T-ANT: A Nature-Inspired Data Gathering Protocol for Wireless Sensor Networks 1

Size: px
Start display at page:

Download "T-ANT: A Nature-Inspired Data Gathering Protocol for Wireless Sensor Networks 1"

Transcription

1 22 JOURNAL OF COMMUNICATIONS, VOL. 1, NO. 2, MAY 26 T-ANT: A Nature-Ispired Data Gatherig Protocol for Wireless Sesor Networks 1 S. Selvakeedy School of Iformatio Techologies, Uiversity of Sydey, NSW 26, Australia. skeedy@it.usyd.edu.au S. Siappa^ ad Yi Shag* ^School of Ecoomics & Iformatio Systems, Uiversity of Wollogog, Wollogog NSW 2522, Australia. suku@uow.edu.au *Dept. of Computer Sciece, Uiversity of Missouri-Columbia, Columbia, MO 65211, USA. shagy@missouri.edu Abstract There are may difficult challeges ahead i the desig of a eergy-efficiet commuicatio stack for wireless sesor etworks. Due to the severe sesor ode costraits, protocols have to be simple yet scalable. To this ed, collective social isects behavior could be adopted to guide the desig of these protocols. We exploit the simple heuristics of at coloy i foragig ad brood sortig to desig a hierarchical ad scalable data gatherig protocol. Also, we demostrate how it could exploit data correlatios i sesor readigs to miimize commuicatios cost i the data gatherig process towards the sik. This approach selects oly a subset of sesor odes to recostruct data for the etire etwork. A distributed variace estimatio algorithm is itroduced to capture data correlatios with egligible state maiteace. It is show that this algorithm is able to predict the values rather accurately. Due to the geeral robustess of ay ature-ispired algorithm, our data gatherig protocol is reliable. It is fully distributed, ad promises scalability ad substatial eergy savigs. Idex Terms Data Gatherig, Data Correlatio, Clusterig, Swarm Itelligece, Simulatio, Sesor Networks I. INTRODUCTION Wireless sesor techology is garerig a lot of iterests due to its promises, eablig it to evolve rather rapidly. For istace, i terms of the sesor ode hardware, the Mica2 mote has roughly eight times the memory ad commuicatio badwidth as its predecessor, the Ree mote, developed i 1999 for the same power budget [1]. These sesor odes have foud use i may applicatios such as earthquake moitorig, target trackig ad surveillace, ad structural moitorig. The odes are typically less mobile due to their uique applicatio eeds, substatially more resource costraied ad more desely deployed tha mobile ad hoc etworks (MANETs). Eve though, there have bee sigificat advaces i recet years, more eergy-efficiet solutios are required withi the commuicatio stack for the coservatio of the battery power. A approach that is likely to succeed is the use of a hierarchical structure [2], which also promotes scalability of wireless sesor etworks (WSNs). Clusterig with data aggregatio is a importat techique i this directio, ad it makes the tradeoff betwee eergy efficiecy ad data resolutio. Most clusterig algorithms aim at geeratig the miimum umber of clusters ad trasmissio distace. These algorithms also distiguish themselves by how the clusterheads (CHs) are elected. The LEACH algorithm [3] ad its related extesio, TCCA [4] use probabilistic self-electio, where each sesor ode has a probability p of becomig a CH i each roud. Such role rotatio aims to distribute the eergy usage for a more load-balaced operatio. However, LEACH oly works for sigle broadcast domai etworks, ad mostly operates i a suboptimally formed hierarchical structure due to its stochastic ature. TCCA overcame the former problem by allowig multihop clusters but still suffers from the latter. Whe developig WSN protocols, aother crucial desig issue to cosider is the etwork reliability. To this ed, social isect swarm behavior may provide a ideal model for the desig of such less cotrollable systems. To our kowledge, very few researchers have cosidered or adopted such ature-ispired approaches for WSN desig. However, a umber of recet works has bee based o differet swarm behaviors i the desig of routig protocols for MANETs. As there are may importat similarities betwee these two ad hoc techologies, we believe buildig o these kowledge may be useful for WSNs. 1 Based o " Data dissemiatio based o at swarms for wireless sesor etworks", by S. Selvakeedy, S. Siappa ad Yi Shag which appeared i the Cosumer Commuicatios ad Networkig Coferece, IEEE. 26 ACADEMY PUBLISHER

2 JOURNAL OF COMMUNICATIONS, VOL. 1, NO. 2, MAY I ay radom etwork deploymet, may sesor odes may also exhibit data correlatios i their sesed data due to their overlappig sesig rages. This issue may be addressed like a topology cotrol issue where it could be formulated as a miimum graph coverig problem, or as a data aggregatio or compressio problem that miimizes the amout of data trasmitted to the sik through some i-etwork processig. I some applicatios, sesor odes may also exhibit temporal correlatio if the moitored physical characteristic has small variability. Whe the correlated data is exploited withi the etwork, the sik gathers sapshots of reduced sigal data values measured at the sesor odes, ad uses iterpolatio to derive the sigal value at other poits i the moitored regio. Here, we exploit the temporal correlatios i the sesor data. This correlatio at a ode is captured etirely based local observatios with miimal state, ad is used to cotrol the ode s participatio i the data gatherig process towards the sik. I this paper, we ivestigate the T-ANT protocol, itroduced iitially i [5], more i depth ad exted it to support some i-etwork processig to remove redudat data without the sik s cotrol. This protocol adopts the clustered strategy realized usig useful priciples of the at coloy behavior. It achieves the objective of uiform cluster formatio by exploitig two swarm behaviors, amely foragig ad brood sortig. T-ANT achieves substatially better performace tha that of a flat miimum hop routig strategy, LEACH as well as TCCA. The rest of the paper is orgaized as follows. Sectio 2 presets the perspective of this area of research. Various clusterig algorithms, ature-ispired algorithms ad data gatherig protocols proposed i the literature are discussed. I Sectio 3, the details of the T-ANT clusterig algorithm ad the associated data variability estimatio algorithm are described. The comprehesive simulator used to experimet with this protocol is described i Sectio 4. Various experimets ad the correspodig results are preseted ad aalyzed i Sectio 5. The paper cocludes with the mai fidigs of this work i the fial sectio. II. RELATED WORK Itese research i the field of sesor etwork techology i recet years has fueled further developmet i micro-sesor techology ad low-power aalog/digital electroics. To support scalable data gatherig, it is realized that the approach that is likely to succeed to provide a eergy-efficiet solutio is to adopt a hierarchical structure. To this ed, various clusterig algorithms have bee proposed i differet cotext. Geerally, clusterig algorithms segmet a etwork ito o-overlappig clusters comprisig a CH each. No-CH odes trasmit sesed data to CHs, where the data sigals could be aggregated ad trasmitted to the sik. Iitially, these algorithms focused o the coectivity problem [6-8] but later eergy-efficiecy was more of iterest i wireless ad hoc ad sesor etworks [3, 4, 9-13]. Aother crucial desig aspect of WSNs is the etwork reliability ad fault-tolerace. It has bee demostrated i differet cotext that the collective behavior of social isects has may attractive features, ot the least robustess ad reliability. However, there are oly very limited WSN proposals ispired by such biological behaviors. Due to some parallels to MANETs, we reviewed some ature-ispired algorithms proposed for this domai. The first MANET routig algorithm based o at coloy priciples is ARA [14]. It exploited the pheromoe layig behavior of ats. Pheromoe is a quality metric idicatig the goodess of a path. Although pheromoe evaporates, subsequet ats leave additioal pheromoe ad thus reiforce the path. Over time, ats establish the shortest path betwee food ad their est i a full-distributed ad autoomous maer. Ats are flooded towards destiatios while establishig the reverse paths to the at source. The gradual decay of pheromoe itroduces a form of egative feedback to prevet old routes from remaiig i the forwardig tables whe routes fall out of favor with ats. The shortest paths become preferable, ad most ats use them. However, loger paths are ot etirely lost as some ats may still maitai such routes. Routig schemes based o such at coloy behavior is both robust ad adaptable. Whe the shortest route is lost due to some evet, the loger routes provide alterative optios. Other atureispired protocols were discussed i [5]. The problem of gatherig correlated data i WSNs has bee recetly addressed by meas of either compressio or topology cotrol-like approaches. The mai focus i the compressio approach is to reduce the total umber of bits trasmitted towards the sik usig suitable codig techiques. I [15], the authors proposed a distributed compressio techique based o the Slepia-Wolf model, ad the level of compressio is determied cetrally by the sik. This ode tracks the correlatio structure amog odes, ad the, idividually iforms each sesor ode the umber of bits to be used for ecodig. They have however assumed that the etwork is a sigle broadcast domai. Moreover, the sik would prove to be a bottleeck i a larger etwork, ad could lead to the scalability problem. Sigle-iput codig strategies were adopted i [16] to ecode a ode s data based o a eighbor ode. As the problem of fidig the miimumeergy data gatherig tree is NP-complete, they preseted approximatio algorithms to costruct a ear-optimal data gatherig tree for foreig-codig ad self-codig schemes. I [17], the authors proposed efficiet approximatio algorithms also based o Slepia-Wolf codig to optimize the trasmissio structure ad the rate allocatio at each ode. I all these approaches, all sesor odes are required to participate i data trasmissio at every roud eve though at reduced umber of bits trasmissios. Aother type of algorithm that aims to reduce the umber of trasmissios by makig redudat odes to sleep were proposed i [18] ad [19]. I priciple, these 26 ACADEMY PUBLISHER

