How to outperform IEEE802.11: Interference Aware (IA) MAC

Size: px
Start display at page:

Download "How to outperform IEEE802.11: Interference Aware (IA) MAC"

Transcription

1 How to outpefom IEEE802.11: Intefeence Awae (IA) MAC Daniela Maniezzo, Piepaolo egamo, Matteo Cesana, Maio Gela CS Dept. - Univesity of Califonia Los Angeles - UCLA, Califonia, USA Engineeing Dept., Feaa Univesity, Italy Dipatimento di Elettonica e Infomazione, Politecnico di Milano, Italy maniezzo@ucla.edu, pbegamo@ing.unife.it, cesana@elet.polimi.it, gela@cs.ucla.edu Abstact Wieless netwoks ae nowadays vey popula. They ae mostly based on IEEE potocol which is known to show low pefomance in ad hoc netwoks. Also when infastuctued netwoks (many access points ae placed) ae consideed, a single tansmission could block many adio cells. In this wok, we popose Intefeence Awae (IA) MAC, a modified vesion of standad IEEE The main idea is not to set the Netwok Allocation Vecto (NAV) on the eception of each RTS and CTS, but only when it is stictly equied, i.e., when a concuent tansmission could actually destoy anothe tansmission. To make it feasible, we popose to inset some infomation about intefeence and eceived powe levels into IEEE contol packets. We show the effectiveness of IA MAC by means of an analytical investigation. I. INTRODUCTION The ecent success of wieless technologies has boosted the development of wieless netwoking. oth industy and academia have tuned thei attention to this aea, attacted the fome by intiguing eseach issues, the latte by maket evenues. Among the numeous standads fo wieless communications, the IEEE802.11b [1] is the one with the highest utilization at the moment. IEEE802.11b defines a MAC (Medium Access Contol) laye, MAC management potocols and sevices, and thee physical (PHY) layes espectively based on IR, FHSS at 2.4 GHz and DSSS at 2.4 GHz. The goal of the standad is to delive sevices peviously found only in wied netwoks, within mobile uses with high thoughput, high eliability and continuous netwok connection. Fo this eason, IEEE based netwoks ae often efeed to as Wieless LANs. The wieless envionment poses some challenging poblems the netwok design has to cope with. Fistly, the adio channel is pone to eos and tempoay failues which ae not encounteed in the wied wold, secondly, the channel is shaed and esouces ae often scace. In this scenaio, the employed access contol schemes ae key points fo achieving effectiveness. As fa as the MAC laye is concened, two diffeent schemes ae standadized: the Point Coodination Function (PCF) and the Distibuted Coodination Function (DCF). While PCF consists of a centalized polling based access scheme, the DCF defines a distibuted access algoithm fo both infastuctue and ad hoc wieless LANs [1], [2]. As fa as unicast data packet tansfe is concened, DCF defines two access methods. The fist one is based on a two-way handshake pocedue (DATA/ACK), the second one adopts a fou-way handshake pocedue, whee the DATA/ACK phase is peceded by a channel pobing/acquiing phase called RTS/CTS (Request To Send/ Clea To Send). oth of the above methods implement a multiple access scheme based on Caie Sensing with Collision Avoidance (CSMA/CA). asically, each node senses the channel befoe tansmitting the fist fame of the handshake; if the channel is sensed idle fo a cetain peiod of time called DIFS (Distibuted InteFame Space), the node stats tansmitting the fist fame of the handshake, othewise the node waits fo the channel to be idle fo DIFS and daws a andom additional backoff time to avoid possible collisions when the channel becomes fee (Collision Avoidance). A futhe channel contol mechanism is applied in the fou-ways handshake pocedue. Accoding to this scheme, each contol fame (RTS/CTS) bings infomation about the duation of the stating communication. Evey othe node oveheaing that fame is pevented fom accessing the channel fo all the duation of the ongoing communications by setting a pope paamete called NAV (Netwok Allocation Vecto). This pocedue is often efeed to as Vitual Caie Sensing. In this pape we popose a novel MAC laye fo Wieless LANs, named Intefeence Awae MAC (IA-MAC) [3], which extends the capabilities of the basic IEEE in envionments with high intefeence, both in ad hoc and in infastuctued mode [4], [5]. In Section II we focus on the open poblems of wieless netwoks, in paticula the IEEE based ones, and we give an oveview of the poposed appoaches of solutions. Section III summaizes the basics of the poposed IA-MAC potocol, while Section IV gives a mathematical model to analyze the pefomance of the potocol itself and in Section V some esults ae shown. Finally, Section VI concludes the pape.

