A Group-Based Architecture for Wireless Sensor Networks

Size: px
Start display at page:

Download "A Group-Based Architecture for Wireless Sensor Networks"

Transcription

1 A Group-Based Architecture for Wireless Sesor Networs Jaime Lloret, Miguel Garcia ad Jesus Tomas Departmet of Commuicatios Polytechic Uiversity of Valecia Valecia, Spai Abstract May routig protocols for ad-hoc etwors ad sesor etwors have bee desiged, but oe of them are based o groups. We propose to divide the etwor ito several groups of sesors. Whe a sesor sed data to other groups, the data has to arrive just to oe sesor from each group, the they propagate it to the rest of sesors i their groups. We have simulated our proposal for differet types of sesor topologies to ow which type of topology is the best depedig o the umber of sesors i the whole etwor or depedig o the umber of iterior sesors. We have also simulated how much time is eeded to propagate iformatio betwee groups. The applicatio areas for our proposal could be rural ad agricultural eviromets to detect plagues ad to propagate it to eighbourig areas, or for military purposes to propagate iformatio betwee eighbourig squads. Keywords-Sesor Networ; Group-Based Architecture; Groupbased routig algorithm. I. INTRODUCTION There are may routig protocols that ca be applied to sesor etwors. They ca be classified ito two groups [] [2]. Oe group is formed by protocols based o the etwor topology ad the other group the oes that do ot tae it ito accout. First group ca be broe dow ito three subgroups: - Plae routig. All odes i the etwor have the same role ad perform the same tass. Because of the umber of odes i these etwors, the use of a global idetifier, for every ode, is ot feasible. It uses a data-cetric routig where the base statio seds requests to some regios ad the odes from that regios reply. Some of the algorithms i this group are SPIN, Direct diffusio, Rumour routig, MCFA, GBR, IDSQ, CADR, COUGAR, ADQUIRE, ad so o. 2- Hierarchical routig. It is very scalable ad has a efficiet commuicatio. It has bee desiged for eergy savig purposes, because cetral odes have ulimited eergy, while leaf sesors have limited eergy. Whe the sesor etwor topology is formed, data ca be routed. Some algorithms such as LEACH, PEGASIS, TEEN, APTEEN, MECN, Virtual grid architecture routig ad TTDD are hierarchical routig algorithms. 3- Positio-based routig. All data is routed through the sesors depedig o their positio. Distaces betwee sesors are ow because of eighbourig sesors sigals. There are other protocols that base ode s situatio o GPS ad, usig that iformatio, route the data to the most adequate sesor. These algorithms cosume more eergy tha others because of the eed of GPS sigal. Some of those algorithms sleep sesors whe the etwor has ot ay activity. Some examples are GAF, GEAR, GOAFR ad SPAN. Secod group does ot have ito accout the structure of the etwor. It ca be broe ito five subgroups: - Multipath Routig Protocols. The iformatio could reach the destiatio through differet paths. Because sesors have to calculate several paths, they use a mai route whe they have eough eergy; otherwise, they use a alterative path. 2- Query-Based Routig protocols. They are based o a cetral ode that seds a query about a evet to the specific area. Whe the query arrives to that area, it is routed to the destiatio sesor, ad the it will reply. A sesor from a area could be sleepig, savig eergy, while there is ot ay query to that area. 3- Negotiatio-Based Routig Protocols. Before data trasmissio, the sesor has to egotiate the data it has to sed, so redudat data could be deleted, ad resources will be available while data exchage. SPIN protocols use this type of routig, but they tae ito accout the etwor structure. 4- QoS protocols. The iformatio is routed to the sesors taig ito accout quality parameters such as delay, eergy, badwidth ad so o. SAR ad SPEED protocols are based o quality of service algorithms. 5- Data coheret/icoheret processig based protocols. These algorithms use several routig techiques taig ito accout the data processig of a coheret or icoheret result. Noe of the routig protocols aforemetioed are groupbased. We propose to divide the etwor of sesors ito several groups ad if a sesor has to sed data to other groups, whe this data arrives to oe sesor from a group, it propagates it to the rest of sesors i its group. The paper is structured as follows. Sectio 2 examies some wors related with our proposal such as eighbour selectio ad architectures based o groups, ad explais our motivatio. There is a descriptio of our architecture proposal i sectio 3. Aalytical model for some types of topologies of sesors are show i sectio 4. The propagatio time to reach a sesor from other group is aalyzed i sectio 5. Fially, sectio 6 gives our coclusios ad future wors.

