Architecture Design of Mobile Access Coordinated Wireless Sensor Networks

Size: px
Start display at page:

Download "Architecture Design of Mobile Access Coordinated Wireless Sensor Networks"

Transcription

1 Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University, East Lansing, MI 4884, USA. Air Force Research Laboratory, Wright-Patterson Air Force Base, Dayton, OH, USA. Abstract This paper consiers architecture esign of mobile access coorinate wireless sensor networks (MC-WSN) for reliable an efficient information exchange. In sensor networks with mobile access points (SENMA), the mobile access points collect information irectly from iniviual sensors as they traverse the network, such that no routing is neee in ata transmission. While being energy efficient, a major limitation with SENMA is the large elay in ata collection, making it unesirable for timesensitive applications. In the propose MC-WSN architecture, the sensor network is coorinate by powerful mobile access points (MA), such that the number of hops from each sensor to the MA is minimize an limite to a pre-specifie number through active network eployment an network topology esign. Unlike in SENMA, where the ata collection elay epens on the physical spee of the MA, in MC-WSN, the elay epens on the number of hops an the electromagnetic wave spee, an is inepenent of the physical spee of the MA. This innovative architecture is energy efficient, resilient, fast reacting an can actively prolong the lifetime of sensor networks. Our simulations show that the propose MC-WSN can achieve higher energyefficiency an orers of magnitue lower elay over SENMA, especially for large-scale networks. Inex Terms Mobile access coorinator, wireless sensor networks, sensor network security an reliability. I. INTRODUCTION Wireless sensor networks have receive significant attention from the research community ue to their potential impact on various military an civilian applications. For efficient an reliable communication over large-scale networks, sensor networks with mobile access points (SENMA) was propose in [1]. In SENMA, the mobile access points (MAs) traverse the network to collect the sensing information irectly from the sensor noes; when the energy consumption at the MAs is not of a concern, SENMA improves the energy-efficiency of the iniviual sensor noes over a-hoc networks by relieving sensors from the energy-consuming routing functions [1], []. While being energy efficient, a major limitation with SENMA is the large elay in the ata collection process. This elay epens on the physical spee of the MA an the length of the MA trajectory, which woul increase ramatically as the network size increases. Large elay makes SENMA unesirable for time-sensitive applications. Along with the recent avances in the remote control technologies, UAVs have been use for management an coorination functions in wireless networks. For example, network eployment through UAV has been recently explore in the literature [3], [4]. For sensor eployment, the UAV basically carries one or more sensor noes, then flies to the require location an gets own to a specific altitue where it is safe to rop the sensor for eployment. A possible network eployment metho using UAV was experimente in [4]. In this paper, mobile access coorinate wireless sensor networks (MC-WSN) architecture is consiere for energyefficient, reliable, an time-sensitive information exchange. In MC-WSN, the whole network is ivie into cells, each is covere by one MA. The MAs coorinate the network through eploying, replacing an recharging noes. They are also responsible for enhancing the network security, by etecting compromise noes then replacing them [5]. Data transmission from sensor noes to the MA goes through simple routing with the cluster heas along a ring or a powerful center cluster hea locate at the mile of each cell. Base on active network eployment an topology esign, the number of hops from any sensor to the MA is minimize an limite to a pre-specifie number. Unlike in SENMA, the elay in MC-WSN epens on the number of hops an the electromagnetic wave spee, an is inepenent of the physical spee of the MA. For MC-WSN, the energy consumption at the iniviual sensors is mainly etermine by the istance from the nearest cluster hea, which is one hop away, an is inepenent of the coverage area of the MA an the noe ensity. We emonstrate the effectiveness of the propose architecture through simulation examples, which show that the MC-WSN architecture achieves higher energy-efficiency an orers of magnitue lower elay over SENMA, especially for large-scale networks. II. REVISIT THE SENMA SYSTEM To reuce the routing buren on iniviual sensors, SENMA networks utilize mobile access points to collect the sensing reports from all sensors noes [1]. The access point traverses the network at a height H S broacasting beacon signals at ranom locations. The coverage area of the access point is moele as a circle of raius r. The access point activates sensors within its coverage area, an each time only a single sensor respons to the beacon message by reporting its sensing information. In SENMA, since sensors communicate irectly to the mobile access point without any routing, the energy consumption at the iniviual sensors is significantly reuce over a-hoc networks [1]. For this to happen, the mobile access point nees to traverse its footprint exhaustively to cover all sensors, resulting in a very long mobile access trajectory an consequently