2 II. OPEN PROLEMS AND PROPOSED SOLUTIONS IEEE was oiginally devised explicitly fo a single Access Point scenaio whee all the mobile nodes ae within the tansmitting ange of one anothe. In this envionment, the IEEE medium access contol potocol, which tends to avoid the intefeence, is able to achieve high efficiency. Poblems aise when IEEE is used both in a pue ad hoc mode, whee the basic IEEE mode is not able to exploit any spatial euse, and in infastuctued cellula-like scenaio whee the connectivity is povided by diffeent APs with ovelapping tansmission anges, i.e. with non negligible intefeence [6]. The efficiency of IEEE based netwoks can be damatically impaied by the well known hidden and exposed teminal poblems [7]. As a matte of fact, the fou-way handshake with the Vitual Caie Sensing solves only patially the hidden teminal poblem, and, to the best of ou knowledge, the exposed teminal one is still a pitfall and can deeply affect the pefomance of multi-hop ad hoc netwoks based on IEEE [8]. Diffeent solutions have been poposed in the liteatue to counteact these shotcomings of the IEEE standad. In paticula, a majo effot has been done in the development of an efficient medium access contol potocol able to exploit spatial euse and allow paallel feasible communications [9]. The wok on this topic deals pimaily with the modification of the numeous times the IEEE MAC level [10], [11] with the pupose to achieve a bette shaing of the common esouce among all the uses. Velayutham and Wang [12] poposed a distibuted scheduling algoithm fo IEEE netwoks able to solve the exposed teminal poblem and consequently incease the spatial euse. Recently, some woks have appeaed aiming at impoving the IEEE MAC laye by exploiting the captue at the physical laye, that is to say the capacity of coectly eceiving a tansmission even if in pesence of intefeing communications [13], [14]. Like in the cellula systems, the captue effect is exploited in ode to incease the euse and consequently the bandwidth efficiency of the wieless system [15]. Ou wok follows this second appoach. In details, we popose to enhance the infomation caied by the CTS packets (and in a moe complex appoach, also by RTS packets) so that each tansmitting/eceiving node can have an estimate on the intefeence it geneates on all the othe ongoing tansmission, and decides to actually tansmit/eceive if such an intefeence is contolled. The basic pinciples of ou mechanism ae simila to the ones intoduced in the Powe Contolled Multiple Access (PCMA) poposed by Monks et al. [16]. oth potocols ty to exploit the captue effect to incease the spatial euse, and, like PCMA, IA-MAC is based on a coopeation pinciple, i.e., no station is allowed to tansmit/eceive if its tansmission/eception can destoy ongoing tansmissions. On the othe hand, ou scheme diffes fom the PCMA in at least two significant aspects: (a) IA-MAC does not implement any powe contol, ou attention is focused on the access pat athe than on the powe management, which can be ticky in a distibuted envionment like the ad hoc one, (b) PCMA uses an additional adio channel in ode to tansmit a busy tone with infomation on the intefeence levels, while in IA- MAC the estimation of the intefeence is done on the same channel used fo data taffic; because of the last eason, IA- MAC seems to be moe cost effective and bette suited fo wieless envionments in which the battey consumption is a constaint. III. IA-MAC ASICS In the following, IA-MAC is explained by consideing that IEEE DCF is known by the eade, even if a bief desciption will be given. In ode to educe the pobability of two stations colliding on a eceive because they cannot hea each othe (hidden teminal poblem), the IEEE standad use the Request to Send/Clea to Send (RTS/CTS) handshake; a station equiing to tansmit a packet fist tansmits a shot contol packet called RTS (Request To Send), which includes the souce, destination, and the duation of the following fame; the taget station eplies (if the medium is fee) with a contol packet called CTS (Clea to Send), which includes the same duation infomation. All stations eceiving eithe the RTS and/o the CTS, efain tansmission fo the given duation. This mechanism educes the pobability of a collision on the eceive aea by a station that is hidden fom the tansmitte (and it does not hea the RTS), since the station heas the CTS and eseves the medium as busy until the end of the tansmission. The duation infomation on the RTS also potects the tansmitte aea fom collisions duing the ACK (fom stations that ae out of ange of the acknowledging station). RTS and CTS ae used in the IEEE only if the width of the data packet to be tansmitted is geate than a cetain theshold. In this pape, we conside to set this theshold to zeo, i.e., each tansmission equies the RTS/CTS handshake. IA-MAC behaves exactly as IEEE apat fom the changes in the following. The fist subsections explain the basic impovement of IA-MAC to IEEE In the last subsection, othe impovements unde investigation ae biefly discussed. A. RTS and CTS In ou poposal, each node uses always the fou way handshake, i.e., the RTS (Request To Send) and CTS (Clea To Send) ae always sent by the nodes involved in the communication. This is necessay in ode to estimate the level of noise and intefeence. Moeove, we equie a vey slight modification of the CTS packet. CTS packet includes the same infomation of the standad potocol. In addition, we include two new heade fields: SINR: the expeienced SINR (Signal to Intefeence and Noise Ratio) at the time of the eception of the RTS,

