Support for Wireless LAN Design
|
|
- Eileen Briana Warner
- 6 years ago
- Views:
Transcription
1 Assocaton for Informaton Systems AIS Electronc Lbrary (AISeL) AMCIS 2005 Proceedngs Amercas Conference on Informaton Systems (AMCIS) 2005 Support for Wreless LAN Desgn Abhjt Dutt Unversty of Wsconsn - Mlwaukee, adutt@uwm.edu Derek L. Nazareth Unversty of Wsconsn - Mlwaukee, derek@uwm.edu Follow ths and addtonal works at: Recommended Ctaton Dutt, Abhjt and Nazareth, Derek L., "Support for Wreless LAN Desgn" (2005). AMCIS 2005 Proceedngs Ths materal s brought to you by the Amercas Conference on Informaton Systems (AMCIS) at AIS Electronc Lbrary (AISeL). It has been accepted for ncluson n AMCIS 2005 Proceedngs by an authorzed admnstrator of AIS Electronc Lbrary (AISeL). For more nformaton, please contact elbrary@asnet.org.
2 Wreless LAN Desgn Support for Wreless LAN Desgn Abhjt Dutt Unversty of Wsconsn-Mlwaukee Derek L. Nazareth Unversty of Wsconsn-Mlwaukee ABSTRACT As moble devces become common n manstream computng, t becomes mperatve to effectvely desgn computng archtectures that seamlessly and effectvely ntegrate them. Rapd advancements n wreless technology has made t possble to buld effcent wreless local area networks (WLANs). Desgnng WLANs presents some unque challenges. Some heurstcs are avalable for WLAN desgn, but they represent pecemeal solutons, focusng on a lmted set of ssues. Ths paper provdes a more comprehensve approach to WLAN desgn, by provdng support for addtonal tasks n the desgn process, as well as by provdng the desgner the opton of examnng multple competng optons. The approach s developed n modular fashon, thereby permttng the easy substtuton of alternatve models n any phase of the process. We beleve the approach to be useful for WLAN desgners, and t provdes an apt llustraton of desgn scence n nformaton systems research. Keywords: WLAN desgn, Network nfrastructure, Wreless networkng, Moble computng. INTRODUCTION Wreless networkng has the potental to provde users unprecedented flexblty n accessng and modfyng nformaton. It s estmated that n near future, about 40% of the e-commerce transactons wll be ntated through a moble devce or nvolve some form of wreless networkng (Varshney and Vetter, 2002). Wreless networks come n many forms, though t s convenent to classfy them n terms of ther range (Agarwal et. al., 2003). These nclude personal area networks, wreless local area networks, wreless metropoltan area networks, and wreless wde area networks. Ths paper addresses wreless local area networks (WLANs) only. WLANs are the drvers behnd the wdespread avalablty of hotspots that offer wreless connectvty to the Internet. Wth a wde varety of hardware, software, securty, and protocol choces avalable, the desgn and mplementaton of WLANs could be challengng and confusng (Varshney, 2003). Several heurstc approaches to WLAN desgn are avalable. However, they represent pecemeal solutons. Ths paper attempts to provde a more comprehensve approach to WLAN desgn to assst and gude potental WLAN desgners through the multfaceted decsons that consttute the process. It presents a desgn framework that allows WLAN desgners to assemble alternatve desgns, evaluate these alternatves, and assst n the selecton of a preferred desgn. CURRENT APPROACHES TO WIRELESS LAN DESIGN A number of dfferent approaches have been proposed for WLAN desgn, ncludng vendor whtepapers, desgn gudelnes, and soluton technques for specfc ssues. Wreless network throughput represents an mportant aspect of WLAN desgn. The theoretcal maxmum throughput under alternatve securty protocols s dscussed n (Jun et al., 2003). A smlar analyss s provded n (Csco, 2003a). Placement of wreless access ponts s another aspect of WLAN desgn that has receved attenton. Lee et. al. (2003) develop a nteger programmng soluton strategy for optmal placement to acheve load balancng gven user traffc demands. Securty n WLANs s an area that has been the subject of desgn gudelnes. Convery et. al. (2003) provde a detaled dscusson on WLAN securty. Edney and Arbaugh (2004) provde detaled dscussons on securty protocols for WLAN desgn, and suggest the use of a securty archtecture. Performance modelng for networks s also relevant to WLAN desgn, wth models for resource utlzaton and response tme presented n (Menasce and Almeda, 2003). Several authors acknowledge the need for a more comprehensve approach. Gast (2002) proposes the ncorporaton of network topology, project plannng, and ste surveys as part of WLAN desgn, wthout addressng the core tasks n WLAN desgn. Roshan and Leary (2003) suggest the use of qualty of servce measures, deployment, and securty, though no clear soluton strategy s presented. Perhaps the most comprehensve approach s presented n (Csco, 2003b). It dscusses hardware selecton (pp ), securty consderatons (pp ), qualty of servce measures (pp ), and roamng consderatons (pp ), as fundamental ssues n WLAN desgn. Though the presentaton s slanted towards Csco products, the dscussons are useful and can be adapted for a more unversal treatment. Proceedngs of the Eleventh Amercas Conference on Informaton Systems, Omaha, NE, USA August 11 th -14 th