2 huge elay. The elay epens on the physical spee of the MA an the length of the MA trajectory, which woul increase significantly as the network size increases. Thus, SENMA coul be unesirable for time-sensitive applications. Motivate by this observation, we propose a mobile access coorinate wireless sensor networks architecture. III. THE PROPOSEOBILE ACCESS COORDINATED WIRELESS SENSOR NETWORK (MC-WSN) In this section, we escribe the propose MC-WSN architecture that aims at proviing reliable, energy-efficient an scalable network structure for prolonge-network lifetime an time-sensitive ata exchange. We assume the network is ivie into hexagonally shape cells, with sies of length. Each cell contains a single powerful mobile access point (MA) an K SN uniformly eploye sensor noes (SNs) that are arrange into K CH clusters, each is of raius R CH. Each cluster is manage by a cluster hea (CH), to which all the cluster members report their ata. CHs then route the ata to the MA. A powerful center cluster hea (CCH) is employe in the mile of each cell. The CCH can establish irect communication with the MA as long as it is insie the cell. After receiving the ata of the sensors, the MA elivers it to the Base Station (BS), which in turn makes the final ecisions. To improve the network reliability, efficiency an scalability, multiple BSs can be employe. The overall network architecture is illustrate in Figure 1. sensor noes an cluster heas. It moves physically for ata collection only in the case when the routing paths o not work. Otherwise, for security reasons, it stays at a ranom location on a circular path of a raius an at an angle φ from the CCH as shown in Figure. φ is uniformly istribute with PDF f φ (φ) = 1 π. The CHs along the circular path forms a ring, through which the ata can be elivere to the MA. The ring is esigne such that there is at least one CH on it can communicate irectly with the MA, which we refer to as the RCH. This shoul be the one nearest to the MA location. Note that, since the MA moves ranomly over the ring, the RCH is not fixe. It is also note that the ring may not be a strict circle, an it epens on the coverage area of the MA. Data transmission from any SN to the MA goes through simple routing, either with the CCH or the RCH. Let the communication range of each sensor noe be r c. SNs only communicate with their corresponing CH, which then route the ata to the MA. CHs have larger storage capacity an longer communication range than SNs. To minimize the elay in ata transmission from the sensors to the MA, the number of hops neee in routing shoul be minimize. Therefore, we consier iviing the CHs in the cell into two groups base on their location. The first group contains CHs within the area of raius R o from the CCH. While the secon group contains all CHs locate outsie the raius R o, where R o <. CHs in the first group will mainly route their information to the MA through the CCH, which can eliver the ata irectly to the MA. While CHs in the secon group route their information to the MA either irectly or through the RCH. The latter case happens by first routing the ata to the nearest CH on the ring, which then broacasts the ata in both irections along the ring until it reaches the RCH as shown in Figure. The RCH then eliver the ata to the MA. To minimize the number of hops, if a CHs in the secon group is very far from RCH, it can irectly forwars its ata to the CCH, as will be illustrate in Section V. Cluster hea Sensor noe Center cluster hea Mobile access Point Base Station Fig. 1. Propose MC-WSN architecture. c In the propose MC-WSN architecture, the MA coorinates the sensor network an resolves the noe eployment issue as well as the energy consumption problem of wireless sensor networks. More specifically, the MAs are responsible for (i) eploying noes, (ii) replacing an recharging noes, (iii) etecting malicious sensors, then removing an replacing them, (iv) collecting the information from sensors an elivering it to the BS. When an MA nees to be recharge or reloae, it sens a request to the MA base. The base will sen a new MA to the cell, an the ol MA will be taken back to the base for maintenance services. The MAs can move on the groun, an can also fly. Each MA traverses its cell mainly for removing the malicious noes an replacing or recharging low-energy R o RCH RCH Cluster hea Mobile access point Sensor noe Center cluster hea Fig.. The topology use in the MC-WSN architecture. Here CH c has a packet to eliver to the MA. 171

