Improving the Connectivity of Heterogeneous Multi-Hop Wireless Networks
|
|
- Clementine Murphy
- 6 years ago
- Views:
Transcription
1 Improving the Connectivity of Heterogeneous Multi-Hop Wireless Networks Te-Hoon Kim, Dvid Tipper, nd Prshnt Krishnmurthy Grdute Networking nd Telecommunictions Progrm University of Pittsburgh, Pittsburgh PA, USA Emil: tk11@pitt.edu, {dtipper, prshnt}@sis.pitt.edu Abstrct Heterogeneous conditions cn occur in multi-hop wireless networks due to vriety of fctors such s vritions in trnsmission power nd signl propgtion environments. Directed links cn occur when the environment nd/or the nodes re heterogeneous. In this pper, we exmine the network connectivity for heterogeneous multi-hop wireless networks nd propose n lgorithm to identify the connectivity of the network. We follow this with numericl study of the connectivity in rndom topologies. Lstly, we propose two schemes for constructing dditionl links to enhnce the connectivity of the network. Our proposed schemes identify the links to be improved or creted vi cluster bsed pproch. Index Terms Connectivity, heterogeneous multi-hop wireless networks I. INTRODUCTION Multi-hop wireless networks re expected to become n importnt prt of the communictions lndscpe. Exmples include wireless mesh networks (WMNs) [1], vehiculr d-hoc networks (VANETs) [2], nd mobile d-hoc networks (MANETs) [3]. In multi-hop wireless networks, the nodes must cooperte to dynmiclly estblish routes using wireless links nd routes my involve multiple hops with ech node cting s router. In mny multi-hop network scenrios the nodes cn move rbitrrily or the interference cn chnge dynmiclly resulting in topology chnges. Multi-hop wireless networks lso inherit the trditionl problems of wireless communictions, which when combined with mobility nd lck of infrstructure mkes their design nd development chllenging [1-3]. A bsic problem in mny multi-hop wireless networks is mintining connectivity. A network is connected if ll nodes hve communiction pth to ech other. Similrly, network is k-connected if there re k-disjoint pths between every pir of nodes. Mintining connectivity is difficult due to the unstructured nture of the topology nd the occurrence of link nd node filures due to interference, mobility, rdio chnnel effects nd bttery life [1-3]. Mny reserchers hve studied multi-hop wireless network connectivity determining conditions under which connectivity [3, 8] nd k-connectivity [9-11] cn be inferred probbilisticlly or ssured symptoticlly. The focus hs lrgely been on wht combintion of node density nd power rnge re required to provide k-node connectivity in specific deployment scenrio for homogenous network. A mjor wekness of this work is the ssumption of homogeneous () Different Tx power levels (b) Non-uniform Tx rnge Fig. 1. Directionl links in heterogeneous wireless networks network context where nodes hve identicl properties nd inhbit uniform environment (e.g., identicl trnsmission power, bttery life, rdio propgtion rnges, ntenns, etc.). Mesurement studies [12] hve shown tht mny of the ssumptions in the homogeneous context re inccurte. In prticulr it ws noted tht rel networks cn hve directionl links. For exmple, if ech node hs different trnsmission power, then their trnsmission rnge differs nd directionl link cn result s shown in Figure 1(). Similrly, in Figure 1(b) directionl link results from nodes hving non-identicl signl propgtion due to differences in the locl environment (e.g., trees, buildings, etc.). In this pper, we look t how one cn develop techniques to improve the connectivity of sprse heterogeneous multi-hop wireless networks without incresing the node density. Our pproch is to determine the topologicl connectivity criticl points tht need to be improved to ttin/mintin t lest 1-connectivity. We propose novel lgorithm for determining the connectivity bsed on results from lgebric grph theory. Using the criticl points identified by our connectivity lgorithm, we propose two techniques to improve the connectivity of the network by djusting the trnsmission power of nodes round criticl point in order to crete dditionl links in the network. The rest of the pper is orgnized s follows. In Section II, we propose n lgorithm to determine the connectivity of heterogeneous networks. Numericl results utilizing the proposed lgorithm to study the effects of network density on the connectivity re given. Then, we propose two network link modifiction schemes in Section III to improve the network connectivity without chnging the node density. Simultion results illustrting the effectiveness nd trdeoffs of the proposed connectivity improvement schemes re lso given. Lstly, we present our conclusions in Section IV.
