Landmark Selection and Greedy Landmark-Descent Routing for Sensor Networks
|
|
- Lynette Higgins
- 6 years ago
- Views:
Transcription
1 1 Landmark Selection and Greedy Landmark-Decent Routing for Senor Network An Nguyen Nikola Miloavljević Qing Fang Jie Gao Leonida J. Guiba Department of Computer Science, Stanford Univerity. Department of Electrical Engineering, Stanford Univerity. Department of Computer Science, Stony Brook Univerity. Abtract We tudy the problem of landmark election for landmark-baed routing in a network of fixed wirele communication node. We preent a ditributed landmark election algorithm that doe not rely on global clock ynchronization, and a companion local greedy landmark-baed routing cheme. We aume no node location information, and that each node can communicate with ome of it geographic neighbor. Each node i named by it hop count ditance to a mall number of nearby landmark. Greedy routing at a node i performed to equalize it vector of landmark ditance to that of the detination. Thi i done by following the hortet path to the landmark that maximize the ratio of it ditance to the ource and the detination. In addition, we propoe a method to alleviate the difficulty in routing to detination near the boundarie by virtually expanding the network boundarie. The greedy routing, when combined with our landmark election cheme, ha a provable bounded path tretch relative to the bet path poible, and guarantee packet delivery in the continuou domain. In the dicrete domain, our imulation how that the landmark election cheme i effective, and the companion routing cheme perform well under realitic etting. Both the landmark election and greedy routing aume no pecific communication model and work with aymmetric link. Although ome of the analyi are non-trivial, the algorithm are imple, flexible and cot-effective enough to warrant a real-world deployment. I. INTRODUCTION The application emerging from the enornet community will depend, in part, on good deign and implementation of calable point-to-point routing. In thi pace, both geographic location-baed and location-free method have been propoed. In geographic routing, the node currently holding the packet forward the packet to it neighboring node that i cloet to the detination. Variou meaning of cloet are poible. The preence of hole in the enor field can caue thee greedy method to fail at node with no neighbor cloer to the detination. The failure of greedy forwarding i mainly due to the mimatch between naming/routing rule and the actual network connectivity when the node ditribution i pare, having hole or of complex hape. A variety of method have been propoed to overcome thi difficulty and to guarantee packet delivery, if at all poible. Probably the bet known approach among thee, the cheme of greedy routing combined with face routing [1], [2], [3] build a planar ubgraph of the connectivity graph and ue perimeter Acknowledgment: The author wih to acknowledge the upport of NSF grant CNS , CNS , ARO grant W911NF , and the upport of DoD Multidiciplinary Univerity Reearch Initiative (MURI) program adminitered by ONR under Grant N forwarding when greedy forwarding get tuck. While greedy forwarding i quite robut to enor location inaccuracie, perimeter routing fail in practice a delivery rate of only 68% i oberved [4], [5]. The problem come from the failure of the planarization of the communication graph in real world deployment. The relative neighborhood graph and the Gabriel graph are both connected planar ubgraph of unit dik graph (UDG) in theory. In reality they turn out to be diconnected due to directional or croing edge, a the conequence of location inaccuracy and the deviation of the real connectivity model from the UDG model. To olve thi problem depite the fact that accurate geographic location information i difficult and expenive to obtain, everal location-free routing cheme have been developed [6], [7], [8], [9]. Thee cheme build virtual coordinate ytem, repecting the true network connectivity, on which greedy meage delivery rule are developed. Several virtual coordinate routing ytem are landmarkbaed [7], [8], [9]. Generally peaking, a ubet of the node are elected a landmark. Every node record it hop count ditance to thee landmark. The landmark ditance are then ued to generate virtual coordinate for the node. Routing i typically guided in a greedy way by a potential function on the landmark-baed ditance. The major difference among thee cheme are motly in their potential function. Take two landmark-baed cheme a example. Gradient Landmark-baed Routing (GLIDER) [7] eparate global and local routing by partitioning the network into combinatorial Voronoi tile uch that the node inide the ame tile are cloet to the ame landmark. The tile adjacency graph i ued to guide global routing acro tile. Local routing within a tile i done by greedy decending on a potential function contructed uing ditance to a et of local landmark (the landmark in the adjacent tile). Such a potential function i local minimum free in the continuou domain. In another cheme, Beacon Vector Routing (BVR) [8] take a imilar but more heuritic approach and deign a potential function that depend on the ditance to the k landmark cloet to the detination, where k i a ytem parameter. Out of the k landmark, the one that are cloer to the detination than to the ource impoe a pulling force while the ret impoe a puhing force. The potential function i a combination of the two. Landmark-baed cheme are favored by their implicity and independence on the dimenion of the network. Unlike face routing in planar graph that require a planar deployment of enor node, landmark-baed routing cheme can be eaily extended to enor deployed in 3D.
2 performance of BVR conitently and ignificantly compared to that uing a random landmark election. Fig. 1. A typical enor field and routing path between 2 node in it. An important iue in all landmark-baed cheme that ha not been addreed i landmark election. Obviouly, poorly elected landmark can reult in poor routing performance. Simulation often aume that landmark are randomly elected or manually placed along network boundarie [7], [8]. It remain a challenging open problem, both in theory and in practice, to undertand the criteria for landmark election and their influence on routing performance. In thi paper we propoe a ditributed landmark election protocol and an accompanying imple routing cheme, Greedy Landmark Decent Routing (GLDR). In the continuou domain, GLDR guarantee packet delivery with provably bounded path tretch relative to the bet path poible. It exhibit good routing performance in network, a verified by our imulation. In our cheme, landmark are elected by a randomized and ditributed proce that enure approximately uniform pacing and good eparation of landmark, for a given eparation parameter. We how that only a contant number of nearet landmark of a node, denoted by the addreing landmark, i needed to addre the node for routing. In practice, a few a 6 nearet landmark are enough to obtain a high routing ucce rate. The routing i imple: intuitively, when the ource i far away, the addreing landmark that i cloet to the detination applie a pulling force until the packet get cloe to the detination. At thi point, the algorithm route the packet toward a ingle landmark elected by a local rule until the ditance to the landmark equal the ditance from the detination to that landmark. Then a new landmark i elected and the above proce repeat. We evaluated the performance on low-degree graph on randomly placed node and oberved favorable performance in both routing tretch and delivery rate compared to BVR. The propoed landmark election protocol can be combined with other landmark-baed routing method. We how by imulation that our landmark election protocol improve the II. LANDMARK SELECTION The ucce of GLDR depend on making good choice of the et of landmark. We build a hortet path tree rooted at each landmark via flooding in the initialization phae. Intuitively, GLDR allow the landmark near the detination to impoe a pulling force on the packet following the hortet path. A packet en route i therefore under the force from a et of nearby landmark. By chooing only one pulling force at a time according to a local rule, and with a et of well elected landmark, we can navigate the packet in the network. Therefore, a deirable landmark election algorithm hould give a et of landmark that are evenly pread out, and each node in the network, if not near a field boundary, i well urrounded by a mall et of nearby landmark. We how that we can ue an r-ampling to elect a good et of landmark. We how, in the next ection, how the r-ampling propertie are eential to guarantee the greedy routing ucce, and to yield a theoretically bounded per-hop tretch factor (of 5 for realitic etting). In fact, by incurring higher cot in node addre compoition, even lower tretch could be achieved. For detail, ee ection III-B. We propoe a ditributed protocol to implement an approximate r-ampling in a practical etting. A. r-ampling in the Continuou Domain Let B(p, r) denote the ball (dik) of radiu r centered at p. Definition 1: Given a continuou domain S, an r-ampling of S i a et of point R S uch that each point in S i within ditance r of ome point in R, i.e. S p R B(p, r). Definition 2: We call a point p an interior point if a ball centered at p with radiu 4r i completely inide S, i.e. B(p, 4r) S. We are intereted in landmark that form an r-ampling and would like to reduce the total number of landmark needed for a given enor field. For a 2-D infinite continuou domain, the bet reult poible i to place landmark at point uch that they form a hexagonal ampling pattern [10]. Thi could be achieved by a global equential algorithm. Another trategy i to ue random ampling. How many independent ample (in fact landmark), elected uniformly at random from S, are ufficient to yield an r-ampling with a confidence level? We divide the domain into quare grid cell of area Θ(r 2 ) and olve for the number of landmark neceary to guarantee at leat one landmark in each grid cell. Thi reduce our quetion to the coupon collector problem. By a well known reult [11], for m equally ized grid cell, the expected number of landmark needed i m(ln m+o(1)). The logarithmic factor characterize the expected non-uniformity of a uniform random ditribution. In other word, the overampling rate of the randomized landmark election algorithm with repect to the determinitic optimal algorithm i about logarithmic in the number of grid cell.
