How to outperform IEEE802.11: Interference Aware (IA) MAC
|
|
- Magdalen Preston
- 6 years ago
- Views:
Transcription
1 How to outpefom IEEE802.11: Intefeence Awae (IA) MAC Daniela Maniezzo, Piepaolo egamo, Matteo Cesana, Maio Gela CS Dept. - Univesity of Califonia Los Angeles - UCLA, Califonia, USA Engineeing Dept., Feaa Univesity, Italy Dipatimento di Elettonica e Infomazione, Politecnico di Milano, Italy maniezzo@ucla.edu, pbegamo@ing.unife.it, cesana@elet.polimi.it, gela@cs.ucla.edu Abstact Wieless netwoks ae nowadays vey popula. They ae mostly based on IEEE potocol which is known to show low pefomance in ad hoc netwoks. Also when infastuctued netwoks (many access points ae placed) ae consideed, a single tansmission could block many adio cells. In this wok, we popose Intefeence Awae (IA) MAC, a modified vesion of standad IEEE The main idea is not to set the Netwok Allocation Vecto (NAV) on the eception of each RTS and CTS, but only when it is stictly equied, i.e., when a concuent tansmission could actually destoy anothe tansmission. To make it feasible, we popose to inset some infomation about intefeence and eceived powe levels into IEEE contol packets. We show the effectiveness of IA MAC by means of an analytical investigation. I. INTRODUCTION The ecent success of wieless technologies has boosted the development of wieless netwoking. oth industy and academia have tuned thei attention to this aea, attacted the fome by intiguing eseach issues, the latte by maket evenues. Among the numeous standads fo wieless communications, the IEEE802.11b [1] is the one with the highest utilization at the moment. IEEE802.11b defines a MAC (Medium Access Contol) laye, MAC management potocols and sevices, and thee physical (PHY) layes espectively based on IR, FHSS at 2.4 GHz and DSSS at 2.4 GHz. The goal of the standad is to delive sevices peviously found only in wied netwoks, within mobile uses with high thoughput, high eliability and continuous netwok connection. Fo this eason, IEEE based netwoks ae often efeed to as Wieless LANs. The wieless envionment poses some challenging poblems the netwok design has to cope with. Fistly, the adio channel is pone to eos and tempoay failues which ae not encounteed in the wied wold, secondly, the channel is shaed and esouces ae often scace. In this scenaio, the employed access contol schemes ae key points fo achieving effectiveness. As fa as the MAC laye is concened, two diffeent schemes ae standadized: the Point Coodination Function (PCF) and the Distibuted Coodination Function (DCF). While PCF consists of a centalized polling based access scheme, the DCF defines a distibuted access algoithm fo both infastuctue and ad hoc wieless LANs [1], [2]. As fa as unicast data packet tansfe is concened, DCF defines two access methods. The fist one is based on a two-way handshake pocedue (DATA/ACK), the second one adopts a fou-way handshake pocedue, whee the DATA/ACK phase is peceded by a channel pobing/acquiing phase called RTS/CTS (Request To Send/ Clea To Send). oth of the above methods implement a multiple access scheme based on Caie Sensing with Collision Avoidance (CSMA/CA). asically, each node senses the channel befoe tansmitting the fist fame of the handshake; if the channel is sensed idle fo a cetain peiod of time called DIFS (Distibuted InteFame Space), the node stats tansmitting the fist fame of the handshake, othewise the node waits fo the channel to be idle fo DIFS and daws a andom additional backoff time to avoid possible collisions when the channel becomes fee (Collision Avoidance). A futhe channel contol mechanism is applied in the fou-ways handshake pocedue. Accoding to this scheme, each contol fame (RTS/CTS) bings infomation about the duation of the stating communication. Evey othe node oveheaing that fame is pevented fom accessing the channel fo all the duation of the ongoing communications by setting a pope paamete called NAV (Netwok Allocation Vecto). This pocedue is often efeed to as Vitual Caie Sensing. In this pape we popose a novel MAC laye fo Wieless LANs, named Intefeence Awae MAC (IA-MAC) [3], which extends the capabilities of the basic IEEE in envionments with high intefeence, both in ad hoc and in infastuctued mode [4], [5]. In Section II we focus on the open poblems of wieless netwoks, in paticula the IEEE based ones, and we give an oveview of the poposed appoaches of solutions. Section III summaizes the basics of the poposed IA-MAC potocol, while Section IV gives a mathematical model to analyze the pefomance of the potocol itself and in Section V some esults ae shown. Finally, Section VI concludes the pape.
