Improving the Connectivity of Heterogeneous Multi-Hop Wireless Networks

Size: px
Start display at page:

Download "Improving the Connectivity of Heterogeneous Multi-Hop Wireless Networks"

Transcription

1 Improving the Connectivity of Heterogeneous Multi-Hop Wireless Networks Te-Hoon Kim, Dvid Tipper, nd Prshnt Krishnmurthy Grdute Networking nd Telecommunictions Progrm University of Pittsburgh, Pittsburgh PA, USA Emil: tk11@pitt.edu, {dtipper, prshnt}@sis.pitt.edu Abstrct Heterogeneous conditions cn occur in multi-hop wireless networks due to vriety of fctors such s vritions in trnsmission power nd signl propgtion environments. Directed links cn occur when the environment nd/or the nodes re heterogeneous. In this pper, we exmine the network connectivity for heterogeneous multi-hop wireless networks nd propose n lgorithm to identify the connectivity of the network. We follow this with numericl study of the connectivity in rndom topologies. Lstly, we propose two schemes for constructing dditionl links to enhnce the connectivity of the network. Our proposed schemes identify the links to be improved or creted vi cluster bsed pproch. Index Terms Connectivity, heterogeneous multi-hop wireless networks I. INTRODUCTION Multi-hop wireless networks re expected to become n importnt prt of the communictions lndscpe. Exmples include wireless mesh networks (WMNs) [1], vehiculr d-hoc networks (VANETs) [2], nd mobile d-hoc networks (MANETs) [3]. In multi-hop wireless networks, the nodes must cooperte to dynmiclly estblish routes using wireless links nd routes my involve multiple hops with ech node cting s router. In mny multi-hop network scenrios the nodes cn move rbitrrily or the interference cn chnge dynmiclly resulting in topology chnges. Multi-hop wireless networks lso inherit the trditionl problems of wireless communictions, which when combined with mobility nd lck of infrstructure mkes their design nd development chllenging [1-3]. A bsic problem in mny multi-hop wireless networks is mintining connectivity. A network is connected if ll nodes hve communiction pth to ech other. Similrly, network is k-connected if there re k-disjoint pths between every pir of nodes. Mintining connectivity is difficult due to the unstructured nture of the topology nd the occurrence of link nd node filures due to interference, mobility, rdio chnnel effects nd bttery life [1-3]. Mny reserchers hve studied multi-hop wireless network connectivity determining conditions under which connectivity [3, 8] nd k-connectivity [9-11] cn be inferred probbilisticlly or ssured symptoticlly. The focus hs lrgely been on wht combintion of node density nd power rnge re required to provide k-node connectivity in specific deployment scenrio for homogenous network. A mjor wekness of this work is the ssumption of homogeneous () Different Tx power levels (b) Non-uniform Tx rnge Fig. 1. Directionl links in heterogeneous wireless networks network context where nodes hve identicl properties nd inhbit uniform environment (e.g., identicl trnsmission power, bttery life, rdio propgtion rnges, ntenns, etc.). Mesurement studies [12] hve shown tht mny of the ssumptions in the homogeneous context re inccurte. In prticulr it ws noted tht rel networks cn hve directionl links. For exmple, if ech node hs different trnsmission power, then their trnsmission rnge differs nd directionl link cn result s shown in Figure 1(). Similrly, in Figure 1(b) directionl link results from nodes hving non-identicl signl propgtion due to differences in the locl environment (e.g., trees, buildings, etc.). In this pper, we look t how one cn develop techniques to improve the connectivity of sprse heterogeneous multi-hop wireless networks without incresing the node density. Our pproch is to determine the topologicl connectivity criticl points tht need to be improved to ttin/mintin t lest 1-connectivity. We propose novel lgorithm for determining the connectivity bsed on results from lgebric grph theory. Using the criticl points identified by our connectivity lgorithm, we propose two techniques to improve the connectivity of the network by djusting the trnsmission power of nodes round criticl point in order to crete dditionl links in the network. The rest of the pper is orgnized s follows. In Section II, we propose n lgorithm to determine the connectivity of heterogeneous networks. Numericl results utilizing the proposed lgorithm to study the effects of network density on the connectivity re given. Then, we propose two network link modifiction schemes in Section III to improve the network connectivity without chnging the node density. Simultion results illustrting the effectiveness nd trdeoffs of the proposed connectivity improvement schemes re lso given. Lstly, we present our conclusions in Section IV.

