A Variable Threats Based Self-Organization Scheme for Wireless Sensor Networks

Size: px
Start display at page:

Download "A Variable Threats Based Self-Organization Scheme for Wireless Sensor Networks"

Transcription

1 009 Thrd Internatonal Conference on Sensor Technologes and Applcatons A Varable Threats Based Self-Organzaton Scheme for Wreless Sensor Networks Jan Zhong School of Computer Scence and Informaton Technology Royal Melbourne Insttute of Technology Melbourne, Australa E-mal: J.Zhong@student.rmt.edu.au Peter Bertok School of Computer Scence and Informaton Technology Royal Melbourne Insttute of Technology Melbourne, Australa E-mal: peter.bertok@rmt.edu.au Abstract Self-organzaton s an mportant ssue n wreless sensor networks because of the nherent unrelablty of the network. Besdes, varable threats n the networks can not be gnored. Extendng battery lfe and enhancng robustness under varable threats are two essental aspects whch need to be consdered when a self-organzaton scheme s explored. In order to address these ssues, a Redundant Nodes Selecton scheme and a varable Threats Probablty Estmaton scheme are proposed n ths paper. RNS s able to select redundant nodes that can be swtched off wthout affectng overall sensng coverage. TPE s able to help a sensor node to choose the most sutable path and avod hgh-threat neghbors n order to reduce packet loss. The scenaro wth RNS extended battery lfe by 30% to 50%, and postponed the occurrence of frst parttonng n the network by 7% to 40%. TPE decreased packet loss by 5% to 400% when a hgh threat level was nvolved. Keywords-wreless sensor networks; self-organzaton; varable threats; battery lfe; robustness I. INTRODUCTION For wreless sensor networks (WSNs), organzng typcally begns wth neghbor dscovery []. Nodes send rounds of messages (packets), buld local neghbor tables and organze clusters centered around a cluster head. The tables nclude nformaton on each neghbor s ID and locaton. However, durng operaton some sensors become nactve due to battery exhauston whch may result n network parttonng, and packets can be lost due to varous threats. Extendng battery lfe, postponng the occurrence of frst parttonng and reducng packet loss are sgnfcant aspects of self-organzng. A self-organzaton scheme supported by a redundant nodes selecton algorthm (RNS) and varable threats probablty estmaton (TPE) s proposed here to extend battery lfe and reduce packet loss. RNS s desgned to scan all sensor nodes and select redundant nodes that can be swtched off so that the whole area wll stll be covered. The redundant nodes wll be used as backups and replacements to extend the effectve network lfetme wthout any coverage loss. The second method TPE, mproves the scheme orgnally proposed n [6], by allowng nodes to choose a safer neghbor as a default path to the data snk and blockng hghthreat nodes to reduce packet loss. The whole proposed scheme provdes a soluton for WSNs to extend battery lfe and avod varable threats. II. BACKGROUND A. Topologes and Network Archtecture We consder a clustered organzaton, when ndvdual nodes are connected to a cluster head, and data from the cluster s relayed by the head towards the destnaton. However, n a number of cases there s no guarantee that all cluster heads can drectly connect to the data snk or all sensor nodes can drectly connect to a cluster head. For such cases, a random non-unform archtecture has been mentoned n [7], whch s shown n Fg.. In Fg. [7], a small number of hgh-end nodes, called Aggregaton and Forwardng Nodes (AFNs), are deployed together wth numerous low-end sensor nodes, called Mcro Sensor Nodes (MSNs). In addton, the network ncludes a globally trusted base staton (BS), whch s the ultmate destnaton for data streams from all the AFNs. The BS has powerful data processng capabltes, and s drectly connected to an outsde network. Each AFN s equpped wth a hgh-end embedded processor, and s capable of communcatng wth other AFNs over long dstances. A two-tered wreless sensor network model wll be used n our proposed method, and AFN wll be called Cluster Head (CH), BS wll be called Data Snk (DS) and MSN wll be called Sensor Node (SN) n the rest of the paper. Fgure. A two-tered archtecture /09 $ IEEE DOI 0.09/SENSORCOMM