2 II. PREVIOUS WORKS AND MOTIVATION Throughout the years, differet types of strategies for eighbors selectio have bee developed. O oe had, there are the oes used for trasfer coordiatio to icrease cotet availability. They ca be applied for P2P etwors [3], [4] ad [5], for cotet delivery systems [6] or for distributig systems [7]. May other systems locate odes i the topology based o mathematical structures such as CAN, Chord, Pastry ad Tapestry, but these systems do ot tae care of the uderlyig etwor, so a eighbor of a ode could be very far (i terms of roud-trip time RTT-) or it could ot have eough capacity available to perform its ecessities. There are proposals where odes coectios are based o the uderlyig etwor, such as Plethora [8] or o their geographic locatio such as the oe described i [9]. Other systems locate ew odes i the topology taig ito accout that they are possibly close to a give ode, ad the, perform RTT measuremets to idetify the actual closest ode such as the oe preseted i [0], ad others use a proximity eighbor selectio (PNS) usig heuristics approximatios such as the oe preseted i []. There are also some researches for wireless etwors, where coectios are established oly if they are closed, because of their coverage area ([2] ad [3]). But oe of the eighbor selectio strategies show cosider to group odes ad structure coectios betwee odes from differet groups. O the other had, oe of them tae ito accout the capacity of the odes to select the eighbor to have a coectio with. There are several wors i the literature where odes are grouped ito groups ad coectios are established betwee odes from differet groups, but all of them have bee developed to solve specific issues. Rhubarb [4] orgaizes odes i a virtual etwor, allowig coectios across firewalls/nat, ad efficiet broadcastig. The odes ca be active, if they establish coectios, or passive, if they do t. Rhubarb system has oly oe coordiator per group ad coordiators could be grouped i groups i a hierarchy. The system uses a proxy coordiator, a active ode outside the etwor, ad all odes iside the etwor mae a permaet TCP coectio with the proxy coordiator, which is reewed if it is broe by the firewall or NAT. If a ode from outside the etwor wishes to commuicate with a ode that is iside, it seds a coectio request to the proxy coordiator, who forwards the request to the ode iside the etwor. Rhubarb has a three-level group s hierarchy. It may be sufficiet to support a millio odes but whe there are several millios of odes i the etwor it could ot be eough, so it suffers from scalability problems. O the other had, all odes eed to ow the IPs of the proxy coordiator odes to establish coectios with odes from other virtual etwors. A Peer-to-Peer Based Multimedia Distributio Service has bee preseted i [5]. That paper proposes a topology-aware overlay i which earby hosts or peers self-orgaize ito applicatio groups. Ed hosts withi the same group have similar etwor coditios ad ca easily collaborate with each other to achieve QoS awareess. Whe a ode i this architecture wats to commuicate with a ode from other group, the iformatio is routed through several groups util it arrives to the destiatio but this solutio oly ca be applied to logical etwors because of eighborig odes could be so far. There are other architectures based o super-peer models such as Gutella 2 ad FastTrac etwors. Each super-peer i these etwors creates a group of leaf odes. Superpeers perform query processig o behalf of their leaf odes. A leaf ode seds the query to its superpeer that floods it to its superpeer eighbors up to a limited umber of hops. The mai drawbac of this architecture is that all iformatio has to be routed through the superpeer logical etwor. Fially, there are some hierarchical architectures were odes are structured hierarchically ad some parts of the tree are grouped ito groups such as the oes preseted i [6] ad i [7]. I some cases, some odes have coectios with odes from other groups although they are i differet layers of the tree, but i all cases, the iformatio has to be routed through the hierarchy to achieve odes from other groups, so all layers of the hierarchy could be overloaded i case of havig may data to be trasferred. Let s suppose we eed to divide the etwor ito groups or areas because of the physical implemetatio of the sesor etwor or for scalability purposes. All architectures previously show do t solve that problem efficietly, because i the case of cetralized architectures, the server will have may wireless coectios at the same time, so it will eed may resources. O the other had, there is a cetral poit of failure ad a bottleec. I the case of fully distributed architectures, it is very difficult to cotrol the system ad it eeds much time to process tass, because of the time eeded to reach far odes, decreasig the performace of the whole system. III. ARCHITECTURE DESCRIPTION Our proposal is based o the creatio of groups of sesors with the same fuctioality i the etwor. There is a cetral sesor that limits the zoe where the sesors from the same group will be placed, but its fuctioality will be the same that the rest of the sesors. A sesor ows i which group is because it is give maually or by GPS. Whe there is a evet i oe sesor, this evet is set to all sesors i its group. All odes i a group ow all iformatio of their group. Border sesors are those sesors of the of the group, ad they have coectios with sesors from other groups as it is show i figure. Border sesors are used to sed iformatio to other groups or to receive iformatio from other groups ad distribute it iside. Whe a sesor has to sed some iformatio to its group ad to eighborig groups, the iformatio is forwarded usig Reverse Path Forwardig (RPF) Algorithm [8] (each group has oe RPF database), but whe the iformatio has to be set to other groups oly, the iformatio is routed directly to the sesor closest to that group. Whe the sesor from the eighbor group receives that iformatio, it routes it to all odes i its group. Because the system is based o groups, the iformatio is forwarded very fast to other groups (the iformatio is routed through the shortest path to the area sesor). Coectios betwee sesors from differet groups are established as a fuctio of their available processig capacity, their available umber of coectios, their available power or because a eighbor sesor failure. Figure 2 shows a logical view of the proposed architecture.

3 Group B Group D Cetral sesor It sesor Border Sesor Cetral coectio It Border coectio Group limit S S 3 Group A Group C Figure. Topology example IV. ANALITICAL MODEL This sectio describes the architecture aalytically taig ito accout that it is a system based o groups. Now, we are goig to aalyze the architecture for several types of etwor architectures iside the groups. Let a etwor of sesors G (V, λ, E) be, where V is the set of sesors, λ is the set of their capacities (λ(i) is the capacity of the i-th sesor ad λ(i) 0 i-th sesor) ad E is the set of coectios betwee sesors. Let be a fiite umber of disjoit subsets of V, so V V ad there is ot ay sesor i two or more subsets ( V 0). Let s suppose V (the umber of sesors i V) ad the umber of subsets of V. We obtai equatio. V i () Every V has a cetral sesor, several it sesors ad several sesors as it is show i expressio 2. it (2) Now we ca describe the whole etwor as the sum of all these sesors from all groups as it is show i equatio 3. Sesor Coectio betwee sesors from the same group Coectios betwee odes from differet groups ( cetral it ) ( it) ( ) i i i (3) Now we are goig to model our proposal as a fuctio of the umber of it ad sesors i a etwor for several types of etwors. A. Tree topology Tree topologies have a sesor actig as a tru ad from this sesor leaves several braches. There are two types of tree topologies: N-ary trees (every sesor has the same umber of leaf odes, biary, terary ad so o) ad bacboe trees, where there is a tru ad there are sesors that brach from it. I both cases the iformatio flows hierarchically. We are goig to study the first case oly, because it could be easily implemeted by limitig the umber of icomig coectios i a sesor. The bacboe tree is a special case of the partially cetralised P2P Networs with superpeers ad it will be discussed later. Figure 2. Logical view of the proposed architecture I a tree topology, the umber of sesors is equal to M, where M2 i case of a biary tree, M3 i a terary tree ad so o, ad is the umber of levels of the tree). The umber of lis is - ad the diameter of the etwor is 2-2. We suppose balaced trees where all braches have the same umber of levels, so the umber of it sesors is give by expressio 4. it (4) grade Where grade is the umber of leaf sesors for each sesor. Usig expressios 2 ad 4, we obtai expressio 5. It gives the umber of sesors related with the umber of it sesors. (grade-) it grade (5) Tree topologies have bee implemeted i several sesor etwors such as the oe show i [9]. B. Grid topology We are goig to cosider 2-dimesioal Grid ad 3- dimesioal Grid with all its sides equals. To mae easy the mathematical developmet, i a 2D Grid we will use a square matrix where m for 3 ad i a 3D Grid we will use a cube matrix where ml for 3. I both cases, the case of 3 has oe cetral sesor, but there is ot ay it sesor. The umber of sesors i a 2D Grid, with all sides equals, sesor etwor is 2 ( 3, 4...). The umber of eighbours of a it sesor is 4, the sesor has 3 eighbours ad the vertex sesor has 2 eighbours. The umber of coectios i the topology is give by expressio 6. ( ) l 2 (6) Expressio 7 gives the diameter of a 2D Grid topology. ( ) d 2 (7) We have observed that the umber of sesors i a 2D Grid topology follows the expressio 8. 4 ( ) (8) Usig expressio 2, we obtai expressio 9. It gives the umber of it sesors. ( ) 4 (9) it S 2

