heade packet size 4-18 B N/A All othe contol packet size 4 B T dop Packet dop theshold 5 ms T V F Voice packet geneation peiod 5.17 ms D T Tansmission ange 5 m D CS Caie Sense ange 57 m # of Packets Numbe of Dopped Packets pe Single Contol Packet Loss Lost Contol Packet Dopped Packets Beacon Heade Contention Fig. 4. MH-TRACE pefomance degadation in tems of dopped data packets fo beacon, heade, and contention packet losses..19 In MH-TRACE, nodes switch to sleep mode wheneve they ae not involved in data tansmission o eception, which saves the enegy that would be wasted in idle mode o in caie sensing. Instead of fequency division o code division, MH-TRACE clustes use the same speading code o fequency, and inte-cluste intefeence is avoided by using time division among the clustes to enable each node in the netwok to eceive all the desied data packets in its eceive ange, not just those fom nodes in the same cluste. Thus, MH-TRACE clusteing does not ceate had clustesthe clustes themselves ae only used fo assigning time slots fo nodes to tansmit thei data. Fo a moe complete desciption of MH-TRACE, the eade is efeed to [6]. ANALYTICAL MODEL In this section we develop an analytical model to estimate the pefomance of MH-TRACE as a function of BER. In ou analysis we do not conside any eo coection scheme, thus, if thee is at least one bit eo within a packet, then that packet is discaded. Random packet eos ae independently intoduced at the eceives. BASIC MODEL To minimize the numbe of paametes in the model, fist we conside a fully-connected netwok with a small numbe of static nodes. The numbe of data slots in one supefame is high enough to suppot all of the nodes in the netwok (see Table I). When thee ae no channel eos, all nodes should be able to tansmit and eceive without any packet dops o collisions. Thee will be only one clustehead in the netwok due to the fact that thee cannot be two clusteheads that can hea each othe diectly. The numbe of data packets geneated pe node pe second, (DP node ), is equal to the packet ate (R packet ) of MH-TRACE (i.e., one packet pe supefame time (1/ )). DP node = R packet = 1 (1) DP node epesents the numbe of data packets geneated by a single node in the netwok and can be egaded as the maximum numbe of packets a node can tansmit given that it has full access to a pefect channel wheneve it needs. Howeve a lossy channel will cause packet dops and theefoe the thoughput of the netwok will dop accodingly. In Figue 4, the coesponding thoughput losses due to coupted beacon, heade and contention packets ae given to illustate the impact of the paticula contol packet on oveall potocol pefomance. In these esults only the specified contol packets ae lost due to channel eos and all the othe packets ae not affected [7]. As can be seen fom the figue, heade packets ae vital to MH-TRACE and ae the packets whose loss has the most impact on the pefomance of MH-TRACE. Loss of contention packets cause 1 times less loss in data packets than loss of heade packets (.19). Finally, fo each beacon packet dopped, only.15 data packets ae dopped. Like beacon packet losses, losses of othe contol packets (e.g., IS, CA) do not significantly affect the thoughput of the netwok. Thus, the heade and contention packets ae the only contol packets whose loss due to channel noise significantly affect the netwok pefomance. Theefoe, we can wite the equation fo the tansmit thoughput of a single node (i.e., tansmit thoughput pe node pe second T node ) in tems of the data packets dopped befoe tansmission due to lost heade packets (DP L H ) and contention (DP L C ) packets: T node = DP node DP L H DP L C ()