3 Wreless LAN Desgn However, none of these approaches provde a truly holstc soluton. Rather, they represent pecemeal attempts to address varous facets of WLAN desgn. Ths paper adopts the vew that WLAN desgners could beneft from a more comprehensve approach, that addresses these ssues, whle also factorng n cost and performance consderatons. WIRELESS LAN DESIGN FRAMEWORK For the purposes of ths paper, a WLAN s vewed as consstng of wreless devces, hotspots, hotspot controllers, and access ponts. Several dfferent topologes are possble. A number of protocols and standards for supportng dfferent forms of wreless communcaton are also avalable. The desgn approach advocated here assumes the followng: Wreless devces are not addressed. WLAN topologes are also not addressed. Only wreless networks that employ the IEEE techncal specfcaton are addressed. WLAN Desgn s a multdmensonal problem. It nvolves decsons that address very dfferent aspects, but are n some manner related. Ths paper adopts a modular approach to WLAN desgn. Ths permts workng on dfferent aspects of the desgn n ndependent manner, as well as the easy swap of one component, should the underlyng technologes change, or should alternatve desgner preferences dctate so. We have dentfed four related modules for WLAN desgn, vz. nfrastructure desgn, securty desgn, cost estmaton, and performance modelng. These components are nexorably lnked, but can be addressed n somewhat ndependent manner. It s not the ntent that the framework produces a sngle WLAN desgn recommendaton. Rather, t s expected that multple competng desgns are possble, characterzed by dfferent cost, performance, and securty measures. Allowng the desgner to trade off between these objects s a necessary part of the desgn framework. The basc structure of the proposed WLAN desgn framework s presented n Fgure 1. External nputs wll shape the desgn of ndvdual components. Relatonshps between varous desgn components are also hghlghted. Fgure 1. Wreless LAN Desgn Infrastructure Desgn Specfyng the archtectural components for a WLAN requres estmaton of network throughput, selecton of access ponts, and layout to meet specfc objectves. These are related decsons, and must be performed n tandem. Selecton of access pont devces wll affect the layout, and subsequent cost of the WLAN. Lkewse, throughput wll be affected by access pont selecton and layout, and wll n turn affect the performance. Proceedngs of the Eleventh Amercas Conference on Informaton Systems, Omaha, NE, USA August 11 th -14 th
4 Wreless LAN Desgn Network Throughput Analyss WLAN throughput requrements can be computed s several ways. One approach s based on users and ther ndvdual requrements. Ths s a data ntensve strategy that requres dentfcaton of all users, estmaton of ther requrements, ncludng frequency of access, and specfcaton of the resource requrements at the server for each requrement. Network throughput WT est s estmated as f pq Dq 8192 (1 + WT = OH ) est p q where f pq represents the frequency of access of applcaton q by user p, D q the data returned by applcaton q, 8192 converts bytes to Klobts, and OH represents the wreless protocol overhead (approxmately 0.8 to 1). Snce ths nvolves tedous data collecton, and potentally suspect data based on user perceptons of frequences, an analyss of server logs may yeld a more accurate pcture, based on the servce demand for dfferent types of requests. Usng ths approach, network throughput can be estmated as WT = sd R 8192 (1 OH ) est + where sd represents the servce demand for request type, and R the volume of data returned by request type. The desgner can select ether approach, or employ both to estmate throughput. Actual throughput s a functon of bandwdth, error performance, congeston, and other factors. Throughput s also moderated by qualty of servce guarantees. A smple estmate of network throughput s gven by WT B log + S N = 2 (1 ) 1 + dr lv where B s the bandwdth, S/N represents the sgnal to nose rato, d the dstance traversed, R the data transfer rate, l the frame length, and v the transmsson velocty. Accordngly, the sgnal strength S can be estmated, for a gven sgnal to nose rato. Access Pont Selecton The access pont characterstcs are specfed n terms of the type, power, and range of the antenna selected. Clearly, the larger the range, the fewer the number of devces needed. Ths also has mplcatons for throughput and costs. Antenna Layout The layout model of the access ponts wll depend on the grd pattern or the way the access ponts wll be placed (hexagonal versus tled), the percentage area