AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE

Size: px
Start display at page:

Download "AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE"

Transcription

1 AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity of Rocheste, Rocheste, NY 1467 USA {numanogl, tavli, ABSTRACT In this pape, we pesent an analysis of the effects of channel noise on the pefomance of coodinated and noncoodinated MAC potocols. In ode to obseve the degadation in the pefomance of a coodinated MAC potocol (MH-TRACE) with inceasing BER level, we ceated an analytical model to estimate MH-TRACE s pefomance. This analytical model is validated though simulation expeiments. Ou esults show that despite its highe level of vulneability, the coodinated MAC potocol s pefomance loss is compaable to the pefomance loss of the noncoodinated MAC potocol (IEEE 8.11) fo low to mid BER levels (i.e., BER < 1 4 ). On the othe hand, fo extemely high BER levels (i.e., BER 1 4 ) the pefomance loss of the coodinated MAC potocol is compaatively highe than the pefomance loss of the non-coodinated MAC potocol due to its dependence on contol taffic, which is also affected by the BER level. INTRODUCTION Medium Access Contol (MAC) potocols ae employed to contol access to the channel in ode to egulate tansmissions to avoid o minimize collisions [1]. Futhemoe, the MAC potocol is the key element in detemining many featues of a wieless netwok, such as thoughput, Quality of Sevice (QoS), enegy dissipation, fainess, stability, and obustness [], [3], [4]. In othe wods, the pefomance of a paticula netwok highly depends on the choice of the MAC potocol. MAC potocols can be classified into two categoies based on the collaboation level of the netwok in egulating the channel access: coodinated and non-coodinated. A coodinated MAC potocol opeates with explicit coodination among the nodes and is geneally associated with coodinatos, channel access schedules and clustes. A noncoodinated MAC potocol, on the othe hand, opeates without any explicit coodination among the nodes in the netwok. Fo example, IEEE 8.11 is a non-coodinated Abstact ID: 589. This wok was suppoted in pat by the Univesity of Rocheste Cente fo Electonic Imaging Systems and in pat by Hais Copoation, RF Communications Division. N 1 N 3 N Schedule N 3 N N N 1 N 3 N N 1 N 3 N Collision N N 1 N 3 N 1 Fig. 1. Illustation of coodinated and non-coodinated MAC potocols. The uppe left and ight panels show the node distibutions fo nodes N -. The lowe left panel shows the medium access fo the coodinated scheme, whee node N is the coodinato and the channel access is egulated though a schedule tansmitted by N. The lowe ight panel shows the channel access fo the non-coodinated scheme (e.g., CSMA). Ovelapping data tansmissions of N 1 and N 3 lead to a collision. MAC potocol when opeating in the boadcast mode (i.e., in boadcasting mode, IEEE 8.11 becomes plain CSMA without any handshaking) [5]. Figue 1 illustates the channel access mechanism fo geneic coodinated and non-coodinated MAC potocols. In the coodinated MAC potocol, node N is the clustehead (coodinato) fo the potion of the netwok consisting of five nodes. Channel access is egulated though a schedule that is boadcast by the coodinato. Upon eception of the schedule, nodes tansmit thei data at thei allocated time, and thus collisions among nodes within the same cluste ae eliminated. Time is oganized into cyclic time fames, and the tansmission schedule is dynamically updated at the beginning of each time fame. IEEE is a ecent example of such a coodinated MAC potocol [5]. In the non-coodinated MAC potocol, each node detemines its own tansmission time based on feedback obtained though caie sensing on the channel. Thus, conflicts in data tansmission attempts (i.e., collisions, captue) ae unavoidable in the non-coodinated scheme. IEEE 8.11 is a well-known example of a noncoodinated MAC potocol when it is used fo boadcasting. MH-TRACE (Multi-Hop Time Resevation Using Adaptive