2 A C E G B D F H () 1-Connected (b) Disconnected Fig. 2. Smple 8 node heterogeneous network topologies () Adjusted 1-Connected (b) Adjusted Disconnected Fig. 3. Adjusted network topologies corresponding to Fig. 2 II. HETEROGENEOUS NETWORK CONNECTIVITY A distinguishing chrcteristic of homogeneous networks is tht the set of multi-hop pths between pir of nodes re the sme in ech direction, while this my not be the cse in heterogeneous network. For exmple, in the network of Figure 2 (), the pth from node A to H is A C D F H wheres the pth from H to A is H G E C D B A (i.e., PATH A H PATH H A ). Another effect of directed links in the topology is tht communictions my be one wy. For exmple in the network of Figure 2 (b), nodes A, B, C, nd D cn receive dt from E, F, G, nd H through the links E C nd F D. However, the opposite direction is not vilble such tht A, B, C, or D, cn communicte with E, F, G, or H. Given tht directionl links cn occur in heterogeneous networks we define the connectivity between pir of nodes s requiring tht they be bi-communicble. Specificlly we hve the following. Definition 1. Bi-communicble: A pir of nodes is bi-communicble if nd only if both nodes cn receive informtion from ech other. Note tht bi-communicble doesn t require tht pths between the nodes in question hve the sme set of intermedite nodes. This definition indictes tht node i nd j re connected if nd only if node i cn receive dt sent by j nd vice vers. Bsed on this connectivity definition, we introduce modified definition of link between two nodes in network. Definition 2. Vlid Link: A pir of nodes i nd j hve vlid link if nd only if direct link exists in both directions or t lest one direct link in either direction exists nd t lest one multi-hop pth in the other direction is vilble. Bsed on Definitions 1 nd 2 we define prtition of the network s follows. Definition 3. Prtitioned Network: A network is considered prtitioned if one or more nodes do not hve bi-directionl connectivity to the rest of the nodes in the network. Hence network is 1-connected if nd only if ll pirs of nodes hve t lest one pth between them in both directions. Here we propose n lgorithm for network node to test the overll connectivity of the topology when directed links exist in the network. A. Connectivity Test Consider n rbitrry multi-hop wireless network of N nodes. Let G = (V, E), be the grph of the topology where V is the set of nodes nd E is the set of links. The grph G cn be represented by the N x N djcency mtrix A( t time t, 11( = 21( A( M N1( N1 M L L L 1N 2 N NN M (1) where 1,,. The link connectivity ij ( between two nodes depends on their rdio rnge nd cn be determined by nodes loclly through the exchnge of ``Hello or probing pckets. For now we ssume homogeneous network scenrio where ll links re bidirectionl (i.e., ij (=1 ji (=1). Thus, A( is symmetric mtrix. Let d i ( denote the degree of node i N t time t (i.e., d i ( equls the number of neighbor nodes of i). We define D s the digonl mtrix consisting of the degree of ech node (i.e., D( = dig(d i ()). The Lplcin mtrix L( of grph is defined in terms of the djcency mtrix A( nd nodl degree mtrix D( s L = D( A(. (2) The eigenvlues λ = [λ 1, λ 2,... λ Ν ] of L( form the Lplcin spectrum of the grph. The eigenvlues λ nd their ssocited eigenvectors X = [x 1, x 2, x N ] cn be computed from L λ using number of well known efficient numericl methods. In lgebric grph theory [13] it hs been shown tht zero is lwys n eigenvlue of L nd the number of zero eigenvlues is equl to the number of connected components of the network N CL. Thus the network is connected (i.e., t lest 1-connectivity) if the Lplcin mtrix of the topology hs single zero eigenvlue (i.e., if second smllest eigenvlue is positive N CL = 1). Here we pply this result in constructing test for connectivity in heterogeneous multi-hop wireless networks. The djcent mtrix cn be obtined by use of the topology informtion periodiclly gthering by proctive routing protocol or rective routing protocol tht exchnge locl connectivity periodiclly. The possible existence of directed links in the topology mens tht one cn not directly pply the result. In order to force the djcency mtrix A( to hve symmetric form we pply Definition 2 bove in determining the link connectivity. Specificlly, we require ll links to be vlid links nd modify the link connectivity in logiclly djusted topology djcency mtrix to reflect this. For exmple, the smple topologies of Figure 2 fter djustment will hve the corresponding logicl topologies shown in Figure 3. Note, tht fter djustment of the network topology the resulting is symmetric nd one cn pply test on the Lplcin eigenvlues to determine the network connectivity. The connectivity test procedure is given in lgorithmic form below. Heterogeneous Connectivity Test Algorithm (h-cta) Step 1 : Identify ny directed links in the topology from the djcency mtrix A(. If none, set = A( nd go to step 3. Step 2 : Form djusted djcency mtrix contining only vlid links. Specificlly, for ech link i j such tht ij ji,
3 , 1 1, 1 Otherwise, where is the djusted djcent mtrix. Step 3 : Compute the eigenvlues of the Lplcin mtrix L =, where is the degree mtrix corresponding to Step 4 : Determine the number of zero eigenvlues mong the Lplcin spectrum. If N CL = 1 then the network is connected, otherwise it is prtitioned into N CL components networks. For network of N nodes nd E links of which K re directed, it cn be shown tht the time complexity of h-cta is O(K(E+N logn)+n 2 ). The lgorithm cn be implemented t ny network node hving djcency mtrix informtion However, if the network is prtitioned ccording to Definition 3, ll nodes cnnot exchnge connectivity informtion. For exmple, in the network of Figure 2 (b) cluster 2 (i.e., CL 2 = { E, F, G, H}) cnnot receive connectivity informtion of cluster 1 (i.e., CL 1 = {A, B, C, D}) while cluster 1 cn receive nd obtin the connectivity informtion of cluster 2. Since the nodes in cluster 1 cn obtin the globl djcency informtion, ny node in cluster 1 cn execute h-cta to determine the overll connectivity. In Section III we show node with in cluster such s 1 in Figure 2(b) cn find which link should be improved so tht the cluster 2 cn receive the connectivity informtion of cluster 1. If there exists other wekly connected clusters, the cluster tht cn receive the most informtion cn do initite the h-cta procedure to determine which links need to be dded to provide connectivity. A network such s Figure 2(b) is termed wekly connected nd this is our focus in the pper. Once is found, k-connectivity my be lso exmined by the lgebric connectivity. However, it is out