2 B. Self-Organzaton For WSN organzaton, a self-organzaton mechansm for non-unform dstrbuton of sensor nodes was proposed n [3], and a locaton-based scheme for both unform and nonunform was descrbed []. The mechansm n [3] offers good performance for non-unform dstrbuton, and an solated part of the network can be reconnected by moble sensors/devces. The method can fnd the optmum path to connect to the data snk effcently. The soluton n [3] reles on moble robots to mantan connectvty n the network, but n some cases a moble robot s not avalable. The locatonbased mechansm [] s relyng on a specal node named server node. Ths wll rase the cost of the whole network and f ths server node s compromsed or damaged, all nodes under ts control wll be affected. If ths functon s embedded n each cluster head, the power consumpton wll ncrease, due to most of the key management and delvery beng performed by the server node. To reduce the memory overhead as well as mantan securty for the network, a new approach s proposed n [7], whch s called Survvable and Effcent Clustered Keyng (SECK). However, a new ssue, default path selecton becomes a problem n hgh-threat networks. To reduce WSN power consumpton swtchng off some nodes has been ntroduced. To mantan sensng coverage, an nformaton coverage concept [4] was proposed, n whch a deactvated sensor s data s estmated by usng nformaton from the surroundng actve sensors. In [4], a balance between coverage and sensor densty was explored. In some cases data can be estmated relably, n other cases estmates cannot be a replacement of actual data. WSNs are often deployed n hostle envronments, and reslence to falures/attacks s mportant. The attack probablty estmaton algorthm n [5] has a good expermental result for statc attack probablty estmaton and connectvty mantenance. However, a varable attack and falure probablty s more realstc for WSNs. Ths paper wll focus on sensor node organzaton, and a neghbor-orented self-organzaton mechansm wll be proposed. These aspects wll be descrbed respectvely. III. PROPOSED METHOD A WSN self-organzaton scheme s proposed here to address two man aspects, namely battery lfe extenson and network reslence. The self-organzaton mechansm facltates network mantenance, and s based on a Redundant Nodes Selecton scheme (RNS) and a varable Threats Probablty Estmaton scheme (TPE). RNS s employed to select the redundant nodes that can be deactvated n order to save power. TPE s used to help a sensor node to choose the most sutable path to the cluster head and data snk, and avod hgh-threat neghbors n order to reduce packet loss. Noton : It s a redundant node, f and only f there are no changes n the covered area when t has been swtched to sleep mode. Fgure. The redundant node A. Redundant Node Selecton Assume that every node has ts own locaton nformaton whch wll be the coordnate n ths algorthm and all rado range (radus) wll be R. Assume that all sensor nodes are n the same -dmensonal area. In ths paper, assume a pont u s covered (montored) by a node v f ther Eucldan dstance s equal or less than the sensng range,.e. uv R. Defne the sensng crcle C(u) of node u as the boundary of u s coverage regon. The RNS algorthm has two steps. The frst one s to select redundant nodes and the second s to check whether the redundant nodes can be swtched off. The algorthm has the followng steps:. Put a node SN at the orgn of the coordnate system.. Assume there s a node SN n C(SN ) whch means node SN s n node SN s rado range, vce versa. Wthout loss of generalty, let SN be on the X-axs, shown n Fg The X-axs and crcle C(SN ) ntersect at P. C(SN ) and C(SN ) ntersect at Q and Q. 4. To fnd the next crcle. 4. If there s a node SN 3 n the area Q SN W and SN Q R, then go to step 3 and replace SN by SN 3. If SN could be the next crcle, then node SN can be swtched to sleep mode, as shown n Fg If there s a node SN 3 n the area Q SN W and SN Q > R, as shown n Fg. 5, there wll be a small area A B Q whch s not covered. If there exsts a node SN E that SN E A R, SN E B R, SN E Q R, then goto to step 3 and replace SN by SN 3. If there s no such SN E, the node SN wll not be swtched off, as shown n Fg If there s not any nodes n the area Q SN W: Assume that there s a node SN A whch s outsde the area Q SN W, as t s shown n Fg. 7, and SN A SN < R, SN A SN R, and SN A Q < R. The C(SN A ) and the C(SN ) ntersect at C and C s n the area Q SN W. Then, go to step 4.3 and replace Q and SN by C and C. If Q s n the next crcle, then node SN can be swtched to sleep mode. If there s no such node SN A, the node SN can not be swtched off. 38

3 and all SN mp are defned as redundant related nodes (RR nodes or RRNs) and SN ml s defned as redundant related seed (RRS). Especally, there may be only one SN mp related wth SN ml and both of them are RRS for each other. Then, these two nodes are defned as twn redundant related nodes (TRRNs), shown n Fg. 8. Fgure 3. Put both nodes n the coordnate system Fgure 7. Step 4.3 Fgure 4. Step 4. Fgure 8. Twn redundant related nodes Fgure 5. Step 4. Fgure 6. Step 4. Noton : If there exsts a set of nodes R = {SN m, SN m, SN mn },n N, for any SN mk ( k n) that SN mk s a redundant node, but f any node SN ml ( l n) from among them s swtched off, there wll be at least one node SN mp ( p<n) that s no longer redundant, then the node SN ml The algorthm of swtchng the RR nodes s to separate them nto TRRNs. Frst, select a RRS from RR nodes and search all of the SN mp that whether there s a twn node for the RRS. If there s, swtch one of them off and put the other one back. Besdes, the selecton algorthm, from step one to step four, does not cover all coverage probabltes because the computaton overhead stll need to be consdered. The selecton for the TRRNs s based on the Varable Threats Probablty Estmaton algorthm whch s specfed n the followng secton. The hgher threat probablty estmaton node wll be swtched off. Besdes, for any sleepng node SN s, let a pont n the deployment area be Z=(x, y). If there exsts Z, ZSN > R, ZSNs R, s, SN s wll be swtched on. B. Varable Threats Probablty Estmaton There s no sure and effcent way to readly detect a node capture. The authors mentoned n [9] and [0]. Accordngly, a threats probablty estmaton algorthm s employed n the self-organzaton scheme. In my proposed method, a new deployment model s used Compared wth that n [5], the attack and falure probablty 39