4 Both (DP L H ) and (DP L C ) can be expanded as the poduct of thee pats. Numbe of data packets dopped pe heade/contention packet loss (DP L peh /DP L pec ). Numbe of heade/contention packets sent to a node/clustehead pe second (HP node /CP node ). Pobability of dopping a heade/contention packet (P H /P C ). As contention packets ae elatively shot (4 bytes), they ae less likely to be dopped than heade packets (16 bytes fo 6 boadcasting nodes). Futhemoe, since the souces ae continuous bit ate and MH-TRACE utilizes automatic channel access enewal, once a node gets channel access, it will not loose it and thus will not need to tansmit contention packets fo the est of the simulation time. Moeove, the numbe of dopped data packets pe lost heade packet is 1 times lage than the numbe of dopped data packets pe lost contention packet, as shown in Figue 4. Theefoe it is easonable to assume that the effect of losing contention packets can be neglected. Based on this assumption, the tansmit thoughput pe node pe second becomes: T node = DP node DP L H (3) T node = 1 DP L peh HP node P H. (4) In Equation (4), DP L peh is a constant (1.99) and HP node is equal to DP node since each node eceives one heade pe supe fame fom its clustehead. Finally P H depends on the length of the heade packet L H and is calculated fom the Bit Eo Rate (BER) of the channel. Theefoe, P H = {1 (1 BER) L H }. (5) T node = {1 (1 BER) LH } (6) T node = 1 [ {1 (1 BER) L H }]. (7) In ode to get the numbe of eceived packets pe second in the netwok we need to multiply the tansmit thoughput pe node pe second with the numbe of neighboing nodes N 1 (note that all the nodes can hea each othe in this netwok). Moeove, each data packet is eceived with a pobability P D, which is the pobability that a data packet (with length L D = 14 bytes) goes though the channel with no eo at a given BER. Accodingly, the eceive thoughput pe node pe second (T ) becomes: T = (N 1) T node (1 BER) LD. (8) Note that the eceive thoughput pe node pe second of IEEE 8.11 is simply equal to N 1 (1 BER) L D since in CSMA-type potocols such IEEE 8.11 in boadcasting Aveage Numbe of Received Packets MH TRACE MH TRACE Model IEEE 8.11 IEEE 8.11 Model Bit Eo Rate Fig. 5. Aveage numbe of eceived packets pe node pe second vesus bit eo ate (BER). mode, only data packets ae sent though the lossy channel and the thoughput is detemined by the BER of the channel and length of a data packet. We used the ns- simulato to validate the analytical model. The channel ate is set to Mbps, and all nodes have a CBR (Constant Bit Rate) data souce with 3 Kbps data ate, which coesponds to one voice packet pe supefame. The simulations ae un fo 1 s and epeated with the same paametes five times. In Figue 5 the analytical model fo MH-TRACE and IEEE 8.11 ae plotted against inceasing BER. Also the simulation esults ae included fo both potocols to demonstate the accuacy of the models. The thoughput of MH-TRACE dops by almost 5% at a BER aound On the othe hand, IEEE 8.11 etains almost 55% of its initial thoughput at the same BER (note that the initial thoughputs of both potocols ae the same). This diffeence can be tanslated into the fact that IEEE 8.11 pefoms 1% bette than MH-TRACE, which expeiences a wose pefomance degadation due to lost coodination packets [7]. These esults show that the analytical model poposed to estimate the thoughput of MH-TRACE is quite accuate. The model captues the fact that coodinated MAC potocols ae moe vulneable than non-coodinated MAC potocols to channel noise due to thei dependence on the obustness of the contol taffic. Howeve, in ou model, we teated the clustehead as a egula node inside the netwok, but in eality, a clustehead would not dop any data packets due to lost heade packets since the clustehead is the one geneating the heade packets. Theefoe, ou model slightly undeestimates the thoughput of MH-TRACE by teating the clustehead as an odinay node.