3 In the architecture esign, we limit the average number of hops from any SN to its corresponing CH to N 1, an limit the average number of hops from any CH to the MA to N, where N 1 an N are pre-specifie numbers. N 1 is controlle through active network eployment, while N is controlle through the network topology esign (i.e. select the ring raius an the raius R o ). The main features of the MC-WSN architecture are: Resolve the network eployment problem an actively prolong the network lifetime The propose MC-WSN allows the MAs to manage the eployment of SNs an CHs. That is, the MA can a more noes, relocate or replace exiting noes. In aition, it can recharge or replace low energy noes. When a noe has low remaining energy, it sens a control message to the MA notifying it with its energy level. The MA can then make the ecision to replace the noe or recharge it. Being coorinate by the MA, the MC-WSN architecture resolves the network eployment issue an can actively prolong the network lifetime. Minimize the elay Unlike in SENMA, where the ata collection elay epens on the physical velocity of the MA, in MC-WSN the elay epens on the number of hops an the electromagnetic wave spee, an is inepenent of the physical spee of the MA. Therefore, the elay is significantly lower than that in SENMA. The elay is further reuce by minimizing the number of hops require to reach the MA; this is achieve through network topology esign an active network eployment. Provie high energy efficiency The SNs have the most limite resources in wireless sensor networks. In the propose MC-WSN, SNs only communicate with their nearest CHs, an are not involve in any inter-cluster routing. Also, in contrast to SENMA, SNs in MC-WSN o not nee to receive the beacon signal from the MA. Enhance network security The MAs can etect malicious SNs an CHs an replace them [5]. It is ifficult to get the MA itself compromise or estroye, since it is much more powerful than other network noes, an it moves ranomly in the network where its location can be kept private [6]. Enhance network resilience, reliability an scalability: The MC-WSN is a self-healing architecture, where the CCH an RCH represent two options for relaying the ata to the MA. Each option can act as an alternative for the other. In the case when the routing paths o not work, the MA can traverse its cell for ata collection. Overall, MC-WSN is a resilient, reliable an scalable architecture. Discussions on Feasibility: Sensor noes an MAs eployment in ifferent cells is possible through the UAV technology. A helicopter, or a larger unmanne aerial vehicle, can eploy the MAs in the network, an can replace existing MAs when they are out of energy. The sensor eployment is initiate by the UAV an then tune by the MA. IV. NETWORK OPERATIONS In this section, we illustrate the main network proceures use in MC-WSN. A. Network Set-Up We assume that the CHs an the MAs are equippe with Global Positioning System (GPS) to obtain their location information. The network set-up is establishe through the following steps: 1) Cluster formation: All CHs broacast Hello messages containing their IDs an locations. Each SN etects it nearest CH, to which it sens a Request to Join (RT J). Upon reception of RT J, CH replies with Confirm to Join (CTJ). ) Ring set-up: The MA traverses the cell along a circular ring of raius broacasting Start messages to the CHs in its coverage area. Denote the set of CHs that are along the ring an within the MA coverage area as χ. All the CHs in χ receive the Start message, an reply to the MA with an ACK. 3) Discover links to the ring: broacast InitCH message to all their neighboring CHs. The InitCH message inclues the ID an location of the sener CH. When a CH receives the InitCH, it will in turn broacast InitCH to its neighbors. This happens until all CHs receive at least a single InitCH message. Confirmation is mae backwar through the same links. 4) Discover links to the CCH: CCH also broacasts a Reference signal to all its neighboring CHs. The Reference signal is forware by CHs, using the same manner iscusse above, until it reaches the CHs on the ring. 5) Establish the links to the ring or the CCH: CHs then establish connections with the CCH an/or the closest CH on the ring by sening Request to Connect (RT C) message. The process is complete when the intene receiver replies with Confirm to Connect (CTC). B. Sensing an Collecting The sensing an collecting stage is performe perioically, where the iniviual sensors monitor the environment an report their information to the CHs. When TDMA is use within clusters, each SN reports to its corresponing CH a ata message in its allotte time slot. In orer to minimize the interference between clusters (inter-cluster interference), Direct Sequence Sprea Spectrum (DSSS) can be use, where the noes of the ifferent clusters use ifferent spreaing coes [7]. Also, ata transmissions from SNs to CHs, between CHs, from CHs to the MA, an from the CCH to the MA are mae over ifferent frequencies to avoi interference between the ifferent communication links. CHs route the sensing information to the MA through their establishe links with the CCH or any noe in χ. When the MA visits a region, it sens a beacon signal to the CHs within its coverage area. If a CH receives the beacon signal, then it can respon irectly by sening its ata to the MA. If the ata is receive correctly, the MA respons with an ACK. It