3 Fig. 1. to D. C D A A is sending a packet to when C should decide whethe to tansmit since I P RT S /SINR. If SINR ext is below a cetain theshold (γ), C efains fom tansmitting by setting its NAV, othewise it can send its own RTS. The value of γ should be designed in such a way to take into account that moe than one node could incease the expeienced intefeence on the ongoing communications. P R : the eception powe of the RTS packet. Since the quantities could be expessed in dmw (d milliwatt), the ange values can be expessed in 1 byte fo each field. These values ae used by the node which oveheas the CTS to decide whethe to set o not the NAV, accoding to the ules descibed in the following.. Physical and Vitual Channel Sensing With espect to IEEE802.11, an IA-MAC compliant node does not pefom the physical channel sensing phase but always esots to the Vitual Caie Sensing. Nevetheless, the potocol belongs to CSMA family, due to the vitual caie sensing, i.e., the value of the Netwok Allocation Vecto (NAV) detemines whethe the channel is busy fo a oncoming tansmission and fo the backoff counte. Thus, nodes decement thei backoff counte only when the channel is logically sensed busy and not when a tansmission is head by the node. The backoff counte follows the othe ules of the standad potocol (it is decemented afte a Distibuted InteFame Space time since the channel was vitually tested fee if the last eception has been coect, etc). C. Netwok Allocation Vecto (NAV) NAV is always set upon the eception of RTS, as in the standad potocol. Each node which eceives the RTS (but the ecipient node) sets up its NAV. NAV is not always set on the eception of CTS. If a node eceives a CTS fom anothe node, it can compute the impact of a tansmission on the othe node SINR. Fo bette undestanding the potocol, let us conside fou nodes (A,, C, D) in a ow (see Figue 1). A is in adio coveage only with, with A and C, C with and D and D only with C. A sent a RTS packet to and answeed with a CTS. Node C eceives a CTS packet fom (in etun to a RTS fom A), it can estimate how an its own tansmission could affect the eception of. Let P RT S be the powe eceived by on the RTS sent by A, and let I be the sum of noise and intefeence peceived by. insets in its CTS the infomation of SINR P RT S and P RT S /I. C oveheas the CTS sent by. Let PC CT S be the powe C eceives on the CTS sent by. In ode to estimate the SINR would get if C stats tansmitting, C consides the channel symmetic, i.e., would eceive a packet fom C with the same powe PC CT S peceive a value of SINR equal to: SINR ext P RT S I + P C CT S. Thus, C estimates that would P RT S SINR + PC CT S, SINR P RT S D. A Paticula Situation Let us conside the same situation of Figue 1: tansmitted its CTS to A. Suppose C has a packet to be deliveed to. In the standad IEEE802.11, C would efain the tansmission upon eception of the CTS fom. With IA-MAC, C could ty to send an RTS to, unless it has to set the NAV because of the ules descibed above. In ode to avoid such a situation, the nodes should ecod in thei memoy the ID of the sende of the CTS they ovehea and the tansmission duation (which is inseted in the standad CTS packet). In this case, the node could simply set the NAV and eset it when the duation time expies. E. Impovements IA-MAC has bette pefomance with espect to standad IEEE fo two easons, at least: it pemits paallel eliable tansmissions which ae not allowed by the basic standad, and the backoff times expie faste, since the physical caie sensing is disabled. Convesely, IA-MAC uses always RTS/CTS, which is a easonable assumption if we conside an ad hoc scenaio. In Section IV, an estimation of the pefomance gain is deived though mathematical analysis. Futue impovements to the potocol we ae woking on will futhe incease the spatial euse and consequently the oveall gain. The basic idea is to elax the ule which wants the NAV to be set always upon eception of the RTS. We have found that in some situations the NAV can be unset even if the node has eceived a RTS. This can be done inseting the infomation on the intefeence level in the RTS as well, and exploiting the time divesity among paallel communications, that is to say cases whee collision can be avoided because the nodes within the same coveage ange ae in the same tansmitting/eceiving state. IV. AN ANALYTICAL MODEL OF IA-MAC In ode to compae the pefomance of the standad IEEE DCF and the poposed IA-MAC, we conside that each tansmission of a data packet is peceded by the RTS/CTS exchanging phase. In this pape, we focus on static ad hoc netwoks. Note that in most mobility scenaios, nodes do not move fo significant distances duing a packet tansmission time, thus, fo capacity analysis, we can assume mobile netwoks as effectively static. The status of a wieless link depends on seveal system and envionmental factos that affect sende and eceive anges. In geneal, a node tansmission ange is neithe fixed, no symmetic but it shows time and spatial vaiability. In this