3 24 JOURNAL OF COMMUNICATIONS, VOL. 1, NO. 2, MAY 26 approaches are similar to topology cotrol algorithms such as SPAN [2] ad ASCENT [21]. However, the ode redudacy i the data gatherig issue is of the applicatio perspective, whereas it is maily of the routig perspective i the latter. I [18], the authors proposed a scheme to reduce umber of trasmissios ad provided approximate results to aggregate queries through spatial data correlatio. Oly a subset of odes dissemiates data to the sik. A set of CHs is selected usig a simple localized scheme. It uses oly the edges of the forwardig tree for selectio of CHs ad routers. With a similar aim of forcig redudat odes to sleep, Gupta et al. [19] formulated this problem as fidig the miimum domiatig set problem, which is a well-kow NP-complete problem. Accordigly, they proposed a distributed approximatio algorithm ad a couple of cetralized heuristics to select a small correlatiodomiatig set, which is sufficiet to ifer data of the remaiig odes. For their distributed algorithm, each ode is expected to collect k-hop eighborhood iformatio to form the correlatio hypergraph. It is also assumed that the correlatio structure is fixed. Eve though a more complete spatial correlatio is achievable here, the computatio of the correlatio weightig coefficiets has eergy cost i the order of the trasmissio cost, ad the storage requiremet is expoetial i the umber of eighbors. Thus, i this paper, we exted the T-ANT protocol to exploit temporal data correlatio i sesor readigs, which oly ivolves local decisios, ad has smaller eergy ad storage costs. III. THE T-ANT PROTOCOL There are two mai compoets to this protocol. The first aspect is related to the CH electio ad clusterig, whereas the secod ivolves the estimatio of the data variace ad redudacy detectio. These are described i the followig subsectios, respectively. A. The Clusterig Algorithm T-ANT adopts two-phase clusterig process ivolvig the cluster setup ad steady state phases. To guide the CH electio, we chose to use a swarm of ats. Through the use of a swarm of ats, we could guaratee that the etwork always maitais a optimal umber of clusters. Durig the ode iitializatio, the sik releases a umber of ats (i.e. cotrol messages). Ramos ad Merelo [22] suggest that the ratio of the umber of ats to the umber of objects (i.e. sesor odes) should equal.1. Whe the sik releases a at, it chooses oe of its eighbors at radom. The at could travel ito the etwork as deep as restricted by its time-to-live (TTL) field. Whe a at arrives at a ode, the ext ode is radomly chose (excludig the seder) for its subsequet stop if TTL has ot expired. If TTL expires, the at remais at this ode. If however the fial at locatio overlaps with aother at, the former at must fid aother locatio. The cluster setup (CS) phase is cotrolled through a CS timer. Whe this timer expires, a ode checks to see whether it possesses a at. If the ode has a at, it becomes a CH. Whe a ode becomes a CH, it advertises to its eighbors by broadcastig a ADV message with its ode id ad a TTL field to costrai the ADV propagatio. Upo receivig a ADV message, a regular ode records the CH id, the seder s id as its paret, the hop distace to this CH, the umber of ADV messages received so far ad total hop distace to all see CHs, ad the rebroadcasts if its TTL permits. A ode decides to joi a cluster whe its joi-timer expires. It the computes its pheromoe level based o its total hop distace (h) to CHs, the umber of CHs () i its eighborhood, ad its ormalized residual eergy. The pheromoe expressio is based o the forwardig probability formula used i the at routig algorithm [23], but expaded as: where Δ p is give by: k Δp = 2 h p + Δp p = (1) 1 + Δp * E E h * is the ode s hop distace to the selected CH, E resi is the residual eergy, E max is the referece maximum battery eergy ad k is the learig rate of the algorithm ( =.1). This expressio esures that Δp is higher whe the ode is oly reachable by fewer CH odes (smaller ), far from CHs ( h ), has higher residual eergy (E resi ) i or is earer to its selected CH ( ). A regular ode chooses the best cluster to joi based o its hop distace to the CH, which would esure miimal eergy dissipatio durig the data collectio rouds. The ode jois a cluster by sedig a JOIN message with its id, the selected CH id ad its pheromoe level. If the CH is i rage, the message is trasmitted directly; otherwise it is forwarded through its paret to the CH. Whe a CH receives JOIN messages, it fids the member with the highest pheromoe level to attract its at for the followig CS phase. Before the ext CS timer expires, the ats wader to the odes with the highest pheromoe level amog their eighbors, ad these odes will be the subsequet CHs. Before a at leaves its curret ode, a amout of atipheromoe is laid to mimic a rapid decay of pheromoe level [5]. This esures that the ats do ot retur to the same ode too soo, which promotes load balacig. The give pheromoe expressio guides the evolutio of the swarm to achieve the separatio behavior betwee ats i the swarm [5]. It is foud empirically that separatio is attaied rather quickly withi 3-5 rouds as a optimal swarm size is used. Aother useful swarm behavior is aligmet [5]. I our cotext, the area served by each at represets the aligmet property. It is reflected by the umber of members i a cluster. Whe the swarm evolves to achieve separatio, aligmet is also achieved as a side-beefit. The pheomeo due to resi max h * i= 1 h i (2) 26 ACADEMY PUBLISHER