2 Contol fo Enegy Efficiency) is a ecent example of a coodinated MAC potocol that elies on contol packet exchanges fo its opeation. A compaative evaluation of IEEE 8.11 and MH-TRACE fo eal-time data boadcasting using a pefect channel showed that the pefomance of MH-TRACE is bette than IEEE 8.11 in tems of thoughput and enegy efficiency unde vaious netwok conditions [6]. Howeve, due to the elatively complicated design of MH-TRACE, which elies on obust contol packet exchange, the advantages of MH-TRACE ove IEEE 8.11 ae questionable unde a ealistic channel eo model. In ou pevious wok we pesented a compaative pefomance evaluation of IEEE 8.11 and MH-TRACE when they ae utilized fo single hop data boadcasting. The oveall pefomance (e.g., QoS, enegy dissipation) of these potocols is diectly detemined by the pefomance of the MAC potocol fo a elatively low bit eo ate (BER) level (i.e., BER = 1 4 ) though ns- simulations [7]. We used a single-hop boadcasting scenaio to clealy assess the pefomance of the MAC laye without being affected by the uppe layes. Ou analysis evealed that the pefomance of MH-TRACE is still bette than the pefomance of IEEE 8.11 in tems of thoughput and enegy efficiency fo a channel BER of 1 4. In this study we pesent an analysis of the effects of channel noise fo IEEE 8.11 and MH-TRACE fo a wide ange of BER levels though mathematical models suppoted by ns- simulations. BACKGROUND In this section we pesent an oveview of IEEE 8.11 and MH-TRACE when they ae used fo single-hop data boadcasting. IEEE 8.11 In boadcasting mode, IEEE 8.11 uses p-pesistent CSMA with a constant defe window length (i.e., the default minimum defe peiod) [5]. When a node has a packet to boadcast, it picks a andom defe time and stats to sense the channel. When the channel is sensed idle, the defe time counts down fom the initially selected defe time at the end of each time slot. When the channel is sensed busy, the defe time is not decemented. Upon the expiation of the defe time, the packet is boadcast. MH-TRACE Multi-Hop Time Resevation Using Adaptive Contol fo Enegy Efficiency (MH-TRACE) is a MAC potocol designed fo enegy-efficient eal-time data boadcasting [6]. C C 1 C 3 Fame 1 Fame Fame 3 Fame 4 Fame 5 Fame 6 Fame 7 Supefame N - 1 Supefame N Supefame N + 1 C 4 C 5 C 7 C 6 Fig.. A snapshot of MH-TRACE clusteing and medium access fo a potion of an actual distibution of mobile nodes. Nodes C 1 - C 7 ae clustehead nodes. Figue shows a snapshot of MH-TRACE clusteing and medium access. In MH-TRACE, the netwok is patitioned into ovelapping clustes though a distibuted algoithm. Time is oganized into cyclic constant duation supefames consisting of seveal fames. Each clustehead chooses the least noisy fame to opeate within and dynamically changes its fame accoding to the intefeence level of the dynamic netwok. Nodes gain channel access though a dynamically updated and monitoed tansmission schedule ceated by the clusteheads. Each fame consists of a contol sub-fame fo tansmission of contol packets and a contention-fee data sub-fame fo data tansmission (see Figue 3). Beacon packets ae used fo the announcement of the stat of a new fame; Clustehead Announcement (CA) packets ae used fo educing co-fame cluste intefeence; contention slots ae used fo initial channel access equests; the heade packet is used fo announcing the data tansmission schedule fo the cuent fame; and Infomation Summaization (IS) packets ae used fo announcing the upcoming data packets. IS packets ae cucial in enegy saving. Each scheduled node tansmits its data at the eseved data slot. Fig. 3. CA Slot Beacon Contol sub-fame sub-fame Contention Slot Heade IS Slot Slots - MH-TRACE fame stuctue.

3 TABLE I SIMULATION PARAMETERS Aconym Desciption Value T SF Supefame duation 5.17 ms N F Numbe of fames 7 N DS Numbe of data slots pe fame 7 N C Numbe of cont. slots pe fame 6 T H Heade slot duation 9 s T B,CA,C,IS Beacon, CA, Cont., IS slot du. 3 s T D slot duation 43 s N/A packet size 14 B N/A Heade packet size 4-18 B N/A All othe contol packet size 4 B T dop Packet dop theshold 5 ms T V F Voice packet geneation peiod 5.17 ms D T Tansmission ange 5 m D CS Caie Sense ange 57 m # of Packets Numbe of Dopped Packets pe Single Contol Packet Loss Lost Contol Packet Dopped Packets Beacon Heade Contention Fig. 4. MH-TRACE pefomance degadation in tems of dopped data packets fo beacon, heade, and contention packet losses..19 In MH-TRACE, nodes switch to sleep mode wheneve they ae not involved in data tansmission o eception, which saves the enegy that would be wasted in idle mode o in caie sensing. Instead of fequency division o code division, MH-TRACE clustes use the same speading code o fequency, and inte-cluste intefeence is avoided by using time division among the clustes to enable each node in the netwok to eceive all the desied data packets in its eceive ange, not just those fom nodes in the same cluste. Thus, MH-TRACE clusteing does not ceate had clustesthe clustes themselves ae only used fo assigning time slots fo nodes to tansmit thei data. Fo a moe complete desciption of MH-TRACE, the eade is efeed to [6]. ANALYTICAL MODEL In this section we develop an analytical model to estimate the pefomance of MH-TRACE as a function of BER. In ou analysis we do not conside any eo coection scheme, thus, if thee is at least one bit eo within a packet, then that packet is discaded. Random packet eos ae independently intoduced at the eceives. BASIC MODEL To minimize the numbe of paametes in the model, fist we conside a fully-connected netwok with a small numbe of static nodes. The numbe of data slots in one supefame is high enough to suppot all of the nodes in the netwok (see Table I). When thee ae no channel eos, all nodes should be able to tansmit and eceive without any packet dops o collisions. Thee will be only one clustehead in the netwok due to the fact that thee cannot be two clusteheads that can hea each othe diectly. The numbe of data packets geneated pe node pe second, (DP node ), is equal to the packet ate (R packet ) of MH-TRACE (i.e., one packet pe supefame time (1/ )). DP node = R packet = 1 (1) DP node epesents the numbe of data packets geneated by a single node in the netwok and can be egaded as the maximum numbe of packets a node can tansmit given that it has full access to a pefect channel wheneve it needs. Howeve a lossy channel will cause packet dops and theefoe the thoughput of the netwok will dop accodingly. In Figue 4, the coesponding thoughput losses due to coupted beacon, heade and contention packets ae given to illustate the impact of the paticula contol packet on oveall potocol pefomance. In these esults only the specified contol packets ae lost due to channel eos and all the othe packets ae not affected [7]. As can be seen fom the figue, heade packets ae vital to MH-TRACE and ae the packets whose loss has the most impact on the pefomance of MH-TRACE. Loss of contention packets cause 1 times less loss in data packets than loss of heade packets (.19). Finally, fo each beacon packet dopped, only.15 data packets ae dopped. Like beacon packet losses, losses of othe contol packets (e.g., IS, CA) do not significantly affect the thoughput of the netwok. Thus, the heade and contention packets ae the only contol packets whose loss due to channel noise significantly affect the netwok pefomance. Theefoe, we can wite the equation fo the tansmit thoughput of a single node (i.e., tansmit thoughput pe node pe second T node ) in tems of the data packets dopped befoe tansmission due to lost heade packets (DP L H ) and contention (DP L C ) packets: T node = DP node DP L H DP L C ()