4 Usig expressios 8 ad 9, we obtai expressio 0 that relates the umber of sesors related with the umber of it sesors. ( ) 4 it (0) 2D Grid topologies have bee implemeted i several sesor wors such as the oe show i [20]. The umber of sesors i a 3D Grid, with all sides equals, sesor etwor is 3 ( 3, 4...). The umber of eighbours of a it or cetral sesor is 6, sesors have 5 eighbours ad the vertex sesors have 4 eighbours. Expressio gives the umber of coectios i the topology. ( ) l 3 () Expressio 2 gives the diameter of a 3D Grid topology. ( ) d 3 3 (2) The umber of sesors i a 3D Grid topology ca be measured by expressio (3) Usig equatio 2, we ca obtai the umber of it sesors i a 3D Grid topology (4) it Usig the cube geometry, we ca obtai the umber of sesors as a fuctio of the umber of it sesors. This relatio is give by equatio 5. 6 ( ) 2 3 ( ) 8 (5) it it 3D Grid topology is used i etwors that eed may paths to reach the same destiatio. C. Power Law I [2], M. Faloutsos et al. show that the odes of a distributio etwor ca be modelled usig mathematical laws. This paper states that power law fits real measuremets with correlatio coefficiets of 96%. Power law states that the grade of a ode (d v ) is proportioal to its rage (r v ) to the power of a costat called R as it is show i expressio 6. R d v r v (6) Where R varies depedig o it is applied. Applyig Lemma, from paper [2], the grade of a ode is give by expressio 7. R d v r (7) R v Where is the umber of sesors i the etwor, d v ad r v are the grade ad the rage of the v sesor respectively. From the power law appears the Zipf s law. It states that some odes have may lis while may odes have oe or two lis. Zipf s law has bee proposed by B. A. Huberma et al. to model Iteret i [22], ad by Z. Ge et al. to model Gutella ad Napster Networs i [23]. Zipf s fuctio states that the rage of r odes follows the proportioality show i expressio 8. f α ( r) C r (8) Where α varies depedig o the type of distributio of the odes. It is also ow as the Zipf coefficiet. C is a costat that varies depedig o the type of etwor. Taig ito accout expressios 7 ad 8, we ca assume that R-α. Applyig Zipf s law to our sesor architecture, we obtai expressio 9. α (9) ( ) α it Taig expressio 2 ito accout, we ca obtai expressio 20. It relates the umber of sesors with the total umber of sesors i the topology. α ( ) α / α ( ) (20) O the other had, replacig expressio 2 i expressio 9 we obtai the umber of sesors as a fuctio of the umber of it sesors as it is show i expressio 2. ( it ) ( ) α (2) it As Iteret topology has varied alog the years, because of the growth of the umber of computers coected to it, α value has varied from 0.74 to 3 i last measures, as it ca be see i [2] ad [24]. D. Logarithmic law Logarithmic law was itroduced by György Herma i [25]. This law proposes that the odes, or the odes with higher roles i the etwor, are the resposible of the stability of the etwor. It also proposes that the odes are the resposible of the security of the etwor because they are the oes that commuicate with exterior odes. This proposal follows the model developed by D. J. Watts et al. i [26], where coectios are established based o efficiecy, stability ad security features. This law states that the distace betwee two sesors is give by expressio 22. l l ) (22) max l( it Where l max is the diameter of the etwor. It is equal to the logarithm of the odes that do t are i the of the etwor (the cetral sesor plus the it sesors). The relatioship betwee the umber of sesors ad the it sesors is give by expressio 23. ( ) c ( ) l( ) c (23) it it ermedate it ermedate C is a costat that depeds o the model of the etwor. So, the umber of sesors i the etwor is set betwee limits show i equatio 24. α

5 2 ( ) ( l( ) ) it it Whe mi Whe max (24) E. Partially cetralized P2P etwors I [27], J. Lloret et al. proposed a architecture for partially cetralized P2P etwors. They measured the umber of broers or superpeers (depedig o the type of etwor), that was iside the architecture o behalf of all broers or superpeers i the whole etwor. Those values could be applied to the proposal preseted i this paper if we suppose that the it sesors plus the cetral oe are the distributio odes ad the sesors are the odes cosidered i the access layer. The relatioship betwee it sesors ad sesors are differet accordig o the type of P2P etwor as it is show i expressio 25. it i a broer model 96 ( it ) i a superpeer model Usig expressio 2 we obtai expressio ( 2) i a broer model i a superpeer model (25) (26) F. Architectures comparatio. This sectio compares the umber of sesors versus the umber of it sesors ad the umber of sesors versus the umber of sesors i the group for all architectures show. I both cases, partially cetralized P2P etwors with broers model is the same case tha the miimum values of the logarithmic model. Figure 3 graphs the umber of sesors i the group as a fuctio of the umber of it sesors for all models previously aalyzed. For Zipf s law we have used umerical methods to obtai its graph. I figure 6, we ca observe that if a group with few sesors is eeded, if there are less tha 24 it sesors, the best electio is the miimum value of the logarithmic law, but if we have more tha 24 it sesors the best oe is 2D Grid. What is desirable is to have may sesors i order to have may coectios with sesors from other groups, so there will be higher probability to cotact with more eighbourig groups. We have checed that for less tha 770 it sesors the best topology is the partially cetralized P2P etwors with superpeer model, but if the umber of it sesors is equal or higher that 770, the best topology is Zipf s law with R Figure 4 shows the umber of sesors i the group as a fuctio of the umber of sesors i the group. We have used umerical methods to ow the umber of sesors as a fuctio of the umber of sesors i the group for the logarithmic model ad for Zipf s law. I figure 4, we ca observe that, whe may sesors are eeded versus the umber of sesors i the group, for less tha 40 sesors the best electio is 3D Grid, but for 40 sesors or more, the best electio is the partially cetralized etwor with superpeers model. Whe we eed few sesors versus the umber of sesors i the group, for less tha 0 sesors the best topology is the terary tree, but for more tha 0 sesors the best topology is 2D Grid. V. PROPAGATION TIME Every time a sesor has to sed iformatio to a specific group, first it has to sed the iformatio to the sesor closest to that group, ad the, the iformatio has to be set through the groups till the iformatio arrives to the destiatio group. Expressio 27 formulates it mathematically. i T t t t (27) to _ max_ it ragroup _ i i _ i _ i Where t to_ is the time eeded to reach the sesor closest to that group, is the umber of it groups through that path, t max_itragroup_i is the time eeded to cross the i- th group ad t _i-_i is the time eeded to trasmit the iformatio from oe sesor to aother sesor from other group. Let s suppose that t p is the mea value of the propagatio time for all trasmissios betwee 2 sesors i the architecture. So, we ca assume that t _i-_i t p ad, give d hops to reach from a source sesor to the sesor closest to the destiatio group, we ca assume t to_ d t p. We ca defie the time eeded to cross the i th -group as t max_itragroup_i d i t p, where d i is the umber of hops to cross the i th -group. Expressio 28 gives the time eeded to reach a group as a fuctio of the mea value of the propagatio time. T d d i t (28) p i Let s cosider four groups alog a path to a group destiatio. Figure 5 shows two simulatios. The first oe (source group) shows the time eeded whe the mea value of the umber of hops to cross the groups ivolved i the path is 0 ad the umber of hops from the source sesor to the sesor closest to the destiatio group vary from to 32. The secod oe (mea value of groups) shows the time eeded whe the umber of hops from the source sesor to the sesor closest to the destiatio group is 0 ad the mea value of the umber of hops to cross the groups ivolved i the path vary from to 32. I figure 5, we ca observe that the delay is higher whe the mea value of the umber of hops i the groups icreases, but it is less sigificat whe the umber of hops from the source sesor to the sesor closest to the destiatio group icreases. VI. CONCLUSIONS To the extet of our owledge, there is ot ay previous itercoectio system to structure coectios betwee groups of odes lie the oe preseted i this paper. This paper demostrates that it is a feasible optio ad it is idepedet of the structure of the sesors of the group, but some group architectures perform better tha others. It could be applied to specific eviromets such as rural eviromets or for military purposes. We are ow desigig its fault-tolerace.

