Modeling and Analysis of Slow CW Decrease for IEEE WLAN

Size: px
Start display at page:

Download "Modeling and Analysis of Slow CW Decrease for IEEE WLAN"

Transcription

1 Modeling and Analyi of Slow CW Decreae for IEEE 82. WLAN Qiang Ni, Imad Aad 2, Chadi Barakat, and Thierry Turletti Planete Group 2 Planete Group INRIA Sophia Antipoli INRIA Rhône-Alpe Sophia Antipoli, France Grenoble, France {qni, cbarakat, turletti}@ophia.inria.fr imad.aad@inrialpe.fr Abact The IEEE 82. Medium Acce Conol (MAC) protocol provide a contention-baed diibuted channel acce mechanim for mobile tation to hare the wirele medium, which may inoduce a lot of colliion in cae of overloaded active tation. Slow Contention Window (CW) decreae cheme i a imple and efficient olution for thi problem. In thi paper, we ue an analytical model to compare the low CW decreae cheme to the IEEE 82. MAC protocol. Several parameter are invetigated uch a the number of tation, the initial CW ize, the decreae factor value, the maximum backoff tage and the coexitence with the RequetToSend and ClearToSend (RTS/CTS) mechanim. The reult how that the low CW decreae cheme can efficiently improve the throughput of IEEE 82., and that the throughput gain i higher when the decreae factor i larger. Moreover, the initial CW ize and maximum backoff tage alo affect the performance of low CW decreae cheme. Keyword - IEEE 82.; DCF; low CW decreae cheme; RTS/CTS I. INTRODUCTION In recent year, IEEE 82. wirele LAN (WLAN) [] ha emerged a one of the mot deployed wirele acce technologie all over the world. Thi technology provide people with a ubiquitou environment in office, hopital, campue, factorie, airport and tock market. The IEEE 82. tandard provide both Medium Acce Conol (MAC) layer and the phyical (PHY) layer pecification for WLAN. IEEE 82. MAC ha defined two medium acce coordination function: the contention-baed Diibuted Coordination Function (DCF) and the contention-free baed Point Coordination Function (PCF) []. 82. can operate both in DCF mode and PCF mode. Every 82. tation hould implement DCF mode, which i baed on the Carrier Sene Multiple Acce with Colliion Avoidance (CSMA/CA) protocol []. Unlike DCF, the implementation of PCF i not mandatory in the tandard. In thi paper, we limit our invetigation to the DCF and correponding enhanced cheme. In the DCF cheme, all tation compete for the reource and channel with the ame prioritie. The number of colliion increae with the number of tation. Throughput degradation and high delay are caued by the increaing time needed by contending tation to acce the channel. Although the RequetToSend and ClearToSend (RTS/CTS) cheme i known to provide better performance than baic acce cheme in ome cae [2], it induce a coniderable overhead when packet ize i mall. Recently, IEEE 82. Tak Group e (TGe) ha been working on a new mechanim, the Enhanced Diibuted Coordination Function (EDCF), to enhance the performance of 82. DCF [4]. However, latet reearch work [8, 9] have hown that EDCF only reduce the internal colliion within a tation, and external colliion between tation remain high in ad-hoc network. Thi motivate the reearch on the low Contention Window (CW) decreae cheme [9]. To analyze the performance of 82. DCF, [2] propoe an analytical model for the computation of 82. aturation throughput. Thi model make the following aumption: Ideal channel condition (i.e. no hidden terminal and capture), a fixed number of tation and each mobile tation alway have packet to end. [3] extend thi model further to conider the cae of dynamic number of tation. The active tation are modeled with a Continuou Time Markov Chain Single Server Queue (CTMC-SSQ) proce. [5] extend the model in [2] to conider the frame retanmiion limit, which i pecified in the 82. tandard. [6] analyze the throughput and fairne iue of the DCF function concerning the effect of hidden terminal and capture. [7] ue a p-peritent protocol to tudy the maximum protocol capacity of 82.. The author in [7] claim that thi method give very cloe approximation of the 82. tandard protocol if the average backoff interval i alway the ame. Unlike 82., they propoe to compute the optimized contention window ize that maximize the channel utilization. But thi cheme require the knowledge of the number of active tation, which i difficult to obtain in real implementation. The low CW decreae cheme in [9] i impler than the one in [7], ince it only require multiplying the previou CW by a contant decreae factor to compute the new CW after ucceful anmiion. Given that there are no analytical model to analyze the performance of low CW decreae cheme, we preent in thi paper a Markov chain