of scope in this pper. B. Numericl Study We utilized the h-cta lgorithm to study the connectivity of heterogeneous multi-hop wireless network topologies. Here we discuss typicl results for the cse of rndom topologies. Using the ns2 simultor, we generted rndom topologies with different number of nodes (i.e., 5, 75, nd 1) in network re of m 2. The nodes were independently distributed ccording to uniform [-15] rndom vrible in the network re. We dopted bseline prmeters from 82.11b equipment (i.e., verge trnsmit power P T = 15dBm, receiver sensitivity threshold P RSST = -9 dbm). The bsic trnsmission rnge ws determined using simple pth loss model dbm dbm 1 log (3) where α is the pth loss exponent nd d is the distnce between pir of nodes in meters. A pth loss exponent of α = ws used, which results in circulr coverge re with rdius 25 meters. A heterogeneous network ws creted by vrying either the trnsmission power or propgtion model for ech node or both fctors. Ech node i selects its trnsmission power P Ti ccording to uniform [13.5dBm dBm] rndom vrible. The resulting mximum trnsmission rnge R is uniform between 231m nd 27.5m. Non-uniform signl propgtion between nodes ws modeled using the Qusi-Unit Disk Grph (Q-UDG) model. In the Qusi-UDG model, link exists between two nodes if the inter-nodl distnce d is less thn βr, where R is the mximum trnsmission rnge of the node nd β is the Q-UDG fctor ( β 1). For distnces d greter thn R, there is no connectivity. However, for βr d R, the link will exist with probbility (R - d)/(r-βr). We selected different β prmeter vlues of.5,.75,.85 nd 1. to show how irregulr propgtion ffects the connectivity. Figure 4 shows 95% confidence intervls on the P(connected network) determined with h-cta versus the node density for two cses of node power ssignment: () homogenous with P Ti = 15dBm t ech node i nd (b) heterogeneous with P Ti drwn from uniform [13.5dBm dBm] rndom vrible for ech node. Ech point in Figure 4 is determined from 4 independent simultion runs. From Figure 4(), notice tht for the cse of homogeneous network (i.e., fixed P T = 15dBm, β = 1.) the network is connected (i.e., P(connected network) = 1) for ll node densities considered. In contrst, the P(connected network) is lmost zero for ll network densities for both homogeneous (4()) nd heterogeneous power ssignments (4(b)) when β =.5. This is becuse the verge trnsmission rnge is only meters. However, the network connectivity increses s β increses. For exmple, in Figure 4() the probbility of connectivity for 1 node network is estimted from the simultion s.43with β =.5,.226 with β =.75, P(Connected Network) () Rndom networks with homogeneous trnsmission power P(Connected Network) Rndom (β =.5) Rndom (β =.75) Rndom (β =.85) Rndom (β = 1.) Rndom (β =.5) Rndom (β =.75) Rndom (β =.85) Rndom (β = 1.) (b) Rndom networks with heterogeneous trnsmission power Fig. 4. Probbility of connectivity in rndom network topologies
4 nd.54 with β =.85. Similrly for fixed β the network connectivity increses with the node density, for exmple in Figure 4 () with β =.85, the probbility of connectivity is.63 t 5 nodes,.1145 t 75 nodes, nd.54 t 1 nodes. In compring homogeneous power ssignment with heterogeneous ssignment (i.e., 4() vs. 4(b)) we see tht only for the β = 1 cse does the power ssignment result in significnt difference in the connectivity. For the other vlues of β, the Q-UDG propgtion effect domintes nd the power ssignment hs little effect on the results (i.e., the confidence intervls on the results overlp). From Figure 4 one cn clerly see tht the connectivity in heterogeneous network is considerbly lower thn the homogenous cse no mtter wht the cuse of the heterogeneity. III. CONNECTIVITY IMPROVEMENT SCHEMES We propose schemes tht for n unconnected heterogeneous network identify the links whose ddition will connect the network. The pproch is bsed on identifying the isolted groups (i.e. clusters) of nodes nd determining the links required to connect between clusters. Consider network prtitioned into N CL wekly connected clusters (i.e., ech cluster hs t lest directed link to some other cluster). The Lplcin mtrix L with re-lbeled node IDs cn be written s where ech L k represents the Lplcin mtrix of connected cluster C k of nodes. There re N CL zeros in the eigenvlue set λ = [λ 1, λ 2,... λ Ν ] of L(. From the N CL eigenvectors x i ssocited with the zero eigenvlues one cn determine the nodes in ech cluster. Specificlly the nodes in cluster will hve non-zero vlues in the eigenvector ssocited with zero eigenvlue [15]. Once the sets of member nodes in ech isolted cluster re identified, cluster djcency mtrix, CL_A, cn be determined which represents how the clusters re symmetriclly connected. The cluster djcency mtrix cn be determined by: _ 1,, 1 (4), otherwise where CL i is nodes set of ech cluster i, nd A is the network djcency mtrix. The cluster djcency mtrix provides informtion bout which cluster needs to be connected to nother cluster to provide network connectivity. We propose two schemes to identify the links needed to reconnect the network bsed on given cost constrints: (1) Simple Merging Scheme (SMS) nd (2) Cost Optimized Merging Scheme (COMS). The link cost is the cost to improve the link so tht bi-communiction cn occur. Note tht vriety of techniques such s node movement, trnsmission power, directionl ntenn, nd etceter cn be used to dd link to the network. In this pper, we mnipulte the trnsmission power to improve the links in question nd the link cost constrint LC limit in terms of distnce is determined from the mximum trnsmission power together with the propgtion model. A. Simple Merging Scheme (SMS) The Simple Merging Scheme (SMS) tries to dd links until ech isolted cluster hs bi-directionl connection with it s neighbor clusters. The lgorithm finds the set of locl minimum cost links between n isolted cluster nd neighbor cluster using distnce informtion. Specificlly between ech pir of neighbor clusters SMS finds the minimum distnce links tht re within the mximum possible trnsmission rnge s determined by LC limit. The distnce between nodes in isolted clusters cn be obtined by Globl Positioning System (GPS) or locliztion techniques [14, 15]. SMS cn be implemented loclly by the cluster heds (nodes with directed link to nother cluster) in ech cluster. SMS cn be put in lgorithm form s below. Simple Merging Scheme (SMS) Step 1 : Perform h-cta to determine if the network is prtitioned, if Yes go to step 2, otherwise STOP. Step 2 : From the h-cta results determine the number of clusters N CL nd the node sets of ech cluster, C i, nd the cluster djcency mtrix CL_A. Step 