4 y A1 A2 R A d q A2 x L Fig. 3. Gid Netwok. Fig. 2. Coveage and intefeence aeas. pape, a widely applied optimistic model has been used [17], [18]. Fistly, we intoduce the concepts of coveage ange and blocking ange, defined espectively as the aea whee the tansmissions of a given node can be coectly detected and the aea which is blocked by the tansmission of a contol packet (RTS/CTS). Secondly, we assume that, given a sample node, both its coveage ange and blocking ange can be depicted as a cicle of adius R and espectively, centeed in the position of the node itself. The value of R depends on the tansmission powe level used and on the popagation model adopted, while the value of depends on the access potocol to be used. It is clea to undestand how in the basic IEEE DCF, the coveage ange and the blocking ange ae the same, i.e. R. Finally, we assume unifom tansmitted powe and unifom popagation law thoughout the netwok, i.e. evey node has a coveage ange with a adius R. If IA-MAC is used, the blocking ange of the node sending a CTS is smalle than its coveage ange ( < R) as shown in Figue 2, whee two nodes A and ae epesented. Given the nodes A and in Figue 2, the aea of the geometic shape which is the union of the two cicumfeences centeed on the nodes ae: A tot(, d, R, 8q) A 1(R) + δ A2 (, d, R, q) >< 0 d R, πr R d+ p 2 (x d) q 2 dx+ >: 2 R R R2 x q 2 dx R < d R; whee R is the adius of the confeence A 1, δ A2 (, d, R, q) is the aea included in the cicumfeence A 2 with adius not included in A 1, d is the distance between A and, and q is the abscissa of the intesection points between the two cicumfeences. Supposing node A is the RTS sende and node answes with a CTS, using the standad IEEE the blocking anges of both nodes ae equal, with adius R, and the two coesponding cicumfeences have thei intesection in the (1) abscissa with the same distance fom the position of the two nodes (q d 2 ). Thus, in the standad IEEE DCF, RTS and CTS block the tansmissions of all the nodes within the aea given by the union of the two blocking anges centeed on the nodes A and : A std (d, R) A tot (R, d, R, d 2 ) [ πr 2 + d 2 4R2 d 2 + 2R 2 actan ] d 4R2 d 2 On the othe hand, if IA-MAC is applied in the same case, the CTS sent by the eceive blocks a smalle numbe of neighbos than the IEEE standad one. This is because some nodes that eceive only CTS packet do not set NAV accoding to the ules explained in Section III. The nodes that have to set the NAV, ae in the aea A IA (, d, R) A tot (, d, R, q IA ). Inseting the coect value fo the intesection point abscissa, q IA d2 2 +R 2 2d, in Eq. 1 we obtain: A IA(, d, R) 8 A tot(r, d, R, q IA) 0 d R, 1 >< ˆπ( 2 R 2 ) πr 2 2 h + a(, d, R) i R 2 d actan 2 2 +R 2 + R < d R; h i >: + 2 d actan R 2 (3) whee a(, d, R) 4d 2 R 2 (d R 2 ) 2. If we conside a mesh (o gid) netwok with distance between two contiguous nodes (see Figue 3), in the IEEE standad case the numbe of simultaneous tansmissions in the netwok is given by: N std (d, R). (2) L 2 / 2 A std (d, R)/ 2 L 2 A std (d, R) ; (4) whee L is the side of the squaed netwok aea. Note that the esult is not elated to, which means it is not elated to the numbe of nodes in the netwok. This is because the blocked aea does not depend on the numbe of the nodes o on its density. Obviously, the esult depends on L because it is a function of the total available aea L 2.

5 Using IA-MAC in the same netwok configuation of Figue 3, the numbe of possible simultaneous tansmissions ae: /R0.5 /R0.6 /R0.7 /R0.8 /R0.9 N IA (, d, R) L 2 / 2 A IA (, d, R)/ 2 L 2 A IA (d, R). (5) We define the capacity gain G of the IA-MAC fo the netwok topology consideed as the atio between N IA (, d, R) and N std (d, R): Capacity Gain G(, d, R) N IA(, d, R) N std (d, R) { πr 2 +b(d,r,r) πr d R, 2 πr 2 +b(d,r,r) πr 2 +b(d,r,) R < d R; (6) d/r Fig. 4. Capacity Gain vs. sende-eceive distance. [ 1 whee: b(, d, R) 2 π( 2 R 2 ) + a(, d, R) ] [ ] [ ] + R 2 actan + 2 actan (basically: d 2 2 +R 2 d R 2 b(, d, R) A IA (, d, R) πr 2 when R < d R). Note that G is neithe function of no of L. The deived esult is geneic fo a mesh netwok. V. PERFORMANCE RESULTS In this Section some analytical esults ae shown in ode to veify the impovement of the poposed scheme with espect to the basic access scheme. The pefomances have been evaluated by consideing diffeent value of (adius fom the eceive in which nodes set thei NAV upon the eception of a CTS packet). asically, in the eal envionment, is a function of the theshold γ discussed in Section III. Fo a single fixed value, we evaluate the capacity gain G(, d, R) of the netwok with espect to the distance d between the sende and the eceive nodes. Figue 4 shows the capacity gain G as a function of d, fo diffeent values of. Since d R (othewise the eceive does not hea the RTS) and R (the maximum tansmit adius is equal to R), the vaiables of the function G ae nomalized to R. Thus, the plots show G( R, d R, 1). When d R 0, the two cicles ae ovelapping and the gain is vey low. When d R 1, IEEE blocks the lagest aea, while IA-MAC can show its effectiveness. The smalle, the geate G, because the blocked aea is educed vey much. Fo a given value of R the gain G changes its inceasing tend when d R 1 R, because of the conditions in Eq. 6. In the best situation, the netwok capacity obtained with IA- MAC is about 40% geate than IEEE Geate gains could be achieved if smalle values of R ae consideed. Actually, if values of R < 1 2 ae consideed, it means that being some nodes close to the eceive than to the tansmitte, they ae not blocked and this does not make sense. Assuming a unifom distibution of the distances between souce and destination d in the inteval [0, R], the stochastic aveage of the capacity gain function G(, d, R) is given by: Capacity Gain Fig /R Stochastic Aveage Capacity Gain vs. Receive Tansmission Radius. Γ(, R) 1 R + 1 R R 0 R R πr 2 + b(d, R, R) πr 2 dd + πr 2 + b(d, R, R) πr 2 dd. (7) + b(d, R, ) Figue 5 shows the esults of the numeical computation of the integal Γ( R, 1). The vaiables ae nomalized as above. The pefomance inceases with the nomalized blocking adius R 1 2 (the captue effect is consideed pefect) is about 26%. With a moe ealistic value of R ( R 7 10 ), the incease is about 20%, which definitely shows the effectiveness of the poposal. VI. CONCLUSION AND RESEARCH IN PROGRESS In this pape we have pesented an effective impovement to IEEE MAC potocol. The poposed scheme, Intefeence Awae IA-MAC, achieves a highe spatial euse in the netwok by allowing feasible paallel tansmissions. To