of deadspots and the access pont characterstcs. Deadspots can be computed as 4d 4 r 2 2 π for a tled layout, or 1.5 3d 3 r 2 2 π for a hexagonal layout, where d represents the dstance between access ponts, and r s the range for the antenna. Based on ths, the percentage of deadspots for a non-overlappng regular layout s 21.5% for tled, and 9.3% for hexagonal patterns. Deadspots can be elmnated by shrnkng d, and ths condton s acheved for d=1.77r for a tled pattern, and d=1.90r for a hexagonal pattern. Selectng values of d less than ths provdes no addtonal beneft, and ncreases overlap. In the layout model, the desgner can select an approprate confguraton and dstance between antennae, tradng off overlap and deadspots. Securty Desgn Ths component enables a desgner to specfy securty requrements, ncludng specfcaton of securty protocols used, user authentcaton polcy, and user access polcy. At the WLAN layer, t s mportant to ensure that the ntegrty of the data s not compromsed, and protocols for encrypton need to be selected. Wred Equvalent Prvacy (WEP), W-F Protected Access (WPA) based on Temporal Key Integrty Protocol (TKIP), Robust Securty Networks (RSN) represent optons for the desgner to select. Proceedngs of the Eleventh Amercas Conference on Informaton Systems, Omaha, NE, USA August 11 th -14 th
5 Wreless LAN Desgn At the access control layer, the am s to ensure that only data from authorzed users enters the WLAN. Protocols that can be used to mplement access control n WPA and n RSN nclude IEEE 802.1X, Extensble Authentcaton Protocol (EAP), and Remote Authentcaton Dal-In User Servce. The authentcaton layer establshes user dentty, and the polcy decsons are made at ths layer. Protocols avalable at ths stage nclude Transport Layer Securty (TLS) [the default for WPA], Kerberos V5, and Protected Extensble Authentcaton Protocol (PEAP). Gven the multplcty of goals for securty desgn, no sngle soluton approach can be unversally recommended. Instead, a prescrptve system usng a rule-based strategy s recommended. Cost Estmaton The cost ncurred for nstallng and operatng a WLAN s easly computed. Intal setup costs nclude hardware, software, nstallaton and confguraton costs. Operatng and mantenance costs nclude personnel costs, and upgrade costs. In an effort to mantan comparablty between the ntal and ongong costs, the ongong costs wll be computed for a perod of two years, as rapd technology advancement would render the desgn obsolete. To facltate equal treatment of vendor costs, suggested lst prces wll be employed for all hardware, software, and upgrade costs. All cost nformaton wll be stored n a database for easy computaton and update Performance Modelng Several dfferent measures of network performance have been recommended, such as response tme, throughput, avalablty, and cost among others (Menasce and Almeda 2002). Ths approach to WLAN desgn wll focus on network utlzaton, response tme, and throughput, as performance relevant metrcs. Utlzaton can be easly estmated for each resource n the WLAN. Utlzaton for a resource j s smply estmated as U j = sd ST j j where sd j represents the servce demand for request type at resource j, and ST j s the servce tme for request type at resource j. Clearly, utlzaton cannot exceed 1. An average value of utlzaton across resources s not meanngful, and nstead, the maxmum value, representng the bottleneck resource, s suggested. Response tme s estmated usng a queung model where servce tme and wat tme at each resource needed by a request are estmated. Ths s estmated as: Average response tme = f = RT f ST * (1 U ) j j where f represents the relatve frequency of request type as a fracton, RT s the estmated response tme for request type, and U j s the utlzaton of resource j. Note that the computaton ncludes only those resources that are needed for ths request. Throughput can be estmated n a varety of ways. Whle t s temptng to examne t from a resource perspectve, e.g. number of requests servced by resource, t s more meanngful to estmate t from a user perspectve, partcularly n the case of lost connectons, dropped messages, and request tmeouts. Accordngly, throughput s estmated as: T est ( sd RT RT ) = max where RT max represents the response tmeout for requests. WLAN Desgn Evaluaton The desgn process outlned wll permt the WLAN desgner to generate several dfferent WLAN desgns, each of whch s characterzed by several dmensons, ncludng deadspot percentage, cost, securty consderatons met, network utlzaton, response tme, and throughput. These metrcs employ dfferent unts, makng comparablty dffcult. It s recommended that a multple crtera approach be adopted for alternatve desgn evaluaton, gven that the mportance accorded to dfferent crtera wll vary. An ntutvely appealng approach s the use of the Analytc Herarchy Process (Saaty, 1980). It permts j Proceedngs of the Eleventh Amercas Conference on Informaton Systems, Omaha, NE, USA August 11 th -14 th