3 B. r-ampling in the Dicrete Cae Definition 1 and 2 have their dicrete-cae analog, with the ditance between a pair of node defined a the length of the hortet path between them. Definition 3: The r-neighborhood of node c, denoted by B(c, r), i the et of node at mot r hop away from c. We aume in thi ubection that the enor field i nice, in a ene that any neighborhood of radiu r in the enor field contain at leat αr 2 node for ome contant α. To obtain an r-ampling, we need to have at leat one landmark in every r-neighborhood of any interior node. One way to carry out the ampling i to ue the following equential greedy procedure. Algorithm 1: All node are initially unmarked. While there are unmarked node, repeatedly pick an unmarked node, make it a landmark, and mark all node in it r-neighborhood. Thi algorithm produce a et of landmark with a minimum ditance of r-hop apart, and each non-ampled node being in the r-neighborhood of at leat one landmark. Since the landmark r/2-neighborhood are dijoint, there are at mot 4n/(αr 2 ) landmark. On the other hand, in an ad hoc network, any equential algorithm i prohibitively expenive. A parallel algorithm i thu much more preferable. Thi motivate the following randomized algorithm that could be executed in parallel. Algorithm 2: Each node make itelf a landmark with a probability p where p i ome contant. We have the following reult: Theorem 1: The et of landmark produced by Algorithm 2 i an r-ampling with probability if p 1 (1 αr2 16n ) 4 αr 2. Proof: Firt elect a ubet of node which we call center by following the procedure decribed in Algorithm 1, ubtituting the r-neighborhood with r 2-neighborhood. By the previou analyi, there are at mot m = 16n/(αr 2 ) center. If we make ure that there i a landmark in each center r 2-neighborhood, the et of landmark would be an r- ampling. Let E i be the event that no node i ampled in center i r 2 -neighborhood, then Pr[E i] (1 p) αr2 /4. The probability that Algorithm 2 produce an r-ampling i given by Pr [ m i=1 ( E i)] (1 (1 p) αr2 /4 ) n/(αr2 /16). Setting thi probability to be at leat and olve for p we obtain the deired reult. Corollary 1: The expected over-ampling rate of the parallel random ampling algorithm to that of the equential determinitic algorithm i therefore at leat: n [1 (1 αr2 16n ) 4 αr 2 ] 4n αr2 4 αr 2 [ = k 1 [ ( 1 16n 1 αr 2 ) 4 αr 2 ] ( ) ] 1/k f 4m Where k = αr 2 /4 i the lower bound on the number of node in an r 2-neighborhood, f = 1. For a fixed confidence level and a large network, a the r- neighborhood ize grow, the over-ampling rate of the parallel algorithm to that of the equential algorithm grow linearly with the local neighborhood ize (which i quadratic in r). The performance gap between the equential algorithm and the randomized parallel algorithm i rather ignificant. Thi reult motivated u to deign a protocol that find the middle ground between the two algorithm. C. The Protocol During the network initialization phae, we elect a et of landmark by computing an approximate r-ampling of the network node, and the hortet path tree rooted at thee landmark. We propoe to ue a randomized, ditributed cheme that combine both procee. Firt, each node in the network generate a number v uniformly at random in [0, 1). Each node then wait for Kv time, where K i a network parameter, and the unit of time i the time it take to end a packet from a node to it neighbor. If during thi waiting period, a node i not uppreed by any other node, it declare itelf a landmark. The new landmark broadcat it tatu to it r-neighborhood, uppreing all non-landmark node in it. When K i large, the above cheme effectively give u a equential algorithm for computing an r-ampling. When K i mall, ome upreing meage arrive too late due to the delay incurred in communication. Conequently, additional landmark are elected. When the node are ditributed approximately regularly (a defined below), we can upper bound the expected number of landmark. Definition 4: We ay that the node ditribution i (α, β)- regular (β α 1) if the r -neighborhood contain between αr 2 and βr 2 node, for any r R. Theorem 2: If the node ditribution i (α, β)-regular, then any r-neighborhood contain, in expectation, at mot (9β/Kr β 1) landmark. Proof: See Appendix VI-A. Theorem 2 how that by adjuting K, we can tradeoff between the over-ampling rate and the time require to complete the ampling proce. For K = Θ(r), the overampling rate grow linearly with r. To have a contant overampling rate, we need K = Θ(r 2 ). III. LANDMARK-DESCENT THE GREEDY RULE To route a packet to a detination, the ource node elect, out of the landmark that addre the detination, the one that maximize the ratio of ditance to ource and detination. It then move toward thi landmark along the hortet path, until the landmark become equally ditant from the ource and the detination, at which point, the proce repeat. Effectively, the ource i trying to equalize it vector of landmark ditance to that of the detination, by only reducing the ditance, i.e. going toward landmark, not away from them. If the ource and the detination coincide, thee vector are indeed equal. However, the convere i not true becaue multiple node may have the ame hop count ditance to the ame et of landmark. Neverthele, in the continuou domain we will how that not only doe the convere hold, but the ditance vector can be made equal uing a imple greedy trategy, i.e. decreaing the coordinate that maximize the dicrepancy (the ratio to the correponding detination coordinate).