4 does not focus on groups but on ndvdual sensors. A new algorthm s proposed to keep the whole network connected and avod key threats. For securty of Trusted Neghbors, I refer to Reputaton-based Framework for Hgh Integrty Sensor Networks [8]. Also, a sensor node S ( N) s assocated wth a basc falure coeffcent b s representng the threat from the envronment and b s s predstrbuted value by experence. Let w be the varable attack and falure weght, whch s obtaned by experence. Let ϕ be threshold threat level and let D be the detected attack level. Then w s defned ϕ as w, Dϕ = ϕ w, Dϕ = ϕ w =, n, wn Dϕ = ϕ n Here n denotes the number of threat levels. Let { ϕ, ϕ,, ϕn} be a set of threshold values and N T shows how many tmes a certan threat level has been detected. For a certan threat level, the falure estmate s F = wn. The T dfference between the falure estmates at tme k and that at tme (k-) can be defned as e = FS F ( k ) S () whch s the frst correcton factor. Here FS ( denotes the estmate falure of S at tme k. Then the second correcton factor M c, relatve threat value, can be defned as FS M c = θ (3) FC ( S ) where θ s a constant coeffcent. FC ( S )( denotes the sum of falure estmate of S 's neghbors, whch can be defned as F = F + F ( k (4) C( S ) ) S S j S j C ( S ) The thrd correcton factor s connectvty detecton, whch s the number of sensors that have at least an avalable path to a cluster head. It can be defned as CNTS CDS = ( )( CNT CNT ) S (5) S CNTS Here CNTS ( denotes the connectvty of S at the tme k and CNT denotes the connectvty when the network frst S deployed. If CDS > 0, t means some nodes are compromsed or unavalable at the tme k. The frst correcton factor measures the dversty between dfferent tme ntervals. The second factor measures the relatve threat. The thrd factor measures the connectvty for a sensor and ts neghbors. The total correcton measurement derved from (), (3) and (5) can be defned as M A( = ω ( e( + M c( + γcds + ( e( ) (6) α d + M c( ) dk + β ( e( + M c( ) dk Here α, β, γ are constants and wll be set based on experence. Let δ, a constant, be the decreasng threat value, () whch means f no falure/attack problems are detected, b s wll gradually drop down. Then b s can be defned as bs = bs ( k ) δ + M A (7) If bs < 0, then let bs = 0. The bs ( s the real tme threat estmate and ths wll also be used n RNS algorthm for TRRNs. After real tme threat estmate b s s calculated, the degree of a sensor node can be derved. A degree of a sensor node denotes the number of avalable connectons for a sensor node (number of shared keys wth neghbors). Gven a set of threshold { ϖ, ϖ, ϖ n }, n for any sensor nodes, the degree can be calculated by κ, bs = ϖ κ ϖ (8), bs = K( S) =, n, κ bs = ϖ n Here K(S ) denotes the degree of a sensor node n a deployment group. In (8), for, j, j, f ϖ ϖ, then j κ. In my proposed method, dfferently from that n [5], κ j the hgher attack/falure probablty a sensor has, the fewer keys t has. C. Organzng To dscover a prmary cluster head (CH), each sensor node (SN) wants to dscover the ID of the closest CH. In my proposed scheme, let SNID be the ID of a SN, DP be Default Path, DD be the Depth of Default Path, DTD be Dstance to Default Path, SLP be the status (sleepng or actve), TL be Threat Level, NL be a Neghbor Lst. Then, we gve each SN an expresson (9): SN = { SNID, DP, DD, DTD, SLP, TL, ω)} (9) Where ω s the ndex of SN s neghbors. SN s parameters are expressed wth dotted notaton, for nstance, SN.DP denotes the SN s Default Path. After deployment, the RNS algorthm (detaled n A) s actvated. SNs whch are redundant wll be set to SLP =. At the same tme, all SNs dscover all ther neghbors and store n NL. Then they wll wat for connecton from ther neghbors whch can connect to cluster heads and the algorthm s descrbed as follows. At frst, each CH wll search SNs wthn ts sensng range. Each SN wthn CH s sensng range wll update ts expresson (0). SN = update{ DP = CH, DD = 0, DTD, SLP = 0, ω)} (0) Then these SNs contnue to tell ther neghbors they can communcate wth a cluster head by sendng a path message (): PathInfo = { SNID = SN, DP = CH, DD = 0, DTD, SLP = 0} () The SNs who receve the path message () wll update ther expresson (). SN = update{ DP, DD, DTD, SLP)} () If a SN receves more than one path message, t wll calculate the power consumpton (PC) on these dfferent communcaton paths. As mentoned above, the proposed 330