2 II. OPEN PROLEMS AND PROPOSED SOLUTIONS IEEE was oiginally devised explicitly fo a single Access Point scenaio whee all the mobile nodes ae within the tansmitting ange of one anothe. In this envionment, the IEEE medium access contol potocol, which tends to avoid the intefeence, is able to achieve high efficiency. Poblems aise when IEEE is used both in a pue ad hoc mode, whee the basic IEEE mode is not able to exploit any spatial euse, and in infastuctued cellula-like scenaio whee the connectivity is povided by diffeent APs with ovelapping tansmission anges, i.e. with non negligible intefeence [6]. The efficiency of IEEE based netwoks can be damatically impaied by the well known hidden and exposed teminal poblems [7]. As a matte of fact, the fou-way handshake with the Vitual Caie Sensing solves only patially the hidden teminal poblem, and, to the best of ou knowledge, the exposed teminal one is still a pitfall and can deeply affect the pefomance of multi-hop ad hoc netwoks based on IEEE [8]. Diffeent solutions have been poposed in the liteatue to counteact these shotcomings of the IEEE standad. In paticula, a majo effot has been done in the development of an efficient medium access contol potocol able to exploit spatial euse and allow paallel feasible communications [9]. The wok on this topic deals pimaily with the modification of the numeous times the IEEE MAC level [10], [11] with the pupose to achieve a bette shaing of the common esouce among all the uses. Velayutham and Wang [12] poposed a distibuted scheduling algoithm fo IEEE netwoks able to solve the exposed teminal poblem and consequently incease the spatial euse. Recently, some woks have appeaed aiming at impoving the IEEE MAC laye by exploiting the captue at the physical laye, that is to say the capacity of coectly eceiving a tansmission even if in pesence of intefeing communications [13], [14]. Like in the cellula systems, the captue effect is exploited in ode to incease the euse and consequently the bandwidth efficiency of the wieless system [15]. Ou wok follows this second appoach. In details, we popose to enhance the infomation caied by the CTS packets (and in a moe complex appoach, also by RTS packets) so that each tansmitting/eceiving node can have an estimate on the intefeence it geneates on all the othe ongoing tansmission, and decides to actually tansmit/eceive if such an intefeence is contolled. The basic pinciples of ou mechanism ae simila to the ones intoduced in the Powe Contolled Multiple Access (PCMA) poposed by Monks et al. [16]. oth potocols ty to exploit the captue effect to incease the spatial euse, and, like PCMA, IA-MAC is based on a coopeation pinciple, i.e., no station is allowed to tansmit/eceive if its tansmission/eception can destoy ongoing tansmissions. On the othe hand, ou scheme diffes fom the PCMA in at least two significant aspects: (a) IA-MAC does not implement any powe contol, ou attention is focused on the access pat athe than on the powe management, which can be ticky in a distibuted envionment like the ad hoc one, (b) PCMA uses an additional adio channel in ode to tansmit a busy tone with infomation on the intefeence levels, while in IA- MAC the estimation of the intefeence is done on the same channel used fo data taffic; because of the last eason, IA- MAC seems to be moe cost effective and bette suited fo wieless envionments in which the battey consumption is a constaint. III. IA-MAC ASICS In the following, IA-MAC is explained by consideing that IEEE DCF is known by the eade, even if a bief desciption will be given. In ode to educe the pobability of two stations colliding on a eceive because they cannot hea each othe (hidden teminal poblem), the IEEE standad use the Request to Send/Clea to Send (RTS/CTS) handshake; a station equiing to tansmit a packet fist tansmits a shot contol packet called RTS (Request To