4 JOURNAL OF COMMUNICATIONS, VOL. 1, NO. 2, MAY both behaviors is captured by the followig fitess fuctios, respectively. The CH electio fitess fuctio S to capture the separatio behavior is: S = c i i i= 1 h ij j= 1 where c is the umber of CH odes, i is the umber of ADVs see by CH i ad h ij is CH i s hop distace to CH j. The clusterig fitess fuctio A to represet the aligmet behavior is as follows: A = r h i i= 1 where r is the umber of regular odes ad h i is ode i s hop distace to its CH. I the steady state phase, if a regular ode is cosidered redudat, it seds or forwards its sesory data to its CH. It is possible that the foragig ats may die due to the evirometal ucertaity or ode failure. To avoid a reducig umber of ats i the etwork over time, ats have a fiite lifetime. Whe ats die, the sik rereleases the same optimal umber of ats to restart the process. I order to determie the odes that have redudat iformatio ad thus, could be made to sleep, we itroduce the followig algorithm to capture data correlatios. B. The Variace Estimatio Algorithm I order to decide a ode s participatio i the data gatherig process, we eed to determie whether its data is redudat. We choose ot to base this selectio decisio o spatial correlatio due to the amout of data to be collected ad stored from the k-hop eighbors as well as the subsequet computatio cost ivolved i the value predictio eve as a liear combiatio of the eighbor values. To reduce the amout of state at each ode, oly temporal correlatio is maitaied. If the variability of the moitored value falls below the specified applicatio boud, the ode s data is cosidered redudat, ad it locally decides to sleep. This decisio is made durig the CS phase. Fidig a factor s variability problem could be aalogized to the roud-trip time (RTT) variace estimatio problem i settig of the retrasmissio timeout value i the TCP trasport protocol. The timeout algorithm allows a TCP etity to cope with the highly dyamic Iteret traffic. This RTT variace estimatio is based o the Jacobso s algorithm, ad is specified as part of TCP i RFC2988 [24]. Jacobso itroduced a variatio measure called mea deviatio, ad used it with the expoetial smoothig techique to capture the dyamic ature of Iteret traffic. As it is obvious that TCP is successful i adaptig to this dyamism, a similar estimatio algorithm could prove useful for our purpose to capture the sesor data variability. To eable such estimatio, each ode maitais a average value (represeted as s_val) that stores the (3) (4) weighted sesor data value based o preset ad past values as follows: s_val k+1 = (1-g) s_val k + g val k+1 (5) where s_val i is the smoothed value at the i th time istat, val i is the actual sesed value at the i th time istat ad g is a costat, <g<1. I order to capture the measure of dispersio of the sesed data, we adopt the mea deviatio metric as follows: s_dev k+1 = (1-h) s_dev k + h val k+1 - s_val k (6) where s_dev i is the smoothed variability of the sesed values at the i th time istat ad h is a costat, <h<1. Fially, the sesed value for the (k+1) th time istat ca be predicted as follows: i k + 1 val = s_val k+1 + s_dev k+1 (7) * where val * is the predicted value at the ith time istat. If the predicted ad actual values deviate lesser tha the applicatio boud, this value is uiterestig for the applicatio ad could be approximated by the sik from the historic data. Thus, this ode should ot participate i further data gatherig rouds util data variability exceeds the boud. Sice redudat odes are decided durig the CS phase, these odes will ot be ivolved i the clusters formatio. Also, the ats will oly forage amog the active odes. As sesig the eviromet is cotiuously performed by all odes, a iactive ode may rejoi durig the ext CS phase, if its value falls outside the threshold. IV. SIMULATION FRAMEWORK The performace of T-ANT clusterig is evaluated usig a discrete-evet simulator. To eable a comprehesive study, the effects of both routig ad MAC protocols are itegrated. I the descriptio of the simulator, we assume that each sesor ode is aware of: its eighbors due to the occasioal beacoig by the sik ad the cluster setup phase; ad the etwork is sychroized by meas of ay time sychroizatio protocols. The radio model is assumed to follow isotropic propagatio. As for the MAC choice, we adopted the CSMA protocol due to its simplicity ad its promise of scalability. However, a straightforward applicatio of this protocol i a covergecast sceario is a recipe for failure. I the periodic moitorig type applicatio, whe the sesor data timer expires, all odes capture their sesory value ad covert to digital via a aalog-to-digital coverter (ADC) liked to the sesig hardware. Assumig a time-sychroized clustered etwork, all odes geerate the sesory message for trasmissio towards their CHs at the same time. If o precautio was take, their trasmissios would iterfere resultig i may collisios ad retrasmissios. I order to reduce such collisios, Huag ad Zhag [25] proposed that a ode should delay its trasmissio relative to its distace to the destiatio (h) ad the ode desity. As there is 26 ACADEMY PUBLISHER

5 26 JOURNAL OF COMMUNICATIONS, VOL. 1, NO. 2, MAY 26 likely to be may odes at each hop, a additioal radom offset is also icluded to further reduce the collisio probability. We choose to adopt a similar temporal coordiatio with respect to a ode s CH. However, it was modified here to be less coservative to reflect the smaller scope of a cluster rather tha a etire etwork as i [25]. The radom wait time fuctio (T) is accordigly give as: T(h) = (1 + r).τh (8) Where r is a uiformly distributed radom umber from to 1 ad τ is the average oe-hop delay. At the etwork layer, we adopted a simple routig mechaism i Greedy Routig Scheme (GRS) to cotrol the etwork s forwardig behavior. The forwardig objective is to miimize the umber of hops betwee the sik ad the other odes. To establish this miimum hop routig tree, the sik occasioally broadcasts a beaco message with a hop cout, which is iitialized to zero. Upo receivig the beaco, each ode records the seder id, icremets the hop cout by oe, ad the rebroadcasts it. A ode oly rebroadcasts if the ew hop cout is smaller tha its stored value. Sice we are focusig o a quasi-statioary type of applicatio, the sik ode oly eeds to perform occasioal beacoig to avoid sigificat overhead. This forwardig rule establishes a miimum hop tree rooted at the sik. Fially, the T-ANT scheme is implemeted betwee the applicatio ad the etwork layer, ad thus, the overall system framework is as show i Fig. 1. Figure 1. Applicatio T-ANT GRS CSMA Radio ADC Sesor The simulatio framework. eergy parameters are set as: E elec = 5 J/bit ad ε fs = 1 pj/bit/m 2. The eergy for data aggregatio is set to E DA = 5 J/bit per sigal [3]. The cotrol ad data message sizes are fixed at 3 bytes, ad sesory data is geerated at 2- secod iterval. Each CH ode retais its CH status for 2 secods. The umber of ats is fixed at 1 ad the ati-pheromoe rate is.1. The performace metrics beig ivestigated are: Clusterig fitess: This metric is based o the fitess fuctio give as (4). It represets the goodess of the cluster formatio i terms of aligmet ivolvig all regular odes. CH electio fitess: This metric is based o the fitess fuctio give i (3). It represets the goodess of all the elected CH odes i terms of CH separatio. Average eergy per roud: This metric represets the average eergy dissipated by all the odes i a roud of data dissemiatio. Network lifetime: This metric represets the time period from the istat the etwork is deployed to the momet whe the first sesor ode rus out of eergy. Fig. 2 depicts the clusterig fitess value at differet simulatio time. For T-ANT, the iitial value is high idicatig that the swarm has ot yet achieved the aligmet behavior as the ats are radomly released ito the etwork. However, as pheromoe is laid ad atipheromoe takes effect durig CS phases, the swarm aligmet improves. Withi the third evolutio, the swarm is able to alig. As for the other schemes, the fitess value varies rather wildly. Ulike T-ANT, TCCA mostly operates i sub-optimal fashio. Also for m- LEACH, the fitess value is always smaller tha the other schemes due to the ADV messages beig limited to firsthop eighbors. Ay ucovered odes would have to resort to direct trasmissio to the sik. Sice m-leach ad TCCA have probabilistic CH electio, it is possible that the CHs may eve be clumped. Whe the CHs are clumped, the disparity amog clusters is large i terms of their umber of members, as each CH coteds for the same regular odes pool. Based o the give simulatio framework, we ivestigated T-ANT s performace agaist LEACH, TCCA ad a flat strategy (i.e. the applicatio sits directly o GRS). However, sice LEACH ca t be applied directly to a multihop etwork, we modified this algorithm to use a routig protocol to forward messages wheever the destiatio is ot withi a ode s radio rage. We termed this modified algorithm as multihop- LEACH (or m-leach). The results from this compariso ad other evaluatios are preseted further. V. RESULTS AND DISCUSSIONS For these simulatio experimets, we assumed that there are 1 sesor odes distributed radomly i a square M M regio with M = 5 m. The trasceiver Clusterig Fitess 25 T-A NT TCCA 2 m-lea CH Figure 2. Clusterig fitess at differet simulatio time of T-ANT, m-leach ad TCCA. 26 ACADEMY PUBLISHER