5 scheme s neghbor-orented. The default path selecton algorthm s descrbed n (3). SN = update{ PC( DP, DD, DTD)} (3) Here PC denotes the power consumpton functon. Before gve the expresson for total power consumpton, assume power consumpton s proportonal to the square of dstance wth a coeffcent θ and each hop wll consume λ. Thus, the power consumpton functon can be descrbed as PC( SN, ndex)) = θ ( DTD + ndex). DTD ) + λ DD (4) ndex).dtd denotes the dstance between a neghbor s default path and the neghbor. The paths from a SN to a CH are called communcaton lnks. For nstance, SN need to send messages to SN j, and SN j need to forward to SN k then fnally to the CH, the lnk j k CH s called a communcaton lnk. Theorem : For any SNs, f there exsts PC (SN,ndex )) < PC (ndex )), the power consumpton of the communcaton lnk on ndex ) s less than that on ndex ) s true. Proof: PC( SN, ndex )) = θ ( DTD + ndex ). DTD ) + λ DD = ( θ DTD + λ) + ( θ ndex ). DTD + ( λ DD )) = PC( SN) + PC( ndex )) (5) PC(SN) denotes the power consumpton between the SN and ts default path and PC(ndex )) denotes the power consumpton between the node of SN s default path and the node of SN s default path s default path. For any avalable communcaton lnks, we defne a searchng functon (SF), that SF(SN) = SN.ndex ) f for any n ( < n N, N s the number of SN s neghbor), there s PC (SN,ndex )) < PC n (ndex n )), where SN.ndex ) denotes the SN s neghbor wth ndex. We defne SF(SF(SN)) = SF (SN), then the most power-savng path wll be the communcaton. DD+ lnk SN SF( SN) SF ( SN) SF SN. Thus, for any SNs, f there exst PC (SN,ndex )) < PC (ndex )), that the power consumpton of the communcaton lnk on ndex ) s less than that on ndex ) s true. Lemma : For any SNs, f there exsts PC (SN,ndex )) < PC n (ndex n )),( < n N, N s the number of SN s neghbors), the ndex ) s the mnmum power-savng lnk for SN. Based on Lemma, all SNs can fnd the mnmum power path. If a sleepng node s on a mnmum power path, then t wll be swtched on. IV. SIMULATION RESULTS In ths secton, smulaton results are gven for total energy consumpton and total packages lost n the network. The latter ndcates network robustness, that s, the ablty of the network to contnue operatng after varable threats. In the smulaton, a JAVA based wreless sensor network smulator was used. Compared wth other smulators, such as OMNeT++, the JAVA smulator proved to be more flexble for envronment confguraton and mplementaton of the proposed solutons. A. Power Consumpton Unform sensor dstrbuton and unform traffc dstrbuton was used when examne the total energy consumptons between before and after mplementng proposed method. In the smulator, each hop costs % battery lfe, around % per smulaton meter and 0.00% per workng sensor. Smulatons wth dfferent parameters produced smlar results. A typcal set of results s presented here. There were 00 sensors wth three cluster heads and sensor densty s 8. The sensors were arranged n a 0 0 matrx. Fg. 9 shows the total battery consumpton wthout proposed scheme and Fg. 0 shows the total consumpton under the same crcumstance but wth self-organzaton scheme actvated. There are smlar smulaton results n the normal dstrbuton scenaros. Fgure 9. Total power consumpton n unform dstrbuton wthout RNS Fgure 0. Total power consumpton n unform dstrbuton wth RNS The charts prove that the RNS scheme could reduce energy consumpton of the network, and thereby extend the network s lfetme. B. Robustness Ths paper descrbes a Threats Probablty Estmaton (TPE) based self-organzaton scheme to support the key management. For comparson, the default key management scheme s shortest path frst (SPF). There are total 00 sensors were deployed n such area and average sensor densty s 6. One fourth of the sensors are set as hgh threats and random threats are launched sx tmes n each scenaro. In the smulator the process of detectng threats was not modeled, but rather the threat event was drectly passed on to the sensors. ) Normal sensor dstrbuton wth normal traffc dstrbuton Frst, we look at the scenaro when sensors are deployed n a normal dstrbuton (Gaussan dstrbuton). The traffc 33