4 is note that the ata a CH sens to the MA can be information from its own cluster members, or from other clusters that relay their ata through it. C. Malicious Noe Detection When the MA receives ata from a noe, it first authenticates the source an checks its ientity. If the noe passes the authentication proceure, its ata woul be use in the final ecision making process. Some authenticate sensors can be compromise an may report fictitious ata. This is known as Byzantine attacks [5]. The MA shoul be able to etect these malicious noes an avoi their harmful effect. One way to etect compromise noes is to use a reliable ata fusion scheme [5], on the information collecte from many sensors, an obtain the final ecision. The MA monitors the reports of each iniviual noe an compares it with the final ecision obtaine by the ata fusion. Base on the observations over several sensing perios, the malicious noes can be etecte an remove. V. THE NETWORK TOPOLOGY DESIGN In this section, we obtain the optimal raius R o an the ring raius that minimize the require number of hops from any CH to the MA. Define θ as the smaller angle between the MA position an the CH on the ring that first receive the ata; the PDF of θ is f θ (θ) = 1 π. Assume that two cluster heas separate by a istance can communicate irectly. Then, for a given θ, routing along the ring requires θr approximately t hops to reach the RCH. While, the R routing from the ring to the CCH requires t hops. Therefore, to minimize the number of hops for noes outsie the ring, the routing over the ring is mae uner the conition that θ < 1, i.e., θ < If this conition is not satisfie, noes reach the MA mainly through the CCH. Noes in the region between R o an route their ata through the ring if θ Rt x < x. That is, if θ < x 1, the noes at istance R o x< route their ata to the RCH. Otherwise, they route the ata to the CCH. We assume that CHs along the ring can estimate θ from the beacon signal they receive. The RCH notifies the noes in the region between R o an that are connecte to it. If the noes in this region o not receive a notification from the RCH, then they forwar their ata to the CCH. Let N hops be the average number of hops require to route the ata from any CH in the network to the CH that can establish irect communication with the MA, i.e., the CCH or the RCH. Note that the number of hops to reach the MA is N = N hops 1. N hops is given by: N hops = 1 Rt [ Ro 0 π x=r o θ= R x 1 t x 1 Rt x=r o θ=0 xf X(x)x xf X(x)f θ (θ)θx ( x θ) f X(x)f θ (θ)θx π x= θ=1 1 x= θ=0 xf X(x)f θ (θ)θx ] (x θ) f X(x)f θ (θ)θx,(1) where x is the istance from any CH to the center of the cell, f X (x) is the PDF of x an can be approximate by f X (x) = x assuming that the CHs are uniformly istribute in a circle of raius. By setting N hops R o =0, we obtain the optimal R o =0.5. Then, we substitute in (1) with the optimal R o, an obtain the optimal by setting N hops =0. We get =0.686 ; it then follows that R o = Proposition: To minimize the ata collection elay in MC- WSN, the following conitions shoul be met. (1) The CHs within a istance R o =0.343 from the center of the cell eliver their ata to the MA through the CCH. () Noes at a istance x from CCH, where R o x<, eliver their ata to the MA through the ring if θ < x 1, or through the CCH if θ > x 1. (3) Other noes at a istance x from the CCH, eliver their ata to the MA through the ring if θ < 1, or through the CCH if θ > 1. The ring raius is = The elay is proportional to the number of hops require for routing the ata to the MA. The average istance travele corresponing to N hops is N hops ; therefore, the elay in packet elivery is N hops V EM, where V EM = m/s is the electromagnetic wave (EM) propagation spee. VI. NUMERICAL RESULTS Example 1: Delay comparisons For elay calculations, we assume that there are no collisions or retransmissions. We also assume that each SN reaches its nearest CH in one hop, which can be ensure with the active network eployment, an the number of hops from the RCH or CCH to the MA is one. Therefore, we use the number of hops to reach the RCH or the CCH as an inication of the elay. To show the effectiveness of our propose architecture, we compare two topologies: (a) Topology 1: all noes in the cell use the CCH to eliver their ata to the MA. (b) Topology : both the CCH an the RCH are employe to eliver the ata to the MA. For topology 1, let N hops,1 be the average number of hops for a CH to reach the CCH. Then, N hops,1 = x 0 f X (x)x = 3R CH. For topology, the number of hops is obtaine using (1). By substituting with =0.686, we get N hops, = N hops =0.97 R CH. Comparing N hops, with N hops,1, it can be seen that lower elay can be achieve with the propose topology (topology ). This is further illustrate in Figure 3, where the number of hops is plotte versus for both topologies. The elay in ata elivery ( ) can be expresse as: = C 1 V EM, where C 1 is a constant. In SENMA, the SNs wait for the MA visit to report their ata; hence, the elay epens on the velocity of the MA, as well as the cell size; that is, the average elay for a noe to report its ata to the MA in SENMA is D S = C V MA [1], where V MA is the MA spee

5 an C is a constant. Therefore, we have D S = C V EM V MA, where C is a constant. This implies that the propose MC- WSN architecture coul result in several orers of magnitue lower elay over SENMA. The elay reuction is proportional to the ratio between the spee of light (EM spee) an the physical spee of the MA. Table I shows the elay ratio D S for ifferent cell sizes. TABLE I DELAY COMPARISON WITH V MA =30m/s. Energy (J/bit) 6 x MC WSN SENMA Cell ege length (m): D Delay ratio: S D S : Average elay in SENMA, : Average elay in MC-WSN. Average number of hops CCH only Ring an CCH (m) Fig. 3. The average number of hops in the cases when the communication with the MA is establishe through the CCH only (N hops,1 ), an both the CCH an the ring (N hops, ). Here we use R CH =10m. Example : Energy efficiency We focus on the energy issipate in the iniviual SNs, since they have the most limite resources. We use the circuitry raio energy issipation moel to evaluate the energy efficiency [7]. We assume that the raius of the cluster is R CH = r c. Let E tx an E rx be the energy issipate in the transmitter an receiver electronics of the SNs, respectively. Then, in MC-WSN, the maximum energy issipate in SN to transmit a bit to the CH is E SN,M = E tx ϵ pa rc γ (J/bit), where ϵ pa is the energy consume by the power amplifier, γ is the path loss exponent. In SENMA, each SN must first receive a beacon signal from the MA in orer to report its ata. Therefore, the energy issipate by a noe to report a single bit to the MA is E SN,S = E tx ϵ pa H γ S E rxπr K SN A c [1], where A c is the area of the cell. Figure 4 shows E SN,M an E SN,S as the number of sensor noes increases. It can be seen from the figure that the MC-WSN is significantly more energy-efficient than SENMA, especially when the ensity of the sensors increases. It shoul be note that energy issipation in the CHs an MAs are ignore here. However, if their energy issipation is taken into account, the MC-WSN woul still be more efficient than SENMA architecture; since in SENMA, the MA is assume to traverse the network continuously leaing to a very high energy consumption Number of sensors K SN x 10 4 Fig. 4. The energy issipation (J/bit) vs. the number of SNs in the MC-WSN an SENMA networks, when =100m, r c = r =10m, H S =10m, γ =, E tx = E rx =50pJ/bit an ϵ =10pJ/bit/m VII. CONCLUSIONS In this paper, we propose a reliable an energy-efficient architecture esign for mobile access coorinate wireless sensor networks (MC-WSN). In the propose architecture, the network exploits the mobile access points to actively eploy noes, perform ata collection, etect malicious sensors an enhance the network security. Not only oes the MC-WSN resolve the network eployment problem, but it also prolongs the network lifetime actively an provies an efficient framework for time-sensitive information exchange. Simulation results showe that the propose MC-WSN architecture can achieve higher energy efficiency an several orers of magnitue lower elay over SENMA. The gains achieve by the propose architecture increase as the network size increases. REFERENCES [1] G. Mergen, Z. Qing, an L. Tong, Sensor networks with mobile access: Energy an capacity consierations, IEEE Transactions on Communications,, vol. 54, no. 11, pp , Nov [] A. Poornima an B. Amberker, Agent base secure ata collection in heterogeneous sensor networks, 010 Secon International Conference on Machine Learning an Computing (ICMLC), pp , Feb [3] I. Maza, F. Caballero, J. Capitan, J. Martinez-e Dios, an A. Ollero, A istribute architecture for a robotic platform with aerial sensor transportation an self-eployment capabilities, Journal of Fiel Robotics, vol. 8, no. 3, pp , 011. [Online]. Available: [4] P. Corke, S. Hrabar, R. Peterson, D. Rus, S. Saripalli, an G. Sukhatme, Autonomous eployment an repair of a sensor network using an unmanne aerial vehicle, IEEE International Conference on Robotics an Automation, ICRA 04, vol. 4, pp Vol.4, 6-May 1, 004. [5] M. Abelhakim, L. Lightfoot, an T. Li, Reliable ata fusion in wireless sensor networks uner byzantine attacks, IEEE Military Communications Conference, MILCOM, Nov [6] J. Ren, Y. Li, an T. Li, Spm: Source privacy for mobile a hoc networks, EURASIP J. Wireless Comm. an Networking, 010. [7] W. Heinzelman, A. Chanrakasan, an H. Balakrishnan, An applicationspecific protocol architecture for wireless microsensor networks, IEEE Transactions on Wireless Communications, vol. 1, no. 4, pp , Oct. 00.