6 Wreless LAN Desgn decson makers to trade off among dverse crtera wthout havng to perform explct tradeoffs. Addtonally, t provdes for a herarchcal analyss of the problem, permttng the desgner to examne related crtera when evaluatng solutons. Another alternatve s a neghborhood search of a promsng soluton. After generatng several alternatve desgns, the desgner can select a preferred soluton, and search n close proxmty of ths soluton. Yet another approach would nvolve the use of an deal soluton, and the use of multdmensonal scalng to select a soluton that s the closest to ths deal. Tradtonal multple crtera decson makng methods lke mult-objectve lnear programmng are not recommended gven the nature of the functons. FUTURE RESEARCH Implementaton of the desgn modules and ntegraton nto a cohesve system represents the next logcal step. The use of a varety of soluton approaches, e.g. algorthmc (nfrastructure desgn, cost estmaton), rule-based (securty desgn), probablstc (performance modelng), and nteractve teratve (desgn evaluaton), coupled wth the need for a separate database on product characterstcs, ntroduces the need for nteroperablty between modules, and the assembly of a robust physcal archtecture of the desgn components. Creaton, calbraton, and testng of the models wll ental some smulaton to valdate performance under a varety of desgn scenaros. Applcaton to real world desgn problems would then be undertaken. Ths ncludes applcaton to new desgn problems, as well as dentfcaton of alternatve desgns for currently wred facltes. CONCLUSIONS Ths paper dscusses an approach to WLAN desgn that s more comprehensve than the current heurstc approaches. Support s provded for nfrastructure desgn, securty desgn, and performance estmaton. Several mechansms are proposed for the evaluaton of competng desgns. The use of a modular approach permts easy replacement of one component of the desgn wth relatvely lttle effect on the rest of the desgn. Upgrades to the framework, to accommodate new technologes or alternatve consderatons, are also facltated. Clearly there are other consderatons that have not been ncluded n the desgn framework. Lkewse, some assumptons for the estmaton procedures can be challenged. Nonetheless, t represents a good startng pont for WLAN desgn. It provdes a desgner wth a set of meanngful measures to evaluate alternatve desgns, thereby leadng to a more nformed decson, and presumably a better desgn. REFERENCES 1. Agarwal, M., Char K., and Shankar, R. (2003) Demystfyng wreless technologes: Navgatng through the wreless technology maze, Communcatons of the Assocaton for Informaton Systems, 12, 12, Csco. (2003a) Capacty, coverage, and deployment consderatons for IEEE g, Csco Whte Paper, Csco Systems, Inc. 3. Csco. (2003b) Csco AVVID wreless LAN desgn, Csco Desgn Gude, Csco Systems, Inc. 4. Convery, S., Mller, D. and Sundaralngam, S. (2003) Csco SAFE: Wreless LAN securty n depth, Csco Whte Paper, Csco Systems, Inc. 5. Edney, J. and Arbaugh, W.A. (2004) Real Securty: W-F protected access and , Addson-Wesley, Boston. 6. Gast, M.S. (2002) wreless networks: The defntve gude, O Relly Meda, Sebastopol, CA. 7. Jun, J., Peddabachagar, P. and Schtu, M. (2003) Theoretcal maxmum throughput of IEEE and ts applcatons, Proceedngs of the Second IEEE Internatonal Symposum on Network Computng and Applcatons (NCA 03), Cambrdge, MA, Lee, Y., Km, K., and Cho, Y. (2002) Optmzaton of AP placement and channel assgnment n wreless LANs, Proceedngs of the 27 th. Annual IEEE Conference on Local Computer Networks (LCN 02), Tampa, FL, Menascé, D.A. and. Almeda, V.A.F. (2002) Capacty plannng for web servces: metrcs, models, and methods, Prentce Hall, Upper Saddle Rver, NJ. 10. Roshan, P. and Leary, J. (2003) Wreless local-area network fundamentals, Pearson Educaton. 11. Saaty, T.L. (1980) The analytc herarchy process, McGraw Hll Company, New York. 12. Varshney, U. and Vetter, R (2002) Moble Commerce: Framework, Applcatons and Networkng Support, Moble Networks and Applcatons, 7, 3, Varshney, U. (2003) Wreless I: Moble and Wreless Informaton Systems: Applcatons, Networks and Research Problems, Communcatons of the Assocaton for Informaton Systems, 12, 12, Proceedngs of the Eleventh Amercas Conference on Informaton Systems, Omaha, NE, USA August 11 th -14 th
Simulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationEvaluation of an Enhanced Scheme for High-level Nested Network Mobility
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationInternet Traffic Managers
Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John
More informationAADL : about scheduling analysis
AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng
More informationFAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks
2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng
More informationSolution Brief: Creating a Secure Base in a Virtual World
Soluton Bref: Creatng a Secure Base n a Vrtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Abstract The adopton rate of Vrtual Machnes has exploded at most organzatons, drven by the mproved
More informationHelsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)
Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationWightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK
Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your
More informationAn Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed
More informationA Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI
216 Jont Internatonal Conference on Artfcal Intellgence and Computer Engneerng (AICE 216) and Internatonal Conference on etwork and Communcaton Securty (CS 216) ISB: 978-1-6595-362-5 A Model Based on Mult-agent
More informationHierarchical clustering for gene expression data analysis
Herarchcal clusterng for gene expresson data analyss Gorgo Valentn e-mal: valentn@ds.unm.t Clusterng of Mcroarray Data. Clusterng of gene expresson profles (rows) => dscovery of co-regulated and functonally
More informationQuantifying Performance Models
Quantfyng Performance Models Prof. Danel A. Menascé Department of Computer Scence George Mason Unversty www.cs.gmu.edu/faculty/menasce.html 1 Copyrght Notce Most of the fgures n ths set of sldes come from
More informationWishing you all a Total Quality New Year!
Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma
More informationA Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics
A Hybrd Genetc Algorthm for Routng Optmzaton n IP Networks Utlzng Bandwdth and Delay Metrcs Anton Redl Insttute of Communcaton Networks, Munch Unversty of Technology, Arcsstr. 21, 80290 Munch, Germany
More informationVISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES
UbCC 2011, Volume 6, 5002981-x manuscrpts OPEN ACCES UbCC Journal ISSN 1992-8424 www.ubcc.org VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES
More informationDLK Pro the all-rounder for mobile data downloading. Tailor-made for various requirements.
DLK Pro the all-rounder for moble data downloadng Talor-made for varous requrements www.dtco.vdo.com Smply brllant, brllantly smple Always the rght soluton The DLK Pro s the VDO product famly, whch sets
More informationMultigranular Simulation of Heterogeneous Embedded Systems
Multgranular Smulaton of Heterogeneous Embedded Systems Adtya Agrawal Insttute for Software Integrated Systems Vanderblt Unversty Nashvlle, TN - 37235 1 615 343 7567 adtya.agrawal@vanderblt.edu Akos Ledecz
More informationRAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:
Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:
More informationAn Entropy-Based Approach to Integrated Information Needs Assessment
Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology
More informationA Facet Generation Procedure. for solving 0/1 integer programs
A Facet Generaton Procedure for solvng 0/ nteger programs by Gyana R. Parja IBM Corporaton, Poughkeepse, NY 260 Radu Gaddov Emery Worldwde Arlnes, Vandala, Oho 45377 and Wlbert E. Wlhelm Teas A&M Unversty,
More informationCognitive Radio Resource Management Using Multi-Agent Systems
Cogntve Rado Resource Management Usng Mult- Systems Jang Xe, Ivan Howtt, and Anta Raja Department of Electrcal and Computer Engneerng Department of Software and Informaton Systems The Unversty of North
More informationBioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.
[Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationUser Authentication Based On Behavioral Mouse Dynamics Biometrics
User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA
More informationTECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.
TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of
More informationSupport Vector Machines
/9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.
More informationSmoothing Spline ANOVA for variable screening
Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationA MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS
Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung
More informationConditional Speculative Decimal Addition*
Condtonal Speculatve Decmal Addton Alvaro Vazquez and Elsardo Antelo Dep. of Electronc and Computer Engneerng Unv. of Santago de Compostela, Span Ths work was supported n part by Xunta de Galca under grant
More informationOn Some Entertaining Applications of the Concept of Set in Computer Science Course
On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,
More informationARTICLE IN PRESS. Signal Processing: Image Communication
Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton
More informationA HIERARCHICAL SIMULATION FRAMEWORK FOR APPLICATION DEVELOPMENT ON SYSTEM-ON-CHIP ARCHITECTURES. Vaibhav Mathur and Viktor K.