6 dstrbuton s also normal, to smulate centralzed events, such as fre n a forest. The Fg. shows the robustness of the network wth SPF scheme and Fg. shows that wth TPE based self-organzaton scheme. The curves llustrated n Fg. ndcate the TPE scheme could enhance the robustness of the network, by reducng packet loss from 5% to %. ) Unform sensor dstrbuton wth unform traffc dstrbuton In unform dstrbuton, the TPE scheme mproves the robustness by reducng packet loss from 4% to 4%. Fgure. Robustness of the network wth SPF n normal dstrbuton Fgure. Robustness of the network wth TPE n normal dstrbuton V. DISCUSSION AND CONCLUSION The smulaton results showed that battery lfe was extended. The results prove that the RNS scheme could reduce energy consumpton of the network, and thereby extend the network s lfetme. Varable threats, such as nodes falure n hostle envronments are nevtable. A sensor wth hgh threat level ndcates a hgh packet loss probablty when packets are receved or sent. The proposed TPE method scans all neghbors and helps sensors to avod hgh-threat nodes to reduce packet loss. TPE also showed a dstnct mprovement n network behavor. Wth hgh threats n the network, TPE can be consdered as an effectve scheme to mprove robustness by reducng packet loss. In my proposed method, the mprovement by RNS depends on sensor densty, the hgher the densty, the more mprovement. Low sensor densty networks wll not beneft sgnfcantly from RNS. TPE s desgned to counter varable threats and there wll not be much mprovement on the scenaro wthout varable threats. possble f t was not for hs contnuous gudance at every stage. A/Prof. Peter Bertok s supports, suggestons and supervson on the whole progress of the project were apprecated. I would also lke to thank hm for proofreadng the drafts and helpng me come up wth ths work. I would also lke to thank my parents and my fancée Ru Ru Zhang for ther understandng and support. REFERENCES [] B. Karp, Geographc routng for wreless networks, PhD Dssertaton, Harvard Unversty, October 000. URL actcomm.dartmouth.edu/papers/karp:paper.pdf [] R. D Petro, L. V. Mancn and A. Me, Energy effcent node-tonode authentcaton and communcaton confdentalty n wreless sensor networks, Wreless Netowrks, Volume, Number 6, pp 709-7, 006. URL [3] D. Lu and P. Nng, Effcent dstrbuton of key chan commtments for broadcast authentcaton n dstrbuted sensor networks, In Proceedngs of the 0th Annual Network and Dstrbuted Sensor Networks (ISOC), 003. URL pdf [4] B. Wang, K. C. Chua and V. Srnvasan, We Wang, Sensor densty for complete nformaton coverage n wreless sensor networks, In Proceedngs of ACM SenSys, Sngapore, 005. [5] C. Yu, C. L, C. Lu, D. Lee and S. Kuo, Attack probablty based determnstc key predstrbuton mechansm for non-unform sensor deployment, In Proceedngs of the 7th Internatonal Conference on Dstrbuted Computng Systems Workshops(IEEE), pp 8, 007. [6] C. Karlof and D. Wagner, Secure routng n wreless sensor networks, Unversty of Calforna at Berkeley, 00. URL [7] M. W. Chorzempa, Key management for wreless sensor networks n hostle envronments, Paper submtted to the Faculty of the Vrgna Polytechnc Insttute and State Unversty, 006. URL [8] Saurabh Ganerwal and Man B. Srvastava, Reputaton-based Framework for Hgh Integrty Sensor Networks, SASN 04, October 5, 004, Washngton, D.C., USA [9] G. Jolly, M. Kusu, and P. Kokate. A herarchcal key management method for low-energy wreless MSN networks. In Proc. of the 8th IEEE Symposum on Computers and Communcaton (ISCC), pp Turkey, July, 003. [0] S. Zhu, S. Seta and S. Jajoda. LEAP: effcent securty mechansms for large-scale dstrbuted MSN networks. In Proc. of the 0th ACM Conference on Computer and Communcaton Securty (CCS), pp. 6-7, Washngton DC, October 003. ACKNOWLEDGMENT I would lke to thank my supervsor, A/Prof. Peter Bertok, for hs contnuous support and useful feedback throughout the project. Ths paper would not have been 33

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Wireless Sensor Network Localization Research

Wireless Sensor Network Localization Research Sensors & Transducers 014 by IFSA Publshng, S L http://wwwsensorsportalcom Wreless Sensor Network Localzaton Research Lang Xn School of Informaton Scence and Engneerng, Hunan Internatonal Economcs Unversty,

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks Communcatons and Network, 2016, 8, 45-55 Publshed Onlne February 2016 n ScRes. http://www.scrp.org/journal/cn http://dx.do.org/10.4236/cn.2016.81006 Performance Comparson of a QoS Aware Routng Protocol

More information

Internet Traffic Managers

Internet Traffic Managers Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John

More information

DECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks

DECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks da Rocha Henrques et al. EURASIP Journal on Wreless Communcatons and Networkng (2016) 2016:163 DOI 10.1186/s13638-016-0662-9 RESEARCH Open Access DECA: dstrbuted energy conservaton algorthm for process

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Extending Network Life by Using Mobile Actors in Cluster-based Wireless Sensor and Actor Networks

Extending Network Life by Using Mobile Actors in Cluster-based Wireless Sensor and Actor Networks Extendng Networ Lfe by Usng Moble Actors n Cluster-based Wreless Sensor and Actor Networs Nauman Aslam, Wllam Phllps, Wllam Robertson and S. Svaumar Department of Engneerng Mathematcs & Internetworng Dalhouse

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Learning-Based Top-N Selection Query Evaluation over Relational Databases

Learning-Based Top-N Selection Query Evaluation over Relational Databases Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **

More information

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks A Load-balancng and Energy-aware Clusterng Algorthm n Wreless Ad-hoc Networks Wang Jn, Shu Le, Jnsung Cho, Young-Koo Lee, Sungyoung Lee, Yonl Zhong Department of Computer Engneerng Kyung Hee Unversty,

More information

A Decentralized Lifetime Maximization Algorithm for Distributed Applications in Wireless Sensor Networks

A Decentralized Lifetime Maximization Algorithm for Distributed Applications in Wireless Sensor Networks A Decentralzed Lfetme Maxmzaton Algorthm for Dstrbuted Applcatons n Wreless Sensor Networks Vrgna Pllon, Mauro Franceschell, Lug Atzor, Alessandro Gua Dept. of Electrcal and Electronc Engneerng, Unversty

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

SPEED: A Stateless Protocol for Real-Time Communication in Sensor Networks

SPEED: A Stateless Protocol for Real-Time Communication in Sensor Networks Internatonal Conference on Dstrbuted Computng Systems ICDCS 2003 : A Stateless Protocol for Real-Tme Communcaton n Sensor Networks Tan He a John A Stankovc a Chenyang Lu b Tarek Abdelzaher a a Department

More information

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks Moblty Based Routng Protocol wth MAC Collson Improvement n Vehcular Ad Hoc Networks Zhhao Dng, Pny Ren, Qnghe Du Shaanx Smart Networks and Ubqutous Access Rearch Center School of Electronc and Informaton

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks 2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Fusion Performance Model for Distributed Tracking and Classification

Fusion Performance Model for Distributed Tracking and Classification Fuson Performance Model for Dstrbuted rackng and Classfcaton K.C. Chang and Yng Song Dept. of SEOR, School of I&E George Mason Unversty FAIRFAX, VA kchang@gmu.edu Martn Lggns Verdan Systems Dvson, Inc.

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Base Station Location Protection in Wireless Sensor Networks: Attacks and Defense

Base Station Location Protection in Wireless Sensor Networks: Attacks and Defense Base Staton Locaton Protecton n Wreless Sensor Networks: Attacks and Defense Juan Chen, Hongl Zhang, Xaojang Du 2, Bnxng Fang, Yan Lu 3, Hanng Yu Research Center of Computer Network and Informaton Securty

More information

Simulator for Energy Efficient Clustering in Mobile Ad Hoc Networks

Simulator for Energy Efficient Clustering in Mobile Ad Hoc Networks Smulator for Energy Effcent Clusterng n Moble Ad Hoc Networks Amt Kumar 1 Dhrendra Srvastav 2 and Suchsmta Chnara 3 Department of Computer Scence and Engneerng, Natonal Insttute of Technology, Rourkela,

More information

Study of Data Stream Clustering Based on Bio-inspired Model

Study of Data Stream Clustering Based on Bio-inspired Model , pp.412-418 http://dx.do.org/10.14257/astl.2014.53.86 Study of Data Stream lusterng Based on Bo-nspred Model Yngme L, Mn L, Jngbo Shao, Gaoyang Wang ollege of omputer Scence and Informaton Engneerng,

More information

Long Lifetime Routing in Unreliable Wireless Sensor Networks

Long Lifetime Routing in Unreliable Wireless Sensor Networks 211 Internatonal Conference on Networkng, Sensng and Control Delft, the Netherlands, 11-13 Aprl 211 Long Lfetme Routng n Unrelable Wreless Sensor Networks Hamed Yousef, Mohammad Hossen Yeganeh, Al Movaghar

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Vol. 4, No. 4 April 2013 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.

Vol. 4, No. 4 April 2013 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved. WP A Tree Based Response Tme Algorthm for Event Drven Wreless Sensor Networks 1 Itu Sngdh, 2 Saurabh Kumar 1 Department of Computer Scence and Engneerng, Brla Insttute of Technology, Mesra, Ranch, Jharkhand,

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

A Spatiotemporal Communication Protocol for Wireless Sensor Networks

A Spatiotemporal Communication Protocol for Wireless Sensor Networks IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, TPDS-0195-1003.R2 1 A Spatotemporal Communcaton Protocol for Wreless Sensor Networks Tan He, Member, IEEE, John A. Stankovc, Fellow, IEEE, Chenyang

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

A Robust Method for Estimating the Fundamental Matrix

A Robust Method for Estimating the Fundamental Matrix Proc. VIIth Dgtal Image Computng: Technques and Applcatons, Sun C., Talbot H., Ourseln S. and Adraansen T. (Eds.), 0- Dec. 003, Sydney A Robust Method for Estmatng the Fundamental Matrx C.L. Feng and Y.S.