3 : Find the set of minimum cost links between ech pir of isolted clusters,, ;,, where MLC ij is minimum cost link from cluster i to j nd LC(k,l) is the link cost between node k in cluster i nd l from cluster j. Exclude the existing links. Step 4 : Select the dequte links bsed on constrints such tht the link direction stisfying CL_ ij = nd MLC ij < LC limit. B. Cost Optimized Merging Scheme (COMS) In order to provide benchmrk comprison to SMS we developed the Cost Optimized Merging Scheme (COMS) which finds the set of globlly minimum cost links between isolted clusters, MLC = {for ll i nd j; MLC ij } while stisfying the cost constrint LC limit. This process is very time consuming since it hs to check every combintion of 2 1 links nd its computtion time is exponentil. Therefore, before solving the optimiztion problem we dd step to merge smll clusters with one node to the nerest lrger cluster. COMS cn be implemented in centrlized fshion t super node nd put in lgorithm form s follows. Cost Optimized Merging Scheme (COMS) Step 1 : Perform h-cta to determine if the network is prtitioned, if Yes go to step 2, otherwise STOP. Step 2 : From the h-cta results determine the number of clusters N CL nd the node sets of ech cluster, C i, nd the cluster djcency mtrix CL_A. Step 3 Merge the clusters with single member to the nerest bigger cluster. Add these links to n improvement required set of links. If this process resolves the prtition problem, STOP. Otherwise, go on step 4. Step 4 Find the minimum Totl Cost (TC) : 1, set of links to provide bi-communicble connectivity between to ll nodes. Step 5 : Add the set of links from step 4 into the set of links from step 2. () Originl clusters (b) COMS (c) SMS Fig. 5. Added links by SMS (RED) nd COMS (BLUE)
5 C. Comprison of Cluster Merging Schemes Figure 5 shows simple exmple illustrting the differences between SMS nd COMS. Figure 5 () shows the originl connections between the three clusters of network. The nodes in cluster C 3 cn obtin topology informtion from C 1 nd C 2 nd one cn initite COMS. Figure 5(b) shows the topologicl results of running the COMS lgorithm. Observe tht only single directed link is dded to provide bi-communicble connectivity to ll clusters. In contrst the topology fter running SMS is shown in Figure 5(c). Obviously SMS dds more links then COMS nd thus costs more but it hs the dvntges of being distributed nd mking the network more robust to filures. Note tht one node in C 2 nd one in C 3 will independently initite the SMS lgorithm. As more extensive, evlution nd comprison of SMS nd COMS, we conducted set of simultion bsed experiments similr to those reported in Section II B. Specificlly, using the ns2 simultor we generted rndom topologies with different node densities (i.e., 5, 75, nd 1) in network re of m 2. The nodes were independently distributed ccording to uniform [-15] rndom vrible in the re. We dopted bseline prmeters from 82.11b equipment (e.g., P RSST = -9 dbm). Heterogeneous conditions were creted by hving ech node i selects its trnsmission power P Ti ccording to uniform [13.5dBm dBm] rndom vrible nd creted non-uniform signl propgtion between nodes using the Qusi-Unit Disk Grph (Q-UDG) model with α = , β =.75 or β =.85. We rndomly generted topologies in this fshion until 5 wekly connected topologies were found for ech node density. For ech wekly connected topology both SMS nd COMS were implemented to improve the connectivity. We exmined three mximum node trnsmission powers constrints nmely: 2dBm, 25dBm, nd unlimited. In the unlimited power cse for COMS the power ws incresed to the minimum power required to provide the minimum cost links necessry for bi-communicble 1-connectivity. In the unlimited power cse for SMS, the power ws incresed until Averge number of directed links dded SMS (β =.75, Tx = 2dBm) COMS (β =.75, Tx = 2dBm) SMS (β =.75, Tx = 25dBm) COMS (β =.75, Tx = 25dBm) SMS (β =.75, Tx = Unlimited) COMS (β =.75, Tx = Unlimited) Averge number of directed links dded SMS (β =.85, Tx = 2dBm) COMS (β =.85, Tx = 2dBm) SMS (β =.85, Tx = 25dBm) COMS (β =.85, Tx = 25dBm) SMS (β =.85, Tx = Unlimited) COMS (β =.85, Tx = Unlimited) () Averge number of directed links dded for β =.75 (b) Averge number of directed links dded for β =.85 Averge number of hops in pths SMS (β =.75, Tx = 2dBm) COMS (β =.75, Tx = 2dBm) SMS (β =.75, Tx = 25dBm) 5.5 COMS (β =.75, Tx = 25dBm) SMS (β =.75, Tx = Unlimited) COMS (β =.75, Tx = Unlimited) Averge number of hops in pths SMS (β =.85, Tx = 2dBm) COMS (β =.85, Tx = 2dBm) SMS (β =.85, Tx = 25dBm) COMS (β =.85, Tx = 25dBm) SMS (β =.85, Tx = Unlimited) COMS (β =.85, Tx = Unlimited) (c) Averge number of hops in pths for β =.75 (d) Averge number of hops in pths for β =.85 Fig. 6. Comprison of SMS nd COMS in verge number of directed dding links nd hops in pths with 95% of confidence intervl
6 the minimum power necessry to dd links tht result in full mesh of links between ll clusters. While the unlimited trnsmit power cse is imprcticl it provides benchmrk scenrio for the results. Figure 6 shows typicl simultion results. For the three mximum trnsmit power limit investigtes fter pplying SMS or COMS ll topologies were t lest bi-communicble 1-connected. Figure 6 () nd (b) show the verge number of directed links dded to the network versus network density for both SMS nd COMS. As expected, when the network density increses fewer links re required to be dded in order to provide connectivity regrdless of whether SMS or COMS is used. For exmple, COMS dds n verge of 5.52 links in 5 node networks nd 1.96 links in 1 node networks with β =.75 nd mximum trnsmit power limit of 2dBm. Compring SMS nd COMS one cn see tht COMS needs fewer links to provide connectivity. In exmining the effects of the mximum trnsmit power limit one cn see tht the two schemes behve differently. For SMS s the power increses more links re dded beyond the minimum needed for 1-connectivity. In the extreme cse of unlimited vilble trnsmit power, links re dded until the clusters re interconnected with full mesh of links. In contrst, COMS lwys chooses the cost optimized minimum number of dditionl links. Hence, the men number of dditionl links decreses slightly with incresing mximum power limit. Further compring the effect of β on the results one cn see tht s β decreses nd the signl propgtion becomes more irregulr the verge number of directed links need to provide connectivity increses. Figure 6(c) nd (d) show how the verge hop count in source-destintion pths chnges versus the network density for both schemes. The verge hop count of ll pths between every pir of nodes is considered. From the