2 model that allow thi analyi. Our analytical model i baed on the one propoed in [2], which ha already proven good performance reult. The ret of thi paper i organized a follow. Section II decribe the low CW decreae cheme briefly. Section III derive our analytical model. Section IV how the numerical reult of the model and analyze the performance of the low decreae cheme. Section V conclude the paper. II. SLOW CW DECREASE SCHEME In a diibuted 82. DCF mode, a mobile tation ha no knowledge of the number of other contending terminal. Thu, the MAC layer adapt it CW to the current congetion level by doubling it CW upon each colliion, and by reetting it upon each ucceful anmiion. Doubling the CW aume that each unucceful anmiion indicate a high congetion level. On the conary, when a node ucceed to anmit a packet, it aume the congetion level decreaing and reet it CW ize to it minimal value: CW min. However, when a anmiion ucceed at a given CW, thi doe not correpond to a congetion level decreae, but to a convenient CW value. Therefore the CW value hould be kept the ame a long a the congetion level remain the ame. Normally, congetion level i not likely to drop harply. By reetting the CW to CW min, a node take the rik of experiencing colliion and reanmiion until it reache the high CW value again, wating time and channel bandwidth. Although a pot backoff, i.e. DIFS plu backoff after a ucceful anmiion, i ued in the tandard to help low-tart after each ucceful anmiion [], thi i not enough to avoid colliion. Slow CW decreae cheme provide a olution to thi problem. The main advantage of low CW decreae cheme i more colliion avoidance during congetion, which reult in le colliion and reanmiion, and hence in a better throughput. The diadvantage i keeping high CW value when congetion level harply drop, increaing the overhead and maybe decreaing the throughput. The low CW decreae cheme induce then a adeoff between wating ome backoff time and riking a colliion following a packet anmiion. [9] propoe three different low CW decreae cheme: multiplicative CW decreae cheme, linear CW decreae cheme and adaptive CW decreae cheme. In thi paper, we propoe a Markov model to analyze the performance of the multiplicative low CW decreae cheme and we denote thi cheme a SD cheme. Let δ be the contant low decreae factor in the range of (,). The SD cheme tudied in thi paper i defined a follow: CW new = max (CW min, δ CW old ), after each ucceful anmiion, CW new = 2 CW old, after each unucceful anmiion. III. ANALYTICAL MODEL OF SLOW CW DECREASE (SD) SCHEME Our analyi i divided into two part: Firt, we tudy the behavior of a ingle mobile tation with a SD Markov model, and we compute the tationary probability that the tation anmit a packet in a randomly choen lot time. Thi probability doe not depend on the acce mechanim (with or without RTS/CTS cheme). Second, by tudying the event occurring within a lot time, we expre the channel throughput a a function of with and without RTS/CTS cheme. We get then a ytem of two equation that we olve for the channel throughput by getting rid of. A. Analyi of packet anmiion probability We make the ame aumption a [2]. A fixed number n of contending tation i conidered and the anmiion queue of each tation i alway nonempty. Each packet ha to wait for a random backoff time decrement to zero before being anmitted. The lot time i defined a, and p denote the probability that a packet collide. A lot time i equal to real PHY lot time if no packet are anmitted. If a packet i anmitted, i equal to the buy period until the channel i idle again. We define two tochatic procee to model the protocol behavior, ee Fig.. Firt, b(t) repreent the backoff counter of the time a tation ha to wait before it can anmit. Thi proce ha the range from to the current CW ize. Another tochatic proce (t) i defined a the backoff tage at a different CW level. (t) cale from to m, with m being the maximum CW tage. (-p)/w (-p)/w 2 (-p)/w g (-p)/w g+ (-p)/w m-g,,,2,w -2,W -, g, g+, m-g, m+-g, m+-g, m+-g,2 m,, g, g+, m-g, p/w p/w 2 p/w g p/w g+ p/w m-g p/w m+-g (-p)/w m+-g, W m+-g -2 m+-g, W m+-g - p/w m m, m,2 m,w m -2 m,w m - p/w m Fig. Markov chain model for the SD cheme With thee aumption, the bi-dimenional tochatic proce {(t), b(t)} fulfill the propertie of a homogenou dicrete Markov chain. The Markovian property doe not hold for the proce b(t) alone, which i dependent on the backoff tage hitory. For implicity, we write W i intead of CW i and W intead of CW min. Since the contention window double after each colliion, we can write W i = 2 i W, where i m. The maximum backoff tage m i the value uch that CW max =2 m W. We uppoe that the contant decreae factor δ ha a power of two form δ = /(2 g ), where the contant factor