6 P o ly.(t -A N T ) P o ly.(t C C A ) JOURNAL OF COMMUNICATIONS, VOL. 1, NO. 2, MAY I Fig. 3, the CH electio fitess is depicted for the same three algorithms. Agai, cosistet behavior as above is obtaied. For T-ANT, it has a higher fuctio value iitially, but it quickly coverged somewhat. The ats move to better locatio based o the computed pheromoe level, ad withi the fifth roud, the swarm is able to achieve the separatio behavior. This behavior esures the elected CHs are distributed as uiformly as possible. Eve after the uiformity is achieved, the ats keep movig at each roud to esure that the CH role is shared amog odes, ad eergy-load balacig is attaied. As for the other schemes, the topology barely settles ad mostly has a lower value tha T-ANT. A lower value idicates that the CHs i these schemes are mostly too close to each other. I m-leach, the fitess fuctio quite ofte assumes a zero value compared to TCCA. This is maily due to its restricted ADV propagatio, where a CH is uable to recogize aother CH located oly two hops away. CH Electio Fitess T-A NT TCCA m-lea CH Figure 3. CH electio fitess at differet simulatio time of T- ANT, m-leach ad TCCA. Sice cluster size was show to have a sigificat impact o clusterig algorithms [4], we varied ADV s TTL value ad compared these algorithms. I Fig. 4, these algorithms exhibit the presece of a optimal cluster size. However, T-ANT achieves sigificatly more eergy savigs tha m-leach ad TCCA for cluster sizes up to four. T-ANT achieves eergy savigs of more tha 3% agaist m-leach. Whe cluster size is two, T-ANT dissipates 27% lesser eergy compared to TCCA. This observatio is cosistet with fitess values reported i Figs. 2 ad 3. Sice m-leach ad TCCA maily operates with sub-optimally formed topology, their eergy dissipatios are higher. However, for larger cluster sizes, T-ANT s beefit is less apparet. This is maily caused by the eergy expeded durig the cluster setup phase that is sigificatly larger as ADV messages are flooded further, ad the JOIN messages have to be forwarded may hops before reachig their CHs. Similarly, durig the steady state phase, sigificat itracluster traffic is geerated egatig T-ANT s beefits. Average Eergy per Roud (J) Cluster Size (hops) T-A NT TCCA Figure 4. Average eergy usage per roud agaist the cluster size of T-ANT ad TCCA (ad m-leach similar to TCCA with cluster size oe). I Fig. 5, the improvemet gaied through T-ANT is further exemplified by the etwork lifetime graph. For this ivestigatio, we have fixed the iitial battery eergy, E max at.1j. It is evidet that T-ANT exhibits the logest lifetime with all odes remaiig fully fuctioal. It is foud that T-ANT achieves almost 3.5 times the lifetime of m-leach ad almost five times of the flat approach. It also achieves up to 5% loger lifetime tha TCCA. Number of Nodes Alive T-A NT TCCA m-lea CH Figure 5. Network lifetime agaist simulatio time of T-ANT, TCCA, m-leach ad the flat strategy. To ivestigate the effectiveess of the proposed estimatio algorithm, we gathered daily temperature data (i Fahreheit) of 1 Australia weather statios for the whole year of 24 [26]. Usig aturally gathered data, we exhibit the exted of correlatios iheret i real data. For the variace estimatio algorithm, the costats asume these values: g =.125 ad h =.25. I Fig. 6, the accuracy of the adopted variace estimatio algorithm is ivestigated. The cotiuous lie represets the predicted values, whereas the crosses represet the actual observed data agaist the left y-axis. The error ratio betwee these two values is show usig the triagle marker o the right y-axis. As expected, the iitial forecasts are quite far from the actual values. However, as more values are used for the smoothig process, the predictio improves sigificatly. Occasioally, whe there are sudde chages i the temperature with steep vertical rises or drops, the error ratio becomes quite large idicatig the eed for the affected ode to report back to the sik. Otherwise, it is Flat 26 ACADEMY PUBLISHER