figures SMS outperforms COMS for ll network densities, β vlues, nd restortion restrictions. For exmple, with 2dBm mximum power level restriction, the verge hop count for SMS is 6.72 nd COMS is 7.35 for 5 node network with β =.75. Since COMS finds the minimum number of dditionl links to provide connectivity, while SMS generte s mny s it could, the verge hop count by SMS should be lwys smller thn COMS. On the other hnd, in terms of the verge link cost COMS lwys results in lower verge cost nd the difference is more significnt s the mximum power level limit increses. Note tht, the worse cse mximum number of directed links to connect N CL clusters is 2(N CL 1). The time complexity of SMS cn be shown to be nd tht of COMS is where k is number of possible link combintions. The rnge of the number of link combintions is 1 to 2(N CL 1) nd k cn be computed by, where, 2 (5) 2 Therefore, the computtion time of SMS is smller thn tht of COMS. If the number of isolted clusters N CL increses, the computtion time of COMS increses more quickly thn SMS. IV. CONCLUSIONS Mny 1-connected homogeneous wireless networks become disconnected when the network becomes heterogeneous. In this pper we hve proposed new lgorithm to determine the connectivity of heterogeneous wireless networks. The results of simultion bsed numericl study utilizing our proposed lgorithm to exmine the effects of severl fctors (vritions in power levels, irregulr signl propgtion, nd network nodl density) on connectivity re presented. Further we propose two connectivity mngement schemes SMS nd COMS to dd dditionl links to prtitioned heterogeneous network in order to provide t lest 1-connectivity. A simultion bsed study of the two schemes shows tht both schemes cn correctly dd links to provide connectivity, but SMS is esier to implement with the drwbck of higher cost. REFERENCES [1] I. F. Akyildiz nd X. Wng, A survey on wireless mesh networks, IEEE Communictions Mgzine, Vol. 43, No. 9, pp. S23 S3, Sept., 25. [2] H. Moustf nd Y. Zhng, Vehiculr networks, techniques, stndrds, nd pplictions, CRC Press, 29. [3] I. Chlmtc, M. Conti, nd J. J. Liu, Mobile d hoc networking: impertives nd chllenges, Ad Hoc Networks, vol. 1, no. 1, pp , July, 23. [4] P. Gupt nd P.R. Kumr, Criticl Power for Asymptotic Connectivity in Wireless Networks, Stochstic Anlysis, Control, Optimiztion nd Applictions, Boston: Birkhuser, pp , [5] P. Snti nd D.M. Blough, The Criticl Trnsmitting Rnge of Connectivity in Sprse Wireless Ad Hoc Networks, IEEE Trnsctions on Mobile Computing, Vol 2. No. 1, Jnury-Mrch 23 [6] F. Xue nd P.R. Kummr, The Number of Neighbors Needed for Connectivity of Wireless Networks, Wireless Networks 1, Kluwer Acdemic, Netherlnds, 24, pp [7] R. Hekmt nd P. V. Mieghem, Study of connectivity in wireless d-hoc networks with n improved rdio model, In Workshop on Wireless Optimiztion, WiOpt, 24. [8] T.-H. Kim, D. Tipper nd P. Krishnmurthy, ``Connectivity nd Criticl Point Behvior in Mobile Ad Hoc nd Sensor Networks, Proceedings of IEEE ISCC 9, July, 29. [9] C. Bettstetter, On the minimum node degree nd connectivity of wireless multihop network, Proc. 3rd ACM Interntionl Symposium on Mobile Ad Hoc Networking nd Computing (MobiHoc), Lusnne, Switzerlnd, pp. 8 91, June [1] Q. Ling nd Z. Tin, ``Minimum Node Degree nd k-connectivity of Wireless Multihop Network in Bounded Are, Proceedings of IEEE Globecom, 27. [11] H. Zhng nd J. C. Hou, On the criticl totl power for symptotic k-connectivity in wireless networks, IEEE/ACM Trnsctions on Networking, April, 28. [12] D. Kotz, C. Newport, R.S. Gry, J. Liu, Y. Yun, nd C. Elliott, Experimentl Evlution of Wireless Simultion Assumptions, Proceedings of the 7 th ACM Interntionl Workshop on Modeling Anlysis nd Simultion of Wireless nd Mobile Systems (MSWiM 24), Venice, Itly, Oct., 24. [13] F. Kuhn nd A. Zollinger, Ad-hoc networks beyond unit disk grphs, in Proc. of the ACM Workshop on Foundtions of mobile computing, 23. [14] C. Bettstetter nd C. Hrtmnn, Connectivity of Wireless Multihop Networks in Shdow Fding Environment, Wireless Networks 11, Springer Science, 25. [15] C. Godsil nd G. Royle, Algebric Grph Theory, Springer-Verlg, 21. [16] C. Svrese, J. M. Rbey, nd J. Beutel, Loction in Distributed Ad-Hoc Wireless Sensor Networks, Proc. IEEE Int l Conf. Acoustics, Speech, nd Sgnl Processing, Vol. 4, pp , My 21. [17] T. He, C. Hung, B. M. Blum, J. A. Stnkovic, nd T. Abdelzher, Rnge-Free Locliztion Schemes for Lrge Scle Sensor Networks, Proc Ninth ACM Int l Conf. MOBICOM, pp , Sept. 23.
Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li
2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min
More informationOn the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis
On the Detection of Step Edges in Algorithms Bsed on Grdient Vector Anlysis A. Lrr6, E. Montseny Computer Engineering Dept. Universitt Rovir i Virgili Crreter de Slou sin 43006 Trrgon, Spin Emil: lrre@etse.urv.es
More information9 Graph Cutting Procedures
9 Grph Cutting Procedures Lst clss we begn looking t how to embed rbitrry metrics into distributions of trees, nd proved the following theorem due to Brtl (1996): Theorem 9.1 (Brtl (1996)) Given metric
More information1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)
Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric
More informationOverview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases
Overview Mobile computing nd dtbses Generl issues in mobile dt mngement Dt dissemintion Dt consistency Loction dependent queries Interfces Detils of brodcst disks thlis klfigopoulos Network rchitecture
More informationII. THE ALGORITHM. A. Depth Map Processing
Lerning Plnr Geometric Scene Context Using Stereo Vision Pul G. Bumstrck, Bryn D. Brudevold, nd Pul D. Reynolds {pbumstrck,brynb,pulr2}@stnford.edu CS229 Finl Project Report December 15, 2006 Abstrct A
More informationThe Distributed Data Access Schemes in Lambda Grid Networks
The Distributed Dt Access Schemes in Lmbd Grid Networks Ryot Usui, Hiroyuki Miygi, Yutk Arkw, Storu Okmoto, nd Noki Ymnk Grdute School of Science for Open nd Environmentl Systems, Keio University, Jpn
More informationLecture 10 Evolutionary Computation: Evolution strategies and genetic programming
Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationVulnerability Analysis of Electric Power Communication Network. Yucong Wu
2nd Interntionl Conference on Advnces in Mechnicl Engineering nd Industril Informtics (AMEII 2016 Vulnerbility Anlysis of Electric Power Communiction Network Yucong Wu Deprtment of Telecommunictions Engineering,
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationLECT-10, S-1 FP2P08, Javed I.