5 H n 1 L L- n 3 H- H- H Region 1 Region 3 Region y Assumptions: * Coodinates of the location of node n i is the oigin fo calculation. * x is distance between theoigin and the edge of the field. Theefoe; * x anges fom zeo to. * The coveage does not depend on vetical displacement of the node. (Povided that node stays inside egion.) Fig. 6. n L- Region 1 Region Region 3 L Rectangula field patitioned into thee diffeent egions. n i x x Can be calculated by a simple integal A(x ) = π 1 Aveage Coveage= A(x )dx GENERAL MODEL In this section, we conside a ectangula field (L H) in which a cetain numbe of nodes (N), which have a communication adius (), ae andomly deployed. We use a statistical voice souce model that classifies speech into sputs and gaps (i.e., gaps ae the silent moments duing a convesation). Duing gaps, no data packets ae geneated, and duing sputs, data packets ae geneated at 3 Kbps data ate. Both sputs and gaps ae exponentially distibuted statistically independent andom vaiables, with means η s = 1.s and η g = 1.35s, espectively [8]. Ou appoach to this moe complex model will be basically the same as befoe. We begin by calculating the tansmit thoughput pe node pe second (T node ) when the channel is pefect. In addition to Equation (7) we need a tem that captues the effect of the voice souce model. This tem can easily be epesented with the atio of sputs to the whole convesation (η). Theefoe, we can wite T node as in Equation (9). T node = 1 [1 1.99{1 (1 BER) L H }][η] = 1 η s [1 1.99{1 (1 BER) LH }][ ] η s + η g (9) Afte obtaining the expession fo the tansmit thoughput pe node pe second, we have to find an expession fo the aveage numbe of nodes within the communication age of a given node (i.e., the aveage numbe of neighbos fo a given node). In Figue 6, the ectangula field is patitioned into thee diffeent egions accoding to the coveage chaacteistic of a node in a paticula egion. Fo example, a node inside egion 1 (e.g., n ) has its full coveage within the boundaies of the field. Theefoe, any node inside egion 1 utilizes 1% of its total coveage. Wheeas nodes inside egions and 3 (e.g., n 1 and n 3 ) Fig. 7. Calculation of the pecentage coveage of a node inside egion. have a pat of thei coveage outside the field of inteest and consequently the aveage pecentage coveage fo these nodes is less than 1%. Finding the pecentage coveage fo each egion will lead us to the aveage numbe of neighbos. We stat the deivation of the pecentage with egion. In Figue 7 the appoach we used fo obtaining the pecentage is given. The aea of the piece of cicle shaded in Figue 7 can be expessed as follows: I = x x dx = π 4 x x acsin(x ). Thus, the aveage coveage fo egion (α ) becomes, α = 1 = 1 A(x )dx = π 3. ( π I(x ) ) dx (1) (11) Afte obtaining the aveage coveage as in Equation (11), we can easily calculate the pecentage coveage of egion (σ ). σ = α π = 1 3π (1) Next we deive the aveage coveage fo egion 3 (σ 3 ). The aea in question is divided into thee pats (see Figue 8). Accoding to this patitioning we have A = π (A 1 + A A 3 ), which is the coveage fo a node inside egion 3. The integals fo A 1 and A ae the same as I given in Equation (1) and can be expessed as I(x ) and I(y ), espectively.
6 y ( ) A 3 = x y x = y y dx + y acsin( ) (13) x x acsin( x ) + y x. Afte obtaining A 3, we can calculate the aveage coveage α 3 by taking the aveage of A. α 3 = 1 = π 9 4. Thus, σ 3 becomes: A (x, y ) dx dy (14) σ 3 = α 3 π = 1 9 (15) 4π This is the last pecentage coveage we needed to calculate the oveall pecentage coveage (σ), o the aveage numbe of nodes within the ange of a given node inside the ectangula field. Below we give the esulting σ in tems of the communication adius, the length of the field L and the height of the field H. σ = σ 1(L )(H ) + σ (H + L 4) + 4σ 3 LH (16) This expession can be used to calculate the aveage numbe of neighboing nodes (N N ) fo a node inside of a ectangula field by multiplying σ with π (i.e., the coveage of a node with communication adius ) and the node density ( (N 1) LH ). Note that thee ae N 1 nodes emaining that can be neighbos. (N 1)σπ N N = (17) LH Now, we can combine Equation (17) with Equation (9) to get the eceive thoughput pe node pe second T. Aveage numbe of eceived packets MHTRACE no eo Numbe of Nodes Fig. 9. Aveage numbe of eceived packets pe node pe second vesus numbe of nodes. T = N N T node (1 BER) L D (18) Accoding to ou model, given that we have a constant simulation aea and the same taffic model, thoughput inceases as the numbe of nodes in the netwok inceases. In othe wods, the model suggests that thoughput inceases linealy with inceasing node density. Howeve, ou pevious wok showed that thoughput pe node pe second goes into satuation as the numbe of nodes in the netwok inceases (see Figue 9). This tend is a esult of packet collisions and dops emeging fom mobility and inceased contention fo channel access [7]. Accoding to this fact, we have to modify ou initial thoughput value (thoughput when thee is a pefect channel) in ode to get a moe accuate model fo thoughput. Since it is extemely challenging to model the dynamical behavio in Figue 9 analytically, the initial thoughput values ae calibated accoding to feedback fom simulation esults. SIMULATIONS In this section we pesent simulations to demonstate the validity of the analytical esults. The simulation paametes ae given in Table II. y TABLE II SIMULATION SETUP y => x A 1 x => A => A 3 Fig. 8. Calculation of the pecentage coveage of a node inside egion 3. PARAMETER SET 1 SET Numbe of Nodes 1 1 Simulation Aea 1m x 1m 1m x 1m Simulation Time s s Potocol MH-TRACE/ MH-TRACE/ IEEE 8.11 IEEE 8.11 Numbe of Repetition 1 1 Node Mobility Stationay Mobile
7 Aveage Numbe of Received Packets MH TRACE MH TRACE Model IEEE 8.11 IEEE 8.11 Model Bit Eo Rate Fig. 1. SET 1 (Stationay nodes): Aveage numbe of eceived packets pe node pe second vesus bit eo ate (BER). The esults of SET 1 simulations ae given in Figue 1, which pesents the eceive thoughput pe node pe second fo MH-TRACE and IEEE 8.11 along with the analytical esluts as a function of the BER. MH-TRACE thoughput is obtained fom the analytical model in Equation (18). The guideline fo IEEE 8.11 is obtained by using the pobability of successful data packet tansmission ((1 BER) L D ) and the initial thoughput value. When we look at Figue 1, we see that the thoughput of MH-TRACE is highe than IEEE 8.11 fo low BER (i.e., BER < 1 4 ). Howeve, as BER inceases, MH-TRACE thoughput deceases below the thoughput of IEEE Although this pefomance loss seems to be a dawback fo any coodinated potocol, we have to keep in mind that the BER value at which the pefomance of MH-TRACE becomes wose than IEEE 8.11 causes almost 3% of the data packets to be dopped. Fo SET simulations, nodes ae mobile and we use a Random Way-Point mobility model with node speeds chosen fom a unifom distibution between. m/s and 5. m/s (the aveage pace of a maathon unne) with zeo pause time. As shown in Figue 11, the aveage thoughputs fo MH-TRACE and IEEE 8.11 ae almost 4% moe than Aveage Numbe of Received Packets MH TRACE MH TRACE Model IEEE 8.11 IEEE 8.11 Model Bit Eo Rate Fig. 11. SET (Mobile nodes): Aveage numbe of eceived packets pe node pe second vesus bit eo ate (BER). the thoughputs with stationay nodes. This is a esult of the mobility model which makes the nodes accumulate in the middle of the field instead of distibuting them unifomly [9], poviding a lage aveage numbe of neighbos (N N ) than in the stationay case. Theefoe the initial thoughput value is calibated. Note that afte adjusting the initial value the fom of the cuve tacks the simulation esults closely. CONCLUSIONS In this pape we poposed an analytical model fo the thoughput of MH-TRACE. Paametes such as netwok aea, numbe of nodes and BER of the channel ae included in the model. Moeove, we deived an expession to detemine the aveage numbe of single-hop neighbos. The impact of channel eos on the pefomance of MH-TRACE and IEEE 8.11, which ae examples of coodinated and non-coodinated MAC potocols, espectively, ae estimated by using this model. We also pesented ns- simulations to demonstate the validity of the model. As expected, the pefomance of MH-TRACE is bette than IEEE 8.11 fo low-mid BER levels. Howeve, fo extemely high BER ates IEEE 8.11 pefomance is bette than MH-TRACE due to the dependence of MH-TRACE on the obustness of the contol packet taffic. Howeve, fo highe data ates o node densities, we expect MH-TRACE to pefom bette than IEEE 8.11 even unde vey high BER levels due to its coodinated channel access mechanism. REFERENCES [1] W. Stallings. Wieless Communications and Netwoks. Pentice-Hall,. [] A. Chanda, V. Gummalla, and J. O. Limb. Wieless medium access contol potocols. IEEE Communications Suveys and Tutoials, 3: 15,. [3] P. Mohapata, J. Li, and C. Gui. QoS in mobile ad hoc netwoks. IEEE Wieless Communications, 1(3):44 5, June 3. [4] D. A. Maltz, J. Boch, and D. B. Johnson. Lessons fom a full-scale multihop wieless ad hoc netwok testbed. IEEE Pesonal Commun. Mag., 8(1):8 15, Feb 1. [5] T. Cooklev. Wieless Communication Standats. IEEE Pess, 4. [6] B. Tavli and W. B. Heinzelman. MH-TRACE: Multi hop time esevation using adaptive contol fo enegy efficiency. IEEE Jounal on Selected Aeas of Communications, (5):94 953, June 4. [7] T. Numanoglu, B. Tavli, and W. B. Heinzelman. The effects of channel eos on coodinated and non-coodinated medium access contol potocols. IEEE Intenational Confeence on Wieless and Mobile Computing, 5 (Available at numanogl/wimob 5.pdf). [8] D. J. Goodman and S. X. Wei. Efficiency of packet esevation multiple access. IEEE Tans. Vehic. Tech., 4(1):17 176, Feb [9] W. Navidi and T. Camp. Stationay distibutions fo the andom waypoint mobility model. Technical Repot MCS-3-4, The Coloado School of Mines, Apil 3.