4 In the dicrete domain, our experimental reult how that uch a greedy trategy ucceed with high probability. However, it i poible that the packet get tuck into a loop before reaching it detination. Baed on our imulation, by remembering the ID of the lat 8 extreme node (node at which the packet topped proceeding to it current landmark), we can detect uch a ituation and declare the packet get tuck. Once a packet get tuck, it i greedily forwarded to the detination uing L 1 and L norm, and if the detination i till not reached, a coped flooding i ued to deliver the packet. In the following ection, we firt decribe the continuou verion of the landmark decent routing and provide theoretical reult. We then decribe the routing algorithm in a dicrete network. We aume continuou, imply connected (without hole ) enor domain with an outer boundary in the form of a cloed curve. d 4r Fig. 2. Landmark decent can alway proceed if d i an interior point. l d l Fig. 3. Landmark decent alway make progre if l > dl. A. Greedy Succe in the Continuou Domain Suppoe there i a et of landmark node in the domain. The algorithm will ue only ditance to landmark node for routing to non-landmark point. Each detination i addreed by the vector of ditance from a ubet of landmark. We will ee later, by theory and imulation, that thi number can be made mall (independent of the network ize). In landmark-decent, the ource i trying to equalize it vector of landmark ditance to that of the detination. If the ource and the detination coincide, thee vector are indeed equal. In thi ection we how that under certain condition on the landmark placement the convere i alo true, i.e. the detination i the only point with thi property. Furthermore, we how that the vector can be made equal uing a imple greedy trategy. For implicity of notation, throughout we ue, d and l to denote the ource, detination and landmark point that are ued in one routing tep. Furthermore, we denote by the point to which the ource move after the tep ha been taken. The following lemma ay that unle it ha reached the detination, the ource can alway find a dicrepancy in the coordinate, i.e. the proce can never terminate prematurely. Thi i under the condition that the detination be an interior point. Lemma 1: If d i an interior point, then a long a d, there i a landmark l that atifie l > dl. Proof: Aume d, and conider the interection of B(d, 4r) and the open halfplane defined by the line through d perpendicular to d, and not containing (Figure 2). Thi area i contained in the domain, ince d i an interior point, and it contain a ball of radiu r. Therefore it contain a landmark l, by the r-ampling condition. Clearly dl > 90 > dl, o l > dl. The next reult ay that by equalizing the coordinate, the ource indeed get cloer to the detination in term of the traight-line ditance. Lemma 2: If l > dl, then d < d. Fig. 5. Upper bound on R/r for variou κ. Proof: Refer to Figure 3. Since d l i iocele, d l < 90, o d > 90. Thi implie d < 90, hence d < d. From the previou two reult it i obviou that the routing proce eventually terminate by reaching the detination, if the latter i an interior point. We ummarize thi part in the following theorem. Theorem 3: If d i an interior point, the landmark decent routing to d i alway ucceful. B. Bounded Stretch in the Continuou Domain In thi ection, we analyze the theoretical performance of our routing approach. Let be the current point, d the detination, l a landmark, ρ = l / dl, and φ = π dl (ee Figure 4). Aume that ρ > 1 and let be the point on the line l uch that l = dl. The ratio κ = /( d d ) we call the one-tep tretch factor of routing from to d uing l. ρx φ d Fig. 4. Bounding the one-tep tretch κ by a function of ρ or φ. We firt relate κ to the minimum ditance between d and it addreing landmark (including l). Lemma 3: If the landmark form an r-ampling and the ditance between d and it addreing landmark i at leat R, then f(κ) R/r, where f = u w, u = 1 1 κ 2, v = 1 1 κ, w = (1 u 2 ) + 2u 2 (1 v 2 ) + 2u (1 v 2 )(1 u 2 v 2 ). Proof: See Appendix VI-B α x l
5 It i traightforward to how that for κ > 1, f(κ) i monotonically decreaing with range (2, ). It follow that it invere f 1 exit, and κ f 1 (R/r) for R > 2r. The plot of f i hown in Figure 5. Apparently, the lower the tretch upper-bound, the farther away the addreing landmark need to be. To have an upper bound of 5 on the per-hop tretch, we need each node to be addreed by it ditance to landmark that are at leat 5r away. We will how in the next corollary that the number of addreing landmark for each node i an cale-free contant. We have thu proved: Theorem 4: If R > 2r, then κ i bounded. In the ret of the paper we aume R = 2r for implicity. Now we can bound the number of addreing landmark, a quantity eential for calability of the ytem, under the regularity aumption of node ditribution in the previou ection. Corollary 2: If the node ditribution i (α, β)-regular, then the expected number of addreing landmark for any node i at mot (144β/Kr β 1)p. Proof: Not difficult, but omitted for brevity. C. Greedy Landmark Decend Routing (GLDR) in Network Each GLDR packet carrie in it header, (i) the addre of the detination, (ii) the ID of the landmark toward which the packet i forwarded, (iii) a lit of recently encountered extreme node. The addre of a detination i a vector of ditance to it addreing landmark, together with it ID (multiple node may have the ame et of nearet landmark). A packet header i updated only at extreme node, node with the ame ditance to the current landmark a the detination. At an extreme node, if there i no landmark that i farther from the node than from the detination or if the extreme node i found in the packet header, the packet i tuck. If not, the current extreme node i added to the header. The packet i then forwarded toward the landmark that maximize the ratio of ditance to the current node and to the detination. If a packet get tuck, we reort to flooding. A thi i expenive, we actually forward the packet greedily uing L 1 norm, then uing L norm. If the detination i till not reached, we perform coped flooding. The peudo code to implement the algorithm i hown in III-C. To keep the packet header mall, we do not tore all extreme node that we encountered and only keep the lat 8 recently encountered extreme node in the header. While there i no theoretical proof that uch a hort lit uffice to detect looping, in our extenive imulation we never encountered a loop. Thi i becaue looping i uually caued by too mall a number of landmark being available for routing. We would like to emphaize that GLDR i imple and eay to implement. A local greedy rule guide the greedy routing at each tep. The protocol i tatele unle loop occur in the route, which rarely happen. D. Handling the Boundary Effect Recall that the reult we dicued up to now apply to interior node only. For the non-interior node, the routing 1: if p.mode = GLDR then 2: if dit(p.betbae) > dit(p.det) then 3: FORWARD p toward p.betbae 4: ele 5: if current node i in p.extremenode then 6: SET p.mode = L 1 7: ele 8: RECORD current node into p.extremenode 9: COMPUTE new bae p.betbae 10: if p.betbae = null then 11: SET p.mode = L 1 12: ele 13: FORWARD p toward p.betbae 14: end if 15: end if 16: end if 17: end if 18: if p.mode = L 1 then 19: if ome neighbor nb i cloer to p.det uing L 1 then 20: FORWARD p to nb 21: end if 22: SET p.mode = L 23: end if 24: if p.mode = L then 25: if ome neighbor nb i cloer to p.det uing L then 26: FORWARD p to nb 27: end if 28: FLOOD to find p.det 29: end if Algorithm 1. Peudocode for routing a packet p. i more challenging. Intuitively peaking, for virtual coordinate baed method, routing to detination near the network boundarie i more difficult becaue there are le and/or only one-ided reference point to navigate the packet. Specifically in our cae, the aumption of our continuou domain reult (Lemma 2, Theorem 3, and 4) are not even approximately atified near the boundary. Thi etback i common in all virtual coordinate baed method. To alleviate thi boundary effect, we propoe to virtually expand the enor field. Suppoe that we duplicate the noninterior part of the network, and place it immediately below the original o that they meet along the boundary. The expanded network i obtained by unfolding the replica. Thi effectively provide pulling force on packet toward the boundary. We firt extend the definition of hortet path and ditance. Path between the original (real) and replicated (virtual) node are required to viit a boundary node, and are thu called reflected path. The ditance between two uch node (reflected ditance) i the length of hortet reflected path connecting them. The reflected and the tandard traightline ditance between x and y are denoted by xy and xy, repectively. Now we can define an augmented landmark election procedure and the matching routing algorithm to be eentially the ame a in the bae cae. Thi i poible becaue the algorithm operate only on hortet path. If the boundary i not very curved compared to r, it locally look like a traight line (Figure 6 left). Thu uing a virtual landmark i almot the ame a uing it mirror image with repect to the boundary, viewed a a real landmark.