2 A C E G B D F H () 1-Connected (b) Disconnected Fig. 2. Smple 8 node heterogeneous network topologies () Adjusted 1-Connected (b) Adjusted Disconnected Fig. 3. Adjusted network topologies corresponding to Fig. 2 II. HETEROGENEOUS NETWORK CONNECTIVITY A distinguishing chrcteristic of homogeneous networks is tht the set of multi-hop pths between pir of nodes re the sme in ech direction, while this my not be the cse in heterogeneous network. For exmple, in the network of Figure 2 (), the pth from node A to H is A C D F H wheres the pth from H to A is H G E C D B A (i.e., PATH A H PATH H A ). Another effect of directed links in the topology is tht communictions my be one wy. For exmple in the network of Figure 2 (b), nodes A, B, C, nd D cn receive dt from E, F, G, nd H through the links E C nd F D. However, the opposite direction is not vilble such tht A, B, C, or D, cn communicte with E, F, G, or H. Given tht directionl links cn occur in heterogeneous networks we define the connectivity between pir of nodes s requiring tht they be bi-communicble. Specificlly we hve the following. Definition 1. Bi-communicble: A pir of nodes is bi-communicble if nd only if both nodes cn receive informtion from ech other. Note tht bi-communicble doesn t require tht pths between the nodes in question hve the sme set of intermedite nodes. This definition indictes tht node i nd j re connected if nd only if node i cn receive dt sent by j nd vice vers. Bsed on this connectivity definition, we introduce modified definition of link between two nodes in network. Definition 2. Vlid Link: A pir of nodes i nd j hve vlid link if nd only if direct link exists in both directions or t lest one direct link in either direction exists nd t lest one multi-hop pth in the other direction is vilble. Bsed on Definitions 1 nd 2 we define prtition of the network s follows. Definition 3. Prtitioned Network: A network is considered prtitioned if one or more nodes do not hve bi-directionl connectivity to the rest of the nodes in the network. Hence network is 1-connected if nd only if ll pirs of nodes hve t lest one pth between them in both directions. Here we propose n lgorithm for network node to test the overll connectivity of the topology when directed links exist in the network. A. Connectivity Test Consider n rbitrry multi-hop wireless network of N nodes. Let G = (V, E), be the grph of the topology where V is the set of nodes nd E is the set of links. The grph G cn be represented by the N x N djcency mtrix A( t time t, 11( = 21( A( M N1( N1 M L L L 1N 2 N NN M (1) where 1,,. The link connectivity ij ( between two nodes depends on their rdio rnge nd cn be determined by nodes loclly through the exchnge of ``Hello or probing pckets. For now we ssume homogeneous network scenrio where ll links re bidirectionl (i.e., ij (=1 ji (=1). Thus, A( is symmetric mtrix. Let d i ( denote the degree of node i N t time t (i.e., d i ( equls the number of neighbor nodes of i). We define D s the digonl mtrix consisting of the degree of ech node (i.e., D( = dig(d i ()). The Lplcin mtrix L( of grph is defined in terms of the djcency mtrix A( nd nodl degree mtrix D( s L = D( A(. (2) The eigenvlues λ = [λ 1, λ 2,... λ Ν ] of L( form the Lplcin spectrum of the grph. The eigenvlues λ nd their ssocited eigenvectors X = [x 1, x 2, x N ] cn be computed from L λ using number of well known efficient numericl methods. In lgebric grph theory [13] it hs been shown tht zero is lwys n eigenvlue of L nd the number of zero eigenvlues is equl to the number of connected components of the network N CL. Thus the network is connected (i.e., t lest 1-connectivity) if the Lplcin mtrix of the topology hs single zero eigenvlue (i.e., if second smllest eigenvlue is positive N CL = 1). Here we pply this result in constructing test for connectivity in heterogeneous multi-hop wireless networks. The djcent mtrix cn be obtined by use of the topology informtion periodiclly gthering by proctive routing protocol or rective routing protocol tht exchnge locl connectivity periodiclly. The possible existence of directed links in the topology mens tht one cn not directly pply the result. In order to force the djcency mtrix A( to hve symmetric form we pply Definition 2 bove in determining the link connectivity. Specificlly, we require ll links to be vlid links nd modify the link connectivity in logiclly djusted topology djcency mtrix to reflect this. For exmple, the smple topologies of Figure 2 fter djustment will hve the corresponding logicl topologies shown in Figure 3. Note, tht fter djustment of the network topology the resulting is symmetric nd one cn pply test on the Lplcin eigenvlues to determine the network connectivity. The connectivity test procedure is given in lgorithmic form below. Heterogeneous Connectivity Test Algorithm (h-cta) Step 1 : Identify ny directed links in the topology from the djcency mtrix A(. If none, set = A( nd go to step 3. Step 2 : Form djusted djcency mtrix contining only vlid links. Specificlly, for ech link i j such tht ij ji,

3 , 1 1, 1 Otherwise, where is the djusted djcent mtrix. Step 3 : Compute the eigenvlues of the Lplcin mtrix L =, where is the degree mtrix corresponding to Step 4 : Determine the number of zero eigenvlues mong the Lplcin spectrum. If N CL = 1 then the network is connected, otherwise it is prtitioned into N CL components networks. For network of N nodes nd E links of which K re directed, it cn be shown tht the time complexity of h-cta is O(K(E+N logn)+n 2 ). The lgorithm cn be implemented t ny network node hving djcency mtrix informtion However, if the network is prtitioned ccording to Definition 3, ll nodes cnnot exchnge connectivity informtion. For exmple, in the network of Figure 2 (b) cluster 2 (i.e., CL 2 = { E, F, G, H}) cnnot receive connectivity informtion of cluster 1 (i.e., CL 1 = {A, B, C, D}) while cluster 1 cn receive nd obtin the connectivity informtion of cluster 2. Since the nodes in cluster 1 cn obtin the globl djcency informtion, ny node in cluster 1 cn execute h-cta to determine the overll connectivity. In Section III we show node with in cluster such s 1 in Figure 2(b) cn find which link should be improved so tht the cluster 2 cn receive the connectivity informtion of cluster 1. If there exists other wekly connected clusters, the cluster tht cn receive the most informtion cn do initite the h-cta procedure to determine which links need to be dded to provide connectivity. A network such s Figure 2(b) is termed wekly connected nd this is our focus in the pper. Once is found, k-connectivity my be lso exmined by the lgebric connectivity. However, it is out of scope in this pper. B. Numericl Study We utilized the h-cta lgorithm to study the connectivity of heterogeneous multi-hop wireless network topologies. Here we discuss typicl results for the cse of rndom topologies. Using the ns2 simultor, we generted rndom topologies with different number of nodes (i.e., 5, 75, nd 1) in network re of m 2. The nodes were independently distributed ccording to uniform [-15] rndom vrible in the network re. We dopted bseline prmeters from 82.11b equipment (i.e., verge trnsmit power P T = 15dBm, receiver sensitivity threshold P RSST = -9 dbm). The bsic trnsmission rnge ws determined using simple pth loss model dbm dbm 1 log (3) where α is the pth loss exponent nd d is the distnce between pir of nodes in meters. A pth loss exponent of α = ws used, which results in circulr coverge re with rdius 25 meters. A heterogeneous network ws creted by vrying either the trnsmission power or propgtion model for ech node or both fctors. Ech node i selects its trnsmission power P Ti ccording to uniform [13.5dBm dBm] rndom vrible. The resulting mximum trnsmission rnge R is uniform between 231m nd 27.5m. Non-uniform signl propgtion between nodes ws modeled using the Qusi-Unit Disk Grph (Q-UDG) model. In the Qusi-UDG model, link exists between two nodes if the inter-nodl distnce d is less thn βr, where R is the mximum trnsmission rnge of the node nd β is the Q-UDG fctor ( β 1). For distnces d greter thn R, there is no connectivity. However, for βr d R, the link will exist with probbility (R - d)/(r-βr). We selected different β prmeter vlues of.5,.75,.85 nd 1. to show how irregulr propgtion ffects the connectivity. Figure 4 shows 95% confidence intervls on the P(connected network) determined with h-cta versus the node density for two cses of node power ssignment: () homogenous with P Ti = 15dBm t ech node i nd (b) heterogeneous with P Ti drwn from uniform [13.5dBm dBm] rndom vrible for ech node. Ech point in Figure 4 is determined from 4 independent simultion runs. From Figure 4(), notice tht for the cse of homogeneous network (i.e., fixed P T = 15dBm, β = 1.) the network is connected (i.e., P(connected network) = 1) for ll node densities considered. In contrst, the P(connected network) is lmost zero for ll network densities for both homogeneous (4()) nd heterogeneous power ssignments (4(b)) when β =.5. This is becuse the verge trnsmission rnge is only meters. However, the network connectivity increses s β increses. For exmple, in Figure 4() the probbility of connectivity for 1 node network is estimted from the simultion s.43with β =.5,.226 with β =.75, P(Connected Network) () Rndom networks with homogeneous trnsmission power P(Connected Network) Rndom (β =.5) Rndom (β =.75) Rndom (β =.85) Rndom (β = 1.) Rndom (β =.5) Rndom (β =.75) Rndom (β =.85) Rndom (β = 1.) (b) Rndom networks with heterogeneous trnsmission power Fig. 4. Probbility of connectivity in rndom network topologies