A Course on Foundtions of Peer-to-Peer Systems & Applictions LECT-10, S-1 CS /799 Foundtion of Peer-to-Peer Applictions & Systems Kent Stte University Dept. of Computer Science www.cs.kent.edu/~jved/clss-p2p08
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationRevisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network
Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 Revisiting the notion of Origin-Destintion Trffic Mtrix of the Hosts tht re ttched to Switched Locl Are Network Mondy
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationDigital Design. Chapter 6: Optimizations and Tradeoffs
Digitl Design Chpter 6: Optimiztions nd Trdeoffs Slides to ccompny the tetbook Digitl Design, with RTL Design, VHDL, nd Verilog, 2nd Edition, by Frnk Vhid, John Wiley nd Sons Publishers, 2. http://www.ddvhid.com
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationA Priority-based Distributed Call Admission Protocol for Multi-hop Wireless Ad hoc Networks
A Priority-bsed Distributed Cll Admission Protocol for Multi-hop Wireless Ad hoc Networks un Sun Elizbeth M. Belding-Royer Deprtment of Computer Science University of Cliforni, Snt Brbr suny, ebelding
More informationMidterm 2 Sample solution
Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the
More informationChapter 2 Sensitivity Analysis: Differential Calculus of Models
Chpter 2 Sensitivity Anlysis: Differentil Clculus of Models Abstrct Models in remote sensing nd in science nd engineering, in generl re, essentilly, functions of discrete model input prmeters, nd/or functionls
More informationP(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have
Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using
More information4452 Mathematical Modeling Lecture 4: Lagrange Multipliers
Mth Modeling Lecture 4: Lgrnge Multipliers Pge 4452 Mthemticl Modeling Lecture 4: Lgrnge Multipliers Lgrnge multipliers re high powered mthemticl technique to find the mximum nd minimum of multidimensionl
More information2 Computing all Intersections of a Set of Segments Line Segment Intersection
15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationcell 1 cell 2 cell 3 cell 4 a a
Frequency Assignment for Cellulr Mobile Systems Using Constrint Stisfction Techniques Mkoto Yokooy nd Ktsutoshi Hirymz y NTT Communiction Science Lbortories -4 Hikridi, Seik-cho, Sorku-gun, Kyoto 69-037
More informationEngineer To Engineer Note
Engineer To Engineer Note EE-169 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit
More informationsuch that the S i cover S, or equivalently S
MATH 55 Triple Integrls Fll 16 1. Definition Given solid in spce, prtition of consists of finite set of solis = { 1,, n } such tht the i cover, or equivlently n i. Furthermore, for ech i, intersects i
More informationMATH 25 CLASS 5 NOTES, SEP
MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid
More information9.1 apply the distance and midpoint formulas
9.1 pply the distnce nd midpoint formuls DISTANCE FORMULA MIDPOINT FORMULA To find the midpoint between two points x, y nd x y 1 1,, we Exmple 1: Find the distnce between the two points. Then, find the
More information12-B FRACTIONS AND DECIMALS
-B Frctions nd Decimls. () If ll four integers were negtive, their product would be positive, nd so could not equl one of them. If ll four integers were positive, their product would be much greter thn
More informationUnit #9 : Definite Integral Properties, Fundamental Theorem of Calculus
Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl
More informationAn Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization
An Efficient Divide nd Conquer Algorithm for Exct Hzrd Free Logic Minimiztion J.W.J.M. Rutten, M.R.C.M. Berkelr, C.A.J. vn Eijk, M.A.J. Kolsteren Eindhoven University of Technology Informtion nd Communiction
More informationOSPF WEIGHT SETTING OPTIMIZATION FOR SINGLE LINK FAILURES
OSP WEIGH SEIG OPIMIZAIO OR SIGLE LIK AILURES Mohmmed H. Sqlli, Sdiq M. Sit, nd Syed Asdullh Computer Engineering Deprtment King hd University of Petroleum & Minerls Dhhrn 31261, Sudi Arbi {sqlli,sdiq,ssd}@kfupm.edu.s
More informationA New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method
A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,
More informationFault injection attacks on cryptographic devices and countermeasures Part 2
Fult injection ttcks on cryptogrphic devices nd countermesures Prt Isrel Koren Deprtment of Electricl nd Computer Engineering University of Msschusetts Amherst, MA Countermesures - Exmples Must first detect
More informationa < a+ x < a+2 x < < a+n x = b, n A i n f(x i ) x. i=1 i=1
Mth 33 Volume Stewrt 5.2 Geometry of integrls. In this section, we will lern how to compute volumes using integrls defined by slice nlysis. First, we recll from Clculus I how to compute res. Given the
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. TechAdvisory.org SME Reports sponsored by Voice over Internet Protocol (VoIP)
More informationNetwork Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved
Network Interconnection: Bridging CS 57 Fll 6 6 Kenneth L. Clvert All rights reserved The Prolem We know how to uild (rodcst) LANs Wnt to connect severl LANs together to overcome scling limits Recll: speed
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationVoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
More informationPerformance Evaluation of Dynamic Reconfiguration in High-Speed Local Area Networks
Performnce Evlution of Dynmic Reconfigurtion in High-Speed Locl Are Networks Rfel Csdo, Aurelio Bermúdez, Frncisco J. Quiles, JoséL.Sánchez Depto. de Informátic Universidd de Cstill-L Mnch 271- Albcete,
More informationA Probabilistic Emergent Routing Algorithm for Mobile Ad Hoc Networks
Author mnuscript, published in "WiOpt'03: Modeling nd Optimiztion in Mobile, Ad oc nd Wireless Networks (2003) 10 pges" A Probbilistic Emergent Routing Algorithm for Mobile Ad oc Networks John S. Brs nd
More informationUSING HOUGH TRANSFORM IN LINE EXTRACTION
Stylinidis, Efstrtios USING HOUGH TRANSFORM IN LINE EXTRACTION Efstrtios STYLIANIDIS, Petros PATIAS The Aristotle University of Thessloniki, Deprtment of Cdstre Photogrmmetry nd Crtogrphy Univ. Box 473,
More informationFig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1.