A HIERARCHICAL SIMULATION FRAMEWORK FOR APPLICATION DEVELOPMENT ON SYSTEM-ON-CHIP ARCHITECTURES Vabhav Mathur and Vktor K. Prasanna Department of EE-Systems Unversty of Southern Calforna Los Angeles, CA
More informationFusion Performance Model for Distributed Tracking and Classification
Fuson Performance Model for Dstrbuted rackng and Classfcaton K.C. Chang and Yng Song Dept. of SEOR, School of I&E George Mason Unversty FAIRFAX, VA kchang@gmu.edu Martn Lggns Verdan Systems Dvson, Inc.
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationSolutions for Real-Time Communication over Best-Effort Networks
Solutons for Real-Tme Communcaton over Best-Effort Networks Anca Hangan, Ramona Marfevc, Gheorghe Sebestyen Techncal Unversty of Cluj-Napoca, Computer Scence Department {Anca.Hangan, Ramona.Marfevc, Gheorghe.Sebestyen}@cs.utcluj.ro
More informationEvaluation of Parallel Processing Systems through Queuing Model
ISSN 2278-309 Vkas Shnde, Internatonal Journal of Advanced Volume Trends 4, n Computer No.2, March Scence - and Aprl Engneerng, 205 4(2), March - Aprl 205, 36-43 Internatonal Journal of Advanced Trends
More informationON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE
Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton
More informationFeature Reduction and Selection
Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components
More information3. CR parameters and Multi-Objective Fitness Function
3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft
More informationNAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics
Introducton G10 NAG Fortran Lbrary Chapter Introducton G10 Smoothng n Statstcs Contents 1 Scope of the Chapter... 2 2 Background to the Problems... 2 2.1 Smoothng Methods... 2 2.2 Smoothng Splnes and Regresson
More informationSession 5.3. Switching/Routing and Transmission planning
ITU Regonal Semnar Belgrade Serba and Montenegro 20-24 24 June 2005 Sesson 5.3 Swtchng/Routng and Transmsson plannng volvng nfrastructures to NGN and related Plannng Strateges and Tools I.S. Sesson 5.3-1
More informationAdvanced radio access solutions for the new 5G requirements
Advanced rado access solutons for the new 5G requrements Soumaya Hamouda Assocate Professor, Unversty of Carthage Tuns, Tunsa Soumaya.hamouda@supcom.tn IEEE Summt 5G n Future Afrca. May 3 th, 2017 Pretora,
More informationVirtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory
Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationMODULE DESIGN BASED ON INTERFACE INTEGRATION TO MAXIMIZE PRODUCT VARIETY AND MINIMIZE FAMILY COST
INTERNATIONAL CONFERENCE ON ENGINEERING DESIGN, ICED 07 28-31 AUGUST 2007, CITE DES SCIENCES ET DE L'INDUSTRIE, PARIS, FRANCE MODULE DESIGN BASED ON INTERFACE INTEGRATION TO MAIMIZE PRODUCT VARIETY AND
More informationTransit Networking in ATM/B-ISDN based on Service Category
Transt Networkng n ATM/B-ISDN based on Servce Category Young-Tak Km Dept. of Informaton and Communcaton Engneerng, College of Engneerng, YeungNam Unv. E-mal : ytkm@ynucc.yeungnam.ac.kr ABSTRACT The ATM
More informationNETWORK LIFETIME AND ENERGY EFFICIENT MAXIMIZATION FOR HYBRID WIRELESS NETWORK
NETWORK LIFETIME AND ENERGY EFFICIENT MAXIMIZATION FOR HYBRID WIRELESS NETWORK Prasana kumar. S 1, Deepak.N 2, Tajudeen. H 3, Sakthsundaram. G 4 1,2,3,4Student, Department of Electroncs and Communcaton,
More informationBANDWIDTH OPTIMIZATION OF INDIVIDUAL HOP FOR ROBUST DATA STREAMING ON EMERGENCY MEDICAL APPLICATION
ARPN Journal of Engneerng and Appled Scences 2006-2009 Asan Research Publshng Network (ARPN). All rghts reserved. BANDWIDTH OPTIMIZATION OF INDIVIDUA HOP FOR ROBUST DATA STREAMING ON EMERGENCY MEDICA APPICATION
More informationClock Skew Compensator for Wireless Wearable. Computer Systems
Contemporary Engneerng Scences, Vol. 7, 2014, no. 15, 767 772 HIKRI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.4688 Clock Skew Compensator for Wreless Wearable Computer Systems Kyeong Hur Dept.