4 nd.54 with β =.85. Similrly for fixed β the network connectivity increses with the node density, for exmple in Figure 4 () with β =.85, the probbility of connectivity is.63 t 5 nodes,.1145 t 75 nodes, nd.54 t 1 nodes. In compring homogeneous power ssignment with heterogeneous ssignment (i.e., 4() vs. 4(b)) we see tht only for the β = 1 cse does the power ssignment result in significnt difference in the connectivity. For the other vlues of β, the Q-UDG propgtion effect domintes nd the power ssignment hs little effect on the results (i.e., the confidence intervls on the results overlp). From Figure 4 one cn clerly see tht the connectivity in heterogeneous network is considerbly lower thn the homogenous cse no mtter wht the cuse of the heterogeneity. III. CONNECTIVITY IMPROVEMENT SCHEMES We propose schemes tht for n unconnected heterogeneous network identify the links whose ddition will connect the network. The pproch is bsed on identifying the isolted groups (i.e. clusters) of nodes nd determining the links required to connect between clusters. Consider network prtitioned into N CL wekly connected clusters (i.e., ech cluster hs t lest directed link to some other cluster). The Lplcin mtrix L with re-lbeled node IDs cn be written s where ech L k represents the Lplcin mtrix of connected cluster C k of nodes. There re N CL zeros in the eigenvlue set λ = [λ 1, λ 2,... λ Ν ] of L(. From the N CL eigenvectors x i ssocited with the zero eigenvlues one cn determine the nodes in ech cluster. Specificlly the nodes in cluster will hve non-zero vlues in the eigenvector ssocited with zero eigenvlue [15]. Once the sets of member nodes in ech isolted cluster re identified, cluster djcency mtrix, CL_A, cn be determined which represents how the clusters re symmetriclly connected. The cluster djcency mtrix cn be determined by: _ 1,, 1 (4), otherwise where CL i is nodes set of ech cluster i, nd A is the network djcency mtrix. The cluster djcency mtrix provides informtion bout which cluster needs to be connected to nother cluster to provide network connectivity. We propose two schemes to identify the links needed to reconnect the network bsed on given cost constrints: (1) Simple Merging Scheme (SMS) nd (2) Cost Optimized Merging Scheme (COMS). The link cost is the cost to improve the link so tht bi-communiction cn occur. Note tht vriety of techniques such s node movement, trnsmission power, directionl ntenn, nd etceter cn be used to dd link to the network. In this pper, we mnipulte the trnsmission power to improve the links in question nd the link cost constrint LC limit in terms of distnce is determined from the mximum trnsmission power together with the propgtion model. A. Simple Merging Scheme (SMS) The Simple Merging Scheme (SMS) tries to dd links until ech isolted cluster hs bi-directionl connection with it s neighbor clusters. The lgorithm finds the set of locl minimum cost links between n isolted cluster nd neighbor cluster using distnce informtion. Specificlly between ech pir of neighbor clusters SMS finds the minimum distnce links tht re within the mximum possible trnsmission rnge s determined by LC limit. The distnce between nodes in isolted clusters cn be obtined by Globl Positioning System (GPS) or locliztion techniques [14, 15]. SMS cn be implemented loclly by the cluster heds (nodes with directed link to nother cluster) in ech cluster. SMS cn be put in lgorithm form s below. Simple Merging Scheme (SMS) Step 1 : Perform h-cta to determine if the network is prtitioned, if Yes go to step 2, otherwise STOP. Step 2 : From the h-cta results determine the number of clusters N CL nd the node sets of ech cluster, C i, nd the cluster djcency mtrix CL_A. Step 3 : Find the set of minimum cost links between ech pir of isolted clusters,, ;,, where MLC ij is minimum cost link from cluster i to j nd LC(k,l) is the link cost between node k in cluster i nd l from cluster j. Exclude the existing links. Step 4 : Select the dequte links bsed on constrints such tht the link direction stisfying CL_ ij = nd MLC ij < LC limit. B. Cost Optimized Merging Scheme (COMS) In order to provide benchmrk comprison to SMS we developed the Cost Optimized Merging Scheme (COMS) which finds the set of globlly minimum cost links between isolted clusters, MLC = {for ll i nd j; MLC ij } while stisfying the cost constrint LC limit. This process is very time consuming since it hs to check every combintion of 2 1 links nd its computtion time is exponentil. Therefore, before solving the optimiztion problem we dd step to merge smll clusters with one node to the nerest lrger cluster. COMS cn be implemented in centrlized fshion t super node nd put in lgorithm form s follows. Cost Optimized Merging Scheme (COMS) Step 1 : Perform h-cta to determine if the network is prtitioned, if Yes go to step 2, otherwise STOP. Step 2 : From the h-cta results determine the number of clusters N CL nd the node sets of ech cluster, C i, nd the cluster djcency mtrix CL_A. Step 3 Merge the clusters with single member to the nerest bigger cluster. Add these links to n improvement required set of links. If this process resolves the prtition problem, STOP. Otherwise, go on step 4. Step 4 Find the minimum Totl Cost (TC) : 1, set of links to provide bi-communicble connectivity between to ll nodes. Step 5 : Add the set of links from step 4 into the set of links from step 2. () Originl clusters (b) COMS (c) SMS Fig. 5. Added links by SMS (RED) nd COMS (BLUE)