Send), which includes the souce, destination, and the duation of the following fame; the taget station eplies (if the medium is fee) with a contol packet called CTS (Clea to Send), which includes the same duation infomation. All stations eceiving eithe the RTS and/o the CTS, efain tansmission fo the given duation. This mechanism educes the pobability of a collision on the eceive aea by a station that is hidden fom the tansmitte (and it does not hea the RTS), since the station heas the CTS and eseves the medium as busy until the end of the tansmission. The duation infomation on the RTS also potects the tansmitte aea fom collisions duing the ACK (fom stations that ae out of ange of the acknowledging station). RTS and CTS ae used in the IEEE only if the width of the data packet to be tansmitted is geate than a cetain theshold. In this pape, we conside to set this theshold to zeo, i.e., each tansmission equies the RTS/CTS handshake. IA-MAC behaves exactly as IEEE apat fom the changes in the following. The fist subsections explain the basic impovement of IA-MAC to IEEE In the last subsection, othe impovements unde investigation ae biefly discussed. A. RTS and CTS In ou poposal, each node uses always the fou way handshake, i.e., the RTS (Request To Send) and CTS (Clea To Send) ae always sent by the nodes involved in the communication. This is necessay in ode to estimate the level of noise and intefeence. Moeove, we equie a vey slight modification of the CTS packet. CTS packet includes the same infomation of the standad potocol. In addition, we include two new heade fields: SINR: the expeienced SINR (Signal to Intefeence and Noise Ratio) at the time of the eception of the RTS,
3 Fig. 1. to D. C D A A is sending a packet to when C should decide whethe to tansmit since I P RT S /SINR. If SINR ext is below a cetain theshold (γ), C efains fom tansmitting by setting its NAV, othewise it can send its own RTS. The value of γ should be designed in such a way to take into account that moe than one node could incease the expeienced intefeence on the ongoing communications. P R : the eception powe of the RTS packet. Since the quantities could be expessed in dmw (d milliwatt), the ange values can be expessed in 1 byte fo each field. These values ae used by the node which oveheas the CTS to decide whethe to set o not the NAV, accoding to the ules descibed in the following.. Physical and Vitual Channel Sensing With espect to IEEE802.11, an IA-MAC compliant node does not pefom the physical channel sensing phase but always esots to the Vitual Caie Sensing. Nevetheless, the potocol belongs to CSMA family, due to the vitual caie sensing, i.e., the value of the Netwok Allocation Vecto (NAV) detemines whethe the channel is busy fo a oncoming tansmission and fo the backoff counte. Thus, nodes decement thei backoff counte only when the channel is logically sensed busy and not when a tansmission is head by the node. The backoff counte follows the othe ules of the standad potocol (it is decemented afte a Distibuted InteFame Space time since the channel was vitually tested fee if the last eception has been coect, etc). C. Netwok Allocation Vecto (NAV) NAV is always set upon the eception of RTS, as in the standad potocol. Each node which eceives the RTS (but the ecipient node) sets up its NAV. NAV is not always set on the eception of CTS. If a node eceives a CTS fom anothe node, it can compute the impact of a tansmission on the othe node SINR. Fo bette undestanding the potocol, let us conside fou nodes (A,, C, D) in a ow (see Figue 1). A is in adio coveage only with, with A and C, C with and D and D only with C. A sent a RTS packet to and answeed with a CTS. Node C eceives a CTS packet fom (in etun to a RTS fom A), it can estimate how an its own tansmission could affect the eception of. Let P RT S be the powe eceived by on the RTS sent by A, and let I