6 each this goal we popose to include some infomation on the Signal To Intefeence and Noise Ratio (SINR) and eceived powe levels into CTS heade and to slightly modify the actual IEEE DCF. Futhemoe, we tested the effectiveness of the the poposed potocol by developing an analytical model which is able to give some pefomance indices in tems of genealized netwok capacity. Unde the discussed assumptions, the incease of pefomance with espect to the basic IEEE eaches a maximum gain of 30%. Some peliminay ideas ae given on how to futhe impove IA-MAC by including infomation even in RTS packets and by taking into account the tansmission duations of the packets. To test the effectiveness of the potocol and the consistency of ou analytical wok, IA-MAC will be implemented in QualNet Simulato [19]. VII. ACKNOWLEDGEMENTS This wok has been patially funded by the UC Coe pogam Coe unde the sponsoship of ST Micoelectonics. Coesponding Autho: D. Maniezzo UCLA Depatment of Compute Science, H 3731, 420 Westwood Plaza, Los Angeles, CA 90024, USA, dmaniezzo@ieee.og. REFERENCES [1] [2] IEEE Standad , Wieless LAN media access contol (MAC) and physical laye (PHY) specifications, [3] D. Maniezzo, M. Cesana, M. Gela, IA-MAC: Intefeence Awae MAC fo WLANs, UCLA Compute Science Depatment Technical Repot [4] K.K. Leung,. McNai, L.J. Cimini, J.H. Wintes, Outdoo IEEE cellula netwoks: MAC potocol design and pefomance, ICC 2002, New Yok, NY, USA, Apil [5] P. Gupta, P.R. Kuma, The capacity of wieless netwoks, IEEE Tansactions on Infomation Theoy, Volume 46 Issue 2, Mach [6] Haitao Wu, Shiduan Cheng, Yong Peng, Keping Long, Jian Ma, Does the IEEE MAC potocol wok well in multihop wieless ad hoc netwoks?, IEEE Communication Magazine, Volume 39, Issue 6, June [7] Haitao Wu, Shiduan Cheng, Yong Peng, Keping Long, Jian Ma, IEEE distibuted coodination function (DCF): analysis and enhancement, ICC 2002, New Yok, USA, Apil [8] C.C. Chow, V.C.M. Leung, Pefomance of IEEE medium access contol potocol ove a wieless local aea netwok with distibuted adio bidges, WCNC 1999, New Oleans, LA, USA, Septembe [9] J. Deng and Z. Haas, Dual busy tone multiple access (DTMA)- a multiple access contol scheme fo ad hoc netwoks, IEEE Tansactions on Communications, Volume 50, Issue 6, June [10] V. haghavan, MACAW: a Media Access Potocol fo Wieless LAN s, SIGCOMM 1994, London, UK, Septembe, [11] F. Talucci, M. Gela, L. Fatta, MACA-I (MACA y Invitation)-a eceive oiented access potocol fo wieless multihop netwoks, PIMRC 1997, Oulu, Finland, Septembe [12] A. Velayutham, H. Wang, Solution to the Exposed Node Poblem of in Wieless Ad-Hoc Netwoks, vel/eseach/e-mac.pdf. [13] S.-L. Wu, Y.-C. Tseng, C.-Y. Lin and J.-P. Sheu, A Multi-Channel MAC Potocol with Powe Contol fo Multi-Hop Mobile Ad Hoc Netwoks, The Compute Jounal, vol. 45, [14] J.So, N. Vaidya, A Multi-channel MAC Potocol fo Ad Hoc Wieless Netwoks, Dept. of Electical and Compute Engeneeing, Univesity of Illinois, USA, Technical Repot, Januay [15] T. Rappapot, Wieless Communications: Pinciples and Pactice, Pentice Hall, New Jesey, [16] J.P. Monks, V. haghavan, W.-M.W. Hwu, A powe contolled multiple access potocol fo wieless packet netwoks, INFOCOM 2001, Anchoage, Alaska, Apil [17] D. Hong and S. Rappapot, Taffic models and pefomance analysis fo cellula mobile adio telephone systems with pioitized and nonpioitized handoff pocedues, IEEE Tansactions on Vehicula Technology, Vol. 35, no. 3, August [18] A.. McDonald and T. F. Znati, A Path Availability Model fo Wieless Ad-Hoc Netwoks, WCNC 1999, New Oleans, LA, USA, Septembe [19]