4 Both (DP L H ) and (DP L C ) can be expanded as the poduct of thee pats. Numbe of data packets dopped pe heade/contention packet loss (DP L peh /DP L pec ). Numbe of heade/contention packets sent to a node/clustehead pe second (HP node /CP node ). Pobability of dopping a heade/contention packet (P H /P C ). As contention packets ae elatively shot (4 bytes), they ae less likely to be dopped than heade packets (16 bytes fo 6 boadcasting nodes). Futhemoe, since the souces ae continuous bit ate and MH-TRACE utilizes automatic channel access enewal, once a node gets channel access, it will not loose it and thus will not need to tansmit contention packets fo the est of the simulation time. Moeove, the numbe of dopped data packets pe lost heade packet is 1 times lage than the numbe of dopped data packets pe lost contention packet, as shown in Figue 4. Theefoe it is easonable to assume that the effect of losing contention packets can be neglected. Based on this assumption, the tansmit thoughput pe node pe second becomes: T node = DP node DP L H (3) T node = 1 DP L peh HP node P H. (4) In Equation (4), DP L peh is a constant (1.99) and HP node is equal to DP node since each node eceives one heade pe supe fame fom its clustehead. Finally P H depends on the length of the heade packet L H and is calculated fom the Bit Eo Rate (BER) of the channel. Theefoe, P H = {1 (1 BER) L H }. (5) T node = {1 (1 BER) LH } (6) T node = 1 [ {1 (1 BER) L H }]. (7) In ode to get the numbe of eceived packets pe second in the netwok we need to multiply the tansmit thoughput pe node pe second with the numbe of neighboing nodes N 1 (note that all the nodes can hea each othe in this netwok). Moeove, each data packet is eceived with a pobability P D, which is the pobability that a data packet (with length L D = 14 bytes) goes though the channel with no eo at a given BER. Accodingly, the eceive thoughput pe node pe second (T ) becomes: T = (N 1) T node (1 BER) LD. (8) Note that the eceive thoughput pe node pe second of IEEE 8.11 is simply equal to N 1 (1 BER) L D since in CSMA-type potocols such IEEE 8.11 in boadcasting Aveage Numbe of Received Packets MH TRACE MH TRACE Model IEEE 8.11 IEEE 8.11 Model Bit Eo Rate Fig. 5. Aveage numbe of eceived packets pe node pe second vesus bit eo ate (BER). mode, only data packets ae sent though the lossy channel and the thoughput is detemined by the BER of the channel and length of a data packet. We used the ns- simulato to validate the analytical model. The channel ate is set to Mbps, and all nodes have a CBR (Constant Bit Rate) data souce with 3 Kbps data ate, which coesponds to one voice packet pe supefame. The simulations ae un fo 1 s and epeated with the same paametes five times. In Figue 5 the analytical model fo MH-TRACE and IEEE 8.11 ae plotted against inceasing BER. Also the simulation esults ae included fo both potocols to demonstate the accuacy of the models. The thoughput of MH-TRACE dops by almost 5% at a BER aound On the othe hand, IEEE 8.11 etains almost 55% of its initial thoughput at the same BER (note that the initial thoughputs of both potocols ae the same). This diffeence can be tanslated into the fact that IEEE 8.11 pefoms 1% bette than MH-TRACE, which expeiences a wose pefomance degadation due to lost coodination packets [7]. These esults show that the analytical model poposed to estimate the thoughput of MH-TRACE is quite accuate. The model captues the fact that coodinated MAC potocols ae moe vulneable than non-coodinated MAC potocols to channel noise due to thei dependence on the obustness of the contol taffic. Howeve, in ou model, we teated the clustehead as a egula node inside the netwok, but in eality, a clustehead would not dop any data packets due to lost heade packets since the clustehead is the one geneating the heade packets. Theefoe, ou model slightly undeestimates the thoughput of MH-TRACE by teating the clustehead as an odinay node.