Adaptation of TDMA Parameters Based on Network Conditions
Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.
More informationSlotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System
Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet
More informationJournal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012
2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo
More informationTopological Characteristic of Wireless Network
Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences
More informationINFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM
INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300
More informationOn the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks
On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New
More informationPerformance Optimization in Structured Wireless Sensor Networks
5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame
More informationWIRELESS sensor networks (WSNs), which are capable
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan
More informationTier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints
Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok 14260 Email:
More informationImage Enhancement in the Spatial Domain. Spatial Domain
8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along
More informationDynamic Topology Control to Reduce Interference in MANETs
Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity
More informationDetection and Recognition of Alert Traffic Signs
Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives
More informationA Memory Efficient Array Architecture for Real-Time Motion Estimation
A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN
More informationIP Network Design by Modified Branch Exchange Method
Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management
More information= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2
Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used
More informationEvent-based Location Dependent Data Services in Mobile WSNs
Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,
More informationOptical Flow for Large Motion Using Gradient Technique
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this
More informationA New Finite Word-length Optimization Method Design for LDPC Decoder
A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology
More informationLifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks
788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,
More informationModule 6 STILL IMAGE COMPRESSION STANDARDS
Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.
More informationModelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set
Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;
More informationA Recommender System for Online Personalization in the WUM Applications
A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based
More informationRT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver
1 RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Dive Amit Jain Daji Qiao Kang G. Shin The Univesity of Michigan Ann Abo, MI 4819, USA {amitj,dqiao,kgshin@eecs.umich.edu Abstact The cuent
More informationHierarchically Clustered P2P Streaming System
Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.
More informationA Novel Automatic White Balance Method For Digital Still Cameras
A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing
More informationMobility Pattern Recognition in Mobile Ad-Hoc Networks
Mobility Patten Recognition in Mobile Ad-Hoc Netwoks S. M. Mousavi Depatment of Compute Engineeing, Shaif Univesity of Technology sm_mousavi@ce.shaif.edu H. R. Rabiee Depatment of Compute Engineeing, Shaif
More informationAssessment of Track Sequence Optimization based on Recorded Field Operations
Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment
More informationA modal estimation based multitype sensor placement method
A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;
More informationAnalysis of Wired Short Cuts in Wireless Sensor Networks
Analysis of Wied Shot Cuts in Wieless Senso Netwos ohan Chitaduga Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles 90089, USA Email: chitadu@usc.edu Ahmed Helmy Depatment
More informationIP Multicast Simulation in OPNET
IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok
More informationTitle. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information
Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220
More informationIllumination methods for optical wear detection
Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical
More informationSegmentation of Casting Defects in X-Ray Images Based on Fractal Dimension
17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach
More informationAn Unsupervised Segmentation Framework For Texture Image Queries
An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu
More informationCommunication vs Distributed Computation: an alternative trade-off curve
Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,
More informationCombinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments
Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile
More informationA Two-stage and Parameter-free Binarization Method for Degraded Document Images
A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and
More informationAn Improved Resource Reservation Protocol
Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing
More informationGravitational Shift for Beginners
Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational
More informationANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS
ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth
More informationThe Dual Round Robin Matching Switch with Exhaustive Service
The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line
More informationControlled Information Maximization for SOM Knowledge Induced Learning
3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity
More informationPoint-Biserial Correlation Analysis of Fuzzy Attributes
Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh
More informationDISTRIBUTION MIXTURES
Application Example 7 DISTRIBUTION MIXTURES One fequently deals with andom vaiables the distibution of which depends on vaious factos. One example is the distibution of atmospheic paametes such as wind
More informationColor Correction Using 3D Multiview Geometry
Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,
More informationUCLA Papers. Title. Permalink. Authors. Publication Date. Localized Edge Detection in Sensor Fields. https://escholarship.org/uc/item/3fj6g58j
UCLA Papes Title Localized Edge Detection in Senso Fields Pemalink https://escholashipog/uc/item/3fj6g58j Authos K Chintalapudi Govindan Publication Date 3-- Pee eviewed escholashipog Poweed by the Califonia
More informationPositioning of a robot based on binocular vision for hand / foot fusion Long Han
2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,
More informationHeterogeneous V2V Communications in Multi-Link and Multi-RAT Vehicular Networks
1 Heteogeneous V2V Communications in Multi-Link and Multi-RAT Vehicula Netwoks Miguel Sepulce and Javie Gozalvez Abstact Connected and automated vehicles will enable advanced taffic safety and efficiency
More informationMinimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks
Available online at www.sciencediect.com Ad Hoc Netwoks 7 (29) 23 247 www.elsevie.com/locate/adhoc Minimizing spatial and time esevation with Collision-Awae DCF in mobile ad hoc netwoks Lubo Song a, Chansu
More informationPrioritized Traffic Recovery over GMPLS Networks
Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing
More informationSCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS
SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),
More informationBo Gu and Xiaoyan Hong*
Int. J. Ad Hoc and Ubiquitous Computing, Vol. 11, Nos. /3, 1 169 Tansition phase of connectivity fo wieless netwoks with gowing pocess Bo Gu and Xiaoyan Hong* Depatment of Compute Science, Univesity of
More informationConfiguring RSVP-ATM QoS Interworking
Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP
More informationMANET QoS support without reservations
SECURITY AND COMMUNICATION NETWORKS Secuity Comm. Netwoks (2010) Published online in Wiley InteScience (www.intescience.wiley.com)..183 SPECIAL ISSUE PAPER MANET QoS suppot without esevations Soon Y. Oh,
More informationModeling spatially-correlated data of sensor networks with irregular topologies
This full text pape was pee eviewed at the diection of IEEE Communications Society subject matte expets fo publication in the IEEE SECON 25 poceedings Modeling spatially-coelated data of senso netwoks
More informationSeparability and Topology Control of Quasi Unit Disk Graphs
Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,
More informationInterference-Aware Multicast for Wireless Multihop Networks
Intefeence-Awae Multicast fo Wieless Multihop Netwoks Daniel Letpatchya School of Electical and Compute Engineeing Geogia Institute of Technology Atlanta, Geogia 30332 0250 Douglas M. Blough School of
More informationFifth Wheel Modelling and Testing
Fifth heel Modelling and Testing en Masoy Mechanical Engineeing Depatment Floida Atlantic Univesity Boca aton, FL 4 Lois Malaptias IFMA Institut Fancais De Mechanique Advancee ampus De lemont Feand Les
More informationErasure-Coding Based Routing for Opportunistic Networks
Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant
More informationOn Error Estimation in Runge-Kutta Methods
Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment
More informationCharacterizing Data Deliverability of Greedy Routing in Wireless Sensor Networks
Chaacteizing Data Deliveability of Geedy Routing in Wieless Senso Netwoks Jinwei Liu, Lei Yu, Haiying Shen, Yangyang He and Jason Hallstom Depatment of Electical and Compute Engineeing, Clemson Univesity,
More informationLecture # 04. Image Enhancement in Spatial Domain
Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency
More information1.3 Multiplexing, Time-Switching, Point-to-Point versus Buses
http://achvlsi.ics.foth.g/~kateveni/534 1.3 Multiplexing, Time-Switching, Point-to-Point vesus Buses n R m Aggegation (multiplexing) Distibution (demultiplexing) Simplest Netwoking, like simplest pogamming:
More informationarxiv: v2 [physics.soc-ph] 30 Nov 2016
Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity
More informationConservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery
Poceedings of the 4th WSEAS Intenational Confeence on luid Mechanics and Aeodynamics, Elounda, Geece, August 1-3, 006 (pp337-34) Consevation Law of Centifugal oce and Mechanism of Enegy Tansfe Caused in
More informationAnalysis of Coexistence between IEEE , BLE and IEEE in the 2.4 GHz ISM Band