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

Interference Aware (IA) MAC: an Enhancement to IEEE802.11b DCF

Interference Aware (IA) MAC: an Enhancement to IEEE802.11b DCF Interference Aware (IA) MAC: an Enhancement to IEEE802.b DCF Matteo Cesana, Daniela Maniezzo, Pierpaolo ergamo, Mario Gerla Dipartimento di Elettronica e Informazione, Politecnico di Milano, Italy Computer

More information

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Dynamic Topology Control to Reduce Interference in MANETs

Dynamic Topology Control to Reduce Interference in MANETs Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks Available online at www.sciencediect.com Ad Hoc Netwoks 7 (29) 23 247 www.elsevie.com/locate/adhoc Minimizing spatial and time esevation with Collision-Awae DCF in mobile ad hoc netwoks Lubo Song a, Chansu

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

The concept of PARPS - Packet And Resource Plan Scheduling

The concept of PARPS - Packet And Resource Plan Scheduling The concept of PARPS - Packet And Resouce Plan Scheduling Magnus Eiksson 1 and Håkan Sätebeg 2 1) Dept. of Signals, Sensos and Systems, Royal Inst. of Technology, Sweden. E-mail: magnus.eiksson@ite.mh.se.

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300

More information

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok 14260 Email:

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver 1 RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Dive Amit Jain Daji Qiao Kang G. Shin The Univesity of Michigan Ann Abo, MI 4819, USA {amitj,dqiao,kgshin@eecs.umich.edu Abstact The cuent

More information

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New

More information

Interference-Aware Multicast for Wireless Multihop Networks

Interference-Aware Multicast for Wireless Multihop Networks Intefeence-Awae Multicast fo Wieless Multihop Netwoks Daniel Letpatchya School of Electical and Compute Engineeing Geogia Institute of Technology Atlanta, Geogia 30332 0250 Douglas M. Blough School of

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

Analysis of Wired Short Cuts in Wireless Sensor Networks

Analysis of Wired Short Cuts in Wireless Sensor Networks Analysis of Wied Shot Cuts in Wieless Senso Netwos ohan Chitaduga Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles 90089, USA Email: chitadu@usc.edu Ahmed Helmy Depatment

More information

EE 6900: Interconnection Networks for HPC Systems Fall 2016

EE 6900: Interconnection Networks for HPC Systems Fall 2016 EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

A Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks

A Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks A Coss-Laye Famewok of QoS Routing and Distibuted Scheduling fo Mesh Netwoks Chi Haold Liu, Athanasios Gkelias, and Kin K. Leung Depatment of Electical and Electonic Engineeing, Impeial College London

More information

Event-based Location Dependent Data Services in Mobile WSNs

Event-based Location Dependent Data Services in Mobile WSNs Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,

More information

Positioning of a robot based on binocular vision for hand / foot fusion Long Han

Positioning of a robot based on binocular vision for hand / foot fusion Long Han 2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

i-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA

i-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA i-pcgrid Wokshop 2016 Apil 1 st 2016 San Fancisco, CA Liang Min* Eddy Banks, Bian Kelley, Met Kokali, Yining Qin, Steve Smith, Philip Top, and Caol Woodwad *min2@llnl.gov, 925-422-1187 LDRD 13-ERD-043

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:

More information

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

AMERICAN UNIVERSITY OF BEIRUT IMPROVING DATA COMMUNICATIONS IN VEHICULAR AD HOC NETWORKS VIA COGNITIVE NETWORKS TECHNIQUES ALI JAWAD GHANDOUR

AMERICAN UNIVERSITY OF BEIRUT IMPROVING DATA COMMUNICATIONS IN VEHICULAR AD HOC NETWORKS VIA COGNITIVE NETWORKS TECHNIQUES ALI JAWAD GHANDOUR AMERICAN UNIVERSITY OF BEIRUT IMPROVING DATA COMMUNICATIONS IN VEHICULAR AD HOC NETWORKS VIA COGNITIVE NETWORKS TECHNIQUES by ALI JAWAD GHANDOUR A thesis submitted in patial fulfillment of the equiements

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad

More information

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE 5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai

More information

Bo Gu and Xiaoyan Hong*

Bo Gu and Xiaoyan Hong* Int. J. Ad Hoc and Ubiquitous Computing, Vol. 11, Nos. /3, 1 169 Tansition phase of connectivity fo wieless netwoks with gowing pocess Bo Gu and Xiaoyan Hong* Depatment of Compute Science, Univesity of

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1 Impovement of Fist-ode Takagi-Sugeno Models Using Local Unifom B-splines Felipe Fenández, Julio Gutiéez, Gacián Tiviño and Juan Calos Cespo Dep. Tecnología Fotónica, Facultad de Infomática Univesidad Politécnica

More information

Analysis of Coexistence between IEEE , BLE and IEEE in the 2.4 GHz ISM Band

Analysis of Coexistence between IEEE , BLE and IEEE in the 2.4 GHz ISM Band Analysis of Coexistence between IEEE 82.5.4, BLE and IEEE 82. in the 2.4 GHz ISM Band Radhakishnan Nataajan, Pouia Zand, Majid Nabi Holst I. I NTRODUCTION In ecent yeas, the emegence of IoT has led to

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

Configuring RSVP-ATM QoS Interworking

Configuring RSVP-ATM QoS Interworking Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP

More information

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network An Efficient andove Mechanism Using the Geneal Switch Management Potocol on a Multi-Potocol abel Switching Netwok Seong Gon hoi, yun Joo Kang, and Jun Kyun hoi Using the geneal switch management potocol

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

MANET QoS support without reservations

MANET QoS support without reservations SECURITY AND COMMUNICATION NETWORKS Secuity Comm. Netwoks (2010) Published online in Wiley InteScience (www.intescience.wiley.com)..183 SPECIAL ISSUE PAPER MANET QoS suppot without esevations Soon Y. Oh,

More information

User Specified non-bonded potentials in gromacs

User Specified non-bonded potentials in gromacs Use Specified non-bonded potentials in gomacs Apil 8, 2010 1 Intoduction On fist appeaances gomacs, unlike MD codes like LAMMPS o DL POLY, appeas to have vey little flexibility with egads to the fom of

More information

Erasure-Coding Based Routing for Opportunistic Networks

Erasure-Coding Based Routing for Opportunistic Networks Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

Heterogeneous V2V Communications in Multi-Link and Multi-RAT Vehicular Networks

Heterogeneous V2V Communications in Multi-Link and Multi-RAT Vehicular Networks 1 Heteogeneous V2V Communications in Multi-Link and Multi-RAT Vehicula Netwoks Miguel Sepulce and Javie Gozalvez Abstact Connected and automated vehicles will enable advanced taffic safety and efficiency

More information

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2 Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used

More information

POMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler

POMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler POMDP: Intoduction to Patially Obsevable Makov Decision Pocesses Hossein Kamalzadeh, Michael Hahsle 2019-01-02 The R package pomdp povides an inteface to pomdp-solve, a solve (witten in C) fo Patially

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced

More information

Modeling spatially-correlated data of sensor networks with irregular topologies

Modeling spatially-correlated data of sensor networks with irregular topologies This full text pape was pee eviewed at the diection of IEEE Communications Society subject matte expets fo publication in the IEEE SECON 25 poceedings Modeling spatially-coelated data of senso netwoks

More information

FACE VECTORS OF FLAG COMPLEXES

FACE VECTORS OF FLAG COMPLEXES FACE VECTORS OF FLAG COMPLEXES ANDY FROHMADER Abstact. A conjectue of Kalai and Eckhoff that the face vecto of an abitay flag complex is also the face vecto of some paticula balanced complex is veified.

More information

The Dual Round Robin Matching Switch with Exhaustive Service

The Dual Round Robin Matching Switch with Exhaustive Service The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number.

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number. Illustative G-C Simila cicles Alignments to Content Standads: G-C.A. Task (a, b) x y Fo this poblem, is a point in the - coodinate plane and is a positive numbe. a. Using a tanslation and a dilation, show

More information

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks Numbe of Paths and Neighbous Effect on Multipath Routing in Mobile Ad Hoc Netwoks Oday Jeew School of Infomation Systems and Accounting Univesity of Canbea Canbea ACT 2617, Austalia oday.jeew@canbea.edu.au

More information

Shortest Paths for a Two-Robot Rendez-Vous

Shortest Paths for a Two-Robot Rendez-Vous Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal

More information

Wormhole Detection and Prevention in MANETs

Wormhole Detection and Prevention in MANETs Womhole Detection and Pevention in MANETs Lija Joy Compute Science and Engineeing KMEA Engineeing College Enakulum, Keala, India lijavj@gmail.com Sheena Kuian K Compute Science and Engineeing KMEA Engineeing

More information

Multidimensional Testing

Multidimensional Testing Multidimensional Testing QA appoach fo Stoage netwoking Yohay Lasi Visuality Systems 1 Intoduction Who I am Yohay Lasi, QA Manage at Visuality Systems Visuality Systems the leading commecial povide of

More information

Quality-of-Content (QoC)-Driven Rate Allocation for Video Analysis in Mobile Surveillance Networks

Quality-of-Content (QoC)-Driven Rate Allocation for Video Analysis in Mobile Surveillance Networks Quality-of-Content (QoC)-Diven Rate Allocation fo Video Analysis in Mobile Suveillance Netwoks Xiang Chen, Jenq-Neng Hwang, Kuan-Hui Lee, Ricado L. de Queioz Depatment of Electical Engineeing, Univesity

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

Clustering Interval-valued Data Using an Overlapped Interval Divergence

Clustering Interval-valued Data Using an Overlapped Interval Divergence Poc. of the 8th Austalasian Data Mining Confeence (AusDM'9) Clusteing Inteval-valued Data Using an Ovelapped Inteval Divegence Yongli Ren Yu-Hsn Liu Jia Rong Robet Dew School of Infomation Engineeing,

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

Mobility Pattern Recognition in Mobile Ad-Hoc Networks

Mobility Pattern Recognition in Mobile Ad-Hoc Networks Mobility Patten Recognition in Mobile Ad-Hoc Netwoks S. M. Mousavi Depatment of Compute Engineeing, Shaif Univesity of Technology sm_mousavi@ce.shaif.edu H. R. Rabiee Depatment of Compute Engineeing, Shaif