6 x l l Fig. 6. Left: When the boundary i locally traight, replacing a virtual landmark l by a reflected real landmark l preerve the ditance involved (e.g. l = l ), and doe not change the routing tep. For a general low-curvature boundary, the change will be mall. Right: Aumption on the curvature of the boundary. From the above dicuion it hould be clear that the reult will depend on ome meaure of curvature of the boundary. A the boundary i not alway known in a realitic etting, and even more complex iue arie when there are large hole [12], [13] in the network, we at thi tage tudy thi method more or le a a theoretic intereting poibility rather than a practical olution to ad-hoc network. In particular, we aume that the boundary i a mooth curve uch that the two tangential ball of radiu R at any point x on on the curve, do not interect the curve anywhere except in x (Figure 6 right). In practice the boundary can often be approximated by uch a curve to within an accuracy comparable to dicretization error. Theorem 5: If R i large enough compared to r, the augmented-gldr guarantee packet delivery along a path of bounded tretch factor. In particular, if R 320r, and the tretch factor of the bae cae routing i κ < 2.5 (cf. Theorem 4), then the tretch factor of the augmented-gldr i at mot 7κ/(5 2κ). Proof: The key idea i to replace a virtual landmark ued in a given routing tep by a carefully deigned real landmark which reult in a imilar routing tep. The bae cae reult can then be applied to the latter. For technical detail, ee Appendix VI-C. The reaon for uing virtual landmark i to compenate for the lack of addreing landmark for non-interior node along the field boundary. They are ued, and only incur extra torage cot, in a local neighborhood along the boundary. Specifically, virtual landmark need only to flood 12r hop inward from the boundary, to let node in thi region learn their ditance to virtual landmark, and non-interior node learn their local addree. It i eay to ee that only node within 12r hop away from the boundary need to learn their ditance to virtual landmark: all the other node are interior, o they mut have at leat one real addreing landmark; after only one tep of landmark decent (alway to a real landmark), the new ource poition will be within 8r hop from d (for it uffice to pick any of d real addreing landmark, which are all at mot 4r hop away from d), i.e. at mot 12r hop away from the boundary. IV. SIMULATIONS We implemented our landmark election and routing algorithm in java, for heuritic tudy. We imulate the network at the network level, not taking into account networking iue uch a packet lo or delay. R x R A. Default imulation etup In our imulation, we generated 3200 node randomly in a unit quare, ee Figure 1. The communication radiu wa et to make the average node degree roughly 10. The field wa fairly dene, but till had many mall hole, which made greedy routing challenging. We generated the landmark to form an 10-ampling. The default K wa For a given enor field, we ran our landmark election cheme 100 time, and for each et of landmark obtained, we generated 320 pair of random ource and detination point and computed the route between them uing that et of landmark. When routing, we ued the ditance to the nearet 10 landmark of a node a it addre. In each imulation, we varied a ingle parameter and kept the other parameter a in the above default etting. We collected tatitic on all the path computed for different parameter we were intereted in. For comparion, we ran BVR and computed tatitic on the ame path on the ame enor field. In thi default etup, there were on average 28.2 landmark. Our routing algorithm achieved a ucce rate of 90.9% without flooding. When the routing failed, the hop ditance from the node where the algorithm terminated to the detination wa 4.47 on average, with a tandard deviation of B. Succeful delivery rate We conidered the performance of the routing algorithm by varying the number of routing landmark, the r-ampling parameter (landmark eparation ditance, roughly), and the average network degree. The ucce rate i hown in Figure 7. Firt we gradually increaed the number of routing landmark and found that, a expected, the ucce rate alo increaed, from 85% with only 6 landmark, up to 92% with 18 landmark. We oberved that the node where GLDR failed to delivered were often near the boundary o that they were not well urrounded by their routing landmark. GLDR mut often rely on greedy routing uing L 1 norm and L norm to reach boundary node, and increaing the number of routing landmark doe little to help for thi phae. When the number of routing landmark wa mall, GLDR wa more ucceful than BVR; a the number increaed, the performance gap narrowed. BVR random landmark election often produce highly irregular landmark and may not work well when only a few routing landmark are ued. We alo examined the influence of the total number of landmark. We varied the eparation ditance r in the landmark election algorithm between 6 and 18, and the number of landmark from around 60 to around 20. The performance improved with more landmark, motly becaue more node near the boundary were well covered by the extra landmark. Finally, we varied the communication radiu o that the number of communication neighbor, averaged over all node, wa between 6 and 18. A the average degree increaed, fewer landmark were ued, o that the landmark denity remained relatively fixed. GLDR performance improved when network degree wa high, a the network became more regular.