3 g i a poitive integer with g>. Thi choice of δ limit the number of tate of the Markov chain and implifie the analyi, without impacting the reult. Another reaon for chooing δ a power of two come from implementation requirement. Current IEEE 82. contention window updating algorithm are implemented in hardware, where power of two multiplicative factor can be eaily upported. Thu, the new CW value when a packet i correctly anmitted will be: CW new = max (W, δ W i ) = max(w, 2 i-g W ) = max(w, W i-g ). Conider the anition of the SD cheme between lot time. Fig. explain the behavior of the Markov chain. The only non-null one-tep anition probabilitie are: P {i, k i, k+} =, k [,W i 2], i [,m] P {, k i, } = ( p)/ W, k [,W ], i [, g ] P {i-g, k i, } = ( p)/ W i-g, k [,W i-g ], i [g, m] P {i, k i, } = p/ W i, k [, W i ], i [, m] P {m, k m, } = p/ W m, k [, W m ]. () The firt equation in () account for the fact that the backoff timer ha not yet reached and that it i decremented by at the beginning of each lot time. The econd and third equation are pecific to the SD cheme. The econd equation account for the fact that when δ W i i maller than W, we reet W i to W, and a new backoff i uniformly choen in the range [, W ]. The third equation account for the fact that when δ W i i larger than W, we decreae W i lowly to the new value W i-g and we chooe the new backoff counter randomly in the range [, W i-g ]. The fourth and the fifth equation correpond to the cae where a colliion occur. Let π i.k = lim P{ ( t) = i, b( t) = k}, i [, m], k [, W i ], t be the tationary diibution of the chain. A the Markov Chain i ergodic, thi diibution exit and i unique. Firt, we expre all π i,k a a function of π,, then we ue the normalization equation to olve for π,, and hence for all π i.k. From the Markov chain above, we can ee that the incoming affic to tage i from either tage i+g after a ucceful anmiion, or from tage i- after a colliion, i uniformly diibuted over all poible backoff value at thi tage. Afterward, the counter i decremented by one and finally reache tate (i,). So, the tationary probability π i, i given by: g π, = (-p) j= π i, = p π i-, + (-p) π i+g,, < i (2) π i, = p π i-,, m-g < i < m p p π m-, = ( p) π m, π m, = π m,, i = m. p The firt equation in (2) account for the fact that tage can only be reached from tage j (j ) in the SD cheme, the tage j (j > g) can not directly decreae to tage. The econd equation in (2) ay that when < i g, there are two π j, different input: from the previou tage with colliion probability p and from tage i + g after a ucceful anmiion with probability -p. For i larger than m-g, there will be no input from tage i + g, becaue i + g i bigger than the maximum tage number m. For i = m, we fall into a pecial cae, ince after a colliion the contention window remain at thi tage. Now, according to the Markov chain regularitie, for each k [,W i -], π i, k can be written a: g ( p) π j, i = W k j= i π i, k = p π i, + ( p) π i+ g, < i m g (3) Wi p π < < i, m g i m p ( π m, + π m, ) i = m. The ratio before the parenthei account for the diibution of probabilitie for each tate in a tage. When we move in a tage to the right, the tate probability decreae by /W i, ince we do not get the input of the previou tate in the ame tage. From there, we can obtain the relation between π i,k and π i, : π i,k = [(W i k)/ W i ] π i,. Uing (2), we obtain the term on the right-hand ide of the parenthei in (3). By combining (2) and (3), one can compute all tationary probabilitie a a function of π, and p. In oppoite to [2], obtaining cloed-form expreion doe not eem poible, o we proceed by olving the ytem numerically with Matlab: firt we olve formula in (2) to obtain π i, that are only dependent on π, and p. Then we plug them into (3) to obtain π i,k that are only dependent on π, and p. π, i finally computed by uing the normalization condition: m W i i= k = π =. (4) i, k Now we compute, the probability that a tation anmit in a lot time. Thi probability i imply the um of probabilitie of all (i,) tate, m τ = π i, = f ( p, W, g, m). (5) i= Thi expreion of i a function of p, which i unknown. Let u aume independence of all tation haring the medium, i.e. the probability that a tation encounter a contention i independent of the tatu of the other tation. All tation anmit packet in a lot time with the ame probability. Conider that a tation anmit a packet in a lot time. p i then the probability that at leat one other tation anmit a packet in the ame lot time: p = ( τ) (n-). (6) We obtain therefore a non-linear ytem of two equation (5) and (6), that we can olve for p and. Thi ytem certainly ha a olution, ince the expreion of p a a function of i continuouly increaing with, with p = for = and p =