Analysis of Coexistence between IEEE 82.5.4, BLE and IEEE 82. in the 2.4 GHz ISM Band Radhakishnan Nataajan, Pouia Zand, Majid Nabi Holst I. I NTRODUCTION In ecent yeas, the emegence of IoT has led to
More informationHow to outperform IEEE802.11: Interference Aware (IA) MAC
How to outpefom IEEE802.11: Intefeence Awae (IA) MAC Daniela Maniezzo, Piepaolo egamo, Matteo Cesana, Maio Gela CS Dept. - Univesity of Califonia Los Angeles - UCLA, Califonia, USA Engineeing Dept., Feaa
More informationImprovement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1
Impovement of Fist-ode Takagi-Sugeno Models Using Local Unifom B-splines Felipe Fenández, Julio Gutiéez, Gacián Tiviño and Juan Calos Cespo Dep. Tecnología Fotónica, Facultad de Infomática Univesidad Politécnica
More informationTopic -3 Image Enhancement
Topic -3 Image Enhancement (Pat 1) DIP: Details Digital Image Pocessing Digital Image Chaacteistics Spatial Spectal Gay-level Histogam DFT DCT Pe-Pocessing Enhancement Restoation Point Pocessing Masking
More informationHISTOGRAMS are an important statistic reflecting the
JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe
More informationSignal integrity analysis and physically based circuit extraction of a mounted
emc design & softwae Signal integity analysis and physically based cicuit extaction of a mounted SMA connecto A poposed geneal appoach is given fo the definition of an equivalent cicuit with SMAs mounted
More informationMulti-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples
Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits
More informationADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM
ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,
More informationEE 6900: Interconnection Networks for HPC Systems Fall 2016
EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection
More informationTowards Adaptive Information Merging Using Selected XML Fragments
Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,
More information2. PROPELLER GEOMETRY
a) Fames of Refeence 2. PROPELLER GEOMETRY 10 th Intenational Towing Tank Committee (ITTC) initiated the pepaation of a dictionay and nomenclatue of ship hydodynamic tems and this wok was completed in
More informationA Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform
A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad
More informationRANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES
RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class
More informationQUALITY OF SERVICE DESIGN ISSUES IN MULTIMEDIA COMMUNICATIONS OVER POWER LINE NETWORKS SRINIVAS KATAR
QUALITY OF SERVICE DESIGN ISSUES IN MULTIMEDIA COMMUNICATIONS OVER POWER LINE NETWORKS By SRINIVAS KATAR A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT
More informationSpiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks
Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition
More informationAPPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE
APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE 1 YAROSLAVTSEV A.F., 2 Al-THUNEIBAT S.A., 3 AL TAWALBEH N.A 1 Depatment of Netwoking, SSUTI, Novosibisk, Russia
More informationFrequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters
Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using
More informationModeling Spatially Correlated Data in Sensor Networks
Modeling Spatially Coelated Data in Senso Netwoks Apoova Jindal and Konstantinos Psounis Univesity of Southen Califonia The physical phenomena monitoed by senso netwoks, e.g. foest tempeatue, wate contamination,
More informationComplete Solution to Potential and E-Field of a sphere of radius R and a charge density ρ[r] = CC r 2 and r n
Complete Solution to Potential and E-Field of a sphee of adius R and a chage density ρ[] = CC 2 and n Deive the electic field and electic potential both inside and outside of a sphee of adius R with a
More informationOn the throughput-cost tradeoff of multi-tiered optical network architectures
1 On the thoughput-cost tadeoff of multi-tieed optical netwok achitectues Guy Weichenbeg, Vincent W. S. Chan, and Muiel Médad Laboatoy fo Infomation and Decision Systems Massachusetts Institute of Technology
More informationAccurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen
Accuate Diffaction Efficiency Contol fo Multiplexed Volume Hologaphic Gatings Xuliang Han, Gichel Kim, and Ray T. Chen Micoelectonic Reseach Cente Depatment of Electical and Compute Engineeing Univesity
More informationQuality Aware Privacy Protection for Location-based Services
In Poceedings of the th Intenational Confeence on Database Systems fo Advanced Applications (DASFAA 007), Bangkok, Thailand, Apil 9-, 007. Quality Awae Pivacy Potection fo Location-based Sevices Zhen Xiao,,
More informationNumber of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks
Numbe of Paths and Neighbous Effect on Multipath Routing in Mobile Ad Hoc Netwoks Oday Jeew School of Infomation Systems and Accounting Univesity of Canbea Canbea ACT 2617, Austalia oday.jeew@canbea.edu.au
More informationA Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks
A Coss-Laye Famewok of QoS Routing and Distibuted Scheduling fo Mesh Netwoks Chi Haold Liu, Athanasios Gkelias, and Kin K. Leung Depatment of Electical and Electonic Engineeing, Impeial College London
More informationTransmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design
Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced
More information(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number.