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach Nishi Sharma, Vanna Verma Abstract Wireless sensor networks (WSNs) is one of the emerging fiel of research in recent era

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun

More information

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA Internet mobility TCP over noisy links

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA Internet mobility TCP over noisy links Overview 15-441 15-441: Computer Networking 15-641 Lecture 24: Wireless Eric Anerson Fall 2014 www.cs.cmu.eu/~prs/15-441-f14 Internet mobility TCP over noisy links Link layer challenges an WiFi Cellular

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

within unicast packets that are organized into multicast data when they reach their destination. I.INTRODUCTION

within unicast packets that are organized into multicast data when they reach their destination. I.INTRODUCTION ISSN XXXX XXXX 2016 IJESC Research Article Volume 6 Issue No.10 Mobile Synchronized Wireless Sensor Network: An Energy Efficient Data Transmission Using DVMRP N. Renga Veni 1, T.Samraj Lawrence 2, J.Jevin

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 0 0 0 0 0 0 0 0 on-uniform Sensor Deployment in Mobile Wireless Sensor etworks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University Boca Raton,

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita

More information

Module13:Interference-I Lecture 13: Interference-I

Module13:Interference-I Lecture 13: Interference-I Moule3:Interference-I Lecture 3: Interference-I Consier a situation where we superpose two waves. Naively, we woul expect the intensity (energy ensity or flux) of the resultant to be the sum of the iniviual

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 34, NO. 5, MAY

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 34, NO. 5, MAY IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 34, NO. 5, MAY 2016 1663 Mobile Coordinated Wireless Sensor Networ: An Energy Efficient Scheme for Real-Time Transmissions Mai Abdelhaim, Member,

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

A Metric for Routing in Delay-Sensitive Wireless Sensor Networks

A Metric for Routing in Delay-Sensitive Wireless Sensor Networks A Metric for Routing in Delay-Sensitive Wireless Sensor Networks Zhen Jiang Jie Wu Risa Ito Dept. of Computer Sci. Dept. of Computer & Info. Sciences Dept. of Computer Sci. West Chester University Temple

More information

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

PAPER. 1. Introduction

PAPER. 1. Introduction IEICE TRANS. COMMUN., VOL. E9x-B, No.8 AUGUST 2010 PAPER Integrating Overlay Protocols for Proviing Autonomic Services in Mobile A-hoc Networks Panagiotis Gouvas, IEICE Stuent member, Anastasios Zafeiropoulos,,

More information

Interference and diffraction are the important phenomena that distinguish. Interference and Diffraction

Interference and diffraction are the important phenomena that distinguish. Interference and Diffraction C H A P T E R 33 Interference an Diffraction 33- Phase Difference an Coherence 33-2 Interference in Thin Films 33-3 Two-Slit Interference Pattern 33-4 Diffraction Pattern of a Single Slit * 33-5 Using