be the sum of noise and intefeence peceived by. insets in its CTS the infomation of SINR P RT S and P RT S /I. C oveheas the CTS sent by. Let PC CT S be the powe C eceives on the CTS sent by. In ode to estimate the SINR would get if C stats tansmitting, C consides the channel symmetic, i.e., would eceive a packet fom C with the same powe PC CT S peceive a value of SINR equal to: SINR ext P RT S I + P C CT S. Thus, C estimates that would P RT S SINR + PC CT S, SINR P RT S D. A Paticula Situation Let us conside the same situation of Figue 1: tansmitted its CTS to A. Suppose C has a packet to be deliveed to. In the standad IEEE802.11, C would efain the tansmission upon eception of the CTS fom. With IA-MAC, C could ty to send an RTS to, unless it has to set the NAV because of the ules descibed above. In ode to avoid such a situation, the nodes should ecod in thei memoy the ID of the sende of the CTS they ovehea and the tansmission duation (which is inseted in the standad CTS packet). In this case, the node could simply set the NAV and eset it when the duation time expies. E. Impovements IA-MAC has bette pefomance with espect to standad IEEE fo two easons, at least: it pemits paallel eliable tansmissions which ae not allowed by the basic standad, and the backoff times expie faste, since the physical caie sensing is disabled. Convesely, IA-MAC uses always RTS/CTS, which is a easonable assumption if we conside an ad hoc scenaio. In Section IV, an estimation of the pefomance gain is deived though mathematical analysis. Futue impovements to the potocol we ae woking on will futhe incease the spatial euse and consequently the oveall gain. The basic idea is to elax the ule which wants the NAV to be set always upon eception of the RTS. We have found that in some situations the NAV can be unset even if the node has eceived a RTS. This can be done inseting the infomation on the intefeence level in the RTS as well, and exploiting the time divesity among paallel communications, that is to say cases whee collision can be avoided because the nodes within the same coveage ange ae in the same tansmitting/eceiving state. IV. AN ANALYTICAL MODEL OF IA-MAC In ode to compae the pefomance of the standad IEEE DCF and the poposed IA-MAC, we conside that each tansmission of a data packet is peceded by the RTS/CTS exchanging phase. In this pape, we focus on static ad hoc netwoks. Note that in most mobility scenaios, nodes do not move fo significant distances duing a packet tansmission time, thus, fo capacity analysis, we can assume mobile netwoks as effectively static. The status of a wieless link depends on seveal system and envionmental factos that affect sende and eceive anges. In geneal, a node tansmission ange is neithe fixed, no symmetic but it shows time and spatial vaiability. In this
4 y A1 A2 R A d q A2 x L Fig. 3. Gid Netwok. Fig. 2. Coveage and intefeence aeas. pape, a widely applied optimistic model has been used [17], [18]. Fistly, we intoduce the concepts of coveage ange and blocking ange, defined espectively as the aea whee the tansmissions of a given node can be coectly detected and the aea which is blocked by the tansmission of a contol packet (RTS/CTS). Secondly, we assume that, given a sample node, both its coveage ange and blocking ange can be depicted as a cicle of adius R and espectively, centeed in the position of the node itself. The value of R depends on the tansmission powe level used and on the popagation model adopted, while the value of depends on the access potocol to be used. It is clea to undestand how in the basic IEEE DCF, the coveage ange and the blocking ange ae the same, i.e. R. Finally, we assume unifom tansmitted powe and unifom popagation law thoughout the netwok, i.e. evey node has a coveage ange with a adius R. If IA-MAC is used, the blocking ange of the node sending a CTS is smalle than its coveage