5 C. Comprison of Cluster Merging Schemes Figure 5 shows simple exmple illustrting the differences between SMS nd COMS. Figure 5 () shows the originl connections between the three clusters of network. The nodes in cluster C 3 cn obtin topology informtion from C 1 nd C 2 nd one cn initite COMS. Figure 5(b) shows the topologicl results of running the COMS lgorithm. Observe tht only single directed link is dded to provide bi-communicble connectivity to ll clusters. In contrst the topology fter running SMS is shown in Figure 5(c). Obviously SMS dds more links then COMS nd thus costs more but it hs the dvntges of being distributed nd mking the network more robust to filures. Note tht one node in C 2 nd one in C 3 will independently initite the SMS lgorithm. As more extensive, evlution nd comprison of SMS nd COMS, we conducted set of simultion bsed experiments similr to those reported in Section II B. Specificlly, using the ns2 simultor we generted rndom topologies with different node densities (i.e., 5, 75, nd 1) in network re of m 2. The nodes were independently distributed ccording to uniform [-15] rndom vrible in the re. We dopted bseline prmeters from 82.11b equipment (e.g., P RSST = -9 dbm). Heterogeneous conditions were creted by hving ech node i selects its trnsmission power P Ti ccording to uniform [13.5dBm dBm] rndom vrible nd creted non-uniform signl propgtion between nodes using the Qusi-Unit Disk Grph (Q-UDG) model with α = , β =.75 or β =.85. We rndomly generted topologies in this fshion until 5 wekly connected topologies were found for ech node density. For ech wekly connected topology both SMS nd COMS were implemented to improve the connectivity. We exmined three mximum node trnsmission powers constrints nmely: 2dBm, 25dBm, nd unlimited. In the unlimited power cse for COMS the power ws incresed to the minimum power required to provide the minimum cost links necessry for bi-communicble 1-connectivity. In the unlimited power cse for SMS, the power ws incresed until Averge number of directed links dded SMS (β =.75, Tx = 2dBm) COMS (β =.75, Tx = 2dBm) SMS (β =.75, Tx = 25dBm) COMS (β =.75, Tx = 25dBm) SMS (β =.75, Tx = Unlimited) COMS (β =.75, Tx = Unlimited) Averge number of directed links dded SMS (β =.85, Tx = 2dBm) COMS (β =.85, Tx = 2dBm) SMS (β =.85, Tx = 25dBm) COMS (β =.85, Tx = 25dBm) SMS (β =.85, Tx = Unlimited) COMS (β =.85, Tx = Unlimited) () Averge number of directed links dded for β =.75 (b) Averge number of directed links dded for β =.85 Averge number of hops in pths SMS (β =.75, Tx = 2dBm) COMS (β =.75, Tx = 2dBm) SMS (β =.75, Tx = 25dBm) 5.5 COMS (β =.75, Tx = 25dBm) SMS (β =.75, Tx = Unlimited) COMS (β =.75, Tx = Unlimited) Averge number of hops in pths SMS (β =.85, Tx = 2dBm) COMS (β =.85, Tx = 2dBm) SMS (β =.85, Tx = 25dBm) COMS (β =.85, Tx = 25dBm) SMS (β =.85, Tx = Unlimited) COMS (β =.85, Tx = Unlimited) (c) Averge number of hops in pths for β =.75 (d) Averge number of hops in pths for β =.85 Fig. 6. Comprison of SMS nd COMS in verge number of directed dding links nd hops in pths with 95% of confidence intervl

6 the minimum power necessry to dd links tht result in full mesh of links between ll clusters. While the unlimited trnsmit power cse is imprcticl it provides benchmrk scenrio for the results. Figure 6 shows typicl simultion results. For the three mximum trnsmit power limit investigtes fter pplying SMS or COMS ll topologies were t lest bi-communicble 1-connected. Figure 6 () nd (b) show the verge number of directed links dded to the network versus network density for both SMS nd COMS. As expected, when the network density increses fewer links re required to be dded in order to provide connectivity regrdless of whether SMS or COMS is used. For exmple, COMS dds n verge of 5.52 links in 5 node networks nd 1.96 links in 1 node networks with β =.75 nd mximum trnsmit power limit of 2dBm. Compring SMS nd COMS one cn see tht COMS needs fewer links to provide connectivity. In exmining the effects of the mximum trnsmit power limit one cn see tht the two schemes behve differently. For SMS s the power increses more links re dded beyond the minimum needed for 1-connectivity. In the extreme cse of unlimited vilble trnsmit power, links re dded until the clusters re interconnected with full mesh of links. In contrst, COMS lwys chooses the cost optimized minimum number of dditionl links. Hence, the men number of dditionl links decreses slightly with incresing mximum power limit. Further compring the effect of β on the results one cn see tht s β decreses nd the signl propgtion becomes more irregulr the verge number of directed links need to provide connectivity increses. Figure 6(c) nd (d) show how the verge hop count in source-destintion pths chnges versus the network density for both schemes. The verge hop count of ll pths between every pir of nodes is considered. From the figures SMS outperforms COMS for ll network densities, β vlues, nd restortion restrictions. For exmple, with 2dBm mximum power level restriction, the verge hop count for SMS is 6.72 nd COMS is 7.35 for 5 node network with β =.75. Since COMS finds the minimum number of dditionl links to provide connectivity, while SMS generte s mny s it could, the verge hop count by SMS should be lwys smller thn COMS. On the other hnd, in terms of the verge link cost COMS lwys results in lower verge cost nd the difference is more significnt s the mximum power level limit increses. Note tht, the worse cse mximum number of directed links to connect N CL clusters is 2(N CL 1). The time complexity of SMS cn be shown to be nd tht of COMS is where k is number of possible link combintions. The rnge of the number of link combintions is 1 to 2(N CL 1) nd k cn be computed by, where, 2 (5) 2 Therefore, the computtion time of SMS is smller thn tht of COMS. If the number of isolted clusters N CL increses, the computtion time of COMS increses more quickly thn SMS. IV. CONCLUSIONS Mny 1-connected homogeneous wireless networks become disconnected when the network becomes heterogeneous. In this pper we hve proposed new lgorithm to determine the connectivity of heterogeneous wireless networks. The results of simultion bsed numericl study utilizing our proposed lgorithm to exmine the effects of severl fctors (vritions in power levels, irregulr signl propgtion, nd network nodl density) on connectivity re presented. Further we propose two connectivity mngement schemes SMS nd COMS to dd dditionl links to prtitioned heterogeneous network in order to provide t lest 1-connectivity. A simultion bsed study of the two schemes shows tht both schemes cn correctly dd links to provide connectivity, but SMS is esier to implement with the drwbck of higher cost. REFERENCES [1] I. F. Akyildiz nd X. Wng, A survey on wireless mesh networks, IEEE Communictions Mgzine, Vol. 43, No. 9, pp. S23 S3, Sept., 25. [2] H. Moustf nd Y. Zhng, Vehiculr networks, techniques, stndrds, nd pplictions, CRC Press, 29. [3] I. Chlmtc, M. Conti, nd J. J. Liu, Mobile d hoc networking: impertives nd chllenges, Ad Hoc Networks, vol. 1, no. 1, pp , July, 23. [4] P. Gupt nd P.R. Kumr, Criticl Power for Asymptotic Connectivity in Wireless Networks, Stochstic Anlysis, Control, Optimiztion nd Applictions, Boston: Birkhuser, pp , [5] P. Snti nd D.M. Blough, The Criticl Trnsmitting Rnge of Connectivity in Sprse Wireless Ad Hoc Networks, IEEE Trnsctions on Mobile Computing, Vol 2. No. 1, Jnury-Mrch 23 [6] F. Xue nd P.R. Kummr, The Number of Neighbors Needed for Connectivity of Wireless Networks, Wireless Networks 1, Kluwer Acdemic, Netherlnds, 24, pp [7] R. Hekmt nd P. V. Mieghem, Study of connectivity in wireless d-hoc networks with n improved rdio model, In Workshop on Wireless Optimiztion, WiOpt, 24. [8] T.-H. Kim, D. Tipper nd P. Krishnmurthy, ``Connectivity nd Criticl Point Behvior in Mobile Ad Hoc nd Sensor Networks, Proceedings of IEEE ISCC 9, July, 29. [9] C. Bettstetter, On the minimum node degree nd connectivity of wireless multihop network, Proc. 3rd ACM Interntionl Symposium on Mobile Ad Hoc Networking nd Computing (MobiHoc), Lusnne, Switzerlnd, pp. 8 91, June [1] Q. Ling nd Z. Tin, ``Minimum Node Degree nd k-connectivity of Wireless Multihop Network in Bounded Are, Proceedings of IEEE Globecom, 27. [11] H. Zhng nd J. C. Hou, On the criticl totl power for symptotic k-connectivity in wireless networks, IEEE/ACM Trnsctions on Networking, April, 28. [12] D. Kotz, C. Newport, R.S. Gry, J. Liu, Y. Yun, nd C. Elliott, Experimentl Evlution of Wireless Simultion Assumptions, Proceedings of the 7 th ACM Interntionl Workshop on Modeling Anlysis nd Simultion of Wireless nd Mobile Systems (MSWiM 24), Venice, Itly, Oct., 24. [13] F. Kuhn nd A. Zollinger, Ad-hoc networks beyond unit disk grphs, in Proc. of the ACM Workshop on Foundtions of mobile computing, 23. [14] C. Bettstetter nd C. Hrtmnn, Connectivity of Wireless Multihop Networks in Shdow Fding Environment, Wireless Networks 11, Springer Science, 25. [15] C. Godsil nd G. Royle, Algebric Grph Theory, Springer-Verlg, 21. [16] C. Svrese, J. M. Rbey, nd J. Beutel, Loction in Distributed Ad-Hoc Wireless Sensor Networks, Proc. IEEE Int l Conf. Acoustics, Speech, nd Sgnl Processing, Vol. 4, pp , My 21. [17] T. He, C. Hung, B. M. Blum, J. A. Stnkovic, nd T. Abdelzher, Rnge-Free Locliztion Schemes for Lrge Scle Sensor Networks, Proc Ninth ACM Int l Conf. MOBICOM, pp , Sept. 23.