More information

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance International Journal of Moern Communication Technologies & Research (IJMCTR) Impact of FTP Application file size an TCP Variants on MANET Protocols Performance Abelmuti Ahme Abbasher Ali, Dr.Amin Babkir

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Supporting Fully Adaptive Routing in InfiniBand Networks

Supporting Fully Adaptive Routing in InfiniBand Networks XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar

More information

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks Hinawi Publishing Corporation International Journal of Distribute Sensor Networks Volume 2014, Article ID 936379, 17 pages http://x.oi.org/10.1155/2014/936379 Research Article REALFLOW: Reliable Real-Time

More information

Estimating Velocity Fields on a Freeway from Low Resolution Video

Estimating Velocity Fields on a Freeway from Low Resolution Video Estimating Velocity Fiels on a Freeway from Low Resolution Vieo Young Cho Department of Statistics University of California, Berkeley Berkeley, CA 94720-3860 Email: young@stat.berkeley.eu John Rice Department

More information

A Framework for Dialogue Detection in Movies

A Framework for Dialogue Detection in Movies A Framework for Dialogue Detection in Movies Margarita Kotti, Constantine Kotropoulos, Bartosz Ziólko, Ioannis Pitas, an Vassiliki Moschou Department of Informatics, Aristotle University of Thessaloniki

More information

Classical Mechanics Examples (Lagrange Multipliers)

Classical Mechanics Examples (Lagrange Multipliers) Classical Mechanics Examples (Lagrange Multipliers) Dipan Kumar Ghosh Physics Department, Inian Institute of Technology Bombay Powai, Mumbai 400076 September 3, 015 1 Introuction We have seen that the

More information

1 Surprises in high dimensions

1 Surprises in high dimensions 1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Two Dimensional-IP Routing

Two Dimensional-IP Routing Two Dimensional-IP Routing Mingwei Xu Shu Yang Dan Wang Hong Kong Polytechnic University Jianping Wu Abstract Traitional IP networks use single-path routing, an make forwaring ecisions base on estination

More information

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose

More information

A T-Step Ahead Constrained Optimal Target Detection Algorithm for a Multi Sensor Surveillance System

A T-Step Ahead Constrained Optimal Target Detection Algorithm for a Multi Sensor Surveillance System A T-Step Ahea Constraine Optimal Target Detection Algorithm for a Multi Sensor Surveillance System K Mahava Krishna Henry Hexmoor an Shravan Sogani International Institute of Information Technology CSCE

More information

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic WLAN Inoor Positioning Base on Eucliean Distances an Fuzzy Logic Anreas TEUBER, Bern EISSFELLER Institute of Geoesy an Navigation, University FAF, Munich, Germany, e-mail: (anreas.teuber, bern.eissfeller)@unibw.e

More information

AN INVESTIGATION OF FOCUSING AND ANGULAR TECHNIQUES FOR VOLUMETRIC IMAGES BY USING THE 2D CIRCULAR ULTRASONIC PHASED ARRAY

AN INVESTIGATION OF FOCUSING AND ANGULAR TECHNIQUES FOR VOLUMETRIC IMAGES BY USING THE 2D CIRCULAR ULTRASONIC PHASED ARRAY AN INVESTIGATION OF FOCUSING AND ANGULAR TECHNIQUES FOR VOLUMETRIC IMAGES BY USING THE D CIRCULAR ULTRASONIC PHASED ARRAY S. Monal Lonon South Bank University; Engineering an Design 103 Borough Roa, Lonon

More information

Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks

Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks Xinxin Liu, Han Zhao, Xin Yang Computer & Information Science & Eng. University of Floria Email:{xinxin,han,xin}@cise.ufl.eu

More information

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks Coorinating Distribute Algorithms for Feature Extraction Offloaing in Multi-Camera Visual Sensor Networks Emil Eriksson, György Dán, Viktoria Foor School of Electrical Engineering, KTH Royal Institute

More information

Calculation on diffraction aperture of cube corner retroreflector

Calculation on diffraction aperture of cube corner retroreflector November 10, 008 / Vol., No. 11 / CHINESE OPTICS LETTERS 8 Calculation on iffraction aperture of cube corner retroreflector Song Li (Ó Ø, Bei Tang (», an Hui Zhou ( ï School of Electronic Information,

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

A Plane Tracker for AEC-automation Applications

A Plane Tracker for AEC-automation Applications A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)

More information

MODULE VII. Emerging Technologies

MODULE VII. Emerging Technologies MODULE VII Emerging Technologies Computer Networks an Internets -- Moule 7 1 Spring, 2014 Copyright 2014. All rights reserve. Topics Software Define Networking The Internet Of Things Other trens in networking

More information

MODULE V. Internetworking: Concepts, Addressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, And End-To-End Services

MODULE V. Internetworking: Concepts, Addressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, And End-To-End Services MODULE V Internetworking: Concepts, Aressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, An En-To-En Services Computer Networks an Internets -- Moule 5 1 Spring, 2014 Copyright

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Cascading Multi-Hop Reservation and Transmission in Underwater Acoustic Sensor Networks