4 for =. A ufficient condition for thi olution to be unique i that the expreion of a a function of p given in (5) i continuouly decreaing. Our numerical reult in ection IV how that a unique olution for our model alway exit. B. Throughput Denote by S the normalized ytem throughput, which i defined a the fraction of time the channel i ued to anmit payload uccefully. Conider a random lot time, let P be the probability that there i at leat one anmiion in thi lot time, and let P be the probability of one ucceful anmiion given that there i at leat one anmiion. Note that P =-(-τ) n and n nτ ( τ ) P = ( τ ) PP E[P] S = ( P ) σ + P PT + P ( P ) T n c. Hence,, (7) where T i the average time the channel i ened buy becaue of a ucceful anmiion, and T c i the average time the channel i ened buy by each tation during a colliion. We ue in our analyi the value of T and T c computed in [2]. Note that the throughput expreion (7) doe not pecify the acce mechanim employed. To account for whether RTS/CTS cheme i ued or not, we only need to pecify the correponding value T and T c [2]. IV. NUMERICAL ANALYSIS We ue the Matlab tool to olve our model for the throughput of the channel. The 82. WLAN ytem parameter ued in the model are reported in Table. We tudy the performance impact of the SD cheme on 82. throughput for everal ytem parameter, uch a with or without RTS/CTS mode, the number of tation, the CW min value, the maximum backoff tage number m, and the value of SD factor g. Note that g= mean CW new =.5 CW old, which i the lowet decreae cheme we conider in thi paper. Our numerical reult how that in all cae, g= achieve the bet performance in term of throughput. We validate thi reult with n imulation and obtain a channel throughput very cloe to what i predicted by our model. The reult of the imulation are not included in thi paper for lack of pace. TABLE SIMULATION PARAMETERS Packet payload 884 bit MAC header 272 bit PHY header 28 bit ACK 2 bit+phy header RTS 6 bit+phy header CTS 2 bit+phy header Channel bit rate Mbit/ Propagation Delay µ Slot time 5 µ SIFS 28 µ DIFS 28 µ A. Without RTS/CTS mechanim Fig. 2 how the aturation throughput for tandard 82. and for the SD cheme. The figure report ix different value for the number of tation n: 5,, 5, 2, 3 and 5. We clearly ee how the throughput decreae when n increae (more contention) and how the total throughput of the SD cheme i alway higher than that of the baic 82. acce cheme, epecially for the mallet value of g (g=). For example, when n =5, the throughput gain of the SD cheme over tandard 82. i about 28% for g =, about 3% for g=2, about 6% for g=3, and about % for g=5. Saturation throughput (Mbit/) Compariion between DCF and SD cheme, CWmin =8, m =6 g =, SD Fig. 2 Saturation throughput for SD and 82. Fig. 3 decribe the impact of the initial CW ize (W ) on the SD cheme for different value of g. We et the maximum number of backoff tage to 6, i.e. W m =2 6 W. The initial CW ize ongly affect the SD gain. For example, when n =5, a high throughput gain (28%) i obtained with a mall initial CW (W =8), and the gain decreae to 4% with a large initial CW ize (W =28). A large initial CW reduce the number of colliion, which make the SD cheme le effective than the cae when a mall initial CW i ued and the number of colliion i high. Throughput Gain (%) The impact of CWmin on SD, n =5, m = Initial ize of the backoff window (CWmin) g = g = 2 g = 3 g = 4 g = 5 Fig. 3 Throughput gain v. initial CW ize To better undertand the above reult, we tudy the following two meaure: i). The average number of idle lot time per ucceful anmiion, which can be expreed a: P ) /( P P ) ; ( ii). The average channel time wated in colliion per ucceful anmiion, which i expreed a: T c ( ). P Fig. 4 and Fig. 5 how the idle time and the colliion time veru the number of tation, for the SD cheme with 5 different value of g and for the 82. cheme when W =8. We oberve that the SD cheme lightly increae the idle