5 H n 1 L L- n 3 H- H- H Region 1 Region 3 Region y Assumptions: * Coodinates of the location of node n i is the oigin fo calculation. * x is distance between theoigin and the edge of the field. Theefoe; * x anges fom zeo to. * The coveage does not depend on vetical displacement of the node. (Povided that node stays inside egion.) Fig. 6. n L- Region 1 Region Region 3 L Rectangula field patitioned into thee diffeent egions. n i x x Can be calculated by a simple integal A(x ) = π 1 Aveage Coveage= A(x )dx GENERAL MODEL In this section, we conside a ectangula field (L H) in which a cetain numbe of nodes (N), which have a communication adius (), ae andomly deployed. We use a statistical voice souce model that classifies speech into sputs and gaps (i.e., gaps ae the silent moments duing a convesation). Duing gaps, no data packets ae geneated, and duing sputs, data packets ae geneated at 3 Kbps data ate. Both sputs and gaps ae exponentially distibuted statistically independent andom vaiables, with means η s = 1.s and η g = 1.35s, espectively [8]. Ou appoach to this moe complex model will be basically the same as befoe. We begin by calculating the tansmit thoughput pe node pe second (T node ) when the channel is pefect. In addition to Equation (7) we need a tem that captues the effect of the voice souce model. This tem can easily be epesented with the atio of sputs to the whole convesation (η). Theefoe, we can wite T node as in Equation (9). T node = 1 [1 1.99{1 (1 BER) L H }][η] = 1 η s [1 1.99{1 (1 BER) LH }][ ] η s + η g (9) Afte obtaining the expession fo the tansmit thoughput pe node pe second, we have to find an expession fo the aveage numbe of nodes within the communication age of a given node (i.e., the aveage numbe of neighbos fo a given node). In Figue 6, the ectangula field is patitioned into thee diffeent egions accoding to the coveage chaacteistic of a node in a paticula egion. Fo example, a node inside egion 1 (e.g., n ) has its full coveage within the boundaies of the field. Theefoe, any node inside egion 1 utilizes 1% of its total coveage. Wheeas nodes inside egions and 3 (e.g., n 1 and n 3 ) Fig. 7. Calculation of the pecentage coveage of a node inside egion. have a pat of thei coveage outside the field of inteest and consequently the aveage pecentage coveage fo these nodes is less than 1%. Finding the pecentage coveage fo each egion will lead us to the aveage numbe of neighbos. We stat the deivation of the pecentage with egion. In Figue 7 the appoach we used fo obtaining the pecentage is given. The aea of the piece of cicle shaded in Figue 7 can be expessed as follows: I = x x dx = π 4 x x acsin(x ). Thus, the aveage coveage fo egion (α ) becomes, α = 1 = 1 A(x )dx = π 3. ( π I(x ) ) dx (1) (11) Afte obtaining the aveage coveage as in Equation (11), we can easily calculate the pecentage coveage of egion (σ ). σ = α π = 1 3π (1) Next we deive the aveage coveage fo egion 3 (σ 3 ). The aea in question is divided into thee pats (see Figue 8). Accoding to this patitioning we have A = π (A 1 + A A 3 ), which is the coveage fo a node inside egion 3. The integals fo A 1 and A ae the same as I given in Equation (1) and can be expessed as I(x ) and I(y ), espectively.

6 y ( ) A 3 = x y x = y y dx + y acsin( ) (13) x x acsin( x ) + y x. Afte obtaining A 3, we can calculate the aveage coveage α 3 by taking the aveage of A. α 3 = 1 = π 9 4. Thus, σ 3 becomes: A (x, y ) dx dy (14) σ 3 = α 3 π = 1 9 (15) 4π This is the last pecentage coveage we needed to calculate the oveall pecentage coveage (σ), o the aveage numbe of nodes within the ange of a given node inside the ectangula field. Below we give the esulting σ in tems of the communication adius, the length of the field L and the height of the field H. σ = σ 1(L )(H ) + σ (H + L 4) + 4σ 3 LH (16) This expession can be used to calculate the aveage numbe of neighboing nodes (N N ) fo a node inside of a ectangula field by multiplying σ with π (i.e., the coveage of a node with communication adius ) and the node density ( (N 1) LH ). Note that thee ae N 1 nodes emaining that can be neighbos. (N 1)σπ N N = (17) LH Now, we can combine Equation (17) with Equation (9) to get the eceive thoughput pe node pe second T. Aveage numbe of eceived packets MHTRACE no eo Numbe of Nodes Fig. 9. Aveage numbe of eceived packets pe node pe second vesus numbe of nodes. T = N N T node (1 BER) L D (18) Accoding to ou model, given that we have a constant simulation aea and the same taffic model, thoughput inceases as the numbe of nodes in the netwok inceases. In othe wods, the model suggests that thoughput inceases linealy with inceasing node density. Howeve, ou pevious wok showed that thoughput pe node pe second goes into satuation as the numbe of nodes in the netwok inceases (see Figue 9). This tend is a esult of packet collisions and dops emeging fom mobility and inceased contention fo channel access [7]. Accoding to this fact, we have to modify ou initial thoughput value (thoughput when thee is a pefect channel) in ode to get a moe accuate model fo thoughput. Since it is extemely challenging to model the dynamical behavio in Figue 9 analytically, the initial thoughput values ae calibated accoding to feedback fom simulation esults. SIMULATIONS In this section we pesent simulations to demonstate the validity of the analytical esults. The simulation paametes ae given in Table II. y TABLE II SIMULATION SETUP y => x A 1 x => A => A 3 Fig. 8. Calculation of the pecentage coveage of a node inside egion 3. PARAMETER SET 1 SET Numbe of Nodes 1 1 Simulation Aea 1m x 1m 1m x 1m Simulation Time s s Potocol MH-TRACE/ MH-TRACE/ IEEE 8.11 IEEE 8.11 Numbe of Repetition 1 1 Node Mobility Stationay Mobile