More informationTowards Autonomous Service Composition in A Grid Environment
Towards Autonomous Servce Composton n A Grd Envronment Wllam K. Cheung +, Jmng Lu +, Kevn H. Tsang +, Raymond K. Wong ++ Department of Computer Scence + Hong Kong Baptst Unversty Hong Kong {wllam,jmng,hhtsang}@comp.hkbu.edu.hk
More informationVideo Proxy System for a Large-scale VOD System (DINA)
Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,
More informationModule Management Tool in Software Development Organizations
Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,
More informationA Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems
A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty
More informationAn Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.
[Type text] [Type text] [Type text] ISSN : 97-735 Volume Issue 9 BoTechnology An Indan Journal FULL PAPER BTAIJ, (9), [333-3] Matlab mult-dmensonal model-based - 3 Chnese football assocaton super league
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationFuzzy Modeling of the Complexity vs. Accuracy Trade-off in a Sequential Two-Stage Multi-Classifier System
Fuzzy Modelng of the Complexty vs. Accuracy Trade-off n a Sequental Two-Stage Mult-Classfer System MARK LAST 1 Department of Informaton Systems Engneerng Ben-Guron Unversty of the Negev Beer-Sheva 84105
More informationAchievable Bandwidth Estimation for Stations in Multi-Rate IEEE WLAN Cells
Achevable Bandwdth Estmaton for Statons n Mult-Rate IEEE 802. WLAN Cells Eduard Garca, Davd Vamonte, Rafael Vdal and Josep Paradells Wreless Networks Group - echncal Unversty of Catalona (UPC) {eduardg,
More informationAn efficient iterative source routing algorithm
An effcent teratve source routng algorthm Gang Cheng Ye Tan Nrwan Ansar Advanced Networng Lab Department of Electrcal Computer Engneerng New Jersey Insttute of Technology Newar NJ 7 {gc yt Ansar}@ntedu
More informationOutline. Type of Machine Learning. Examples of Application. Unsupervised Learning
Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton
More informationRouting on Switch Matrix Multi-FPGA Systems
Routng on Swtch Matrx Mult-FPGA Systems Abdel Enou and N. Ranganathan Center for Mcroelectroncs Research Department of Computer Scence and Engneerng Unversty of South Florda Tampa, FL 33620 Abstract In
More informationMeta-heuristics for Multidimensional Knapsack Problems
2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,
More informationAnalysis of Collaborative Distributed Admission Control in x Networks
1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationSimulation: Solving Dynamic Models ABE 5646 Week 11 Chapter 2, Spring 2010
Smulaton: Solvng Dynamc Models ABE 5646 Week Chapter 2, Sprng 200 Week Descrpton Readng Materal Mar 5- Mar 9 Evaluatng [Crop] Models Comparng a model wth data - Graphcal, errors - Measures of agreement
More informationDetermining the Optimal Bandwidth Based on Multi-criterion Fusion
Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn
More informationReview of approximation techniques
CHAPTER 2 Revew of appromaton technques 2. Introducton Optmzaton problems n engneerng desgn are characterzed by the followng assocated features: the objectve functon and constrants are mplct functons evaluated
More informationThe Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique
//00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy
More informationIMPROVING THE SPEED OF DYNAMIC CLUSTER FORMATION IN MANET VIA SIMULATED ANNEALING
IMPROVING THE SPEED OF DYNAMIC CLUSTER FORMATION IN MANET VIA SIMULATED ANNEALING. Manousaks* and J.S. Baras Electrcal and Computer Engneerng Department and the Insttute for Systems Research Unversty of
More informationPerformance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks
Communcatons and Network, 2016, 8, 45-55 Publshed Onlne February 2016 n ScRes. http://www.scrp.org/journal/cn http://dx.do.org/10.4236/cn.2016.81006 Performance Comparson of a QoS Aware Routng Protocol
More informationSPATIAL DATA INTEGRATION APPROACH WITH APPLICATIONS IN FACILITY LOCATION
SPATIAL DATA INTEGRATION APPROACH WITH APPLICATIONS IN FACILITY LOCATION Jans Kampars, Jans Grabs Rga Techncal Unversty, Faculty of Computer Scence and Informaton Technology, Kalku 1, Rga, Lv-1658, Latva,
More informationCOMPLEX METHODOLOGY FOR STUDY OF INTERCITY RAIL TRANSPORT
ENGINEERING FOR RURA DEVEOPMENT Jelgava 5.-7.05.06. COMPEX METHODOOGY FOR STUDY OF INTERCITY RAI TRANSPORT Svetla Stolova Radna Nkolova Techncal Unversty-Sofa Bulgara stolova@tu-sofa.bg r.nkolova@tu-sofa.bg