More information

Study of Wireless Sensor Network Location Algorithm and Data Collection Protocol

Study of Wireless Sensor Network Location Algorithm and Data Collection Protocol Study of Wreless Sensor Network Locaton Algorthm and Data Collecton Protocol https://do.org/10.3991/joe.v110.609 Wemn Han 1, Shjun L,4, Wedong L 3 1 Hunan Vocatonal Insttute of echnology, Xangtan, Chna;

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

sensors ISSN

sensors ISSN Sensors 2011, 11, 5383-5401; do:10.3390/s110505383 OPEN ACCESS sensors ISSN 1424-8220 www.mdp.com/journal/sensors Artcle FRCA: A Fuzzy Relevance-Based Cluster Head Selecton Algorthm for Wreless Moble Ad-Hoc

More information

A New Transaction Processing Model Based on Optimistic Concurrency Control

A New Transaction Processing Model Based on Optimistic Concurrency Control A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,

More information

Mobile Adaptive Distributed Clustering Algorithm for Wireless Sensor Networks

Mobile Adaptive Distributed Clustering Algorithm for Wireless Sensor Networks Internatonal Journal of Computer Applcatons (975 8887) Volume No.7, Aprl Moble Adaptve Dstrbuted Clusterng Algorthm for Wreless Sensor Networks S.V.Mansekaran Department of Informaton Technology Anna Unversty

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Connection-information-based connection rerouting for connection-oriented mobile communication networks

Connection-information-based connection rerouting for connection-oriented mobile communication networks Dstrb. Syst. Engng 5 (1998) 47 65. Prnted n the UK PII: S0967-1846(98)90513-7 Connecton-nformaton-based connecton reroutng for connecton-orented moble communcaton networks Mnho Song, Yanghee Cho and Chongsang

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

IMPROVEMENT of MULTIPLE ROUTING BASED on FUZZY CLUSTERING and PSO ALGORITHM IN WSNS TO REDUCE ENERGY CONSUMPTION

IMPROVEMENT of MULTIPLE ROUTING BASED on FUZZY CLUSTERING and PSO ALGORITHM IN WSNS TO REDUCE ENERGY CONSUMPTION IMPROVEMENT of MULTIPLE ROUTING BASED on FUZZY CLUSTERING and PSO ALGORITHM IN WSNS TO REDUCE ENERGY CONSUMPTION Gholamreza Farahan Department of Electrcal Engneerng and Informaton Technology, Iranan Research

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications 14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

A Novel Fuzzy Stochastic Routing Protocol For Mobile AdHoc Network

A Novel Fuzzy Stochastic Routing Protocol For Mobile AdHoc Network Avalable Onlne at www.jcsmc.com Internatonal Journal of Computer Scence and Moble Computng A Monthly Journal of Computer Scence and Informaton Technology IJCSMC, Vol. 2, Issue. 0, October 203, pg.98 06

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

EFT: a high throughput routing metric for IEEE s wireless mesh networks

EFT: a high throughput routing metric for IEEE s wireless mesh networks Ann. Telecommun. (2010) 65:247 262 DOI 10.1007/s12243-009-0130-1 EFT: a hgh throughput routng metrc for IEEE 802.11s wreless mesh networks Md. Sharful Islam Muhammad Mahbub Alam Md. Abdul Hamd Choong Seon

More information

Bayesian Model for Mobility Prediction to Support Routing in Mobile Ad-Hoc Networks

Bayesian Model for Mobility Prediction to Support Routing in Mobile Ad-Hoc Networks Bayesan Model for Moblty Predcton to Support Routng n Moble Ad-Hoc Networks Tran The Son, Hoa Le Mnh, Graham Sexton, Nauman Aslam, Zabh Ghassemlooy Northumbra Communcatons Research Laboratory (NCRLab Faculty

More information

Cost-efficient deployment of distributed software services

Cost-efficient deployment of distributed software services 1/30 Cost-effcent deployment of dstrbuted software servces csorba@tem.ntnu.no 2/30 Short ntroducton & contents Cost-effcent deployment of dstrbuted software servces Cost functons Bo-nspred decentralzed

More information

CS 268: Lecture 8 Router Support for Congestion Control

CS 268: Lecture 8 Router Support for Congestion Control CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol 2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen

More information

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks Mddle-East Journal of Scentfc Research 2 (): 566-574, 202 ISSN 990-9233 IDOSI Publcatons, 202 DOI: 0.5829/dos.mejsr.202.2..43 Performance Improvement of Drect Dffuson Algorthm n Sensor Networks Akbar Bemana

More information

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors Optmal Fault-Tolerant Routng n Hypercubes Usng Extended Safety Vectors Je Wu Department of Computer Scence and Engneerng Florda Atlantc Unversty Boca Raton, FL 3343 Feng Gao, Zhongcheng L, and Ynghua Mn

More information

Life Tables (Times) Summary. Sample StatFolio: lifetable times.sgp

Life Tables (Times) Summary. Sample StatFolio: lifetable times.sgp Lfe Tables (Tmes) Summary... 1 Data Input... 2 Analyss Summary... 3 Survval Functon... 5 Log Survval Functon... 6 Cumulatve Hazard Functon... 7 Percentles... 7 Group Comparsons... 8 Summary The Lfe Tables

More information

Research Article Energy Efficient Interest Forwarding in NDN-Based Wireless Sensor Networks