5 time but ignificantly decreae the colliion probability. For example, when n=5 and g=, the idle channel time for the SD cheme i.6 lot time longer than 82., and the time wated in colliion for the SD cheme i about 38 lot time horter than 82.. A mentioned in Section II, the SD cheme involve a adeoff between wating ome backoff time and riking a colliion followed by the reanmiion. Idle channel time per packet TX (lot time) Idle Time, CWmin =8, m =6 g =, SD Fig. 4 Idle lot time per packet anmiion (W =8) Channel time wated in colliion (lot time) g =, SD 82. Colliion Time, CWmin =8, m = Fig. 5 Channel time wated in colliion (W =8) B. With RTS/CTS mechanim Fig. 6 compare the SD throughput gain obtained with and without the ue of the RTS/CTS mechanim. The gain without RTS/CTS i much higher than when RTS/CTS i ued. Thi mean that the SD cheme i more ueful when the RTS/CTS i not ued. The reaon i that RTS/CTS reduce the colliion time to a mall value, which make the ue of SD le effective ince the colliion time i already mall. Throughput Gain (%) The impact of RTS/CTS on SD, CWmin=8, m =6 g =, without RTS/CTS g =, with RTS/CTS V. CONCLUSION Thi paper preent an analytical model for the low CW decreae cheme, which ha been propoed to improve the performance of the baic IEEE 82. MAC. Our model take into account the different parameter that affect the channel throughput, uch a the number of mobile tation, the initial CW ize, the decreae factor value, the maximum number of backoff tage and the ue of RTS/CTS. The numerical reult we obtained how that the Slow CW Decreae (SD) cheme improve the throughput of IEEE 82. in all cae, epecially when the number of tation i large. Another finding i that the SD cheme ignificantly increae the throughput of baic CSMA/CA mode when uing a large decreae factor (e.g. δ=.5), while it i not very helpful when the RTS/CTS mode i ued ince the colliion time i mall with RTS/CTS. In addition, the initial CW ize and the maximum backoff tage alo affect the performance of the SD cheme and the gain in throughput. Future work will include the modeling analyi of the SD cheme with the effect of hidden terminal, and the impact of the SD cheme on fairne iue. ACKNOWLEDGMENT The author would like to thank Romain Zanolla and Marco Schmitt for their earlier work on Matlab code. REFERENCES [] IEEE Std , Part :Wirele LAN Medium Acce Conol (MAC) and Phyical Layer (PHY) pecification, 999 [2] G. Bianchi. Performance analyi of the IEEE 82. diibuted coordination function. IEEE Journal on Selected Area In Communication, Vol. 8. No. 3, March 2 [3] C. H. Foh and M. Zukerman. Performance analyi of the IEEE 82. mac protocol. Proceeding of the EW 22 Conference, Florence, Italy, pp. 84-9, February 22 [4] IEEE 82. WG, Draft Supplement to Part : Wirele Medium Acce Conol (MAC) and Phyical Layer (PHY) pecification: Medium Acce Conol (MAC) Enhancement for Quality of Service (QoS), IEEE 82.e/Draft 4., Februray 23 [5] H. Wu, Y. Peng, K. Long, S. Cheng and J. Ma. Performance of reliable anport protocol over IEEE 82. wirele LAN: analyi and enhancement. IEEE Infocom 2, New York, June 22 [6] H.S. Chhaya and S. Gupta. Performance modeling of the aynchronou data anfer method of IEEE 82. MAC protocol. Wirele Network, No. 3, pp , 997 [7] F. Cali, M. Conti, and E. Gregori. Dynamic tuning of the IEEE 82. protocol to achieve a theoretical throughput limit. IEEE/ACM Tranaction on Networking. Vol. 8, No. 6, December 2 [8] L. Romdhani, Q. Ni and T. Turletti, Adaptive EDCF: enhanced ervice differentiation for IEEE 82. wirele ad hoc network. IEEE WCNC 3, New Orlean, Louiiana, March 6-2, 23 [9] I. Aad, Q. Ni, C. Catelluccia, and T. Turletti. Enhancing IEEE 82. performance with low CW decreae. IEEE 82.e working group document 82.-2/674r, November, Fig. 6 SD throughput gain with and without RTS/CTS

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

Adaptive Fair Channel Allocation for QoS Enhancement in IEEE Wireless LANs

Adaptive Fair Channel Allocation for QoS Enhancement in IEEE Wireless LANs Adaptive Fair Channel Allocation for QoS Enhancement in IEEE 82.11 Wireless LANs Mohammad Malli, Qiang Ni, Thierry Turletti, Chadi Barakat Projet Planète, INRIA-Sophia Antipolis, France E-mail: mmalli,

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput Modeling the Effect of Mobile Handoff on TCP and TFRC Throughput Antonio Argyriou and Vijay Madietti School of Electrical and Computer Engineering Georgia Intitute of Technology Atlanta, Georgia 3332 25,

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

3D SMAP Algorithm. April 11, 2012

3D SMAP Algorithm. April 11, 2012 3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT

More information

A Practical Model for Minimizing Waiting Time in a Transit Network

A Practical Model for Minimizing Waiting Time in a Transit Network A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,