6 Border sesors Number of hops Biary Tree Quaterary Tree Grid 3D mi l P2P Superpeers Teary Tree Grid 2D Zipf (R2-5) max l Zipf (R-2.45) It sesors Figure 3. Border sesors as a fuctio of the it sesors 5 0 Source group mea value of groups Time to reach a group Figure 5. Time to reach a group as a fuctio of the umber of hops ACKNOWLEDGMENT Authors tha Mr. Atoio Caos, from the Polytechic Uiversity of Valecia, because of his support obtaiig, usig umerical methods, the iverse of some fuctios used here. REFERENCES [] L.M. Feeey, A taxoomy for routig protocols i mobile ad hoc etwors, October 999, SICS Techical Report T99:07. [2] J. N. Al-Karai, A. E. Kamal, Routig techiques i wireless sesor etwors: a survey. IEEE Wireless Commuicatios Volume, Issue 6, pp. 6-28, Dec [3] L. Zou, E. Zegura, M.H. Ammar, The effect of peer selectio ad bufferig strategies o the performace of peer-to-peer file sharig systems, i: Proceedigs of Teth Iteratioal Symposium o Modelig, Aalysis ad Simulatio of Computer ad Telecommuicatio Systems, MASCOTS, Fort Worth, TX, [4] Simo G.M. Koo, Karthi Kaa ad C.S. George Lee, O eighborselectio strategy i hybrid peer-to-peer etwors, Future Geeratio Computer Systems 22 (7) (2006). Pp [5] D.S. Berstei, Z. Feg, B.N. Levie, S. Zilberstei, Adaptive peer selectio. Proceedigs of the 2d Iteratioal Worshop o Peer-to- Peer Systems, IPTPS03, Bereley, CA, February [6] J. Byers, J. Cosidie, M. Mitzemacher, S. Rost, Iformed cotet delivery across adaptive overlay etwors, i: Proceedigs of ACM SIGCOMM 2002, Pittsburgh, PA, August [7] S.G.M. Koo, C.S.G. Lee, K. Kaa, A resource-tradig mechaism for efficiet distributio of large-volume cotets o peer-to-peer etwors, Proc. of the 4th IEEE Iteratioal Coferece o Computer Commuicatios ad Networs, Sa Diego, CA, October 7 9, 2005, pp [8] Ferreira, R. A., Jagaatha, S., Grama, A. Locality i structured peerto-peer etwors, Joural of Parallel ad Distributed Computig, Vol. 66, Issue 2. Feb Pp [9] Bose, P., Mori, P., Stojmeovic, I., Urrutia, J. Routig with guarateed delivery i ad hoc wireless etwors, Wireless Networig 7 (6) (200). Pp [0] Xu, Z., Tag, C., Zhag, Z. Buildig topology-aware overlays usig global soft-state. Proc. of the 23rd Iteratioal Coferece o Distributed Computig Systems, May Border sesors 00 0 Biary Tree Quaterary tree Grid 3D mi l P2P Superpeers Terary Tree Grid 2D Zipf (R2-5) max l Zipf (R-2.45) Sesors i the group Figure 4. Border sesors as a fuctio of the umber of sesors i the group [] Castro, M., Druschel, P., Hu, Y. C. ad Rowstro, A. Proximity eighbor selectio i tree-based structured peer-to-peer overlays, Techical Report MSR-TR , Microsoft Research, Microsoft Corporatio [2] Karp, B., Kug, H.T. GPSR: greedy perimeter stateless routig for wireless etwors, i: Proceedigs of the Sixth Aual Iteratioal Coferece o Mobile Computig ad Networig (MobiCom 00), ACM Press. New Yor, NY, USA, 2000, Pp [3] Kim, Y. J., Govida, R., Karp, B., Sheer, S. Geographic routig made practical, i: Proceedigs of the Secod USENIX/ACM Symposium o Networed System Desig ad Implemetatio (NSDI 05), May 2005, pp [4] Wierzbici, A., Strzeleci, R., Swierczewsi, D. ad Zoje, M. Rhubarb: a Tool for Developig Scalable ad Secure Peer-to-Peer Applicatios, i: Secod IEEE Iteratioal Coferece o Peer-to-Peer Computig (P2P2002), Liöpig, Swede, [5] Xiag, Z., Zhag, Q., Zhu, W., Zhag, Z. ad Zhag, Y. Peer-to-Peer Based Multimedia Distributio Service, IEEE Trasactios o Multimedia 6 (2) (2004). [6] Hogju, L., Luo, L. P. ad Zhifeg, Z. A structured hierarchical P2P model based o a rigorous biary tree code algorithm, Future Geeratio Computer Systems 23 (2) Pp [7] Thaller, B., Moser, H. Topology cotrol for fault-tolerat commuicatio i highly dyamic wireless etwors. Proceedigs of the Third Iteratioal Worshop o Itelliget Solutios i Embedded Systems. May [8] Yoge K. Dalal y Robert M. Metcalfe, Reverse path forwardig of broadcast pacets, Commuicatios of the ACM. Volume 2, Issue 2 Pp: Diciembre 978. I. S. Jacobs ad C. P. Bea, Fie particles, thi films ad exchage aisotropy, i Magetism, vol. III, G. T. Rado ad H. Suhl, Eds. New Yor: Academic, 963, pp [9] Ja Beutel, Matthias Dyer, Marti Hiz, Leart Meier ad Matthias Rigwald. Next-geeratio prototypig of sesor etwors, Proceedigs of the 2d iteratioal coferece o Embedded etwored sesor systems. Pp: [20] Radu Stoleru ad Joh A. Staovic, Probability Grid: A Locatio Estimatio Scheme for Wireless Sesor Networs, Sesor ad Ad Hoc Commuicatios ad Networs, IEEE SECON Pp Oct [2] Sigaos, G., Faloutsos, M., Faloutsos, P. ad Faloutsos, C. Power Laws ad the AS-Level Iteret Topology. IEEE/ACM Trasactios o Networig, Vol., Issue 4. August [22] Huberma, B. A. ad Adamic, L. A. Growth dyamics of the World- Wide Web, Nature, vol. 40, (999). Pp [23] Ge, Z., Figueiredo, D. R., Jaiswal, S., Kurose, J., Towsley, D. Modelig Peer-Peer File Sharig Systems, Proceedigs IEEE INFOCOM 2003, Sa Fracisco, March-April [24] Albert, R., Jeog, H. & Barabási, A. L. Diameter of the World Wide Web. (999) Nature 40, [25] Gyorgy Herma. Mathematical ivestigatios i etwor properties. Proceedigs IEEE Itelliget Egieerig Systems, INES '05. Pp September 6-9, 2005 [26] D. J. Watts ad H. S. Strogatz. Collective dyamics of 'small-world' etwors. Nature 393, 440 (998). [27] Lloret, J., Boroat, F., Palau, C., Esteve, M.: Two Levels SPF-Based System to Itercoect Partially Decetralized P2P File Sharig Networs, Joit Iteratioal Cof. o Autoomic ad Autoomous Systems Iteratioal Cof. o Networig ad Services (2005).