Research Article Energy Efficient Interest Forwarding in NDN-Based Wireless Sensor Networks Moble Informaton Systems Volume 2016, Artcle ID 3127029, 15 pages http://dx.do.org/10.1155/2016/3127029 Research Artcle Energy Effcent Interest Forwardng n NDN-Based Wreless Sensor Networks Shua Gao, 1

More information

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty

More information

VFH*: Local Obstacle Avoidance with Look-Ahead Verification

VFH*: Local Obstacle Avoidance with Look-Ahead Verification 2000 IEEE Internatonal Conference on Robotcs and Automaton, San Francsco, CA, Aprl 24-28, 2000, pp. 2505-25 VFH*: Local Obstacle Avodance wth Look-Ahead Verfcaton Iwan Ulrch and Johann Borensten The Unversty

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

Cost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network

Cost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network Cost-Effectve Lfetme Predcton Based Routng Protocol for Wreless Network ABU MD. ZAFOR ALAM, MUHAMMAD ARIFUR RAHMAN, MOHAMMED ABUL HASAN 2,M. LUTFAR RAHMAN Faculty of Scence and IT, Daffodl Internatonal

More information

IP mobility support is becoming very important as the

IP mobility support is becoming very important as the 706 IEEE TRANSACTIONS ON COMPUTERS, VOL. 52, NO. 6, JUNE 2003 A New Scheme for Reducng Lnk and Sgnalng Costs n Moble IP Young J. Lee and Ian F. Akyldz, Fellow, IEEE Abstract IP moblty support s provded

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

K-means and Hierarchical Clustering

K-means and Hierarchical Clustering Note to other teachers and users of these sldes. Andrew would be delghted f you found ths source materal useful n gvng your own lectures. Feel free to use these sldes verbatm, or to modfy them to ft your

More information

A STUDY ON THE PERFORMANCE OF TRANSPORT PROTOCOLS COMBINING EXPLICIT ROUTER FEEDBACK WITH WINDOW CONTROL ALGORITHMS AARTHI HARNA TRIVESALOOR NARAYANAN

A STUDY ON THE PERFORMANCE OF TRANSPORT PROTOCOLS COMBINING EXPLICIT ROUTER FEEDBACK WITH WINDOW CONTROL ALGORITHMS AARTHI HARNA TRIVESALOOR NARAYANAN A STUDY ON THE PERFORMANCE OF TRANSPORT PROTOCOLS COMBINING EXPLICIT ROUTER FEEDBACK WITH WINDOW CONTROL ALGORITHMS By AARTHI HARNA TRIVESALOOR NARAYANAN Master of Scence n Computer Scence Oklahoma State

More information

IJCTA Nov-Dec 2016 Available

IJCTA Nov-Dec 2016 Available Dr K Santh et al, Internatonal Journal of Computer Technology & Applcatons,Vol 7(6),773-779 Optmzed Route Technque for DSR Routng Protocol n MANET Dr.K.Santh, Assocate Professor, Dept. of Computer Scence,

More information

Solution Brief: Creating a Secure Base in a Virtual World

Solution Brief: Creating a Secure Base in a Virtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Abstract The adopton rate of Vrtual Machnes has exploded at most organzatons, drven by the mproved

More information

Distributed Grid based Robust Clustering Protocol for Mobile Sensor Networks

Distributed Grid based Robust Clustering Protocol for Mobile Sensor Networks 414 The Internatonal Arab Journal of Informaton Technology, Vol. 8, No. 4, October 011 Dstrbuted Grd based Robust Clusterng Protocol for Moble Sensor Networks Shahzad Al and Sajjad Madan Department of

More information

HYMN: AN INTEREST-BASED MULTIMEDIA PROVIDING SYSTEM FOR HYBRID WIRELESS NETWORKS

HYMN: AN INTEREST-BASED MULTIMEDIA PROVIDING SYSTEM FOR HYBRID WIRELESS NETWORKS HYMN: AN INTEREST-BASED MULTIMEDIA PROVIDING SYSTEM FOR HYBRID WIRELESS NETWORKS Adran Andronache 1 ), Matthas R. Brust 2 ), Steffen Rothkugel 3 ) Abstract The concept of self-organzaton already exsts

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

CS 534: Computer Vision Model Fitting

CS 534: Computer Vision Model Fitting CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust

More information

A Finite Queue Model Analysis of PMRC-based Wireless Sensor Networks

A Finite Queue Model Analysis of PMRC-based Wireless Sensor Networks A Fnte Queue Model Analyss of PMRC-based Wreless Sensor Networks Qaoqn L, Me Yang, Hongyan Wang, Yngtao Jang, Jazh Zeng College of Computer Scence and Technology, Unversty of Electronc Scence and Technology,

More information

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain Resource-Effcent Mult-Source Authentcaton Utlzng Splt-Jon One-Way ey Chan Seonho Cho, un Sun, Hyeonsang Eom 3 Department of Computer Scence, Bowe State Unversty, Bowe, Maryland, U.S.A. Center for Secure

More information

A Topology-aware Random Walk

A Topology-aware Random Walk A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information