More information

Collision Probability in Saturated IEEE Networks

Collision Probability in Saturated IEEE Networks in Saturated IEEE 80.11 Networks Hai L. Vu Centre for Advanced Internet Architectures (CAIA) ICT Faculty, Swinburne University of Technology Hawthorn, VIC 31, Australia h.vu@ieee.org Taka Sakurai ARC Special

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

Modeling Throughput and Delay in Infrastructure Mode Networks with QoS Support from the Point Coordination Function

Modeling Throughput and Delay in Infrastructure Mode Networks with QoS Support from the Point Coordination Function Proceeding of the World Congre on Engineering and Computer Science 2012 Vol II, October 24-26, 2012, San Francico, USA Modeling Throughput and Delay in 802.11 Infratructure Mode Network with QoS Support

More information

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771

More information

Analysis of the IEEE e EDCA Under Statistical Traffic

Analysis of the IEEE e EDCA Under Statistical Traffic Analysis of the IEEE 82.11e EDCA Under tatistical Traffic Juki Wirawan Tantra, Chuan Heng Foh Centre for Multimedia and Network Technology chool of Computer Engineering Nanyang Technological University

More information

Representations and Transformations. Objectives

Representations and Transformations. Objectives Repreentation and Tranformation Objective Derive homogeneou coordinate tranformation matrice Introduce tandard tranformation - Rotation - Tranlation - Scaling - Shear Scalar, Point, Vector Three baic element

More information

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation

More information

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.

More information

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

How to Select Measurement Points in Access Point Localization

How to Select Measurement Points in Access Point Localization Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

Multi-Target Tracking In Clutter

Multi-Target Tracking In Clutter Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and

More information

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt

More information

Planning of scooping position and approach path for loading operation by wheel loader

Planning of scooping position and approach path for loading operation by wheel loader 22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

Modeling of underwater vehicle s dynamics

Modeling of underwater vehicle s dynamics Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation

More information

Joint Congestion Control and Media Access Control Design for Ad Hoc Wireless Networks

Joint Congestion Control and Media Access Control Design for Ad Hoc Wireless Networks Joint Congetion Control and Media Acce Control Deign for Ad Hoc Wirele Network Lijun Chen, Steven H. Low and John C. Doyle Engineering & Applied Science Diviion, California Intitute of Technology Paadena,

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and

More information

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck. Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization

More information

Available Bandwidth-Based Association in IEEE Wireless LANs

Available Bandwidth-Based Association in IEEE Wireless LANs Available Bandwidth-Baed Aociation in IEEE 82. Wirele LAN Heeyoung Lee, Seongkwan Kim, Okhwan Lee, Sunghyun Choi, Sung-Ju Lee 2 School of Electrical Engineering & INMC, Seoul National Univerity, Seoul,

More information

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in

More information

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de

More information

Shortest Path Routing in Arbitrary Networks

Shortest Path Routing in Arbitrary Networks Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,

More information

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two

More information

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

A NEW APPROACH IN MEASURING OF THE ROUGHNESS FOR SURFACE CONSTITUTED WITH MACHINING PROCESS BY MATERIAL REMOVAL

A NEW APPROACH IN MEASURING OF THE ROUGHNESS FOR SURFACE CONSTITUTED WITH MACHINING PROCESS BY MATERIAL REMOVAL International Journal of Mechanical and Production Engineering Reearch and Development (IJMPERD) ISSN 49-689 Vol. 3, Iue, Mar 3, 4-5 TJPRC Pvt. Ltd. A NEW APPROACH IN MEASURING OF THE ROUGHNESS FOR SURFACE

More information

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov

More information

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES MAKARA, TEKNOLOGI, VOL. 9, NO., APRIL 5: 3-35 3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES Mochammad Zulianyah Informatic Engineering, Faculty of Engineering, ARS International Univerity,

More information

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -

More information

Service and Network Management Interworking in Future Wireless Systems

Service and Network Management Interworking in Future Wireless Systems Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering

More information

CENTER-POINT MODEL OF DEFORMABLE SURFACE

CENTER-POINT MODEL OF DEFORMABLE SURFACE CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D

More information

Lecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization

Lecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization Lecture Outline Global flow analyi Global Optimization Global contant propagation Livene analyi Adapted from Lecture by Prof. Alex Aiken and George Necula (UCB) CS781(Praad) L27OP 1 CS781(Praad) L27OP

More information

Minimum Energy Reliable Paths Using Unreliable Wireless Links

Minimum Energy Reliable Paths Using Unreliable Wireless Links Minimum Energy Reliable Path Uing Unreliable Wirele Link Qunfeng Dong Department of Computer Science Univerity of Wiconin-Madion Madion, Wiconin 53706 qunfeng@c.wic.edu Micah Adler Department of Computer