Illustative G-C Simila cicles Alignments to Content Standads: G-C.A. Task (a, b) x y Fo this poblem, is a point in the - coodinate plane and is a positive numbe. a. Using a tanslation and a dilation, show
More informationModeling a shared medium access node with QoS distinction
Modeling a shaed medium access node with QoS distinction Matthias Gies, Jonas Geutet Compute Engineeing and Netwoks Laboatoy (TIK) Swiss Fedeal Institute of Technology Züich CH-8092 Züich, Switzeland email:
More informationAn Optimised Density Based Clustering Algorithm
Intenational Jounal of Compute Applications (0975 8887) Volume 6 No.9, Septembe 010 An Optimised Density Based Clusteing Algoithm J. Hencil Pete Depatment of Compute Science St. Xavie s College, Palayamkottai,
More informationThe concept of PARPS - Packet And Resource Plan Scheduling
The concept of PARPS - Packet And Resouce Plan Scheduling Magnus Eiksson 1 and Håkan Sätebeg 2 1) Dept. of Signals, Sensos and Systems, Royal Inst. of Technology, Sweden. E-mail: magnus.eiksson@ite.mh.se.
More informationTopic 7 Random Variables and Distribution Functions
Definition of a Random Vaiable Distibution Functions Popeties of Distibution Functions Topic 7 Random Vaiables and Distibution Functions Distibution Functions 1 / 11 Definition of a Random Vaiable Distibution
More informationExtract Object Boundaries in Noisy Images using Level Set. Final Report
Extact Object Boundaies in Noisy Images using Level Set by: Quming Zhou Final Repot Submitted to Pofesso Bian Evans EE381K Multidimensional Digital Signal Pocessing May 10, 003 Abstact Finding object contous
More informationCOMPARISON OF CHIRP SCALING AND WAVENUMBER DOMAIN ALGORITHMS FOR AIRBORNE LOW FREQUENCY SAR DATA PROCESSING
COMPARISON OF CHIRP SCALING AND WAVENUMBER DOMAIN ALGORITHMS FOR AIRBORNE LOW FREQUENCY SAR DATA PROCESSING A. Potsis a, A. Reigbe b, E. Alivisatos a, A. Moeia c,and N. Uzunoglu a a National Technical
More informationObstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor
Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,
More informationDiversity-Multiplexing-Delay Tradeoffs in MIMO Multihop Networks with ARQ
ISIT, Austin, Texas, U.S.A., June - 8, Divesity-Multiplexing-Delay Tadeoffs in MIMO Multihop Netwos with ARQ Yao Xie, Andea Goldsmith Depatment of Electical Engineeing, Stanfod Univesity, Stanfod, CA.
More informationQuality-of-Content (QoC)-Driven Rate Allocation for Video Analysis in Mobile Surveillance Networks
Quality-of-Content (QoC)-Diven Rate Allocation fo Video Analysis in Mobile Suveillance Netwoks Xiang Chen, Jenq-Neng Hwang, Kuan-Hui Lee, Ricado L. de Queioz Depatment of Electical Engineeing, Univesity
More information