7 Aveage Numbe of Received Packets MH TRACE MH TRACE Model IEEE 8.11 IEEE 8.11 Model Bit Eo Rate Fig. 1. SET 1 (Stationay nodes): Aveage numbe of eceived packets pe node pe second vesus bit eo ate (BER). The esults of SET 1 simulations ae given in Figue 1, which pesents the eceive thoughput pe node pe second fo MH-TRACE and IEEE 8.11 along with the analytical esluts as a function of the BER. MH-TRACE thoughput is obtained fom the analytical model in Equation (18). The guideline fo IEEE 8.11 is obtained by using the pobability of successful data packet tansmission ((1 BER) L D ) and the initial thoughput value. When we look at Figue 1, we see that the thoughput of MH-TRACE is highe than IEEE 8.11 fo low BER (i.e., BER < 1 4 ). Howeve, as BER inceases, MH-TRACE thoughput deceases below the thoughput of IEEE Although this pefomance loss seems to be a dawback fo any coodinated potocol, we have to keep in mind that the BER value at which the pefomance of MH-TRACE becomes wose than IEEE 8.11 causes almost 3% of the data packets to be dopped. Fo SET simulations, nodes ae mobile and we use a Random Way-Point mobility model with node speeds chosen fom a unifom distibution between. m/s and 5. m/s (the aveage pace of a maathon unne) with zeo pause time. As shown in Figue 11, the aveage thoughputs fo MH-TRACE and IEEE 8.11 ae almost 4% moe than Aveage Numbe of Received Packets MH TRACE MH TRACE Model IEEE 8.11 IEEE 8.11 Model Bit Eo Rate Fig. 11. SET (Mobile nodes): Aveage numbe of eceived packets pe node pe second vesus bit eo ate (BER). the thoughputs with stationay nodes. This is a esult of the mobility model which makes the nodes accumulate in the middle of the field instead of distibuting them unifomly [9], poviding a lage aveage numbe of neighbos (N N ) than in the stationay case. Theefoe the initial thoughput value is calibated. Note that afte adjusting the initial value the fom of the cuve tacks the simulation esults closely. CONCLUSIONS In this pape we poposed an analytical model fo the thoughput of MH-TRACE. Paametes such as netwok aea, numbe of nodes and BER of the channel ae included in the model. Moeove, we deived an expession to detemine the aveage numbe of single-hop neighbos. The impact of channel eos on the pefomance of MH-TRACE and IEEE 8.11, which ae examples of coodinated and non-coodinated MAC potocols, espectively, ae estimated by using this model. We also pesented ns- simulations to demonstate the validity of the model. As expected, the pefomance of MH-TRACE is bette than IEEE 8.11 fo low-mid BER levels. Howeve, fo extemely high BER ates IEEE 8.11 pefomance is bette than MH-TRACE due to the dependence of MH-TRACE on the obustness of the contol packet taffic. Howeve, fo highe data ates o node densities, we expect MH-TRACE to pefom bette than IEEE 8.11 even unde vey high BER levels due to its coodinated channel access mechanism. REFERENCES [1] W. Stallings. Wieless Communications and Netwoks. Pentice-Hall,. [] A. Chanda, V. Gummalla, and J. O. Limb. Wieless medium access contol potocols. IEEE Communications Suveys and Tutoials, 3: 15,. [3] P. Mohapata, J. Li, and C. Gui. QoS in mobile ad hoc netwoks. IEEE Wieless Communications, 1(3):44 5, June 3. [4] D. A. Maltz, J. Boch, and D. B. Johnson. Lessons fom a full-scale multihop wieless ad hoc netwok testbed. IEEE Pesonal Commun. Mag., 8(1):8 15, Feb 1. [5] T. Cooklev. Wieless Communication Standats. IEEE Pess, 4. [6] B. Tavli and W. B. Heinzelman. MH-TRACE: Multi hop time esevation using adaptive contol fo enegy efficiency. IEEE Jounal on Selected Aeas of Communications, (5):94 953, June 4. [7] T. Numanoglu, B. Tavli, and W. B. Heinzelman. The effects of channel eos on coodinated and non-coodinated medium access contol potocols. IEEE Intenational Confeence on Wieless and Mobile Computing, 5 (Available at numanogl/wimob 5.pdf). [8] D. J. Goodman and S. X. Wei. Efficiency of packet esevation multiple access. IEEE Tans. Vehic. Tech., 4(1):17 176, Feb [9] W. Navidi and T. Camp. Stationay distibutions fo the andom waypoint mobility model. Technical Repot MCS-3-4, The Coloado School of Mines, Apil 3.