More informationUnsupervised Learning
Pattern Recognton Lecture 8 Outlne Introducton Unsupervsed Learnng Parametrc VS Non-Parametrc Approach Mxture of Denstes Maxmum-Lkelhood Estmates Clusterng Prof. Danel Yeung School of Computer Scence and
More informationCHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION
24 CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION The present chapter proposes an IPSO approach for multprocessor task schedulng problem wth two classfcatons, namely, statc ndependent tasks and
More informationPERFORMANCE EVALUATION OF VOICE OVER IP USING MULTIPLE AUDIO CODEC SCHEMES
ISSN 1819-668 www.arpnjournals.com PERFORMANCE EVALUATION OF VOICE OVER IP USING MULTIPLE AUDIO CODEC SCHEMES L. Audah 1, A.A.M. Kamal 1, J. Abdullah 1, S.A. Hamzah 1 and M.A.A. Razak 2 1 Optcal Communcaton
More informationDelay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks
Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network
More informationSome material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier
Some materal adapted from Mohamed Youns, UMBC CMSC 611 Spr 2003 course sldes Some materal adapted from Hennessy & Patterson / 2003 Elsever Scence Performance = 1 Executon tme Speedup = Performance (B)
More informationEfficient Load-Balanced IP Routing Scheme Based on Shortest Paths in Hose Model. Eiji Oki May 28, 2009 The University of Electro-Communications
Effcent Loa-Balance IP Routng Scheme Base on Shortest Paths n Hose Moel E Ok May 28, 2009 The Unversty of Electro-Communcatons Ok Lab. Semnar, May 28, 2009 1 Outlne Backgroun on IP routng IP routng strategy
More informationScheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research
Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research
More informationOPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET
OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor
More informationAdaptive Energy and Location Aware Routing in Wireless Sensor Network
Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}
More informationSynchronous Distributed Wireless Network Emulator for High-Speed Mobility: Implementation and Evaluation
Synchronous Dstrbuted Wreless Network Emulator for Hgh-Speed Moblty: Implementaton and Evaluaton Mnoru Kozum, Tomoch Ebata Yokohama Research Laboratory, Htach, Ltd., 292 Yoshda-cho, Totsuka-ku, Yokohama,
More informationX- Chart Using ANOM Approach
ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are
More informationTsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance
Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for
More informationLS-TaSC Version 2.1. Willem Roux Livermore Software Technology Corporation, Livermore, CA, USA. Abstract
12 th Internatonal LS-DYNA Users Conference Optmzaton(1) LS-TaSC Verson 2.1 Wllem Roux Lvermore Software Technology Corporaton, Lvermore, CA, USA Abstract Ths paper gves an overvew of LS-TaSC verson 2.1,
More informationOverview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION
Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup
More informationDEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS
DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261
More informationPerformance Evaluation of Information Retrieval Systems
Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence
More informationNetwork Intrusion Detection Based on PSO-SVM
TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol.1, No., February 014, pp. 150 ~ 1508 DOI: http://dx.do.org/10.11591/telkomnka.v1.386 150 Network Intruson Detecton Based on PSO-SVM Changsheng Xang*
More informationHYMN: AN INTEREST-BASED MULTIMEDIA PROVIDING SYSTEM FOR HYBRID WIRELESS NETWORKS
HYMN: AN INTEREST-BASED MULTIMEDIA PROVIDING SYSTEM FOR HYBRID WIRELESS NETWORKS Adran Andronache 1 ), Matthas R. Brust 2 ), Steffen Rothkugel 3 ) Abstract The concept of self-organzaton already exsts
More informationPRÉSENTATIONS DE PROJETS
PRÉSENTATIONS DE PROJETS Rex Onlne (V. Atanasu) What s Rex? Rex s an onlne browser for collectons of wrtten documents [1]. Asde ths core functon t has however many other applcatons that make t nterestng
More informationDESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT
DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,
More informationCost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network
Cost-Effectve Lfetme Predcton Based Routng Protocol for Wreless Network ABU MD. ZAFOR ALAM, MUHAMMAD ARIFUR RAHMAN, MOHAMMED ABUL HASAN 2,M. LUTFAR RAHMAN Faculty of Scence and IT, Daffodl Internatonal
More information