7 28 JOURNAL OF COMMUNICATIONS, VOL. 1, NO. 2, MAY 26 evidet that the chose variace estimator algorithm accurately predicts the aturally geerated data. Temperature ('F) actual average Figure 6. Actual ad predicted temperature data values of a sigle ode show o the primary y-axis agaist simulatio time. The secodary y-axis shows the error ratio betwee the two values. To observe the effect of the temporal correlatio suppressio o the etwork, a plot of umber of sleepig odes agaist simulatio time is show with the error ratio i Fig. 7. Whe the error ratio is higher tha the applicatio boud, more odes are ivolved i the data gatherig process. However, whe the predictio is rather accurate, more odes are made to sleep as evidet from the peaks of the cotiuous lie i Fig. 7. For this applicatio data ad the chose boud, the scheme is able to make more tha 3% odes to sleep o average. Eve without ay expesive spatial correlatio exercise, it is evidet that we have the potetial to make sigificat eergy savigs due to the iheret temporal data correlatios i this aturally geerated data. Number of odes iactive Figure 7. Number of iactive odes (i.e. sleepig) show o the primary y-axis agaist simulatio time. The secodary y-axis shows the error ratio betwee the two values. Fially, to ivestigate the effect of data sesitivity o the etwork performace, we vary the applicatio boud. As expected, Fig. 8 cofirms that the eergy cost reduces with the icrease i the applicatio boud. As the applicatio boud is icreased, the eergy cost reduces expoetially. Whe the applicatio is lesser sesitive to mior chages, there would be may more odes iactive i the etwork with lesser radio usage. Thus, the proposed scheme exploits the icreased isesitivity of the applicatio by makig more odes to sleep. error sleep erro r Error ratio (%) Error ratio (%) Average Eergy per Roud (J) Applicatio Boud (%) Figure 8. Average eergy cost per data collectio roud agaist the applicatio boud. VI. CONCLUSIONS To our kowledge, the T-ANT is the first atureispired approach for data gatherig i wireless sesor etworks. The algorithm uses a swarm of ats to cotrol the clusterhead electio i a distributed maer. It is show that T-ANT achieves two desirable swarm behaviors, amely separatio ad aligmet. Due to these, a uiform distributio of clusterhead is guarateed eablig the etwork to operate i a optimal maer throughout its lifetime. Eve though this is possible i a cetralized approach as i LEACH-C [3], our algorithm is distributed, robust ad does ot require positio kowledge. T-ANT also stores less state overhead i memory tha LEACH or TCCA. The T-ANT protocol is also able to exploit the iheret data correlatios i the sesed data sigals. To avoid the amout of state ecessary to capture the spatial correlatio amog eighbors, we resorted to capture temporal correlatio oly. This ivolves oly local decisio-makig. The variace estimatio algorithm itroduced here captures sesor data variability with egligible state maiteace. It is demostrated that T- ANT with data redudacy detectio achieves sigificat eergy savigs for periodic moitorig applicatios. ACKNOWLEDGMENT This work was supported i part by grats from ARC DP ad USyd R&D L2844 U323. REFERENCES [1] J. Hill, M. Horto, R. Klig, ad L. Krishamurthy, "The platforms eablig wireless sesor etworks," Comms. of the ACM, vol. 47, pp , Ju 24. [2] K. Akkaya ad M. Youis, "A Survey o Routig Protocols for Wireless Sesor Networks," Elsevier Ad Hoc Networks, vol. 3, pp , May 25. [3] W. B. Heizelma, A. P. Chadrakasa, ad H. Balakrisha, "A applicatio-specific protocol architecture for wireless microsesor etworks," IEEE Tras. o Wireless Comm., vol. 1, pp , Oct 22. [4] S. Selvakeedy ad S. Siappa, "The Time-Cotrolled Clusterig Algorithm for Optimized Data Dissemiatio i Wireless Sesor Networks," i Proc. IEEE Coferece o LCN, Sydey, Australia, 25, pp ACADEMY PUBLISHER

8 JOURNAL OF COMMUNICATIONS, VOL. 1, NO. 2, MAY [5] S. Selvakeedy, S. Siappa, ad Y. Shag, "Data Dissemiatio Based o At Swarms for Wireless Sesor Networks," i Proc. IEEE CCNC, Las Vegas, NV, USA, 26, pp [6] M. Gerla ad J. T.-C. Tsai, "Multicluster, mobile, multimedia radio etwork," Wireless Networks, vol. 1, pp , Aug [7] F. Kuh, T. Moscibroda, ad R. Wattehofer, " Iitializig ewly deployed ad hoc ad sesor etworks," i Proc. 1th It. coferece o Mobile computig ad etworkig, Philadelphia, PA, USA, Sept 24, pp [8] D. Baker ad A. Ephremides, "The Architectural Orgaizatio of a Mobile Radio Network via a Distributed Algorithm," IEEE Tras. o Commuicatio, vol. 29, pp , Nov [9] G. Gupta ad M. Youis, "Load-balaced clusterig of wireless sesor etworks," i Proc. IEEE ICC, Achorage, AL, USA, May 23, pp [1] A. D. Amis ad R. Prakash, "Load-balacig clusters i wireless ad hoc etworks," i Proc. 3rd IEEE Symposium o Applicatio-Specific Systems ad Software Egieerig Techology, Richardso, TX, USA, Mar 2, pp [11] A. D. Amis, R. Prakash, T. H. P. Vuog, ad D. T. Huyh, "Max-mi d-cluster formatio i wireless ad hoc etworks," i Proc. 19th Joit Coferece of the ICC, Tel Aviv, Israel, Mar 2, pp [12] C.-F. Chiasserii, I. Chlamtac, P. Moti, ad A. Nucci, "A eergy-efficiet method for odes assigmet i cluster-based ad hoc etworks," Wireless Networks, vol. 1, pp , May 24. [13] S. Badyopadhyay ad E. J. Coyle, "A eergy efficiet hierarchical clusterig algorithm for wireless sesor etworks," i Proc. 22d IEEE INFOCOM, Sa Fracisco, CA, USA, Mar 23, pp [14] M. Gees, U. Sorges, ad I. Bouazizi, "ARA - the atcoloy based routig algorithm for maets," i Proc. ICPP Workshop o Ad Hoc Networks, Vacouver, BC, Caada, Aug 22, pp [15] J. Chou, D. Petrovic, ad K. Ramachadra, "A distributed ad adaptive sigal processig approach to reducig eergy cosumptio i sesor etworks," i Proc. INFOCOM, 23, pp [16] P. v. Rickebach ad R. Wattehofer, "Gatherig correlated data i sesor etworks," preseted at Workshop o Foudatios of mobile computig, Philadelphia, PA, USA, 24, pp [17] R. Cristescu ad M. Vetterli, "Power efficiet gatherig of correlated data: optimizatio, NP-completeess ad heuristics," ACM SIGMOBILE Mobile Computig ad Commuicatios Review, vol. 7, pp , 23. [18] S. Yoo ad C. Shahabi, "Exploitig spatial correlatio towards a eergy efficiet clustered aggregatio techique (CAG)," i Proc. IEEE Iteratioal Coferece o Commuicatios, 25, pp [19] H. Gupta, V. Navda, S. R. Das, ad V. Chowdhary, "Efficiet gatherig of correlated data i sesor etworks," i Proc. MobiHoc '5, Urbaa-Champaig, IL, USA, 25, pp [2] B. Che, K. Jamieso, H. Balakrisha, ad R. Morris, "Spa: a eergy-efficiet coordiatio algorithm for topology maiteace i ad hoc wireless etworks," Wireless Networks, vol. 8, pp , 22. [21] A. Cerpa ad D. Estri, "ASCENT: Adaptive Self- Cofigurig sesor Networks Topologies," IEEE Tras. o Mobile Computig, vol. 3, pp , 24. [22] V. Ramos ad J. J. Merelo, "Self-orgaized stigmergic documet maps: Eviromet as mechaism for cotext learig.," i Proc. Spaish Coferece o Evolutioary ad BioIspired Algorithms, 22, pp [23] Y. Ohtaki, N. Wakamiya, M. Murata, ad M. Imase, "Scalable ANT-based Routig Algorithm for Ad-Hoc Networks," i Proc. 3rd IASTED Iteratioal Coferece o Commuicatios, Iteret, ad Iformatio Techology, St. Thomas, US Virgi Islads, Nov 24. [24] V. Paxso ad M. Allma, "Computig TCP's Retrasmissio Timer," RFC2988, 2. [25] Q. Huag ad Y. Zhag, "Radial coordiatio for covergecast i wireless sesor etworks," i Proc. 29th IEEE Iteratioal Coferece o Local Computer Networks, Tampa, FL, USA, Nov 24, pp [26] NESDIS, " US Natioal Oceaic & Atmospheric Admiistratio, 25. S. Selvakeedy obtaied his PhD i computer commuicatios i 1999 from the Uiversity of Putra, Malaysia. Earlier i 1996, he obtaied his first-class hoors degree i computer sciece also from the same uiversity. He is curretly servig as a Seior Lecturer at the Uiversity of Sydey, Australia. He has published more tha 5 articles i jourals ad cofereces maily i the area of commuicatios protocols for all-optical etworkig ad wireless etworkig. His curret research iterests lies i developig algorithms for media access, routig, localizatio ad topology cotrol issues i wireless sesor, ad hoc ad mesh etworks. Dr. Selvakeedy is a member of ACM ad IEEE. He has served o may coferece program committees. Sukuesa Siappa got his doctorate from the Uiversity of Newcastle, Australia i 24. He is curretly with the School of Ecoomics ad Iformatio Systems, Uiversity of Wollogog, Australia. He has published i umerous fields such as olie cosumer behavior, website aalysis ad wireless sesor etworks. His curret research iterests iclude olie self-profilig, locatio-based services, olie privacy ad trust apart from wireless sesor etworks. Yi Shag was bor i Chia i He received the PhD degree i Computer Sciece from the Uiversity of Illiois at Urbaa-Champaig, Urbaa, IL, USA, i 1997; MS i Computer Egieerig from the Istitute of Computig Techology, Chiese Academy of Scieces, Beijig, Chia, i 1991; ad BS i Computer Sciece from Uiversity of Sciece ad Techology of Chia, Hefei, Chia, i His research fields iclude artificial itelligece, oliear optimizatio, wireless etworks, ad distributed systems. He is a Associate Professor i the Departmet of Computer Sciece at the Uiversity of Missouri at Columbia, USA. He was a seior research scietist at the Xerox Palo Alto Research Ceter at Palo Alto, CA from 21 to 23. His curret research iterests are wireless sesor etworks ad multi-aget systems. He has published more tha 8 techical papers ad has 6 patet applicatios pedig. Dr. Shag is a member of ACM ad IEEE. He has bee program committee member of may cofereces. 26 ACADEMY PUBLISHER