Cascading Multi-Hop Reservation and Transmission in Underwater Acoustic Sensor Networks Sensors 2014, 14, 18390-18409; oi:10.3390/s141018390 Article OPEN ACCESS sensors ISSN 1424-8220 www.mpi.com/journal/sensors Cascaing Multi-Hop Reservation an Transmission in Unerwater Acoustic Sensor Networks

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Figure 1: Schematic of an SEM [source: ]

Figure 1: Schematic of an SEM [source:   ] EECI Course: -9 May 1 by R. Sanfelice Hybri Control Systems Eelco van Horssen E.P.v.Horssen@tue.nl Project: Scanning Electron Microscopy Introuction In Scanning Electron Microscopy (SEM) a (bunle) beam

More information

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks Vol. 5, No. 5, 214 Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks MOSTAFA BAGHOURI SAAD CHAKKOR ABDERRAHMANE HAJRAOUI Abstract Ameliorating

More information

Ad-Hoc Networks Beyond Unit Disk Graphs

Ad-Hoc Networks Beyond Unit Disk Graphs A-Hoc Networks Beyon Unit Disk Graphs Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 8092 Zurich, Switzerlan {kuhn, wattenhofer, zollinger}@inf.ethz.ch ABSTRACT

More information

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients Probabilistic Meium Access Control for 1 Full-Duplex Networks with Half-Duplex Clients arxiv:1608.08729v1 [cs.ni] 31 Aug 2016 Shih-Ying Chen, Ting-Feng Huang, Kate Ching-Ju Lin, Member, IEEE, Y.-W. Peter

More information

Topics. Computer Networks and Internets -- Module 5 2 Spring, Copyright All rights reserved.

Topics. Computer Networks and Internets -- Module 5 2 Spring, Copyright All rights reserved. Topics Internet concept an architecture Internet aressing Internet Protocol packets (atagrams) Datagram forwaring Aress resolution Error reporting mechanism Configuration Network aress translation Computer

More information

Comparison of Wireless Network Simulators with Multihop Wireless Network Testbed in Corridor Environment

Comparison of Wireless Network Simulators with Multihop Wireless Network Testbed in Corridor Environment Comparison of Wireless Network Simulators with Multihop Wireless Network Testbe in Corrior Environment Rabiullah Khattak, Anna Chaltseva, Laurynas Riliskis, Ulf Boin, an Evgeny Osipov Department of Computer

More information

Digital fringe profilometry based on triangular fringe patterns and spatial shift estimation

Digital fringe profilometry based on triangular fringe patterns and spatial shift estimation University of Wollongong Research Online Faculty of Engineering an Information Sciences - Papers: Part A Faculty of Engineering an Information Sciences 4 Digital fringe profilometry base on triangular

More information

PART 2. Organization Of An Operating System

PART 2. Organization Of An Operating System PART 2 Organization Of An Operating System CS 503 - PART 2 1 2010 Services An OS Supplies Support for concurrent execution Facilities for process synchronization Inter-process communication mechanisms

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Efficient Recovery from False State in Distributed Routing Algorithms

Efficient Recovery from False State in Distributed Routing Algorithms Efficient Recovery from False State in Distribute Routing Algorithms Daniel Gyllstrom, Suarshan Vasuevan, Jim Kurose, Gerome Milau Department of Computer Science University of Massachusetts Amherst {pg,

More information

Enabling Rollback Support in IT Change Management Systems

Enabling Rollback Support in IT Change Management Systems Enabling Rollback Support in IT Change Management Systems Guilherme Sperb Machao, Fábio Fabian Daitx, Weverton Luis a Costa Coreiro, Cristiano Bonato Both, Luciano Paschoal Gaspary, Lisanro Zambeneetti

More information

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stolyar Abstract Backpressure-base aaptive routing

More information

Multicast Routing : Computer Networking. Example Applications. Overview

Multicast Routing : Computer Networking. Example Applications. Overview Multicast outing 5-744: Computer Networking Unicast: one source to one estination Multicast: one source to many estinations Two main functions: Efficient ata istribution Logical naming of a group L-0 Multicast

More information

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network Volume 118 No. 7 2018, 501-505 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu CASER Protocol Using DCFN Mechanism in Wireless Sensor Network A.Shirly

More information

Secure Network Coding for Distributed Secret Sharing with Low Communication Cost

Secure Network Coding for Distributed Secret Sharing with Low Communication Cost Secure Network Coing for Distribute Secret Sharing with Low Communication Cost Nihar B. Shah, K. V. Rashmi an Kannan Ramchanran, Fellow, IEEE Abstract Shamir s (n,k) threshol secret sharing is an important

More information

Optimal path planning in a constant wind with a bounded turning rate

Optimal path planning in a constant wind with a bounded turning rate Optimal path planning in a constant win with a boune turning rate Timothy G. McGee, Stephen Spry an J. Karl Herick Center for Collaborative Control of Unmanne Vehicles, University of California, Berkeley,