7 Fig. 7. The ucce rate of GLDR i high for variou etting. GLDR compare favorably to BVR. In all cae, the ucce rate of GLDR wa conitently over 80%, and frequently over 90%, which i good, conidering the relatively low degree of the network. C. Remaining path and tretch factor We varied the denity of the landmark by changing the landmark eparation ditance parameter between 6 and 18 in the landmark election algorithm. For pair of node on which the routing got tuck, we computed the hop count from the terminating node to the detination. Thi meaure gave u ome idea on how much we need to flood in order to reach the detination. When we could route uccefully, we alo computed the hortet path between the ource and the detination, and computed the tretch factor. The average remaining path (Figure 8) wa comparable with the eparation ditance between landmark. The tretch factor of the path (Figure 9) wa quite mall, between 1.04 and A typical route wa about 30 hop, which mean that our route were only 1 3 hop longer than the hortet path. GLDR compared favorably to BVR in thee meaure. D. Landmark election We meaured the effectivene of the landmark election algorithm in GLDR. For thi purpoe, we ran the election algorithm for variou value of K, ee Table I. A K increaed, the number of landmark decreaed, a landmark had more time to uppre nearby node, preventing them from becoming landmark. From Table I, we noted that when K increaed from 600 to 3, 000, the number of landmark increaed, but the routing performance tayed relatively contant. Thi ugget that tightly clutered landmark might not contribute much to the routing quality, and that the K value hould not be too mall. On the other hand, when K increaed above 1, 200, the number of landmark tarted to tabilize. A the network initialization time wa dominated by K, K hould be mall, at the expene of having more landmark in the network. We compared the performance of GLDR with landmark choen uniformly at random, and according to II-C. The ucce rate degraded ignificantly with random landmark, a there were more node that are not urrounded well by landmark. Thu, our landmark election i crucial for effectivene of GLDR. E. Improving BVR with r-ampling landmark election Our landmark election cheme can be ued to improve other landmark-baed algorithm. For example, it helped improve the ucce rate of BVR (Figure 10). The performance Fig. 11. Virtual landmark improve routing performance. of BVR with our landmark election cheme i very imilar to GLDR. F. Improving routing performance uing virtual landmark We teted the idea of virtual node and landmark for routing to node near the enor field boundary (Section III-D). To implify the implementation, we elected virtual landmark to coincide with real landmark which are near the boundary (intead of chooing them in the ame way a in the bae cae, only uing a different notion of ditance for ome landmark pair). We found that the virtual landmark improve the routing quality of GLDR, ee Figure 11. V. CONCLUSION We propoed a practical landmark election protocol that uniformly ample a network of enor. Combined with a imple greedy routing baed on ditance to landmark, we can achieve good routing performance which i provable in the continuou domain and manifeted in our extenive network imulation. GLDR, while comparable to BVR in performance categorie uch a packet delivery rate and routing path length, ha lower routing overhead. Further, the landmark election algorithm i alo beneficial to ome other landmark-baed routing cheme. Our experiment howed that BVR performance improve ignificantly with a et of landmark/beacon elected uing thi algorithm. Landmark election i eldom a tand-alone problem, but rather trongly tied to the overlying application, be it point-topoint network routing or robot navigation. Thi paper provide a practical olution in the context of routing in wirele ad-hoc network. The general problem remain important and challenging. We hope thi paper could encourage more reearch interet in thi direction in the networking community.
8 Fig. 8. Unucceful route ended up near the detination. Fig. 9. Succeful route had low tretch factor. Fig. 10. Good landmark election cheme can be ued to improve the performance of BVR. TABLE I THERE ARE FEWER LANDMARKS WHEN K INCREASES. K #LM GLDR No LMS REFERENCES [1] P. Boe, P. Morin, I. Stojmenovic, and J. Urrutia, Routing with guaranteed delivery in ad hoc wirele network, Wirele Network, vol. 7, no. 6, pp , [Online]. Available: citeeer.it.pu.edu/boe01routing.html [2] B. Karp and H. Kung, GPSR: Greedy perimeter tatele routing for wirele network, in Proc. of the ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom), 2000, pp [3] F. Kuhn, R. Wattenhofer, Y. Zhang, and A. Zollinger, Geometric ad-hoc routing: Of theory and practice, in Proc. 22 nd ACM Int. Sympoium on the Principle of Ditributed Computing (PODC), 2003, pp [4] Y.-J. Kim, R. Govindan, B. Karp, and S. Shenker, Geographic routing made practical, in Proceeding of the 2nd USENIX Sympoium on Networked Sytem Deign and Implementation (NSDI 05), Boton, MA, USA, May [5] B. K. S. S. Young-Jin Kim, Rameh Govindan, On the pitfall of geographic face routing, in Proceeding of the Third ACM/SIGMOBILE International Workhop on Foundation of Mobile Computing, September [6] A. Rao, S. Ratnaamy, C. Papadimitriou, S. Shenker, and I. Stoica, Geographic routing without location information, in Proc. 9th Annual International Conference on Mobile Computing and Networking (Mobi- Com 2003). San Diego: ACM Pre, September 2003, pp [7] Q. Fang, J. Gao, L. Guiba, V. de Silva, and L. Zhang, GLIDER: Gradient landmark-baed ditributed routing for enor network, in Proc. of the 24th Conference of the IEEE Communication Society (INFOCOM), March [8] R. Foneca, S. Ratnaamy, J. Zhao, C. T. Ee, D. Culler, S. Shenker, and I. Stoica, Beacon vector routing: Scalable point-to-point routing in wirele enornet, [9] A. Caruo, A. Urpi, S. Chea, and S. De, GPS free coordinate aignment and routing in wirele enor network, in Proc. of the 24th Conference of the IEEE Communication Society (INFOCOM), March [10] R. William, The Geometrical Foundation of Natural Structure: A Source Book of Deign. New York: Dover Publication, [11] R. Motwani and P. Raghavan, Randomized Algorithm. Cambridge Univerity Pre, [12] A. Kroller, S. Fekete, D. Pfiterer, and S. Ficher, Determinitic boundary recognition and topology extraction for large enor network, in SODA 06: Proceeding of the eventeenth annual ACM-SIAM ympoium on Dicrete algorithm. New York, NY, USA: ACM Pre, 2006, pp [13] Q. Fang, J. Gao, and L. J. Guiba, Locating and bypaing hole in enor network, Mobile Network and Application, vol. 11, no. 2, pp , [14] N. Amenta and M. W. Bern, Surface recontruction by Voronoi filtering, in Sympoium on Computational Geometry, 1998, pp [Online]. Available: citeeer.it.pu.edu/article/amenta98urface.html A. Proof of Lemma 2 VI. APPENDIX Conider any node c. Let T be the number of landmark in B(r, c). Suppoe that T t, where t t := β (3+ α) 2. Let 2ρ+1 be the α mallet odd upper bound on the minimum inter-landmark ditance. ρ-neighborhood of the landmark are dijoint, and contained in B(c, r + ρ). It follow ρ argument. Uing t βr 2 we find 1 αr/ r, by a tandard packing αt/β 1 pαt/β 1, hence 2ρ + 1 (2 + α)r p αt/β 1. (1) Since t t, the right hand ide of (1) i at mot r, o the two landmark p and q which realize the minimum inter-landmark ditance are at mot r hop from each other. Hence v p v q (2 + α)r K( p αt/β 1). (2) The probability of thi event i at mot the value of the right hand ide (which i at mot 1, auming K r). By definition, E[T ] (t 1) + P βr 2 t=t Pr[T t]. We bound the um uing (2). βr X 2 (2 + α)r t=t K( p αt/β 1) (2 + α)r K 2β( 2 α + 1)r ln(r α) K r α Zβr 2 t=t «. dt p αt/β 1 We can implify the expreion uing r 1, α 1, and ln x x 1 2 (for x > 0), to obtain the deired reult. B. Proof of Lemma 3 Lemma 4: κ p ρ/(ρ 1). Proof: Without lo of generality aume d = 1. Let dl = x and ld = α. It follow l = ρx and d = 2x in(α/2) (ee Figure 4). We have (ρ 1)x κ = 1 2x in α h 2 1 = ρ 2 x 2 + x 2 2ρx in 2 α i 2 (definition of κ), (coine law dl).