Answer on Question #5692, Physics, Optics Stte slient fetures of single slit Frunhofer diffrction pttern. The slit is verticl nd illuminted by point source. Also, obtin n expression for intensity distribution
More informationSection 10.4 Hyperbolas
66 Section 10.4 Hyperbols Objective : Definition of hyperbol & hyperbols centered t (0, 0). The third type of conic we will study is the hyperbol. It is defined in the sme mnner tht we defined the prbol
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationOn Computation and Resource Management in Networked Embedded Systems
On Computtion nd Resource Mngement in Networed Embedded Systems Soheil Ghisi Krlene Nguyen Elheh Bozorgzdeh Mjid Srrfzdeh Computer Science Deprtment University of Cliforni, Los Angeles, CA 90095 soheil,
More informationAbstract. 1. Introduction. Kaveh Bevrani 1 Mamun Muntasir Rahman 2 Edward Chung 3
Austrlsin Trnsport Reserch Forum 011 Proceedings 8-30 September 011, Adelide, Austrli Publiction website: http://www.ptrec.org/trf.spx Queue protection prmeters fine-tuning for vrible speed limits Kveh
More informationTransparent neutral-element elimination in MPI reduction operations
Trnsprent neutrl-element elimintion in MPI reduction opertions Jesper Lrsson Träff Deprtment of Scientific Computing University of Vienn Disclimer Exploiting repetition nd sprsity in input for reducing
More informationVoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
More informationVoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
More informationPreserving Constraints for Aggregation Relationship Type Update in XML Document
Preserving Constrints for Aggregtion Reltionship Type Updte in XML Document Eric Prdede 1, J. Wenny Rhyu 1, nd Dvid Tnir 2 1 Deprtment of Computer Science nd Computer Engineering, L Trobe University, Bundoor
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationVirtual Network Embedding For Evolving Networks
This full text pper ws peer reviewed t the direction of IEEE Communictions Society subject mtter experts for publiction in the IEEE Globecom proceedings. Virtul Network Embedding For Evolving Networks
More informationText mining: bag of words representation and beyond it
Text mining: bg of words representtion nd beyond it Jsmink Dobš Fculty of Orgniztion nd Informtics University of Zgreb 1 Outline Definition of text mining Vector spce model or Bg of words representtion
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationReplicating Web Applications On-Demand
Replicting Web Applictions On-Demnd Swminthn Sivsubrmnin Guillume Pierre Mrten vn Steen Dept. of Computer Science, Vrije Universiteit, Amsterdm {swmi,gpierre,steen}@cs.vu.nl Abstrct Mny Web-bsed commercil
More informationL. Yaroslavsky. Fundamentals of Digital Image Processing. Course
L. Yroslvsky. Fundmentls of Digitl Imge Processing. Course 0555.330 Lecture. Imge enhncement.. Imge enhncement s n imge processing tsk. Clssifiction of imge enhncement methods Imge enhncement is processing
More informationParallel Square and Cube Computations
Prllel Squre nd Cube Computtions Albert A. Liddicot nd Michel J. Flynn Computer Systems Lbortory, Deprtment of Electricl Engineering Stnford University Gtes Building 5 Serr Mll, Stnford, CA 945, USA liddicot@stnford.edu
More informationA dynamic multicast tree based routing scheme without replication in delay tolerant networks
Accepted Mnuscript A dynmic multicst tree bsed routing scheme without repliction in dely tolernt networks Yunsheng Wng, Jie Wu PII: S0-()00- DOI: 0.0/j.jpdc.0..00 Reference: YJPDC To pper in: J. Prllel
More informationDesign and Performance Evaluation of Underwater Data Dissemination Strategies using Interference Avoidance and Network Coding
Design nd Performnce Evlution of Underwter Dt Dissemintion Strtegies using Interference Avoidnce nd Network Coding Rúl Plcios Fbrizio Grnelli University of Trento, Itly Jnus Heide Frnk H.P. Fitzek Alborg
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More information10.5 Graphing Quadratic Functions
0.5 Grphing Qudrtic Functions Now tht we cn solve qudrtic equtions, we wnt to lern how to grph the function ssocited with the qudrtic eqution. We cll this the qudrtic function. Grphs of Qudrtic Functions
More information1 Quad-Edge Construction Operators
CS48: Computer Grphics Hndout # Geometric Modeling Originl Hndout #5 Stnford University Tuesdy, 8 December 99 Originl Lecture #5: 9 November 99 Topics: Mnipultions with Qud-Edge Dt Structures Scribe: Mike
More informationStained Glass Design. Teaching Goals:
Stined Glss Design Time required 45-90 minutes Teching Gols: 1. Students pply grphic methods to design vrious shpes on the plne.. Students pply geometric trnsformtions of grphs of functions in order to
More informationVoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
More informationFile Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment
File Mnger Quick Reference Guide June 2018 Prepred for the Myo Clinic Enterprise Khu Deployment NVIGTION IN FILE MNGER To nvigte in File Mnger, users will mke use of the left pne to nvigte nd further pnes
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationVoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
More informationSelf-Organizing Hierarchical Routing for Scalable Ad Hoc Networking
1 Self-Orgnizing Hierrchicl Routing for Sclble Ad Hoc Networking Shu Du Ahmed Khn Sntshil PlChudhuri Ansley Post Amit Kumr Sh Peter Druschel Dvid B. Johnson Rudolf Riedi Rice University Abstrct As devices
More informationBefore We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):
Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationComputing offsets of freeform curves using quadratic trigonometric splines