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

Partition in mobile adhoc network with mobility-a new approach for effective use of fast IP address autoconfiguration

Partition in mobile adhoc network with mobility-a new approach for effective use of fast IP address autoconfiguration Mukesh Chad et al. / Iteratioal Joural of Egieerig ad Techology (IJET) Partitio i mobile adhoc etwork with mobility-a ew approach for effective use of fast IP address autocofiguratio Mukesh Chad *, HL

More information

1 Graph Sparsfication

1 Graph Sparsfication CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider

More information

Random Network Coding in Wireless Sensor Networks: Energy Efficiency via Cross-Layer Approach

Random Network Coding in Wireless Sensor Networks: Energy Efficiency via Cross-Layer Approach Radom Network Codig i Wireless Sesor Networks: Eergy Efficiecy via Cross-Layer Approach Daiel Platz, Dereje H. Woldegebreal, ad Holger Karl Uiversity of Paderbor, Paderbor, Germay {platz, dereje.hmr, holger.karl}@upb.de

More information

Energy Efficinet Cluster Head Selection and Data Convening in Wireless Sensor Networks

Energy Efficinet Cluster Head Selection and Data Convening in Wireless Sensor Networks Idia Joural of Sciece ad Techology, Vol 9(15), DOI: 1.17485/ijst/216/v9i15/77749, April 216 ISSN (Prit) : 974-6846 ISSN (Olie) : 974-5645 Eergy Efficiet Cluster Head Selectio ad Data Coveig i Wireless

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

Ontology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection

Ontology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection 2017 Asia-Pacific Egieerig ad Techology Coferece (APETC 2017) ISBN: 978-1-60595-443-1 Otology-based Decisio Support System with Aalytic Hierarchy Process for Tour Pacage Selectio Tie-We Sug, Chia-Jug Lee,

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM

BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM MATEC Web of Cofereces 79, 01014 (016) DOI: 10.1051/ mateccof/0167901014 T 016 BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM Staislav Shidlovskiy 1, 1 Natioal Research

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

Introduction to OSPF. ISP Training Workshops

Introduction to OSPF. ISP Training Workshops Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged

More information

Low Complexity H.265/HEVC Coding Unit Size Decision for a Videoconferencing System

Low Complexity H.265/HEVC Coding Unit Size Decision for a Videoconferencing System BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 6 Special Issue o Logistics, Iformatics ad Service Sciece Sofia 2015 Prit ISSN: 1311-9702; Olie ISSN: 1314-4081 DOI:

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules

More information

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

arxiv: v2 [cs.ds] 24 Mar 2018

arxiv: v2 [cs.ds] 24 Mar 2018 Similar Elemets ad Metric Labelig o Complete Graphs arxiv:1803.08037v [cs.ds] 4 Mar 018 Pedro F. Felzeszwalb Brow Uiversity Providece, RI, USA pff@brow.edu March 8, 018 We cosider a problem that ivolves

More information

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,

More information

Cubic Polynomial Curves with a Shape Parameter

Cubic Polynomial Curves with a Shape Parameter roceedigs of the th WSEAS Iteratioal Coferece o Robotics Cotrol ad Maufacturig Techology Hagzhou Chia April -8 00 (pp5-70) Cubic olyomial Curves with a Shape arameter MO GUOLIANG ZHAO YANAN Iformatio ad

More information

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 9, 85-0 (2003) Evaluatio of Distributed ad Replicated HLR for Locatio Maagemet i PCS Network Departmet of Computer Sciece ad Iformatio Egieerig Natioal Chiao

More information

Realistic Storage of Pending Requests in Content-Centric Network Routers

Realistic Storage of Pending Requests in Content-Centric Network Routers Realistic Storage of Pedig Requests i Cotet-Cetric Network Routers Wei You, Bertrad Mathieu, Patrick Truog, Jea-Fraçois Peltier Orage Labs Laio, Frace {wei.you, bertrad2.mathieu, patrick.truog, jeafracois.peltier}@orage.com