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Energy Efficinet Cluster Head Selection and Data Convening in Wireless Sensor Networks

Energy Efficinet Cluster Head Selection and Data Convening in Wireless Sensor Networks Idia Joural of Sciece ad Techology, Vol 9(15), DOI: 1.17485/ijst/216/v9i15/77749, April 216 ISSN (Prit) : 974-6846 ISSN (Olie) : 974-5645 Eergy Efficiet Cluster Head Selectio ad Data Coveig i Wireless

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

FCM-SEP (Fuzzy C-Means Based Stable Election Protocol) for Energy Efficiency in Wireless Sensor Networks

FCM-SEP (Fuzzy C-Means Based Stable Election Protocol) for Energy Efficiency in Wireless Sensor Networks FCM-SEP (Fuzzy C-Meas Based Stable Electio Protocol) for Eergy Efficiecy i Wireless Sesor Networks Sadeep Kaur Computer Sciece ad Egieerig, Giai Zail Sigh Campus College of Egieerig ad Techology, Bathida,

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

Cost Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks G. SNEHA PRANEETHA 1, DEEPTHI JANAGAMA 2, N.

Cost Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks G. SNEHA PRANEETHA 1, DEEPTHI JANAGAMA 2, N. ISSN 2348 2370 Vol.08,Issue.12, September-2016, Pages:2397-2401 www.ijatir.org Cost Aware Secure Routig (CASER) Protocol Desig for Wireless Sesor Networks G. SNEHA PRANEETHA 1, DEEPTHI JANAGAMA 2, N. ANJANEYULU

More information

Relay Placement Based on Divide-and-Conquer

Relay Placement Based on Divide-and-Conquer Relay Placemet Based o Divide-ad-Coquer Ravabakhsh Akhlaghiia, Azadeh Kaviafar, ad Mohamad Javad Rostami, Member, IACSIT Abstract I this paper, we defie a relay placemet problem to cover a large umber

More information

Markov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size

Markov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size Markov Chai Model of HomePlug CSMA MAC for Determiig Optimal Fixed Cotetio Widow Size Eva Krimiger * ad Haiph Latchma Dept. of Electrical ad Computer Egieerig, Uiversity of Florida, Gaiesville, FL, USA

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea

S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea S. Mehta ad K.S. Kwak UWB Wireless Commuicatios Research Ceter, Iha Uiversity Icheo, 402-75, Korea suryaad.m@gmail.com ABSTRACT I this paper, we propose a hybrid medium access cotrol protocol (H-MAC) for

More information

arxiv: v2 [cs.ds] 24 Mar 2018

arxiv: v2 [cs.ds] 24 Mar 2018 Similar Elemets ad Metric Labelig o Complete Graphs arxiv:1803.08037v [cs.ds] 4 Mar 018 Pedro F. Felzeszwalb Brow Uiversity Providece, RI, USA pff@brow.edu March 8, 018 We cosider a problem that ivolves

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today Admiistrative Fial project No office hours today UNSUPERVISED LEARNING David Kauchak CS 451 Fall 2013 Supervised learig Usupervised learig label label 1 label 3 model/ predictor label 4 label 5 Supervised

More information

Dynamic Programming and Curve Fitting Based Road Boundary Detection

Dynamic Programming and Curve Fitting Based Road Boundary Detection Dyamic Programmig ad Curve Fittig Based Road Boudary Detectio SHYAM PRASAD ADHIKARI, HYONGSUK KIM, Divisio of Electroics ad Iformatio Egieerig Chobuk Natioal Uiversity 664-4 Ga Deokji-Dog Jeoju-City Jeobuk

More information

Mobile terminal 3D image reconstruction program development based on Android Lin Qinhua

Mobile terminal 3D image reconstruction program development based on Android Lin Qinhua Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 05) Mobile termial 3D image recostructio program developmet based o Adroid Li Qihua Sichua Iformatio Techology College

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

ECE4050 Data Structures and Algorithms. Lecture 6: Searching

ECE4050 Data Structures and Algorithms. Lecture 6: Searching ECE4050 Data Structures ad Algorithms Lecture 6: Searchig 1 Search Give: Distict keys k 1, k 2,, k ad collectio L of records of the form (k 1, I 1 ), (k 2, I 2 ),, (k, I ) where I j is the iformatio associated

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

Calculation and Simulation of Transmission Reliability in Wireless Sensor Network Based on Network Coding

Calculation and Simulation of Transmission Reliability in Wireless Sensor Network Based on Network Coding Calculatio ad Simulatio of Trasmissio Reliability i Wireless Sesor Network Based o Network Codig https://doi.org/0.399/ijoe.v3i2.7883 Zhifu Lua Weifag Uiversity of Sciece ad Techology, Weifag, Chia 92268476@qq.com

More information

A Note on Least-norm Solution of Global WireWarping

A Note on Least-norm Solution of Global WireWarping A Note o Least-orm Solutio of Global WireWarpig Charlie C. L. Wag Departmet of Mechaical ad Automatio Egieerig The Chiese Uiversity of Hog Kog Shati, N.T., Hog Kog E-mail: cwag@mae.cuhk.edu.hk Abstract

More information

Lecture 5. Counting Sort / Radix Sort

Lecture 5. Counting Sort / Radix Sort Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018

More information

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,

More information

SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS. Tamil Nadu, INDIA

SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS. Tamil Nadu, INDIA ARTICLE SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS A Sethil Kumar 1, E Logashamugam 2 * 1 Research Scholar, Dept. of Electroics ad Commuicatio Egieerig, St. Peter