More information

Worst-Case Delay Bounds for Uniform Load-Balanced Switch Fabrics

Worst-Case Delay Bounds for Uniform Load-Balanced Switch Fabrics Wost-Case Delay Bounds fo Unifom Load-Balanced Switch Fabics Spyidon Antonakopoulos, Steven Fotune, Rae McLellan, Lisa Zhang Bell Laboatoies, 600 Mountain Ave, Muay Hill, NJ 07974 fistname.lastname@alcatel-lucent.com

More information

Totally Disjoint Multipath Routing in Multihop Wireless Networks

Totally Disjoint Multipath Routing in Multihop Wireless Networks Totally isjoint Multipath Routing in Multihop Wieless Netwoks Sonia Wahate and Raouf outaba Univesity of Wateloo School of ompute Science Wateloo, anada {spwahate,boutaba}@uwateloo.ca bstact Speading taffic

More information

Separability and Topology Control of Quasi Unit Disk Graphs

Separability and Topology Control of Quasi Unit Disk Graphs Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,

More information

Characterizing Data Deliverability of Greedy Routing in Wireless Sensor Networks

Characterizing Data Deliverability of Greedy Routing in Wireless Sensor Networks Chaacteizing Data Deliveability of Geedy Routing in Wieless Senso Netwoks Jinwei Liu, Lei Yu, Haiying Shen, Yangyang He and Jason Hallstom Depatment of Electical and Compute Engineeing, Clemson Univesity,

More information

Cellular Neural Network Based PTV

Cellular Neural Network Based PTV 3th Int Symp on Applications of Lase Techniques to Fluid Mechanics Lisbon, Potugal, 6-9 June, 006 Cellula Neual Netwok Based PT Kazuo Ohmi, Achyut Sapkota : Depatment of Infomation Systems Engineeing,

More information

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1)

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1) 1 Multi Path PERT Ankit Singh and A. L. Naasimha Reddy Electical and Compute Engineeing Depatment, Texas A&M Univesity; email: eddy@ece.tamu.edu. Abstact This pape pesents a new multipath delay based algoithm,

More information

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen Accuate Diffaction Efficiency Contol fo Multiplexed Volume Hologaphic Gatings Xuliang Han, Gichel Kim, and Ray T. Chen Micoelectonic Reseach Cente Depatment of Electical and Compute Engineeing Univesity

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Analysis of uniform illumination system with imperfect Lambertian LEDs

Analysis of uniform illumination system with imperfect Lambertian LEDs Optica Applicata, Vol. XLI, No. 3, 2011 Analysis of unifom illumination system with impefect Lambetian LEDs JIAJIE TAN 1, 2, KECHENG YANG 1*, MIN XIA 1, YING YANG 1 1 Wuhan National Laboatoy fo Optoelectonics,

More information

A Stable Traffic Engineering Technique for Performance Enhancement of the Non-TCP Elastic Flows *

A Stable Traffic Engineering Technique for Performance Enhancement of the Non-TCP Elastic Flows * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 30, 1115-1129 (2014) A Stable Taffic Engineeing Technique fo Pefomance Enhancement of the Non-TCP Elastic Flows * Ian Telecom Reseach Cente (ITRC) Tehan,

More information

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences Ameican Jounal of ata ining and Knowledge iscovey 27; 2(4): 2-8 http://www.sciencepublishinggoup.com//admkd doi:.648/.admkd.2724.2 Genealized Gey Taget ecision ethod Based on ecision akes Indiffeence Attibute

More information

Modeling Spatially Correlated Data in Sensor Networks

Modeling Spatially Correlated Data in Sensor Networks Modeling Spatially Coelated Data in Senso Netwoks Apoova Jindal and Konstantinos Psounis Univesity of Southen Califonia The physical phenomena monitoed by senso netwoks, e.g. foest tempeatue, wate contamination,

More information

An Assessment of the Efficiency of Close-Range Photogrammetry for Developing a Photo-Based Scanning Systeminthe Shams Tabrizi Minaret in Khoy City

An Assessment of the Efficiency of Close-Range Photogrammetry for Developing a Photo-Based Scanning Systeminthe Shams Tabrizi Minaret in Khoy City Austalian Jounal of Basic and Applied Sciences, 5(1): 80-85, 011 ISSN 1991-8178 An Assessment of the Efficiency of Close-Range Photogammety fo Developing a Photo-Based Scanning Systeminthe Shams Tabizi

More information

Concomitants of Upper Record Statistics for Bivariate Pseudo Weibull Distribution

Concomitants of Upper Record Statistics for Bivariate Pseudo Weibull Distribution Available at http://pvamuedu/aam Appl Appl Math ISSN: 93-9466 Vol 5, Issue (Decembe ), pp 8 9 (Peviously, Vol 5, Issue, pp 379 388) Applications and Applied Mathematics: An Intenational Jounal (AAM) Concomitants

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

1.3 Multiplexing, Time-Switching, Point-to-Point versus Buses

1.3 Multiplexing, Time-Switching, Point-to-Point versus Buses http://achvlsi.ics.foth.g/~kateveni/534 1.3 Multiplexing, Time-Switching, Point-to-Point vesus Buses n R m Aggegation (multiplexing) Distibution (demultiplexing) Simplest Netwoking, like simplest pogamming:

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information