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300

More information

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok 14260 Email:

More information

Image Enhancement in the Spatial Domain. Spatial Domain

Image Enhancement in the Spatial Domain. Spatial Domain 8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along

More information

Dynamic Topology Control to Reduce Interference in MANETs

Dynamic Topology Control to Reduce Interference in MANETs Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2 Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used

More information

Event-based Location Dependent Data Services in Mobile WSNs

Event-based Location Dependent Data Services in Mobile WSNs Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver 1 RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Dive Amit Jain Daji Qiao Kang G. Shin The Univesity of Michigan Ann Abo, MI 4819, USA {amitj,dqiao,kgshin@eecs.umich.edu Abstact The cuent

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

Mobility Pattern Recognition in Mobile Ad-Hoc Networks

Mobility Pattern Recognition in Mobile Ad-Hoc Networks Mobility Patten Recognition in Mobile Ad-Hoc Netwoks S. M. Mousavi Depatment of Compute Engineeing, Shaif Univesity of Technology sm_mousavi@ce.shaif.edu H. R. Rabiee Depatment of Compute Engineeing, Shaif

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

Analysis of Wired Short Cuts in Wireless Sensor Networks

Analysis of Wired Short Cuts in Wireless Sensor Networks Analysis of Wied Shot Cuts in Wieless Senso Netwos ohan Chitaduga Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles 90089, USA Email: chitadu@usc.edu Ahmed Helmy Depatment

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

Gravitational Shift for Beginners

Gravitational Shift for Beginners Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

The Dual Round Robin Matching Switch with Exhaustive Service

The Dual Round Robin Matching Switch with Exhaustive Service The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

DISTRIBUTION MIXTURES

DISTRIBUTION MIXTURES Application Example 7 DISTRIBUTION MIXTURES One fequently deals with andom vaiables the distibution of which depends on vaious factos. One example is the distibution of atmospheic paametes such as wind

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

UCLA Papers. Title. Permalink. Authors. Publication Date. Localized Edge Detection in Sensor Fields. https://escholarship.org/uc/item/3fj6g58j

UCLA Papers. Title. Permalink. Authors. Publication Date. Localized Edge Detection in Sensor Fields. https://escholarship.org/uc/item/3fj6g58j UCLA Papes Title Localized Edge Detection in Senso Fields Pemalink https://escholashipog/uc/item/3fj6g58j Authos K Chintalapudi Govindan Publication Date 3-- Pee eviewed escholashipog Poweed by the Califonia

More information

Positioning of a robot based on binocular vision for hand / foot fusion Long Han

Positioning of a robot based on binocular vision for hand / foot fusion Long Han 2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,

More information

Heterogeneous V2V Communications in Multi-Link and Multi-RAT Vehicular Networks

Heterogeneous V2V Communications in Multi-Link and Multi-RAT Vehicular Networks 1 Heteogeneous V2V Communications in Multi-Link and Multi-RAT Vehicula Netwoks Miguel Sepulce and Javie Gozalvez Abstact Connected and automated vehicles will enable advanced taffic safety and efficiency

More information

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks Available online at www.sciencediect.com Ad Hoc Netwoks 7 (29) 23 247 www.elsevie.com/locate/adhoc Minimizing spatial and time esevation with Collision-Awae DCF in mobile ad hoc netwoks Lubo Song a, Chansu

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),

More information

Bo Gu and Xiaoyan Hong*

Bo Gu and Xiaoyan Hong* Int. J. Ad Hoc and Ubiquitous Computing, Vol. 11, Nos. /3, 1 169 Tansition phase of connectivity fo wieless netwoks with gowing pocess Bo Gu and Xiaoyan Hong* Depatment of Compute Science, Univesity of

More information

Configuring RSVP-ATM QoS Interworking

Configuring RSVP-ATM QoS Interworking Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP

More information

MANET QoS support without reservations

MANET QoS support without reservations SECURITY AND COMMUNICATION NETWORKS Secuity Comm. Netwoks (2010) Published online in Wiley InteScience (www.intescience.wiley.com)..183 SPECIAL ISSUE PAPER MANET QoS suppot without esevations Soon Y. Oh,

More information

Modeling spatially-correlated data of sensor networks with irregular topologies

Modeling spatially-correlated data of sensor networks with irregular topologies This full text pape was pee eviewed at the diection of IEEE Communications Society subject matte expets fo publication in the IEEE SECON 25 poceedings Modeling spatially-coelated data of senso netwoks

More information

Separability and Topology Control of Quasi Unit Disk Graphs

Separability and Topology Control of Quasi Unit Disk Graphs Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,

More information

Interference-Aware Multicast for Wireless Multihop Networks

Interference-Aware Multicast for Wireless Multihop Networks Intefeence-Awae Multicast fo Wieless Multihop Netwoks Daniel Letpatchya School of Electical and Compute Engineeing Geogia Institute of Technology Atlanta, Geogia 30332 0250 Douglas M. Blough School of

More information

Fifth Wheel Modelling and Testing

Fifth Wheel Modelling and Testing Fifth heel Modelling and Testing en Masoy Mechanical Engineeing Depatment Floida Atlantic Univesity Boca aton, FL 4 Lois Malaptias IFMA Institut Fancais De Mechanique Advancee ampus De lemont Feand Les

More information

Erasure-Coding Based Routing for Opportunistic Networks

Erasure-Coding Based Routing for Opportunistic Networks Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant

More information

On Error Estimation in Runge-Kutta Methods

On Error Estimation in Runge-Kutta Methods Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment

More information

Characterizing Data Deliverability of Greedy Routing in Wireless Sensor Networks

Characterizing Data Deliverability of Greedy Routing in Wireless Sensor Networks Chaacteizing Data Deliveability of Geedy Routing in Wieless Senso Netwoks Jinwei Liu, Lei Yu, Haiying Shen, Yangyang He and Jason Hallstom Depatment of Electical and Compute Engineeing, Clemson Univesity,

More information

Lecture # 04. Image Enhancement in Spatial Domain

Lecture # 04. Image Enhancement in Spatial Domain Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency

More information

1.3 Multiplexing, Time-Switching, Point-to-Point versus Buses

1.3 Multiplexing, Time-Switching, Point-to-Point versus Buses http://achvlsi.ics.foth.g/~kateveni/534 1.3 Multiplexing, Time-Switching, Point-to-Point vesus Buses n R m Aggegation (multiplexing) Distibution (demultiplexing) Simplest Netwoking, like simplest pogamming:

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery Poceedings of the 4th WSEAS Intenational Confeence on luid Mechanics and Aeodynamics, Elounda, Geece, August 1-3, 006 (pp337-34) Consevation Law of Centifugal oce and Mechanism of Enegy Tansfe Caused in

More information

Analysis of Coexistence between IEEE , BLE and IEEE in the 2.4 GHz ISM Band

Analysis of Coexistence between IEEE , BLE and IEEE in the 2.4 GHz ISM Band Analysis of Coexistence between IEEE 82.5.4, BLE and IEEE 82. in the 2.4 GHz ISM Band Radhakishnan Nataajan, Pouia Zand, Majid Nabi Holst I. I NTRODUCTION In ecent yeas, the emegence of IoT has led to

More information

How to outperform IEEE802.11: Interference Aware (IA) MAC

How to outperform IEEE802.11: Interference Aware (IA) MAC How to outpefom IEEE802.11: Intefeence Awae (IA) MAC Daniela Maniezzo, Piepaolo egamo, Matteo Cesana, Maio Gela CS Dept. - Univesity of Califonia Los Angeles - UCLA, Califonia, USA Engineeing Dept., Feaa

More information

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1 Impovement of Fist-ode Takagi-Sugeno Models Using Local Unifom B-splines Felipe Fenández, Julio Gutiéez, Gacián Tiviño and Juan Calos Cespo Dep. Tecnología Fotónica, Facultad de Infomática Univesidad Politécnica

More information

Topic -3 Image Enhancement

Topic -3 Image Enhancement Topic -3 Image Enhancement (Pat 1) DIP: Details Digital Image Pocessing Digital Image Chaacteistics Spatial Spectal Gay-level Histogam DFT DCT Pe-Pocessing Enhancement Restoation Point Pocessing Masking

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

Signal integrity analysis and physically based circuit extraction of a mounted

Signal integrity analysis and physically based circuit extraction of a mounted emc design & softwae Signal integity analysis and physically based cicuit extaction of a mounted SMA connecto A poposed geneal appoach is given fo the definition of an equivalent cicuit with SMAs mounted

More information

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

EE 6900: Interconnection Networks for HPC Systems Fall 2016

EE 6900: Interconnection Networks for HPC Systems Fall 2016 EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

2. PROPELLER GEOMETRY

2. PROPELLER GEOMETRY a) Fames of Refeence 2. PROPELLER GEOMETRY 10 th Intenational Towing Tank Committee (ITTC) initiated the pepaation of a dictionay and nomenclatue of ship hydodynamic tems and this wok was completed in

More information

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

QUALITY OF SERVICE DESIGN ISSUES IN MULTIMEDIA COMMUNICATIONS OVER POWER LINE NETWORKS SRINIVAS KATAR

QUALITY OF SERVICE DESIGN ISSUES IN MULTIMEDIA COMMUNICATIONS OVER POWER LINE NETWORKS SRINIVAS KATAR QUALITY OF SERVICE DESIGN ISSUES IN MULTIMEDIA COMMUNICATIONS OVER POWER LINE NETWORKS By SRINIVAS KATAR A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE 1 YAROSLAVTSEV A.F., 2 Al-THUNEIBAT S.A., 3 AL TAWALBEH N.A 1 Depatment of Netwoking, SSUTI, Novosibisk, Russia

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

Modeling Spatially Correlated Data in Sensor Networks

Modeling Spatially Correlated Data in Sensor Networks Modeling Spatially Coelated Data in Senso Netwoks Apoova Jindal and Konstantinos Psounis Univesity of Southen Califonia The physical phenomena monitoed by senso netwoks, e.g. foest tempeatue, wate contamination,

More information

Complete Solution to Potential and E-Field of a sphere of radius R and a charge density ρ[r] = CC r 2 and r n

Complete Solution to Potential and E-Field of a sphere of radius R and a charge density ρ[r] = CC r 2 and r n Complete Solution to Potential and E-Field of a sphee of adius R and a chage density ρ[] = CC 2 and n Deive the electic field and electic potential both inside and outside of a sphee of adius R with a