More information

An Algorithm of Mobile Robot Node Location Based on Wireless Sensor Network

An Algorithm of Mobile Robot Node Location Based on Wireless Sensor Network A Algorithm of Mobile Robot Node Locatio Based o Wireless Sesor Network https://doi.org/0.399/ijoe.v3i05.7044 Peg A Nigbo Uiversity of Techology, Zhejiag, Chia eirxvrp2269@26.com Abstract I the wireless

More information

Low Complexity H.265/HEVC Coding Unit Size Decision for a Videoconferencing System

Low Complexity H.265/HEVC Coding Unit Size Decision for a Videoconferencing System BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 6 Special Issue o Logistics, Iformatics ad Service Sciece Sofia 2015 Prit ISSN: 1311-9702; Olie ISSN: 1314-4081 DOI:

More information

Random Network Coding in Wireless Sensor Networks: Energy Efficiency via Cross-Layer Approach

Random Network Coding in Wireless Sensor Networks: Energy Efficiency via Cross-Layer Approach Radom Network Codig i Wireless Sesor Networks: Eergy Efficiecy via Cross-Layer Approach Daiel Platz, Dereje H. Woldegebreal, ad Holger Karl Uiversity of Paderbor, Paderbor, Germay {platz, dereje.hmr, holger.karl}@upb.de

More information

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c Iteratioal Coferece o Computatioal Sciece ad Egieerig (ICCSE 015) Harris Corer Detectio Algorithm at Sub-pixel Level ad Its Applicatio Yuafeg Ha a, Peijiag Che b * ad Tia Meg c School of Automobile, Liyi

More information

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks Iterferece Aware Chael Assigmet Scheme i Multichael Wireless Mesh Networks Sumyeg Kim Departmet of Computer Software Egieerig Kumoh Natioal Istitute of Techology Gum South Korea Abstract Wireless mesh

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045 Oe Brookigs Drive St. Louis, Missouri 63130-4899, USA jaegerg@cse.wustl.edu

More information

History Based Probabilistic Backoff Algorithm

History Based Probabilistic Backoff Algorithm America Joural of Egieerig ad Applied Scieces, 2012, 5 (3), 230-236 ISSN: 1941-7020 2014 Rajagopala ad Mala, This ope access article is distributed uder a Creative Commos Attributio (CC-BY) 3.0 licese

More information

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB) F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk Chapter Objectives Lear how resiliecy strategies reduce risk Discover automatio strategies to reduce risk Chapter #16: Architecture ad Desig Resiliecy ad Automatio Strategies 2 Automatio/Scriptig Resiliet

More information

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved.

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved. Itroductio to Wireless & Mobile Systems Chapter 6 Multiple Radio Access 1 Outlie Itroductio Multiple Radio Access Protocols Cotetio-based Protocols Pure ALOHA Slotted ALOHA CSMA (Carrier Sese Multiple

More information

Range Free Localization Schemes For Wireless Sensor Networks

Range Free Localization Schemes For Wireless Sensor Networks Rage Free Localizatio Schemes For Wireless Sesor Networks ASHOK KUMAR, VINAY KUMAR AND VINOD KAPOOR Departmet of Electroics ad Commuicatio Egieerig Natioal Istitute of Techology Hamirpur (HP) 177 005 INDIA

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations Applied Mathematical Scieces, Vol. 1, 2007, o. 25, 1203-1215 A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045, Oe

More information

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process Vol.133 (Iformatio Techology ad Computer Sciece 016), pp.85-89 http://dx.doi.org/10.1457/astl.016. Euclidea Distace Based Feature Selectio for Fault Detectio Predictio Model i Semicoductor Maufacturig

More information

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000. 5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator

More information

Introduction. Nature-Inspired Computing. Terminology. Problem Types. Constraint Satisfaction Problems - CSP. Free Optimization Problem - FOP

Introduction. Nature-Inspired Computing. Terminology. Problem Types. Constraint Satisfaction Problems - CSP. Free Optimization Problem - FOP Nature-Ispired Computig Hadlig Costraits Dr. Şima Uyar September 2006 Itroductio may practical problems are costraied ot all combiatios of variable values represet valid solutios feasible solutios ifeasible

More information

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le Fudametals of Media Processig Shi'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dih Le Today's topics Noparametric Methods Parze Widow k-nearest Neighbor Estimatio Clusterig Techiques k-meas Agglomerative Hierarchical

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules

More information

AN OPTIMIZATION NETWORK FOR MATRIX INVERSION

AN OPTIMIZATION NETWORK FOR MATRIX INVERSION 397 AN OPTIMIZATION NETWORK FOR MATRIX INVERSION Ju-Seog Jag, S~ Youg Lee, ad Sag-Yug Shi Korea Advaced Istitute of Sciece ad Techology, P.O. Box 150, Cheogryag, Seoul, Korea ABSTRACT Iverse matrix calculatio

More information

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1 Adaptive Graph Partitioig Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, ad W. J. Dewar 1 1 School of Electrical Egieerig Uiversity of New South Wales, Australia 2 Divisio of Radiophysics

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

Lower Bounds for Sorting

Lower Bounds for Sorting Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig

More information

Descriptive Statistics Summary Lists

Descriptive Statistics Summary Lists Chapter 209 Descriptive Statistics Summary Lists Itroductio This procedure is used to summarize cotiuous data. Large volumes of such data may be easily summarized i statistical lists of meas, couts, stadard

More information

Performance Comparisons of PSO based Clustering

Performance Comparisons of PSO based Clustering Performace Comparisos of PSO based Clusterig Suresh Chadra Satapathy, 2 Guaidhi Pradha, 3 Sabyasachi Pattai, 4 JVR Murthy, 5 PVGD Prasad Reddy Ail Neeruoda Istitute of Techology ad Scieces, Sagivalas,Vishaapatam

More information

Effect of control points distribution on the orthorectification accuracy of an Ikonos II image through rational polynomial functions

Effect of control points distribution on the orthorectification accuracy of an Ikonos II image through rational polynomial functions Effect of cotrol poits distributio o the orthorectificatio accuracy of a Ikoos II image through ratioal polyomial fuctios Marcela do Valle Machado 1, Mauro Homem Atues 1 ad Paula Debiasi 1 1 Federal Rural

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged

More information

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods.

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods. Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig

More information

Cubic Polynomial Curves with a Shape Parameter

Cubic Polynomial Curves with a Shape Parameter roceedigs of the th WSEAS Iteratioal Coferece o Robotics Cotrol ad Maufacturig Techology Hagzhou Chia April -8 00 (pp5-70) Cubic olyomial Curves with a Shape arameter MO GUOLIANG ZHAO YANAN Iformatio ad

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

Accuracy Improvement in Camera Calibration

Accuracy Improvement in Camera Calibration Accuracy Improvemet i Camera Calibratio FaJie L Qi Zag ad Reihard Klette CITR, Computer Sciece Departmet The Uiversity of Aucklad Tamaki Campus, Aucklad, New Zealad fli006, qza001@ec.aucklad.ac.z r.klette@aucklad.ac.z

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS

AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Melisa Hajyvahabzadeh

More information

BASED ON ITERATIVE ERROR-CORRECTION

BASED ON ITERATIVE ERROR-CORRECTION A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity

More information

Parallel Polygon Approximation Algorithm Targeted at Reconfigurable Multi-Ring Hardware