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li 2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min

More information

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis On the Detection of Step Edges in Algorithms Bsed on Grdient Vector Anlysis A. Lrr6, E. Montseny Computer Engineering Dept. Universitt Rovir i Virgili Crreter de Slou sin 43006 Trrgon, Spin Emil: lrre@etse.urv.es

More information

9 Graph Cutting Procedures

9 Graph Cutting Procedures 9 Grph Cutting Procedures Lst clss we begn looking t how to embed rbitrry metrics into distributions of trees, nd proved the following theorem due to Brtl (1996): Theorem 9.1 (Brtl (1996)) Given metric

More information

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric

More information

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases Overview Mobile computing nd dtbses Generl issues in mobile dt mngement Dt dissemintion Dt consistency Loction dependent queries Interfces Detils of brodcst disks thlis klfigopoulos Network rchitecture

More information

II. THE ALGORITHM. A. Depth Map Processing

II. THE ALGORITHM. A. Depth Map Processing Lerning Plnr Geometric Scene Context Using Stereo Vision Pul G. Bumstrck, Bryn D. Brudevold, nd Pul D. Reynolds {pbumstrck,brynb,pulr2}@stnford.edu CS229 Finl Project Report December 15, 2006 Abstrct A

More information

The Distributed Data Access Schemes in Lambda Grid Networks

The Distributed Data Access Schemes in Lambda Grid Networks The Distributed Dt Access Schemes in Lmbd Grid Networks Ryot Usui, Hiroyuki Miygi, Yutk Arkw, Storu Okmoto, nd Noki Ymnk Grdute School of Science for Open nd Environmentl Systems, Keio University, Jpn

More information

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Vulnerability Analysis of Electric Power Communication Network. Yucong Wu

Vulnerability Analysis of Electric Power Communication Network. Yucong Wu 2nd Interntionl Conference on Advnces in Mechnicl Engineering nd Industril Informtics (AMEII 2016 Vulnerbility Anlysis of Electric Power Communiction Network Yucong Wu Deprtment of Telecommunictions Engineering,

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

LECT-10, S-1 FP2P08, Javed I.

LECT-10, S-1 FP2P08, Javed I. A Course on Foundtions of Peer-to-Peer Systems & Applictions LECT-10, S-1 CS /799 Foundtion of Peer-to-Peer Applictions & Systems Kent Stte University Dept. of Computer Science www.cs.kent.edu/~jved/clss-p2p08

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network

Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 Revisiting the notion of Origin-Destintion Trffic Mtrix of the Hosts tht re ttched to Switched Locl Are Network Mondy

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Digital Design. Chapter 6: Optimizations and Tradeoffs

Digital Design. Chapter 6: Optimizations and Tradeoffs Digitl Design Chpter 6: Optimiztions nd Trdeoffs Slides to ccompny the tetbook Digitl Design, with RTL Design, VHDL, nd Verilog, 2nd Edition, by Frnk Vhid, John Wiley nd Sons Publishers, 2. http://www.ddvhid.com

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

A Priority-based Distributed Call Admission Protocol for Multi-hop Wireless Ad hoc Networks