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

FPGA IMPLEMENTATION OF BASE-N LOGARITHM. Salvador E. Tropea

FPGA IMPLEMENTATION OF BASE-N LOGARITHM. Salvador E. Tropea FPGA IMPLEMENTATION OF BASE-N LOGARITHM Salvador E. Tropea Electróica e Iformática Istituto Nacioal de Tecología Idustrial Bueos Aires, Argetia email: salvador@iti.gov.ar ABSTRACT I this work, we preset

More information

Properties and Embeddings of Interconnection Networks Based on the Hexcube

Properties and Embeddings of Interconnection Networks Based on the Hexcube JOURNAL OF INFORMATION PROPERTIES SCIENCE AND AND ENGINEERING EMBEDDINGS OF 16, THE 81-95 HEXCUBE (2000) 81 Short Paper Properties ad Embeddigs of Itercoectio Networks Based o the Hexcube JUNG-SING JWO,

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

Introduction to Network Technologies & Layered Architecture BUPT/QMUL

Introduction to Network Technologies & Layered Architecture BUPT/QMUL Itroductio to Network Techologies & Layered Architecture BUPT/QMUL 2018-3-12 Review What is the Iteret? How does it work? Whe & how did it come about? Who cotrols it? Where is it goig? 2 Ageda Basic Network

More information

On Nonblocking Folded-Clos Networks in Computer Communication Environments

On Nonblocking Folded-Clos Networks in Computer Communication Environments O Noblockig Folded-Clos Networks i Computer Commuicatio Eviromets Xi Yua Departmet of Computer Sciece, Florida State Uiversity, Tallahassee, FL 3306 xyua@cs.fsu.edu Abstract Folded-Clos etworks, also referred

More information

Accuracy Improvement in Camera Calibration

Accuracy Improvement in Camera Calibration Accuracy Improvemet i Camera Calibratio FaJie L Qi Zag ad Reihard Klette CITR, Computer Sciece Departmet The Uiversity of Aucklad Tamaki Campus, Aucklad, New Zealad fli006, qza001@ec.aucklad.ac.z r.klette@aucklad.ac.z

More information

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued

More information

S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea

S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea S. Mehta ad K.S. Kwak UWB Wireless Commuicatios Research Ceter, Iha Uiversity Icheo, 402-75, Korea suryaad.m@gmail.com ABSTRACT I this paper, we propose a hybrid medium access cotrol protocol (H-MAC) for

More information

Effect of control points distribution on the orthorectification accuracy of an Ikonos II image through rational polynomial functions

Effect of control points distribution on the orthorectification accuracy of an Ikonos II image through rational polynomial functions Effect of cotrol poits distributio o the orthorectificatio accuracy of a Ikoos II image through ratioal polyomial fuctios Marcela do Valle Machado 1, Mauro Homem Atues 1 ad Paula Debiasi 1 1 Federal Rural

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

Keywords Software Architecture, Object-oriented metrics, Reliability, Reusability, Coupling evaluator, Cohesion, efficiency

Keywords Software Architecture, Object-oriented metrics, Reliability, Reusability, Coupling evaluator, Cohesion, efficiency Volume 3, Issue 9, September 2013 ISSN: 2277 128X Iteratioal Joural of Advaced Research i Computer Sciece ad Software Egieerig Research Paper Available olie at: www.ijarcsse.com Couplig Evaluator to Ehace

More information

ANN WHICH COVERS MLP AND RBF

ANN WHICH COVERS MLP AND RBF ANN WHICH COVERS MLP AND RBF Josef Boští, Jaromír Kual Faculty of Nuclear Scieces ad Physical Egieerig, CTU i Prague Departmet of Software Egieerig Abstract Two basic types of artificial eural etwors Multi

More information

Managing Random Sensor Networks by means of Grid Emulation

Managing Random Sensor Networks by means of Grid Emulation Maagig Radom Sesor Networks by meas of Grid Emulatio Zvi Lotker 1 ad Alfredo Navarra 2 1 Cetrum voor Wiskude e Iformatica Kruislaa 413, NL-1098 SJ Amsterdam, Netherlads lotker@cwi.l 2 Computer Sciece Departmet,

More information

Stone Images Retrieval Based on Color Histogram

Stone Images Retrieval Based on Color Histogram Stoe Images Retrieval Based o Color Histogram Qiag Zhao, Jie Yag, Jigyi Yag, Hogxig Liu School of Iformatio Egieerig, Wuha Uiversity of Techology Wuha, Chia Abstract Stoe images color features are chose

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

A Planar Group-Based Architecture to Scale Ad- Hoc and Sensor Networks

A Planar Group-Based Architecture to Scale Ad- Hoc and Sensor Networks JOURNAL OF NETWORKS, VOL. 4, NO. 6, AUGUST 2009 473 A Planar Group-Based Architecture to Scale Ad- Hoc and Sensor Networks Jaime Lloret, Miguel Garcia 2, Fernando Boronat 3, Jesus Tomás 4 Universidad Politecnica

More information

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only Edited: Yeh-Liag Hsu (998--; recommeded: Yeh-Liag Hsu (--9; last updated: Yeh-Liag Hsu (9--7. Note: This is the course material for ME55 Geometric modelig ad computer graphics, Yua Ze Uiversity. art of

More information

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1 Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)

More information

Primitive polynomials selection method for pseudo-random number generator

Primitive polynomials selection method for pseudo-random number generator Joural of hysics: Coferece Series AER OEN ACCESS rimitive polyomials selectio method for pseudo-radom umber geerator To cite this article: I V Aiki ad Kh Alajjar 08 J. hys.: Cof. Ser. 944 0003 View the

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

ANALYSIS OF RATIONAL FUNCTION DEPENDENCY TO THE HEIGHT DISTRIBUTION OF GROUND CONTROL POINTS IN GEOMETRIC CORRECTION OF AERIAL AND SATELLITE IMAGES

ANALYSIS OF RATIONAL FUNCTION DEPENDENCY TO THE HEIGHT DISTRIBUTION OF GROUND CONTROL POINTS IN GEOMETRIC CORRECTION OF AERIAL AND SATELLITE IMAGES ANALSIS OF RATIONAL FUNCTION DEPENDENC TO THE HEIGHT DISTRIBUTION OF GROUND CONTROL POINTS IN GEOMETRIC CORRECTION OF AERIAL AND SATELLITE IMAGES M. Hosseii, Departmet of Geomatics Egieerig, Faculty of