9 l τ φ g φ a d o b d x l R θ l θ l Fig. 12. Bounding the one-tep tretch factor. d y z Eliminating in(α/2), κ = (ρ 1)x 1 p (1 (ρ 1) 2 x 2 )/ρ. (3) 1, 1 ρ+1 Triangle inequality ρx 1 x implie x [ ]. Tediou ρ 1 but traightforward calculation how that the right hand ide of (3) i minimized over thi interval for x = 1/ p ρ(ρ 1), at which point κ = p ρ/(ρ 1). Lemma 5: If φ < π/2, then κ 1/(1 in φ). Proof: Let be uch that i parallel to dl and d i perpendicular to both and dl. Let be the interection of d and, ee Figure 4. Note that d L = dl < π/2, and when when φ < π/2, it i eay to ee that i between and d, and i alo between and. From triangle inequality, = L dl d. We alo have that d d d = d in φ. Thu κ = /( d d ) 1/(1 in φ). Note that a approache d, ρ approache 1 and φ may or may not be acute. Thu both Lemma 4 and 5 do not yield any bound on κ. We now retrict the routing landmark of d to only landmark that are further than ome threhold ditance R from d. We alo aume that we elect the landmark L uch that the ratio ρ for L i the larget among thoe. Let o be the center and τ be the radiu of the Apoloniu circle of d with ratio ρ, the circle C of all point p atifying p / pd = l / ld = ρ. It i well-known that o i on the line d. Let a and b be the interection of thi circle with d, with a i between d and b i outide (Figure 12). By the choice of l, there i no routing landmark of d inide C. From ρ = / d = b / bd, it i eay to ee that da / db = (ρ 1)(ρ + 1) < 1, and thu d i between a and o. By Lemma 4, da / db 1/(2κ 2 1) = (1 u)/(1+u), and thu da τ(1 u), do τu, db τ(1 + u). Let d be between d and o uch that d b = τ(1 + u). Let g = ( db dl )/2. Since there i a dik of radiu g empty of landmark (Figure 12), we have r g ( d b d l )/2 = τ(1 + u x)/2, where x = d l /τ can be bounded a follow. Lemma 6: For w a in the tatement of Lemma 3, x w. Proof: Suppoe x > w. Then co φ co φ = x2 (1 u 2 ) > 0, 2x o φ < π/2. By Lemma 5, in φ 1 1/κ = v, and thu in 2 φ + co 2 φ (x2 (1 u 2 )) 2 + v 2 > 1, 4x 2 a contradiction. Since R dl 2τ, r R(1 + u x)/4. From Lemma 6, R/r 4/(1 + u w) =: f(κ). C. Proof of Theorem 5 We give only the proof for the cae when, d, are real and l i virtual (Figure 13), the other cae are imilar. Let x and y be the boundary point where the hortet path l and dl cro the boundary. Let l be uch that l = l and dl = dl Fig. 13. virtual. Analyi of the augmented-gldr when, d, are real, and l i (in general, there are two uch point ymmetric with repect to the line d, but we define l the be the one on the ame ide of the line a the local boundary). Notice that l wa picked a a routing landmark becaue the ditance (poibly reflected) among, d and l atify certain relation. By contruction,, d and l preerve thi et of ditance. It follow that if the bae cae protocol i applied to, d and l, then Theorem 4 provide a tretch guarantee, but for a new ource poition, which i different than in general. The true one-tep tretch i d d + d d + κ, (4) which tend to κ a / become maller. Thu if we prove that / 1, we are done. We bound the ratio a follow. Let θ be the (mall) angle between the boundary normal at x and y. Let l and z be the mirror image of l about the tangent to the boundary at x and y, repectively. We find that dl dl, pecifically dl dz zl (triangle inequality) dl dl max{ ll, lz }θ 2 l θ. Now, dl and dl have two pair of ide of the ame length ( d and l ) and one which differ only lightly (at mot 2 l θ). The mall change in the length implie a mall change in the internal angle, more preciely l l 2 dl dl l 2 2 l θ l 4θ. (multiplying the fraction by 2 i far too loppy, but illutrate the point). Hence 4θ. So we have bounded the ratio by a multiple of the angle θ between the normal, which we expect to be mall if the curvature i low. Formally, we know that x and y are cloe at mot 8r apart (both are within 4r from l) and we invoke the following well known geometric lemma. Lemma 7 (Amenta and Bern [14]): The angle between the normal whoe footpoint are at mot ρ R/4 apart i at mot 4ρ/R. It follow that if R 320r, then θ 4 8r/(320r), hence / 0.4. Subtituting into (4) we find that the one-tep tretch i bounded. Notice that the proof o far did not aume (or require) guaranteed delivery, a it wa concerned only with a ingle routing tep. However, we can ue the ingle-tep analyi to prove that even in the augmented cae the detination i alway reached. A in the oneided cae, it uffice to prove, in the ame etting a above, that d > d. But thi imply follow by the following chain of inequalitie d d d d (κ 4θ), which i poitive, under our low curvature requirement. Once we have the delivery guarantee, we can extend the one-tep tretch bound to the entire path. Thi complete the proof.
Routing Definition 4.1
4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing
More informationLocalized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks
Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de
More informationUniversität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.
Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut
More informationMinimum congestion spanning trees in bipartite and random graphs
Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu
More informationA note on degenerate and spectrally degenerate graphs
A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove
More informationLecture 14: Minimum Spanning Tree I
COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce
More informationPerformance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks
Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity
More informationMAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc
MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic
More informationDAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications
DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu
More informationKaren L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract
Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial
More informationManeuverable Relays to Improve Energy Efficiency in Sensor Networks
Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov
More informationShortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights
Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two
More informationGeneric Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline
Generic Travere CS 62, Lecture 9 Jared Saia Univerity of New Mexico Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v) from the bag if (v i unmarked) mark v; parent(v) = p;
More informationToday s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is
Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -
More informationCENTER-POINT MODEL OF DEFORMABLE SURFACE
CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D
More informationxy-monotone path existence queries in a rectilinear environment
CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of
More informationPlanning of scooping position and approach path for loading operation by wheel loader
22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader
More informationOn successive packing approach to multidimensional (M-D) interleaving
On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a
More informationShortest Paths with Single-Point Visibility Constraint
Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet
More informationThis article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and
Thi article appeared in a journal publihed by Elevier. The attached copy i furnihed to the author for internal non-commercial reearch and education ue, including for intruction at the author intitution
More informationelse end while End References
621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized
More informationCERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu
CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,
More informationTopics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X
Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term
More informationBrief Announcement: Distributed 3/2-Approximation of the Diameter
Brief Announcement: Ditributed /2-Approximation of the Diameter Preliminary verion of a brief announcement to appear at DISC 14 Stephan Holzer MIT holzer@mit.edu David Peleg Weizmann Intitute david.peleg@weizmann.ac.il
More informationHow to Select Measurement Points in Access Point Localization
Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,
More informationShortest Path Routing in Arbitrary Networks
Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,
More informationDelaunay Triangulation: Incremental Construction
Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )
More informationDrawing Lines in 2 Dimensions
Drawing Line in 2 Dimenion Drawing a traight line (or an arc) between two end point when one i limited to dicrete pixel require a bit of thought. Conider the following line uperimpoed on a 2 dimenional
More informationNearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks
Nearly Contant Approximation for Data Aggregation Scheduling in Wirele Senor Network Scott C.-H. Huang, Peng-Jun Wan, Chinh T. Vu, Yinghu Li and France Yao Computer Science Department, City Univerity of
More informationDistributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router
Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To
More information1 The secretary problem
Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.