Computing offsets of freeform curves using qudrtic trigonometric splines JIULONG GU, JAE-DEUK YUN, YOONG-HO JUNG*, TAE-GYEONG KIM,JEONG-WOON LEE, BONG-JUN KIM School of Mechnicl Engineering Pusn Ntionl
More informationDELAY Tolerant Networks (DTNs) [1] [2] are a class of
2254 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. 12, DECEMBER 2012 Exploiting Friendship Reltions for Efficient Routing in Mobile Socil Networks Eyuphn Bulut, Member, IEEE, nd Boleslw
More informationA Transportation Problem Analysed by a New Ranking Method
(IJIRSE) Interntionl Journl of Innovtive Reserch in Science & Engineering ISSN (Online) 7-07 A Trnsporttion Problem Anlysed by New Rnking Method Dr. A. Shy Sudh P. Chinthiy Associte Professor PG Scholr
More informationPerformance analysis of QoS mechanisms in IP networks
University of Wollongong Reserch Online Fculty of Informtics - Ppers (Archive) Fculty of Engineering nd Informtion Sciences 2000 Performnce nlysis of QoS mechnisms in IP networks D. Ji University of Wollongong
More informationSlides for Data Mining by I. H. Witten and E. Frank
Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully
More informationEfficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc
4th Ntionl Conference on Electricl, Electronics nd Computer Engineering (NCEECE 2015) Efficient Regulr Expression Grouping Algorithm Bsed on Lbel Propgtion Xi Chen, Shuqio Chenb nd Ming Moc Ntionl Digitl
More informationDIFFERENT POLICY OBJECTIVES OF THE ROAD AUTHORITY IN THE OPTIMAL TOLL DESIGN PROBLEM
DIFFERENT POLICY OBJECTIVES OF THE ROAD AUTHORITY IN THE OPTIMAL TOLL DESIGN PROBLEM Dusic Joksimovic*, Michiel Bliemer Delft University of Technology, The Netherlnds ARS Trnsport &Technology, The Netherlnds
More informationA Heuristic Approach for Discovering Reference Models by Mining Process Model Variants
A Heuristic Approch for Discovering Reference Models by Mining Process Model Vrints Chen Li 1, Mnfred Reichert 2, nd Andres Wombcher 3 1 Informtion System Group, University of Twente, The Netherlnds lic@cs.utwente.nl
More informationDynamic Programming. Andreas Klappenecker. [partially based on slides by Prof. Welch] Monday, September 24, 2012
Dynmic Progrmming Andres Klppenecker [prtilly bsed on slides by Prof. Welch] 1 Dynmic Progrmming Optiml substructure An optiml solution to the problem contins within it optiml solutions to subproblems.
More informationPNC NC code PROGRAMMER'S MANUAL
PNC-3200 NC code PROGRAMMER'S MANUAL Thnk you very much for purchsing the PNC-3200. To ensure correct nd sfe usge with full understnding of this product's performnce, plese be sure to red through this
More informationCOMPUTATIONS of a bijective mapping among different
IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, ACCEPTED 1 Efficient Optimiztion of Common Bse Domins for Cross-Prmeteriztion Tsz-Ho Kwok, Yunbo Zhng, nd Chrlie C.L. Wng, Member, IEEE Abstrct
More informationAlignment of Long Sequences. BMI/CS Spring 2012 Colin Dewey
Alignment of Long Sequences BMI/CS 776 www.biostt.wisc.edu/bmi776/ Spring 2012 Colin Dewey cdewey@biostt.wisc.edu Gols for Lecture the key concepts to understnd re the following how lrge-scle lignment
More informationIn the last lecture, we discussed how valid tokens may be specified by regular expressions.
LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.
More informationTilt-Sensing with Kionix MEMS Accelerometers
Tilt-Sensing with Kionix MEMS Accelerometers Introduction Tilt/Inclintion sensing is common ppliction for low-g ccelerometers. This ppliction note describes how to use Kionix MEMS low-g ccelerometers to
More informationNearest Keyword Set Search in Multi-dimensional Datasets
Nerest Keyword Set Serch in Multi-dimensionl Dtsets Vishwkrm Singh Deprtment of Computer Science University of Cliforni Snt Brbr, USA Emil: vsingh014@gmil.com Ambuj K. Singh Deprtment of Computer Science
More information9 4. CISC - Curriculum & Instruction Steering Committee. California County Superintendents Educational Services Association
9. CISC - Curriculum & Instruction Steering Committee The Winning EQUATION A HIGH QUALITY MATHEMATICS PROFESSIONAL DEVELOPMENT PROGRAM FOR TEACHERS IN GRADES THROUGH ALGEBRA II STRAND: NUMBER SENSE: Rtionl
More informationMobile IP route optimization method for a carrier-scale IP network
Moile IP route optimiztion method for crrier-scle IP network Tkeshi Ihr, Hiroyuki Ohnishi, nd Ysushi Tkgi NTT Network Service Systems Lortories 3-9-11 Midori-cho, Musshino-shi, Tokyo 180-8585, Jpn Phone:
More informationError-Resilient LZW Data Compression
Error-Resilient LZW t Compression Yonghui Wu Stefno Lonrdi ept. Computer Science & Engineering University of Cliforni Riverside, CA 92521 {yonghui stelo}@cs.ucr.edu Wojciech Szpnkowski eprtment of Computer
More informationISG: Itemset based Subgraph Mining
ISG: Itemset bsed Subgrph Mining by Lini Thoms, Stynryn R Vlluri, Kmlkr Krlplem Report No: IIIT/TR/2009/179 Centre for Dt Engineering Interntionl Institute of Informtion Technology Hyderbd - 500 032, INDIA
More informationRepresentation of Numbers. Number Representation. Representation of Numbers. 32-bit Unsigned Integers 3/24/2014. Fixed point Integer Representation
Representtion of Numbers Number Representtion Computer represent ll numbers, other thn integers nd some frctions with imprecision. Numbers re stored in some pproximtion which cn be represented by fixed
More informationWhat do all those bits mean now? Number Systems and Arithmetic. Introduction to Binary Numbers. Questions About Numbers
Wht do ll those bits men now? bits (...) Number Systems nd Arithmetic or Computers go to elementry school instruction R-formt I-formt... integer dt number text chrs... floting point signed unsigned single
More information