More information

Evaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System

Evaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System Evaluatio of Differet Fitess Fuctios for the Evolutioary Testig of a Autoomous Parkig System Joachim Wegeer 1 ad Oliver Bühler 2 1 DaimlerChrysler AG, Research ad Techology, Alt-Moabit 96 a, D-10559 Berli,

More information

Relay Placement Based on Divide-and-Conquer

Relay Placement Based on Divide-and-Conquer Relay Placemet Based o Divide-ad-Coquer Ravabakhsh Akhlaghiia, Azadeh Kaviafar, ad Mohamad Javad Rostami, Member, IACSIT Abstract I this paper, we defie a relay placemet problem to cover a large umber

More information

Look-ahead Geographic Routing for Sensor Networks

Look-ahead Geographic Routing for Sensor Networks 1 Look-ahead Geographic Routig for Sesor Networks Jiaxi You 1, Domiik Lieckfeldt 1, Qi Ha, Jakob Salzma 1, ad Dirk Timmerma 1 1 Uiversity of Rostock, Germay 1 {jiaxi.you, domiik.lieckfeldt, jakob.salzma,

More information

Second-Order Domain Decomposition Method for Three-Dimensional Hyperbolic Problems

Second-Order Domain Decomposition Method for Three-Dimensional Hyperbolic Problems Iteratioal Mathematical Forum, Vol. 8, 013, o. 7, 311-317 Secod-Order Domai Decompositio Method for Three-Dimesioal Hyperbolic Problems Youbae Ju Departmet of Applied Mathematics Kumoh Natioal Istitute

More information

Reversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits

Reversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits Egieerig Letters, :, EL Reversible Realizatio of Quaterary Decoder, Multiplexer, ad Demultiplexer Circuits Mozammel H.. Kha, Member, ENG bstract quaterary reversible circuit is more compact tha the correspodig

More information

Design of efficient, virtual non-blocking optical switches

Design of efficient, virtual non-blocking optical switches Desig of efficiet, virtual o-blockig otical switches Larry F. Lid, Michael Sratt Mobile Systems ad Services Laboratory HP Laboratories Bristol HPL-200-239 March 3 th, 2002* otical switchig, switch desig

More information

The isoperimetric problem on the hypercube

The isoperimetric problem on the hypercube The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose

More information

Creating Exact Bezier Representations of CST Shapes. David D. Marshall. California Polytechnic State University, San Luis Obispo, CA , USA

Creating Exact Bezier Representations of CST Shapes. David D. Marshall. California Polytechnic State University, San Luis Obispo, CA , USA Creatig Exact Bezier Represetatios of CST Shapes David D. Marshall Califoria Polytechic State Uiversity, Sa Luis Obispo, CA 93407-035, USA The paper presets a method of expressig CST shapes pioeered by

More information

Chapter 3 MATHEMATICAL MODELING OF TOLERANCE ALLOCATION AND OVERVIEW OF EVOLUTIONARY ALGORITHMS

Chapter 3 MATHEMATICAL MODELING OF TOLERANCE ALLOCATION AND OVERVIEW OF EVOLUTIONARY ALGORITHMS 28 Chapter 3 MATHEMATICAL MODELING OF TOLERANCE ALLOCATION AND OVERVIEW OF EVOLUTIONARY ALGORITHMS Tolerace sythesis deals with the allocatio of tolerace values to various dimesios of idividual compoets

More information

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana The Closest Lie to a Data Set i the Plae David Gurey Southeaster Louisiaa Uiversity Hammod, Louisiaa ABSTRACT This paper looks at three differet measures of distace betwee a lie ad a data set i the plae:

More information

Content Reserve Utility Based Video Segment Transmission Scheduling for Peer-to-Peer Live Video Streaming System

Content Reserve Utility Based Video Segment Transmission Scheduling for Peer-to-Peer Live Video Streaming System Cotet Reserve Utility Based Video Segmet Trasmissio Schedulig for Peer-to-Peer Live Video Streamig System Zhu Li 1, Jiawei Huag 2, ad Aggelos K. Katsaggelos 3 1,3 Multimedia Research Lab, Motorola Labs,

More information

A Note on Least-norm Solution of Global WireWarping

A Note on Least-norm Solution of Global WireWarping A Note o Least-orm Solutio of Global WireWarpig Charlie C. L. Wag Departmet of Mechaical ad Automatio Egieerig The Chiese Uiversity of Hog Kog Shati, N.T., Hog Kog E-mail: cwag@mae.cuhk.edu.hk Abstract

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

Data Warehousing. Paper

Data Warehousing. Paper Data Warehousig Paper 28-25 Implemetig a fiacial balace scorecard o top of SAP R/3, usig CFO Visio as iterface. Ida Carapelle & Sophie De Baets, SOLID Parters, Brussels, Belgium (EUROPE) ABSTRACT Fiacial

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

Table 2 GSM, UMTS and LTE Coverage Levels

Table 2 GSM, UMTS and LTE Coverage Levels 6 INDICATORS OF QUALITY OF SERVICE This sectio defies quality idicators that characterize the performace of services supported o mobile commuicatio systems i their various phases of access ad use 6. 6.1

More information

Protected points in ordered trees

Protected points in ordered trees Applied Mathematics Letters 008 56 50 www.elsevier.com/locate/aml Protected poits i ordered trees Gi-Sag Cheo a, Louis W. Shapiro b, a Departmet of Mathematics, Sugkyukwa Uiversity, Suwo 440-746, Republic

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

The Value of Peering

The Value of Peering The Value of Peerig ISP/IXP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 25 th

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks Iterferece Aware Chael Assigmet Scheme i Multichael Wireless Mesh Networks Sumyeg Kim Departmet of Computer Software Egieerig Kumoh Natioal Istitute of Techology Gum South Korea Abstract Wireless mesh

More information

Dynamic Programming and Curve Fitting Based Road Boundary Detection

Dynamic Programming and Curve Fitting Based Road Boundary Detection Dyamic Programmig ad Curve Fittig Based Road Boudary Detectio SHYAM PRASAD ADHIKARI, HYONGSUK KIM, Divisio of Electroics ad Iformatio Egieerig Chobuk Natioal Uiversity 664-4 Ga Deokji-Dog Jeoju-City Jeobuk