A Priority-based Distributed Call Admission Protocol for Multi-hop Wireless Ad hoc Networks A Priority-bsed Distributed Cll Admission Protocol for Multi-hop Wireless Ad hoc Networks un Sun Elizbeth M. Belding-Royer Deprtment of Computer Science University of Cliforni, Snt Brbr suny, ebelding

More information

Midterm 2 Sample solution

Midterm 2 Sample solution Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the

More information

Chapter 2 Sensitivity Analysis: Differential Calculus of Models

Chapter 2 Sensitivity Analysis: Differential Calculus of Models Chpter 2 Sensitivity Anlysis: Differentil Clculus of Models Abstrct Models in remote sensing nd in science nd engineering, in generl re, essentilly, functions of discrete model input prmeters, nd/or functionls

More information

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using

More information

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers Mth Modeling Lecture 4: Lgrnge Multipliers Pge 4452 Mthemticl Modeling Lecture 4: Lgrnge Multipliers Lgrnge multipliers re high powered mthemticl technique to find the mximum nd minimum of multidimensionl

More information

2 Computing all Intersections of a Set of Segments Line Segment Intersection

2 Computing all Intersections of a Set of Segments Line Segment Intersection 15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

cell 1 cell 2 cell 3 cell 4 a a

cell 1 cell 2 cell 3 cell 4 a a Frequency Assignment for Cellulr Mobile Systems Using Constrint Stisfction Techniques Mkoto Yokooy nd Ktsutoshi Hirymz y NTT Communiction Science Lbortories -4 Hikridi, Seik-cho, Sorku-gun, Kyoto 69-037

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-169 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

such that the S i cover S, or equivalently S

such that the S i cover S, or equivalently S MATH 55 Triple Integrls Fll 16 1. Definition Given solid in spce, prtition of consists of finite set of solis = { 1,, n } such tht the i cover, or equivlently n i. Furthermore, for ech i, intersects i

More information

MATH 25 CLASS 5 NOTES, SEP

MATH 25 CLASS 5 NOTES, SEP MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid

More information

9.1 apply the distance and midpoint formulas

9.1 apply the distance and midpoint formulas 9.1 pply the distnce nd midpoint formuls DISTANCE FORMULA MIDPOINT FORMULA To find the midpoint between two points x, y nd x y 1 1,, we Exmple 1: Find the distnce between the two points. Then, find the

More information

12-B FRACTIONS AND DECIMALS

12-B FRACTIONS AND DECIMALS -B Frctions nd Decimls. () If ll four integers were negtive, their product would be positive, nd so could not equl one of them. If ll four integers were positive, their product would be much greter thn

More information

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization An Efficient Divide nd Conquer Algorithm for Exct Hzrd Free Logic Minimiztion J.W.J.M. Rutten, M.R.C.M. Berkelr, C.A.J. vn Eijk, M.A.J. Kolsteren Eindhoven University of Technology Informtion nd Communiction

More information

OSPF WEIGHT SETTING OPTIMIZATION FOR SINGLE LINK FAILURES

OSPF WEIGHT SETTING OPTIMIZATION FOR SINGLE LINK FAILURES OSP WEIGH SEIG OPIMIZAIO OR SIGLE LIK AILURES Mohmmed H. Sqlli, Sdiq M. Sit, nd Syed Asdullh Computer Engineering Deprtment King hd University of Petroleum & Minerls Dhhrn 31261, Sudi Arbi {sqlli,sdiq,ssd}@kfupm.edu.s

More information

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,

More information

Fault injection attacks on cryptographic devices and countermeasures Part 2

Fault injection attacks on cryptographic devices and countermeasures Part 2 Fult injection ttcks on cryptogrphic devices nd countermesures Prt Isrel Koren Deprtment of Electricl nd Computer Engineering University of Msschusetts Amherst, MA Countermesures - Exmples Must first detect

More information

a < a+ x < a+2 x < < a+n x = b, n A i n f(x i ) x. i=1 i=1

a < a+ x < a+2 x < < a+n x = b, n A i n f(x i ) x. i=1 i=1 Mth 33 Volume Stewrt 5.2 Geometry of integrls. In this section, we will lern how to compute volumes using integrls defined by slice nlysis. First, we recll from Clculus I how to compute res. Given the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. TechAdvisory.org SME Reports sponsored by Voice over Internet Protocol (VoIP)

More information

Network Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved

Network Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved Network Interconnection: Bridging CS 57 Fll 6 6 Kenneth L. Clvert All rights reserved The Prolem We know how to uild (rodcst) LANs Wnt to connect severl LANs together to overcome scling limits Recll: speed

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

Performance Evaluation of Dynamic Reconfiguration in High-Speed Local Area Networks

Performance Evaluation of Dynamic Reconfiguration in High-Speed Local Area Networks Performnce Evlution of Dynmic Reconfigurtion in High-Speed Locl Are Networks Rfel Csdo, Aurelio Bermúdez, Frncisco J. Quiles, JoséL.Sánchez Depto. de Informátic Universidd de Cstill-L Mnch 271- Albcete,

More information

A Probabilistic Emergent Routing Algorithm for Mobile Ad Hoc Networks

A Probabilistic Emergent Routing Algorithm for Mobile Ad Hoc Networks Author mnuscript, published in "WiOpt'03: Modeling nd Optimiztion in Mobile, Ad oc nd Wireless Networks (2003) 10 pges" A Probbilistic Emergent Routing Algorithm for Mobile Ad oc Networks John S. Brs nd

More information

USING HOUGH TRANSFORM IN LINE EXTRACTION

USING HOUGH TRANSFORM IN LINE EXTRACTION Stylinidis, Efstrtios USING HOUGH TRANSFORM IN LINE EXTRACTION Efstrtios STYLIANIDIS, Petros PATIAS The Aristotle University of Thessloniki, Deprtment of Cdstre Photogrmmetry nd Crtogrphy Univ. Box 473,

More information

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1.