More information

On the throughput-cost tradeoff of multi-tiered optical network architectures

On the throughput-cost tradeoff of multi-tiered optical network architectures 1 On the thoughput-cost tadeoff of multi-tieed optical netwok achitectues Guy Weichenbeg, Vincent W. S. Chan, and Muiel Médad Laboatoy fo Infomation and Decision Systems Massachusetts Institute of Technology

More information

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen Accuate Diffaction Efficiency Contol fo Multiplexed Volume Hologaphic Gatings Xuliang Han, Gichel Kim, and Ray T. Chen Micoelectonic Reseach Cente Depatment of Electical and Compute Engineeing Univesity

More information

Quality Aware Privacy Protection for Location-based Services

Quality Aware Privacy Protection for Location-based Services In Poceedings of the th Intenational Confeence on Database Systems fo Advanced Applications (DASFAA 007), Bangkok, Thailand, Apil 9-, 007. Quality Awae Pivacy Potection fo Location-based Sevices Zhen Xiao,,

More information

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks Numbe of Paths and Neighbous Effect on Multipath Routing in Mobile Ad Hoc Netwoks Oday Jeew School of Infomation Systems and Accounting Univesity of Canbea Canbea ACT 2617, Austalia oday.jeew@canbea.edu.au

More information

A Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks

A Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks A Coss-Laye Famewok of QoS Routing and Distibuted Scheduling fo Mesh Netwoks Chi Haold Liu, Athanasios Gkelias, and Kin K. Leung Depatment of Electical and Electonic Engineeing, Impeial College London

More information

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced

More information

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number.

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number. Illustative G-C Simila cicles Alignments to Content Standads: G-C.A. Task (a, b) x y Fo this poblem, is a point in the - coodinate plane and is a positive numbe. a. Using a tanslation and a dilation, show

More information

Modeling a shared medium access node with QoS distinction

Modeling a shared medium access node with QoS distinction Modeling a shaed medium access node with QoS distinction Matthias Gies, Jonas Geutet Compute Engineeing and Netwoks Laboatoy (TIK) Swiss Fedeal Institute of Technology Züich CH-8092 Züich, Switzeland email:

More information

An Optimised Density Based Clustering Algorithm

An Optimised Density Based Clustering Algorithm Intenational Jounal of Compute Applications (0975 8887) Volume 6 No.9, Septembe 010 An Optimised Density Based Clusteing Algoithm J. Hencil Pete Depatment of Compute Science St. Xavie s College, Palayamkottai,

More information

The concept of PARPS - Packet And Resource Plan Scheduling

The concept of PARPS - Packet And Resource Plan Scheduling The concept of PARPS - Packet And Resouce Plan Scheduling Magnus Eiksson 1 and Håkan Sätebeg 2 1) Dept. of Signals, Sensos and Systems, Royal Inst. of Technology, Sweden. E-mail: magnus.eiksson@ite.mh.se.

More information

Topic 7 Random Variables and Distribution Functions

Topic 7 Random Variables and Distribution Functions Definition of a Random Vaiable Distibution Functions Popeties of Distibution Functions Topic 7 Random Vaiables and Distibution Functions Distibution Functions 1 / 11 Definition of a Random Vaiable Distibution

More information

Extract Object Boundaries in Noisy Images using Level Set. Final Report

Extract Object Boundaries in Noisy Images using Level Set. Final Report Extact Object Boundaies in Noisy Images using Level Set by: Quming Zhou Final Repot Submitted to Pofesso Bian Evans EE381K Multidimensional Digital Signal Pocessing May 10, 003 Abstact Finding object contous

More information

COMPARISON OF CHIRP SCALING AND WAVENUMBER DOMAIN ALGORITHMS FOR AIRBORNE LOW FREQUENCY SAR DATA PROCESSING

COMPARISON OF CHIRP SCALING AND WAVENUMBER DOMAIN ALGORITHMS FOR AIRBORNE LOW FREQUENCY SAR DATA PROCESSING COMPARISON OF CHIRP SCALING AND WAVENUMBER DOMAIN ALGORITHMS FOR AIRBORNE LOW FREQUENCY SAR DATA PROCESSING A. Potsis a, A. Reigbe b, E. Alivisatos a, A. Moeia c,and N. Uzunoglu a a National Technical

More information

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,

More information

Diversity-Multiplexing-Delay Tradeoffs in MIMO Multihop Networks with ARQ

Diversity-Multiplexing-Delay Tradeoffs in MIMO Multihop Networks with ARQ ISIT, Austin, Texas, U.S.A., June - 8, Divesity-Multiplexing-Delay Tadeoffs in MIMO Multihop Netwos with ARQ Yao Xie, Andea Goldsmith Depatment of Electical Engineeing, Stanfod Univesity, Stanfod, CA.

More information

Quality-of-Content (QoC)-Driven Rate Allocation for Video Analysis in Mobile Surveillance Networks

Quality-of-Content (QoC)-Driven Rate Allocation for Video Analysis in Mobile Surveillance Networks Quality-of-Content (QoC)-Diven Rate Allocation fo Video Analysis in Mobile Suveillance Netwoks Xiang Chen, Jenq-Neng Hwang, Kuan-Hui Lee, Ricado L. de Queioz Depatment of Electical Engineeing, Univesity

More information