More information

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute

More information

CS2410 Computer Architecture. Flynn s Taxonomy

CS2410 Computer Architecture. Flynn s Taxonomy CS2410 Computer Architecture Dept. of Computer Sciece Uiversity of Pittsburgh http://www.cs.pitt.edu/~melhem/courses/2410p/idex.html 1 Fly s Taxoomy SISD Sigle istructio stream Sigle data stream (SIMD)

More information

Force Network Analysis using Complementary Energy

Force Network Analysis using Complementary Energy orce Network Aalysis usig Complemetary Eergy Adrew BORGART Assistat Professor Delft Uiversity of Techology Delft, The Netherlads A.Borgart@tudelft.l Yaick LIEM Studet Delft Uiversity of Techology Delft,

More information

Parallel Polygon Approximation Algorithm Targeted at Reconfigurable Multi-Ring Hardware

Parallel Polygon Approximation Algorithm Targeted at Reconfigurable Multi-Ring Hardware Parallel Polygo Approximatio Algorithm Targeted at Recofigurable Multi-Rig Hardware M. Arif Wai* ad Hamid R. Arabia** *Califoria State Uiversity Bakersfield, Califoria, USA **Uiversity of Georgia, Georgia,

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods.

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods. Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

Quorum Based Data Replication in Grid Environment

Quorum Based Data Replication in Grid Environment Quorum Based Data Replicatio i Grid Eviromet Rohaya Latip, Hamidah Ibrahim, Mohamed Othma, Md Nasir Sulaima, ad Azizol Abdullah Faculty of Computer Sciece ad Iformatio Techology, Uiversiti Putra Malaysia

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

Cost Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks G. SNEHA PRANEETHA 1, DEEPTHI JANAGAMA 2, N.

Cost Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks G. SNEHA PRANEETHA 1, DEEPTHI JANAGAMA 2, N. ISSN 2348 2370 Vol.08,Issue.12, September-2016, Pages:2397-2401 www.ijatir.org Cost Aware Secure Routig (CASER) Protocol Desig for Wireless Sesor Networks G. SNEHA PRANEETHA 1, DEEPTHI JANAGAMA 2, N. ANJANEYULU

More information

THE WAY OF CALCULATING THE TRAFFIC AND SIGNALING NETWORK DIMENSION OF COMMON CHANNEL SIGNALING NO.7 (CCS7)

THE WAY OF CALCULATING THE TRAFFIC AND SIGNALING NETWORK DIMENSION OF COMMON CHANNEL SIGNALING NO.7 (CCS7) The Way of Calculatig The Traffic... THE WAY OF CALCULATIG THE TRAFFIC AD SIGALIG ETWORK DIMESIO OF COMMO CHAEL SIGALIG O.7 (CCS7) Departeme Tekik Elektro, Fakultas Tekik, Uiversitas Sumatera Utara Abstract:

More information

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1 Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Quality of Service How good are late data ad lowthroughput chaels? It depeds o the applicatio. Do you care if... Your e-mail takes 1/2

More information

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today Admiistrative Fial project No office hours today UNSUPERVISED LEARNING David Kauchak CS 451 Fall 2013 Supervised learig Usupervised learig label label 1 label 3 model/ predictor label 4 label 5 Supervised

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1 Adaptive Graph Partitioig Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, ad W. J. Dewar 1 1 School of Electrical Egieerig Uiversity of New South Wales, Australia 2 Divisio of Radiophysics

More information

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem Exact Miimum Lower Boud Algorithm for Travelig Salesma Problem Mohamed Eleiche GeoTiba Systems mohamed.eleiche@gmail.com Abstract The miimum-travel-cost algorithm is a dyamic programmig algorithm to compute

More information

Optimal Mapped Mesh on the Circle

Optimal Mapped Mesh on the Circle Koferece ANSYS 009 Optimal Mapped Mesh o the Circle doc. Ig. Jaroslav Štigler, Ph.D. Bro Uiversity of Techology, aculty of Mechaical gieerig, ergy Istitut, Abstract: This paper brigs out some ideas ad

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045 Oe Brookigs Drive St. Louis, Missouri 63130-4899, USA jaegerg@cse.wustl.edu

More information

A Modified Multiband U Shaped and Microcontroller Shaped Fractal Antenna

A Modified Multiband U Shaped and Microcontroller Shaped Fractal Antenna al Joural o Recet ad Iovatio Treds i Computig ad Commuicatio ISSN: 221-8169 A Modified Multibad U Shaped ad Microcotroller Shaped Fractal Atea Shweta Goyal 1, Yogedra Kumar Katiyar 2 1 M.tech Scholar,

More information

Range Free Localization Schemes For Wireless Sensor Networks

Range Free Localization Schemes For Wireless Sensor Networks Rage Free Localizatio Schemes For Wireless Sesor Networks ASHOK KUMAR, VINAY KUMAR AND VINOD KAPOOR Departmet of Electroics ad Commuicatio Egieerig Natioal Istitute of Techology Hamirpur (HP) 177 005 INDIA

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN

A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN Iteratioal Joural of Digital Cotet Techology ad its Applicatios Vol. 2 No 1, March 2008 A Key Distributio method for Reducig Storage ad Supportig High Level Security i the Large-scale WSN Yoo-Su Jeog *1,

More information

Design and Implementation of Web Usage Mining Intelligent System in the Field of e-commerce

Design and Implementation of Web Usage Mining Intelligent System in the Field of e-commerce Available olie at www.sciecedirect.com Procedia Egieerig 30 (2012) 20 27 Iteratioal Coferece o Commuicatio Techology ad System Desig Desig ad Implemetatio of Web Usage Miig Itelliget System i the Field

More information

BOOLEAN MATHEMATICS: GENERAL THEORY

BOOLEAN MATHEMATICS: GENERAL THEORY CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.

More information

NON-LINEAR MODELLING OF A GEOTHERMAL STEAM PIPE

NON-LINEAR MODELLING OF A GEOTHERMAL STEAM PIPE 14thNew Zealad Workshop 1992 NON-LNEAR MODELLNG OF A GEOTHERMAL STEAM PPE Y. Huag ad D. H. Freesto Geothermal stitute, Uiversity of Aucklad SUMMARY Recet work o developig a o-liear model for a geothermal

More information

HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING

HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Y.K. Patil* Iteratioal Joural of Advaced Research i ISSN: 2278-6244 IT ad Egieerig Impact Factor: 4.54 HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Prof. V.S. Nadedkar** Abstract: Documet clusterig is

More information

A Study on the Performance of Cholesky-Factorization using MPI

A Study on the Performance of Cholesky-Factorization using MPI A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information