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1. Answer on Question #5692, Physics, Optics Stte slient fetures of single slit Frunhofer diffrction pttern. The slit is verticl nd illuminted by point source. Also, obtin n expression for intensity distribution

More information

Section 10.4 Hyperbolas

Section 10.4 Hyperbolas 66 Section 10.4 Hyperbols Objective : Definition of hyperbol & hyperbols centered t (0, 0). The third type of conic we will study is the hyperbol. It is defined in the sme mnner tht we defined the prbol

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

On Computation and Resource Management in Networked Embedded Systems

On Computation and Resource Management in Networked Embedded Systems On Computtion nd Resource Mngement in Networed Embedded Systems Soheil Ghisi Krlene Nguyen Elheh Bozorgzdeh Mjid Srrfzdeh Computer Science Deprtment University of Cliforni, Los Angeles, CA 90095 soheil,

More information

Abstract. 1. Introduction. Kaveh Bevrani 1 Mamun Muntasir Rahman 2 Edward Chung 3

Abstract. 1. Introduction. Kaveh Bevrani 1 Mamun Muntasir Rahman 2 Edward Chung 3 Austrlsin Trnsport Reserch Forum 011 Proceedings 8-30 September 011, Adelide, Austrli Publiction website: http://www.ptrec.org/trf.spx Queue protection prmeters fine-tuning for vrible speed limits Kveh

More information

Transparent neutral-element elimination in MPI reduction operations

Transparent neutral-element elimination in MPI reduction operations Trnsprent neutrl-element elimintion in MPI reduction opertions Jesper Lrsson Träff Deprtment of Scientific Computing University of Vienn Disclimer Exploiting repetition nd sprsity in input for reducing

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

Preserving Constraints for Aggregation Relationship Type Update in XML Document

Preserving Constraints for Aggregation Relationship Type Update in XML Document Preserving Constrints for Aggregtion Reltionship Type Updte in XML Document Eric Prdede 1, J. Wenny Rhyu 1, nd Dvid Tnir 2 1 Deprtment of Computer Science nd Computer Engineering, L Trobe University, Bundoor

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Virtual Network Embedding For Evolving Networks

Virtual Network Embedding For Evolving Networks This full text pper ws peer reviewed t the direction of IEEE Communictions Society subject mtter experts for publiction in the IEEE Globecom proceedings. Virtul Network Embedding For Evolving Networks

More information

Text mining: bag of words representation and beyond it

Text mining: bag of words representation and beyond it Text mining: bg of words representtion nd beyond it Jsmink Dobš Fculty of Orgniztion nd Informtics University of Zgreb 1 Outline Definition of text mining Vector spce model or Bg of words representtion

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Replicating Web Applications On-Demand

Replicating Web Applications On-Demand Replicting Web Applictions On-Demnd Swminthn Sivsubrmnin Guillume Pierre Mrten vn Steen Dept. of Computer Science, Vrije Universiteit, Amsterdm {swmi,gpierre,steen}@cs.vu.nl Abstrct Mny Web-bsed commercil

More information

L. Yaroslavsky. Fundamentals of Digital Image Processing. Course

L. Yaroslavsky. Fundamentals of Digital Image Processing. Course L. Yroslvsky. Fundmentls of Digitl Imge Processing. Course 0555.330 Lecture. Imge enhncement.. Imge enhncement s n imge processing tsk. Clssifiction of imge enhncement methods Imge enhncement is processing

More information

Parallel Square and Cube Computations

Parallel Square and Cube Computations Prllel Squre nd Cube Computtions Albert A. Liddicot nd Michel J. Flynn Computer Systems Lbortory, Deprtment of Electricl Engineering Stnford University Gtes Building 5 Serr Mll, Stnford, CA 945, USA liddicot@stnford.edu

More information

A dynamic multicast tree based routing scheme without replication in delay tolerant networks

A dynamic multicast tree based routing scheme without replication in delay tolerant networks Accepted Mnuscript A dynmic multicst tree bsed routing scheme without repliction in dely tolernt networks Yunsheng Wng, Jie Wu PII: S0-()00- DOI: 0.0/j.jpdc.0..00 Reference: YJPDC To pper in: J. Prllel

More information

Design and Performance Evaluation of Underwater Data Dissemination Strategies using Interference Avoidance and Network Coding

Design and Performance Evaluation of Underwater Data Dissemination Strategies using Interference Avoidance and Network Coding Design nd Performnce Evlution of Underwter Dt Dissemintion Strtegies using Interference Avoidnce nd Network Coding Rúl Plcios Fbrizio Grnelli University of Trento, Itly Jnus Heide Frnk H.P. Fitzek Alborg

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

10.5 Graphing Quadratic Functions

10.5 Graphing Quadratic Functions 0.5 Grphing Qudrtic Functions Now tht we cn solve qudrtic equtions, we wnt to lern how to grph the function ssocited with the qudrtic eqution. We cll this the qudrtic function. Grphs of Qudrtic Functions

More information

1 Quad-Edge Construction Operators

1 Quad-Edge Construction Operators CS48: Computer Grphics Hndout # Geometric Modeling Originl Hndout #5 Stnford University Tuesdy, 8 December 99 Originl Lecture #5: 9 November 99 Topics: Mnipultions with Qud-Edge Dt Structures Scribe: Mike

More information

Stained Glass Design. Teaching Goals:

Stained Glass Design. Teaching Goals: Stined Glss Design Time required 45-90 minutes Teching Gols: 1. Students pply grphic methods to design vrious shpes on the plne.. Students pply geometric trnsformtions of grphs of functions in order to

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment File Mnger Quick Reference Guide June 2018 Prepred for the Myo Clinic Enterprise Khu Deployment NVIGTION IN FILE MNGER To nvigte in File Mnger, users will mke use of the left pne to nvigte nd further pnes

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking

Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking 1 Self-Orgnizing Hierrchicl Routing for Sclble Ad Hoc Networking Shu Du Ahmed Khn Sntshil PlChudhuri Ansley Post Amit Kumr Sh Peter Druschel Dvid B. Johnson Rudolf Riedi Rice University Abstrct As devices

More information

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1): Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Computing offsets of freeform curves using quadratic trigonometric splines

Computing offsets of freeform curves using quadratic trigonometric splines Computing offsets of freeform curves using qudrtic trigonometric splines JIULONG GU, JAE-DEUK YUN, YOONG-HO JUNG*, TAE-GYEONG KIM,JEONG-WOON LEE, BONG-JUN KIM School of Mechnicl Engineering Pusn Ntionl

More information

DELAY Tolerant Networks (DTNs) [1] [2] are a class of

DELAY Tolerant Networks (DTNs) [1] [2] are a class of 2254 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. 12, DECEMBER 2012 Exploiting Friendship Reltions for Efficient Routing in Mobile Socil Networks Eyuphn Bulut, Member, IEEE, nd Boleslw

More information

A Transportation Problem Analysed by a New Ranking Method

A Transportation Problem Analysed by a New Ranking Method (IJIRSE) Interntionl Journl of Innovtive Reserch in Science & Engineering ISSN (Online) 7-07 A Trnsporttion Problem Anlysed by New Rnking Method Dr. A. Shy Sudh P. Chinthiy Associte Professor PG Scholr