ange ( < R) as shown in Figue 2, whee two nodes A and ae epesented. Given the nodes A and in Figue 2, the aea of the geometic shape which is the union of the two cicumfeences centeed on the nodes ae: A tot(, d, R, 8q) A 1(R) + δ A2 (, d, R, q) >< 0 d R, πr R d+ p 2 (x d) q 2 dx+ >: 2 R R R2 x q 2 dx R < d R; whee R is the adius of the confeence A 1, δ A2 (, d, R, q) is the aea included in the cicumfeence A 2 with adius not included in A 1, d is the distance between A and, and q is the abscissa of the intesection points between the two cicumfeences. Supposing node A is the RTS sende and node answes with a CTS, using the standad IEEE the blocking anges of both nodes ae equal, with adius R, and the two coesponding cicumfeences have thei intesection in the (1) abscissa with the same distance fom the position of the two nodes (q d 2 ). Thus, in the standad IEEE DCF, RTS and CTS block the tansmissions of all the nodes within the aea given by the union of the two blocking anges centeed on the nodes A and : A std (d, R) A tot (R, d, R, d 2 ) [ πr 2 + d 2 4R2 d 2 + 2R 2 actan ] d 4R2 d 2 On the othe hand, if IA-MAC is applied in the same case, the CTS sent by the eceive blocks a smalle numbe of neighbos than the IEEE standad one. This is because some nodes that eceive only CTS packet do not set NAV accoding to the ules explained in Section III. The nodes that have to set the NAV, ae in the aea A IA (, d, R) A tot (, d, R, q IA ). Inseting the coect value fo the intesection point abscissa, q IA d2 2 +R 2 2d, in Eq. 1 we obtain: A IA(, d, R) 8 A tot(r, d, R, q IA) 0 d R, 1 >< ˆπ( 2 R 2 ) πr 2 2 h + a(, d, R) i R 2 d actan 2 2 +R 2 + R < d R; h i >: + 2 d actan R 2 (3) whee a(, d, R) 4d 2 R 2 (d R 2 ) 2. If we conside a mesh (o gid) netwok with distance between two contiguous nodes (see Figue 3), in the IEEE standad case the numbe of simultaneous tansmissions in the netwok is given by: N std (d, R). (2) L 2 / 2 A std (d, R)/ 2 L 2 A std (d, R) ; (4) whee L is the side of the squaed netwok aea. Note that the esult is not elated to, which means it is not elated to the numbe of nodes in the netwok. This is because the blocked aea does not depend on the numbe of the nodes o on its density. Obviously, the esult depends on L because it is a function of the total available aea L 2.
5 Using IA-MAC in the same netwok configuation of Figue 3, the numbe of possible simultaneous tansmissions ae: /R0.5 /R0.6 /R0.7 /R0.8 /R0.9 N IA (, d, R) L 2 / 2 A IA (, d, R)/ 2 L 2 A IA (d, R). (5) We define the capacity gain G of the IA-MAC fo the netwok topology consideed as the atio between N IA (, d, R) and N std (d, R): Capacity Gain G(, d, R) N IA(, d, R) N std (d, R) { πr 2 +b(d,r,r) πr d R, 2 πr 2 +b(d,r,r) πr 2 +b(d,r,) R < d R; (6) d/r Fig. 4. Capacity Gain vs. sende-eceive distance. [ 1 whee: b(, d, R) 2 π( 2 R 2 ) + a(, d, R) ] [ ] [ ] + R 2 actan + 2 actan (basically: d 2 2 +R 2 d R 2 b(, d, R) A IA (, d, R) πr 2 when R < d R). Note that G is neithe function of no of L. The deived esult is geneic fo a mesh netwok. V. PERFORMANCE RESULTS In this Section some analytical esults ae shown in ode to veify the impovement of the poposed scheme with espect to the basic access scheme. The pefomances have been evaluated by consideing diffeent value of (adius fom the eceive in which nodes set thei NAV upon the eception of a CTS packet). asically, in the eal envionment, is a function of the theshold γ discussed in Section III. Fo a single fixed value, we evaluate the capacity gain G(, d, R) of the netwok with espect to the distance d between the sende and the eceive nodes. Figue 4 shows the capacity gain G as a function of d, fo diffeent values of. Since d R (othewise the eceive does not hea the RTS) and R (the maximum tansmit adius is equal to R), the vaiables of the function G ae nomalized to R. Thus, the plots show G( R, d R, 1). When d R 0, the two