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

Chapter 5 Proposed models for reconstituting/ adapting three stereoscopes

Chapter 5 Proposed models for reconstituting/ adapting three stereoscopes Chapter 5 Propose moels for reconstituting/ aapting three stereoscopes - 89 - 5. Propose moels for reconstituting/aapting three stereoscopes This chapter offers three contributions in the Stereoscopy area,

More information

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA Preprint, August 5, 2018. 1 All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA Mikhail Ivanov, Frerik Brännström, Alexanre Graell i Amat, an Petar Popovski Department of Signals an Systems,

More information

Navigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar

Navigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar Navigation Aroun an nknown Obstacle for Autonomous Surface Vehicles sing a Forwar-Facing Sonar Patrick A. Plonski, Joshua Vaner Hook, Cheng Peng, Narges Noori, Volkan Isler Abstract A robotic boat is moving

More information

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which

More information

A Cost Model For Nearest Neighbor Search. High-Dimensional Data Space

A Cost Model For Nearest Neighbor Search. High-Dimensional Data Space A Cost Moel For Nearest Neighbor Search in High-Dimensional Data Space Stefan Berchtol University of Munich Germany berchtol@informatikuni-muenchene Daniel A Keim University of Munich Germany keim@informatikuni-muenchene

More information

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks Optimal Routing an Scheuling for Deterministic Delay Tolerant Networks Davi Hay Dipartimento i Elettronica olitecnico i Torino, Italy Email: hay@tlc.polito.it aolo Giaccone Dipartimento i Elettronica olitecnico

More information

Robust Camera Calibration for an Autonomous Underwater Vehicle

Robust Camera Calibration for an Autonomous Underwater Vehicle obust Camera Calibration for an Autonomous Unerwater Vehicle Matthew Bryant, Davi Wettergreen *, Samer Aballah, Alexaner Zelinsky obotic Systems Laboratory Department of Engineering, FEIT Department of

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

A Hybrid Routing Algorithm for Delay Tolerant Networks

A Hybrid Routing Algorithm for Delay Tolerant Networks Sensors & Transucers 2013 by IFSA http://www.sensorsportal.com A Hybri Routing Algorithm for Delay Tolerant Networs Jianbo LI, Jixing XU, Lei YOU, Chenqu DAI, Jieheng WU Information Engineering College

More information

Waleed K. Al-Assadi. Anura P. Jayasumana. Yashwant K. Malaiya y. February Colorado State University

Waleed K. Al-Assadi. Anura P. Jayasumana. Yashwant K. Malaiya y. February Colorado State University Dierential I DDQ Testable Static RAM Architecture Walee K. Al-Assai Anura P. Jayasumana Yashwant K. Malaiya y Technical Report CS-96-102 February 1996 Department of Electrical Engineering/ y Department

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Characterizing Decoding Robustness under Parametric Channel Uncertainty

Characterizing Decoding Robustness under Parametric Channel Uncertainty Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric

More information

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:

More information

An Infrastructureless End-to-End High Performance Mobility Protocol

An Infrastructureless End-to-End High Performance Mobility Protocol Proceeings of the 5 IEEE International Conference on Electro Information Technology, 5, Lincoln Nebraska, May 5 An Infrastructureless En-to-En High Performance Mobility Protocol Saneep Davu, Rai Y. Zaghal

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,

More information

0607 CAMBRIDGE INTERNATIONAL MATHEMATICS

0607 CAMBRIDGE INTERNATIONAL MATHEMATICS CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Seconary Eucation MARK SCHEME for the May/June 03 series 0607 CAMBRIDGE INTERNATIONAL MATHEMATICS 0607/4 Paper 4 (Extene), maximum

More information

Fast Window Based Stereo Matching for 3D Scene Reconstruction

Fast Window Based Stereo Matching for 3D Scene Reconstruction The International Arab Journal of Information Technology, Vol. 0, No. 3, May 203 209 Fast Winow Base Stereo Matching for 3D Scene Reconstruction Mohamma Mozammel Chowhury an Mohamma AL-Amin Bhuiyan Department

More information

I DT MC. Operating Manual SINAMICS S120. Verification of Performance Level e in accordance with EN ISO

I DT MC. Operating Manual SINAMICS S120. Verification of Performance Level e in accordance with EN ISO I DT MC Operating Manual SINAMICS S20 Verification of Performance Level e in accorance with EN ISO 3849- Document Project Status: release Organization: I DT MC Baseline:.2 Location: Erl. F80 Date: 24.09.2009

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body International Engineering Mathematics Volume 04, Article ID 46593, 7 pages http://x.oi.org/0.55/04/46593 Research Article Invisci Uniform Shear Flow past a Smooth Concave Boy Abullah Mura Department of

More information

Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks

Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks Qiaoqin Li 12, Mei Yang 1, Hongyan Wang 1, Yingtao Jiang 1, Jiazhi Zeng 2 1 Department

More information

0607 CAMBRIDGE INTERNATIONAL MATHEMATICS

0607 CAMBRIDGE INTERNATIONAL MATHEMATICS PAPA CAMBRIDGE CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Seconary Eucation MARK SCHEME for the May/June 0 series CAMBRIDGE INTERNATIONAL MATHEMATICS /4 4 (Extene), maximum

More information