More information

Performance analysis of QoS mechanisms in IP networks

Performance analysis of QoS mechanisms in IP networks University of Wollongong Reserch Online Fculty of Informtics - Ppers (Archive) Fculty of Engineering nd Informtion Sciences 2000 Performnce nlysis of QoS mechnisms in IP networks D. Ji University of Wollongong

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully

More information

Efficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc

Efficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc 4th Ntionl Conference on Electricl, Electronics nd Computer Engineering (NCEECE 2015) Efficient Regulr Expression Grouping Algorithm Bsed on Lbel Propgtion Xi Chen, Shuqio Chenb nd Ming Moc Ntionl Digitl

More information

DIFFERENT POLICY OBJECTIVES OF THE ROAD AUTHORITY IN THE OPTIMAL TOLL DESIGN PROBLEM

DIFFERENT POLICY OBJECTIVES OF THE ROAD AUTHORITY IN THE OPTIMAL TOLL DESIGN PROBLEM DIFFERENT POLICY OBJECTIVES OF THE ROAD AUTHORITY IN THE OPTIMAL TOLL DESIGN PROBLEM Dusic Joksimovic*, Michiel Bliemer Delft University of Technology, The Netherlnds ARS Trnsport &Technology, The Netherlnds

More information

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants A Heuristic Approch for Discovering Reference Models by Mining Process Model Vrints Chen Li 1, Mnfred Reichert 2, nd Andres Wombcher 3 1 Informtion System Group, University of Twente, The Netherlnds lic@cs.utwente.nl

More information

Dynamic Programming. Andreas Klappenecker. [partially based on slides by Prof. Welch] Monday, September 24, 2012

Dynamic Programming. Andreas Klappenecker. [partially based on slides by Prof. Welch] Monday, September 24, 2012 Dynmic Progrmming Andres Klppenecker [prtilly bsed on slides by Prof. Welch] 1 Dynmic Progrmming Optiml substructure An optiml solution to the problem contins within it optiml solutions to subproblems.

More information

PNC NC code PROGRAMMER'S MANUAL

PNC NC code PROGRAMMER'S MANUAL PNC-3200 NC code PROGRAMMER'S MANUAL Thnk you very much for purchsing the PNC-3200. To ensure correct nd sfe usge with full understnding of this product's performnce, plese be sure to red through this

More information

COMPUTATIONS of a bijective mapping among different

COMPUTATIONS of a bijective mapping among different IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, ACCEPTED 1 Efficient Optimiztion of Common Bse Domins for Cross-Prmeteriztion Tsz-Ho Kwok, Yunbo Zhng, nd Chrlie C.L. Wng, Member, IEEE Abstrct

More information

Alignment of Long Sequences. BMI/CS Spring 2012 Colin Dewey

Alignment of Long Sequences. BMI/CS Spring 2012 Colin Dewey Alignment of Long Sequences BMI/CS 776 www.biostt.wisc.edu/bmi776/ Spring 2012 Colin Dewey cdewey@biostt.wisc.edu Gols for Lecture the key concepts to understnd re the following how lrge-scle lignment

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

Tilt-Sensing with Kionix MEMS Accelerometers

Tilt-Sensing with Kionix MEMS Accelerometers Tilt-Sensing with Kionix MEMS Accelerometers Introduction Tilt/Inclintion sensing is common ppliction for low-g ccelerometers. This ppliction note describes how to use Kionix MEMS low-g ccelerometers to

More information

Nearest Keyword Set Search in Multi-dimensional Datasets

Nearest Keyword Set Search in Multi-dimensional Datasets Nerest Keyword Set Serch in Multi-dimensionl Dtsets Vishwkrm Singh Deprtment of Computer Science University of Cliforni Snt Brbr, USA Emil: vsingh014@gmil.com Ambuj K. Singh Deprtment of Computer Science

More information

9 4. CISC - Curriculum & Instruction Steering Committee. California County Superintendents Educational Services Association

9 4. CISC - Curriculum & Instruction Steering Committee. California County Superintendents Educational Services Association 9. CISC - Curriculum & Instruction Steering Committee The Winning EQUATION A HIGH QUALITY MATHEMATICS PROFESSIONAL DEVELOPMENT PROGRAM FOR TEACHERS IN GRADES THROUGH ALGEBRA II STRAND: NUMBER SENSE: Rtionl

More information

Mobile IP route optimization method for a carrier-scale IP network

Mobile IP route optimization method for a carrier-scale IP network Moile IP route optimiztion method for crrier-scle IP network Tkeshi Ihr, Hiroyuki Ohnishi, nd Ysushi Tkgi NTT Network Service Systems Lortories 3-9-11 Midori-cho, Musshino-shi, Tokyo 180-8585, Jpn Phone:

More information

Error-Resilient LZW Data Compression

Error-Resilient LZW Data Compression Error-Resilient LZW t Compression Yonghui Wu Stefno Lonrdi ept. Computer Science & Engineering University of Cliforni Riverside, CA 92521 {yonghui stelo}@cs.ucr.edu Wojciech Szpnkowski eprtment of Computer

More information

ISG: Itemset based Subgraph Mining

ISG: Itemset based Subgraph Mining ISG: Itemset bsed Subgrph Mining by Lini Thoms, Stynryn R Vlluri, Kmlkr Krlplem Report No: IIIT/TR/2009/179 Centre for Dt Engineering Interntionl Institute of Informtion Technology Hyderbd - 500 032, INDIA

More information

Representation of Numbers. Number Representation. Representation of Numbers. 32-bit Unsigned Integers 3/24/2014. Fixed point Integer Representation

Representation of Numbers. Number Representation. Representation of Numbers. 32-bit Unsigned Integers 3/24/2014. Fixed point Integer Representation Representtion of Numbers Number Representtion Computer represent ll numbers, other thn integers nd some frctions with imprecision. Numbers re stored in some pproximtion which cn be represented by fixed

More information

What do all those bits mean now? Number Systems and Arithmetic. Introduction to Binary Numbers. Questions About Numbers

What do all those bits mean now? Number Systems and Arithmetic. Introduction to Binary Numbers. Questions About Numbers Wht do ll those bits men now? bits (...) Number Systems nd Arithmetic or Computers go to elementry school instruction R-formt I-formt... integer dt number text chrs... floting point signed unsigned single

More information