More informationUC Berkeley International Conference on GIScience Short Paper Proceedings
UC Berkeley International Conference on GIScience Short Paper Proceeding Title A novel method for probabilitic coverage etimation of enor network baed on 3D vector repreentation in complex urban environment
More informationKS3 Maths Assessment Objectives
KS3 Math Aement Objective Tranition Stage 9 Ratio & Proportion Probabilit y & Statitic Appreciate the infinite nature of the et of integer, real and rational number Can interpret fraction and percentage
More informationGray-level histogram. Intensity (grey-level) transformation, or mapping. Use of intensity transformations:
Faculty of Informatic Eötvö Loránd Univerity Budapet, Hungary Lecture : Intenity Tranformation Image enhancement by point proceing Spatial domain and frequency domain method Baic Algorithm for Digital
More informationQuadrilaterals. Learning Objectives. Pre-Activity
Section 3.4 Pre-Activity Preparation Quadrilateral Intereting geometric hape and pattern are all around u when we tart looking for them. Examine a row of fencing or the tiling deign at the wimming pool.
More informationSECTOR BASED MULTICAST ROUTING ALGORITHM FOR MOBILE AD-HOC NETWORKS
SECTOR BASED MULTICAST ROUTING ALGORITHM OR MOBILE AD-HOC NETWORKS Murali Paramewaran 1 and Chittaranjan Hota 2 1 Department of Computer Science & Information Sytem, BITS-Pilani, Pilani, India 2 Department
More informationHassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,
COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)
More informationA Novel Feature Line Segment Approach for Pattern Classification
12th International Conference on Information Fuion Seattle, WA, USA, July 6-9, 2009 A Novel Feature Line Segment Approach for Pattern Claification Yi Yang Intitute of Integrated Automation Xi an Jiaotong
More informationChapter 13 Non Sampling Errors
Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption
More informationFocused Video Estimation from Defocused Video Sequences
Focued Video Etimation from Defocued Video Sequence Junlan Yang a, Dan Schonfeld a and Magdi Mohamed b a Multimedia Communication Lab, ECE Dept., Univerity of Illinoi, Chicago, IL b Phyical Realization
More informationOperational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz
Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,
More informationAn Intro to LP and the Simplex Algorithm. Primal Simplex
An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n
More informationMulti-Target Tracking In Clutter
Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and
More informationA PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED
A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED Jutin Domke and Yianni Aloimono Computational Viion Laboratory, Center for Automation Reearch Univerity of Maryland College Park,
More informationRepresentations and Transformations. Objectives
Repreentation and Tranformation Objective Derive homogeneou coordinate tranformation matrice Introduce tandard tranformation - Rotation - Tranlation - Scaling - Shear Scalar, Point, Vector Three baic element
More informationIMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak
IMPROVED DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION Tak-Shing Wong, Charle A. Bouman, and Ilya Pollak School of Electrical and Computer Engineering Purdue Univerity ABSTRACT We propoe
More informationOptimal Gossip with Direct Addressing
Optimal Goip with Direct Addreing Bernhard Haeupler Microoft Reearch 1065 La Avenida, Mountain View Mountain View, CA 94043 haeupler@c.cmu.edu Dahlia Malkhi Microoft Reearch 1065 La Avenida, Mountain View
More informationMulticast with Network Coding in Application-Layer Overlay Networks
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 1, JANUARY 2004 1 Multicat with Network Coding in Application-Layer Overlay Network Ying Zhu, Baochun Li, Member, IEEE, and Jiang Guo Abtract
More informationSLA Adaptation for Service Overlay Networks
SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada
More informationPerformance Evaluation of an Advanced Local Search Evolutionary Algorithm
Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation
More informationA SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS
A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt
More informationStochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang
Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,
More informationA Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *
Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm
More information/06/$ IEEE 364
006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;
More informationPower Aware Location Aided Routing in Mobile Ad-hoc Networks
International Journal of Scientific and Reearch Publication, Volume, Iue 1, December 01 1 Power Aware Location Aided Routing in Mobile Ad-hoc Network Anamika Computer Science, Inderprataha Engineering
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two
More informationMotion Control (wheeled robots)
3 Motion Control (wheeled robot) Requirement for Motion Control Kinematic / dynamic model of the robot Model of the interaction between the wheel and the ground Definition of required motion -> peed control,
More informationA Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance
A Hybrid Deployable Dynamic Traffic Aignment Framework for Robut Online Route Guidance Sriniva Peeta School of Civil Engineering, Purdue Univerity Chao Zhou Sabre, Inc. Sriniva Peeta School of Civil Engineering
More informationAdvanced Encryption Standard and Modes of Operation
Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES
More informationCompressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit
Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit
More informationGrowing Networks Through Random Walks Without Restarts
Growing Network Through Random Walk Without Retart Bernardo Amorim, Daniel Figueiredo, Giulio Iacobelli, Giovanni Neglia To cite thi verion: Bernardo Amorim, Daniel Figueiredo, Giulio Iacobelli, Giovanni
More informationMinimum Energy Reliable Paths Using Unreliable Wireless Links
Minimum Energy Reliable Path Uing Unreliable Wirele Link Qunfeng Dong Department of Computer Science Univerity of Wiconin-Madion Madion, Wiconin 53706 qunfeng@c.wic.edu Micah Adler Department of Computer
More informationAlgorithmic Discrete Mathematics 4. Exercise Sheet
Algorithmic Dicrete Mathematic. Exercie Sheet Department of Mathematic SS 0 PD Dr. Ulf Lorenz 0. and. May 0 Dipl.-Math. David Meffert Verion of May, 0 Groupwork Exercie G (Shortet path I) (a) Calculate
More informationCutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.
Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization
More information3D SMAP Algorithm. April 11, 2012
3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative
More informationContents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course:
Content Shortet path Algorithm and Network 21/211 The hortet path problem: Statement Verion Application Algorithm (for ingle ource p problem) Reminder: relaxation, Dijktra, Variant of Dijktra, Bellman-Ford,
More informationQuadratic Optimal Control of Wireless Sensor Network Deployment
1 Quadratic Optimal Control of Wirele Senor Network Deployment Ratko R. Selmic 1, Jinko Kanno, Jack Buchart 1, and Nichola Richardon 3 1 Department of Electrical Engineering, Department of Mathematic 3
More informationMotivation: Level Sets. Input Data Noisy. Easy Case Use Marching Cubes. Intensity Varies. Non-uniform Exposure. Roger Crawfis
Level Set Motivation: Roger Crawfi Slide collected from: Fan Ding, Charle Dyer, Donald Tanguay and Roger Crawfi 4/24/2003 R. Crawfi, Ohio State Univ. 109 Eay Cae Ue Marching Cube Input Data Noiy 4/24/2003
More informationExploring Simple Grid Polygons
Exploring Simple Grid Polygon Chritian Icking 1, Tom Kamphan 2, Rolf Klein 2, and Elmar Langetepe 2 1 Univerity of Hagen, Praktiche Informatik VI, 58084 Hagen, Germany. 2 Univerity of Bonn, Computer Science
More informationIMPLEMENTATION OF CHORD LENGTH SAMPLING FOR TRANSPORT THROUGH A BINARY STOCHASTIC MIXTURE
Nuclear Mathematical and Computational Science: A Century in Review, A Century Anew Gatlinburg, Tenneee, April 6-, 003, on CD-ROM, American Nuclear Society, LaGrange Park, IL (003) IMPLEMENTATION OF CHORD
More informationAN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM
RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt
More informationA METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS
Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh
More informationOn the Use of Shadows in Stance Recovery
On the Ue of Shadow in Stance Recovery Alfred M. Brucktein, 1 Robert J. Holt, 1 Yve D. Jean, 2 Arun N. Netravali 1 1 Bell Laboratorie, Lucent Technologie, Murray Hill, NJ 094 2 Avaya Communication, Murray
More informationUninformed Search Complexity. Informed Search. Search Revisited. Day 2/3 of Search
Informed Search ay 2/3 of Search hap. 4, Ruel & Norvig FS IFS US PFS MEM FS IS Uninformed Search omplexity N = Total number of tate = verage number of ucceor (branching factor) L = Length for tart to goal
More informationEdits in Xylia Validity Preserving Editing of XML Documents
dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,
More informationRefining SIRAP with a Dedicated Resource Ceiling for Self-Blocking
Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT
More informationIncreasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment
Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in
More informationA Practical Model for Minimizing Waiting Time in a Transit Network
A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,
More informationConnected Placement of Disaster Shelters in Modern Cities
Connected Placement of Diater Shelter in Modern Citie Huanyang Zheng and Jie Wu Department of Computer and Information Science Temple Univerity, USA {huanyang.zheng, jiewu}@temple.edu ABSTRACT Thi paper
More informationMirror shape recovery from image curves and intrinsic parameters: Rotationally symmetric and conic mirrors. Abstract. 2. Mirror shape recovery
Mirror hape recovery from image curve and intrinic parameter: Rotationally ymmetric and conic mirror Nuno Gonçalve and Helder Araújo Λ Intitute of Sytem and Robotic Univerity of Coimbra Pinhal de Marroco
More informationIMPLEMENTATION OF AREA, VOLUME AND LINE SOURCES
December 01 ADMS 5 P503I1 IMPEMENTATION OF AREA, VOUME AND INE SOURCES The Met. Office (D J Thomon) and CERC 1. INTRODUCTION ADMS model line ource, and area and volume ource with conve polgon bae area.
More informationLinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage
Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,
More informationEfficient Data Forwarding in Mobile Social Networks with Diverse Connectivity Characteristics
Efficient Data Forwarding in Mobile Social Network with Divere Connectivity Characteritic Xiaomei Zhang and Guohong Cao Department of Computer Science and Engineering The Pennylvania State Univerity, Univerity
More informationA Multi-objective Genetic Algorithm for Reliability Optimization Problem
International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR
More informationTAM 212 Worksheet 3. Solutions
Name: Group member: TAM 212 Workheet 3 Solution The workheet i concerned with the deign of the loop-the-loop for a roller coater ytem. Old loop deign: The firt generation of loop wa circular, a hown below.
More informationComparison of Methods for Horizon Line Detection in Sea Images
Comparion of Method for Horizon Line Detection in Sea Image Tzvika Libe Evgeny Gerhikov and Samuel Koolapov Department of Electrical Engineering Braude Academic College of Engineering Karmiel 2982 Irael
More informationAnalyzing Hydra Historical Statistics Part 2
Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the
More informationAnisotropic filtering on normal field and curvature tensor field using optimal estimation theory
Aniotropic filtering on normal field and curvature tenor field uing optimal etimation theory Min Liu Yuhen Liu and Karthik Ramani Purdue Univerity, Wet Lafayette, Indiana, USA Email: {liu66 liu28 ramani}@purdue.edu
More informationDECENTRALIZED structured overlays and distributed. Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn
Harvard Technical Report TR-3-4 Ditributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Jonathan Ledlie and Margo Seltzer Abtract Numerou propoal exit for load balancing in peer-to-peer (pp)
More informationUSING ARTIFICIAL NEURAL NETWORKS TO APPROXIMATE A DISCRETE EVENT STOCHASTIC SIMULATION MODEL
USING ARTIFICIAL NEURAL NETWORKS TO APPROXIMATE A DISCRETE EVENT STOCHASTIC SIMULATION MODEL Robert A. Kilmer Department of Sytem Engineering Unite State Military Acaemy Wet Point, NY 1996 Alice E. Smith
More informationMarkov Random Fields in Image Segmentation
Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image
More informationKeywords: Defect detection, linear phased array transducer, parameter optimization, phased array ultrasonic B-mode imaging testing.
Send Order for Reprint to reprint@benthamcience.ae 488 The Open Automation and Control Sytem Journal, 2014, 6, 488-492 Open Acce Parameter Optimization of Linear Phaed Array Tranducer for Defect Detection
More informationA Boyer-Moore Approach for. Two-Dimensional Matching. Jorma Tarhio. University of California. Berkeley, CA Abstract
A Boyer-Moore Approach for Two-Dimenional Matching Jorma Tarhio Computer Science Diviion Univerity of California Berkeley, CA 94720 Abtract An imple ublinear algorithm i preented for two-dimenional tring
More informationarxiv: v1 [cs.ds] 27 Feb 2018
Incremental Strong Connectivity and 2-Connectivity in Directed Graph Louka Georgiadi 1, Giueppe F. Italiano 2, and Niko Parotidi 2 arxiv:1802.10189v1 [c.ds] 27 Feb 2018 1 Univerity of Ioannina, Greece.
More informationarxiv: v3 [cs.cg] 1 Oct 2018
Improved Time-Space Trade-off for Computing Voronoi Diagram Bahareh Banyaady Matia Korman Wolfgang Mulzer André van Renen Marcel Roeloffzen Paul Seiferth Yannik Stein arxiv:1708.00814v3 [c.cg] 1 Oct 2018
More informationFloating Point CORDIC Based Power Operation
Floating Point CORDIC Baed Power Operation Kazumi Malhan, Padmaja AVL Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland Univerity, Rocheter, MI e-mail: kmalhan@oakland.edu,
More informationA User-Attention Based Focus Detection Framework and Its Applications
A Uer-Attention Baed Focu Detection Framework and It Application Chia-Chiang Ho, Wen-Huang Cheng, Ting-Jian Pan, Ja-Ling Wu Communication and Multimedia Laboratory, Department of Computer Science and Information
More informationA Local Mobility Agent Selection Algorithm for Mobile Networks
A Local Mobility Agent Selection Algorithm for Mobile Network Yi Xu Henry C. J. Lee Vrizlynn L. L. Thing Intitute for Infocomm Reearch, 21 Heng Mui Keng Terrace, Singapore 119613 Email: {yxu, hlee, vriz}@i2r.a-tar.edu.g
More informationComputer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder
Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal
More informationSee chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM
Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive
More information