More information

An Intro to LP and the Simplex Algorithm. Primal Simplex

An Intro to LP and the Simplex Algorithm. Primal Simplex An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n

More information

A Multi-objective Genetic Algorithm for Reliability Optimization Problem

A Multi-objective Genetic Algorithm for Reliability Optimization Problem International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and Thi article appeared in a journal publihed by Elevier. The attached copy i furnihed to the author for internal non-commercial reearch and education ue, including for intruction at the author intitution

More information

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

Motion Control (wheeled robots)

Motion Control (wheeled robots) 3 Motion Control (wheeled robot) Requirement for Motion Control Kinematic / dynamic model of the robot Model of the interaction between the wheel and the ground Definition of required motion -> peed control,

More information

Providing Throughput Guarantees in IEEE e Wireless LANs

Providing Throughput Guarantees in IEEE e Wireless LANs Providing Throughput Guarantees in IEEE 802.11e Wireless LANs Albert Banchs a, Xavier Pérez-Costa a, Daji Qiao b a Network Laboratories, NEC Europe Ltd., Heidelberg, Germany b Real-Time Computing Laboratory,

More information

IMPLEMENTATION OF CHORD LENGTH SAMPLING FOR TRANSPORT THROUGH A BINARY STOCHASTIC MIXTURE

IMPLEMENTATION OF CHORD LENGTH SAMPLING FOR TRANSPORT THROUGH A BINARY STOCHASTIC MIXTURE Nuclear Mathematical and Computational Science: A Century in Review, A Century Anew Gatlinburg, Tenneee, April 6-, 003, on CD-ROM, American Nuclear Society, LaGrange Park, IL (003) IMPLEMENTATION OF CHORD

More information

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong 4th International Conference on Machinery, Material and Computing Technology (ICMMCT 2016) A Load Balancing Model baed on Load-aware for Ditributed Controller Fengjun Shang, Wenjuan Gong College of Compute

More information

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online

More information

Floating Point CORDIC Based Power Operation

Floating Point CORDIC Based Power Operation Floating Point CORDIC Baed Power Operation Kazumi Malhan, Padmaja AVL Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland Univerity, Rocheter, MI e-mail: kmalhan@oakland.edu,

More information

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds * Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem

More information

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks Numerical Analysis of IEEE 802.11 Broadcast Scheme in Multihop Wireless Ad Hoc Networks Jong-Mu Choi 1, Jungmin So 2, and Young-Bae Ko 1 1 School of Information and Computer Engineering Ajou University,

More information

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II IEEE INFOCO 2002 1 Ditributed Partial Information anagement (DPI) Scheme for Survivable Network - Part II Dahai Xu Chunming Qiao Department of Computer Science and Engineering State Univerity of New York

More information

Variable Resolution Discretization in the Joint Space

Variable Resolution Discretization in the Joint Space Variable Reolution Dicretization in the Joint Space Chritopher K. Monon, David Wingate, and Kevin D. Seppi {c,wingated,keppi}@c.byu.edu Computer Science, Brigham Young Univerity Todd S. Peteron peterto@uvc.edu

More information

A note on degenerate and spectrally degenerate graphs

A note on degenerate and spectrally degenerate graphs A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove

More information

Coordinated TCP Westwood Congestion Control for Multiple Paths over Wireless Networks

Coordinated TCP Westwood Congestion Control for Multiple Paths over Wireless Networks Coordinated TCP Wetwood Congetion Control for Multiple Path over Wirele Network Tuan Anh Le, Choong eon Hong, and Eui-Nam Huh Department of Computer Engineering, Kyung Hee Univerity 1 eocheon, Giheung,

More information

The Implementation of an Adaptive Mechanism in the RTP Packet in Mobile Video Transmission

The Implementation of an Adaptive Mechanism in the RTP Packet in Mobile Video Transmission 2011 International Conference on Information Management and Engineering (ICIME 2011) IPCSIT vol. 52 (2012) (2012) IACSIT Pre, Singapore DOI: 10.7763/IPCSIT.2012.V52.91 The Implementation of an Adaptive

More information

Chapter 13 Non Sampling Errors

Chapter 13 Non Sampling Errors Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption

More information

/06/$ IEEE 364

/06/$ IEEE 364 006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;

More information

Delaunay Triangulation: Incremental Construction

Delaunay Triangulation: Incremental Construction Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )

More information

Contents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course:

Contents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course: Content Shortet path Algorithm and Network 21/211 The hortet path problem: Statement Verion Application Algorithm (for ingle ource p problem) Reminder: relaxation, Dijktra, Variant of Dijktra, Bellman-Ford,

More information

xy-monotone path existence queries in a rectilinear environment

xy-monotone path existence queries in a rectilinear environment CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of

More information

Image authentication and tamper detection using fragile watermarking in spatial domain

Image authentication and tamper detection using fragile watermarking in spatial domain International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: 2278 1323 Image authentication and tamper detection uing fragile watermarking

More information

Adaptive EDCF: Enhanced Service Differentiation for IEEE Wireless Ad-Hoc Networks

Adaptive EDCF: Enhanced Service Differentiation for IEEE Wireless Ad-Hoc Networks Adaptive : Enhanced Service Differentiation for IEEE 82.11 Wireless Ad-Hoc Networks Lamia Romdhani, Qiang Ni, and Thierry Turletti INRIA Sophia Antipolis, 24 Route des Lucioles, BP-93, 692 Sophia Antipolis,

More information

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent

More information

On Peer-to-Peer Media Streaming Λ

On Peer-to-Peer Media Streaming Λ On eer-to-eer Media Streaming Λ Dongyan Xu y, Mohamed Hefeeda, Suanne Hambruch, Bharat Bhargava Department of Computer Science urdue Univerity, Wet Lafayette, IN 797 fdxu, hefeeda, eh, bbg@c.purdue.edu

More information

3-D Visualization of a Gene Regulatory Network: Stochastic Search for Layouts

3-D Visualization of a Gene Regulatory Network: Stochastic Search for Layouts 3-D Viualization of a Gene Regulatory Network: Stochatic Search for Layout Naoki Hooyama Department of Electronic Engineering, Univerity of Tokyo, Japan hooyama@iba.k.u-tokyo.ac.jp Abtract- In recent year,

More information

Focused Video Estimation from Defocused Video Sequences

Focused Video Estimation from Defocused Video Sequences Focued Video Etimation from Defocued Video Sequence Junlan Yang a, Dan Schonfeld a and Magdi Mohamed b a Multimedia Communication Lab, ECE Dept., Univerity of Illinoi, Chicago, IL b Phyical Realization

More information

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial

More information

KINEMATIC BENDING OF FIXED-HEAD PILES IN NON- HOMOGENEOUS SOIL

KINEMATIC BENDING OF FIXED-HEAD PILES IN NON- HOMOGENEOUS SOIL KINEMATIC BENDING OF FIXED-HEAD PILES IN NON- HOMOGENEOUS SOIL Raffaele Di Laora Univerity of Napoli Parthenope raffaele.dilaora@uniparthenope.it Emmanouil Rovithi Intitute of Engineering Seimology and

More information

Diverse: Application-Layer Service Differentiation in Peer-to-Peer Communications

Diverse: Application-Layer Service Differentiation in Peer-to-Peer Communications Divere: Application-Layer Service Differentiation in Peer-to-Peer Communication Chuan Wu, Student Member, IEEE, Baochun Li, Senior Member, IEEE Department of Electrical and Computer Engineering Univerity

More information

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer International Reearch Journal of Applied and Baic Science 218 Available online at www.irjab.com ISSN 2251-838X / Vol, 12 (1): 49-53 Science Explorer Publication Analyi of the reult of analytical and imulation

More information

else end while End References

else end while End References 621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

Network Coding in Duty-Cycled Sensor Networks

Network Coding in Duty-Cycled Sensor Networks 1 Network Coding in Duty-Cycled Senor Network Roja Chandanala, Radu Stoleru, Member, IEEE Abtract Network coding and duty-cycling are two popular technique for aving energy in wirele adhoc and enor network.

More information

The norm Package. November 15, Title Analysis of multivariate normal datasets with missing values

The norm Package. November 15, Title Analysis of multivariate normal datasets with missing values The norm Package November 15, 2003 Verion 1.0-9 Date 2002/05/06 Title Analyi of multivariate normal dataet with miing value Author Ported to R by Alvaro A. Novo . Original by Joeph

More information

Resource Allocation in Multi-Radio Multi-Channel Multi-Hop Wireless Networks

Resource Allocation in Multi-Radio Multi-Channel Multi-Hop Wireless Networks Reource Allocation in Multi-Radio Multi-Channel Multi-Hop Wirele Network Technical Report (July 2007) Simone Merlin, Nitin Vaidya, Michele Zorzi Padova Univerity, DEI, Padova, Italy; Univerity of Illinoi

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information