Parallel Polygon Approximation Algorithm Targeted at Reconfigurable Multi-Ring Hardware Parallel Polygo Approximatio Algorithm Targeted at Recofigurable Multi-Rig Hardware M. Arif Wai* ad Hamid R. Arabia** *Califoria State Uiversity Bakersfield, Califoria, USA **Uiversity of Georgia, Georgia,

More information

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard 1 A wireless keyboard is supplied with your computer. The wireless keyboard uses a stadard key arragemet with additioal keys that perform specific fuctios. Usig the Wireless Keyboard Two AA alkalie batteries

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks

QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks QoS Aware Geographic Opportuistic Routig i Wireless Sesor Networks Log Cheg, Member, IEEE, Jiawei Niu, Member, IEEE, Jiaog Cao, Seior Member, IEEE, Sajal K. Das, Seior Member, IEEE, ad Yu Gu, Member, IEEE

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 18 Strategies for Query Processig Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio DBMS techiques to process a query Scaer idetifies

More information

GTS Scheduling Scheme for Real-Time Communication in IEEE Industrial Wireless Sensor Networks

GTS Scheduling Scheme for Real-Time Communication in IEEE Industrial Wireless Sensor Networks Idia Joural of Sciece ad Techology, Vol 9(7), DOI:.7485/ijst/6/v9i7/87734, February 6 ISSN (Prit) : 974-6846 ISSN (Olie) : 974-5645 GTS Schedulig Scheme for Real-Time Commuicatio i IEEE8.5.4 Idustrial

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1 Media Access Protocols Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 Where are We? you are here 00010001 11001001 00011101 A midterm is here Sprig 2018 CS 438 Staff, Uiversity of Illiois 2 Multiple Access

More information

EM375 STATISTICS AND MEASUREMENT UNCERTAINTY LEAST SQUARES LINEAR REGRESSION ANALYSIS

EM375 STATISTICS AND MEASUREMENT UNCERTAINTY LEAST SQUARES LINEAR REGRESSION ANALYSIS EM375 STATISTICS AND MEASUREMENT UNCERTAINTY LEAST SQUARES LINEAR REGRESSION ANALYSIS I this uit of the course we ivestigate fittig a straight lie to measured (x, y) data pairs. The equatio we wat to fit

More information

Contour Map Matching for Event Detection in Sensor Networks

Contour Map Matching for Event Detection in Sensor Networks Cotour Map Matchig for Evet Detectio i Sesor Networks Wewei Xue, Qiog Luo, Lei Che, Yuhao Liu Departmet of Computer Sciece Hog Kog Uiversity of Sciece ad Techology Clear Water Bay, Kowloo, Hog Kog {wwxue,

More information

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1 Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)

More information

Informed Search. Russell and Norvig Chap. 3

Informed Search. Russell and Norvig Chap. 3 Iformed Search Russell ad Norvig Chap. 3 Not all search directios are equally promisig Outlie Iformed: use problem-specific kowledge Add a sese of directio to search: work toward the goal Heuristic fuctios:

More information

1 Graph Sparsfication

1 Graph Sparsfication CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5.

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5. Morga Kaufma Publishers 26 February, 208 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Virtual Memory Review: The Memory Hierarchy Take advatage of the priciple

More information

Random Graphs and Complex Networks T

Random Graphs and Complex Networks T Radom Graphs ad Complex Networks T-79.7003 Charalampos E. Tsourakakis Aalto Uiversity Lecture 3 7 September 013 Aoucemet Homework 1 is out, due i two weeks from ow. Exercises: Probabilistic iequalities

More information

Performance Plus Software Parameter Definitions

Performance Plus Software Parameter Definitions Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios

More information

Lecture 18. Optimization in n dimensions

Lecture 18. Optimization in n dimensions Lecture 8 Optimizatio i dimesios Itroductio We ow cosider the problem of miimizig a sigle scalar fuctio of variables, f x, where x=[ x, x,, x ]T. The D case ca be visualized as fidig the lowest poit of

More information

CMSC Computer Architecture Lecture 11: More Caches. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 11: More Caches. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 11: More Caches Prof. Yajig Li Uiversity of Chicago Lecture Outlie Caches 2 Review Memory hierarchy Cache basics Locality priciples Spatial ad temporal How to access

More information

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence _9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to

More information

HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING

HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Y.K. Patil* Iteratioal Joural of Advaced Research i ISSN: 2278-6244 IT ad Egieerig Impact Factor: 4.54 HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Prof. V.S. Nadedkar** Abstract: Documet clusterig is

More information

Look-ahead Geographic Routing for Sensor Networks

Look-ahead Geographic Routing for Sensor Networks 1 Look-ahead Geographic Routig for Sesor Networks Jiaxi You 1, Domiik Lieckfeldt 1, Qi Ha, Jakob Salzma 1, ad Dirk Timmerma 1 1 Uiversity of Rostock, Germay 1 {jiaxi.you, domiik.lieckfeldt, jakob.salzma,

More information

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued

More information

Appendix A. Use of Operators in ARPS

Appendix A. Use of Operators in ARPS A Appedix A. Use of Operators i ARPS The methodology for solvig the equatios of hydrodyamics i either differetial or itegral form usig grid-poit techiques (fiite differece, fiite volume, fiite elemet)

More information

THIN LAYER ORIENTED MAGNETOSTATIC CALCULATION MODULE FOR ELMER FEM, BASED ON THE METHOD OF THE MOMENTS. Roman Szewczyk

THIN LAYER ORIENTED MAGNETOSTATIC CALCULATION MODULE FOR ELMER FEM, BASED ON THE METHOD OF THE MOMENTS. Roman Szewczyk THIN LAYER ORIENTED MAGNETOSTATIC CALCULATION MODULE FOR ELMER FEM, BASED ON THE METHOD OF THE MOMENTS Roma Szewczyk Istitute of Metrology ad Biomedical Egieerig, Warsaw Uiversity of Techology E-mail:

More information

Probabilistic Fuzzy Time Series Method Based on Artificial Neural Network

Probabilistic Fuzzy Time Series Method Based on Artificial Neural Network America Joural of Itelliget Systems 206, 6(2): 42-47 DOI: 0.5923/j.ajis.2060602.02 Probabilistic Fuzzy Time Series Method Based o Artificial Neural Network Erol Egrioglu,*, Ere Bas, Cagdas Haka Aladag

More information

Ontology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection

Ontology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection 2017 Asia-Pacific Egieerig ad Techology Coferece (APETC 2017) ISBN: 978-1-60595-443-1 Otology-based Decisio Support System with Aalytic Hierarchy Process for Tour Pacage Selectio Tie-We Sug, Chia-Jug Lee,

More information

ISSN (Print) Research Article. *Corresponding author Nengfa Hu

ISSN (Print) Research Article. *Corresponding author Nengfa Hu Scholars Joural of Egieerig ad Techology (SJET) Sch. J. Eg. Tech., 2016; 4(5):249-253 Scholars Academic ad Scietific Publisher (A Iteratioal Publisher for Academic ad Scietific Resources) www.saspublisher.com

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

Solving Fuzzy Assignment Problem Using Fourier Elimination Method

Solving Fuzzy Assignment Problem Using Fourier Elimination Method Global Joural of Pure ad Applied Mathematics. ISSN 0973-768 Volume 3, Number 2 (207), pp. 453-462 Research Idia Publicatios http://www.ripublicatio.com Solvig Fuzzy Assigmet Problem Usig Fourier Elimiatio

More information