cicles ae ovelapping and the gain is vey low. When d R 1, IEEE blocks the lagest aea, while IA-MAC can show its effectiveness. The smalle, the geate G, because the blocked aea is educed vey much. Fo a given value of R the gain G changes its inceasing tend when d R 1 R, because of the conditions in Eq. 6. In the best situation, the netwok capacity obtained with IA- MAC is about 40% geate than IEEE Geate gains could be achieved if smalle values of R ae consideed. Actually, if values of R < 1 2 ae consideed, it means that being some nodes close to the eceive than to the tansmitte, they ae not blocked and this does not make sense. Assuming a unifom distibution of the distances between souce and destination d in the inteval [0, R], the stochastic aveage of the capacity gain function G(, d, R) is given by: Capacity Gain Fig /R Stochastic Aveage Capacity Gain vs. Receive Tansmission Radius. Γ(, R) 1 R + 1 R R 0 R R πr 2 + b(d, R, R) πr 2 dd + πr 2 + b(d, R, R) πr 2 dd. (7) + b(d, R, ) Figue 5 shows the esults of the numeical computation of the integal Γ( R, 1). The vaiables ae nomalized as above. The pefomance inceases with the nomalized blocking adius R 1 2 (the captue effect is consideed pefect) is about 26%. With a moe ealistic value of R ( R 7 10 ), the incease is about 20%, which definitely shows the effectiveness of the poposal. VI. CONCLUSION AND RESEARCH IN PROGRESS In this pape we have pesented an effective impovement to IEEE MAC potocol. The poposed scheme, Intefeence Awae IA-MAC, achieves a highe spatial euse in the netwok by allowing feasible paallel tansmissions. To
6 each this goal we popose to include some infomation on the Signal To Intefeence and Noise Ratio (SINR) and eceived powe levels into CTS heade and to slightly modify the actual IEEE DCF. Futhemoe, we tested the effectiveness of the the poposed potocol by developing an analytical model which is able to give some pefomance indices in tems of genealized netwok capacity. Unde the discussed assumptions, the incease of pefomance with espect to the basic IEEE eaches a maximum gain of 30%. Some peliminay ideas ae given on how to futhe impove IA-MAC by including infomation even in RTS packets and by taking into account the tansmission duations of the packets. To test the effectiveness of the potocol and the consistency of ou analytical wok, IA-MAC will be implemented in QualNet Simulato [19]. VII. ACKNOWLEDGEMENTS This wok has been patially funded by the UC Coe pogam Coe unde the sponsoship of ST Micoelectonics. Coesponding Autho: D. Maniezzo UCLA Depatment of Compute Science, H 3731, 420 Westwood Plaza, Los Angeles, CA 90024, USA, dmaniezzo@ieee.og. REFERENCES [1] [2] IEEE Standad , Wieless LAN media access contol (MAC) and physical laye (PHY) specifications, [3] D. Maniezzo, M. Cesana, M. Gela, IA-MAC: Intefeence Awae MAC fo WLANs, UCLA Compute Science Depatment Technical Repot [4] K.K. Leung,. McNai, L.J. Cimini, J.H. Wintes, Outdoo IEEE cellula netwoks: MAC potocol design and pefomance, ICC 2002, New Yok, NY, USA, Apil [5] P. Gupta, P.R. Kuma, The capacity of wieless netwoks, IEEE Tansactions on Infomation Theoy, Volume 46 Issue 2, Mach [6] Haitao Wu, Shiduan Cheng, Yong Peng, Keping Long, Jian Ma, Does the IEEE MAC potocol wok well in multihop wieless ad hoc netwoks?, IEEE Communication Magazine, Volume 39, Issue 6, June [7] Haitao Wu, Shiduan Cheng, Yong Peng, Keping Long, Jian Ma, IEEE distibuted coodination function (DCF): analysis and enhancement, ICC 2002, New Yok, USA, Apil [8] C.C. Chow, V.C.M. Leung, Pefomance of IEEE medium access contol potocol ove a wieless local aea netwok with distibuted adio bidges, WCNC 1999, New Oleans, LA, USA, Septembe [9] J. Deng and Z. Haas, Dual busy tone multiple access (DTMA)- a multiple access contol scheme fo ad hoc netwoks, IEEE Tansactions on Communications, Volume 50, Issue 6, June [10] V. haghavan, MACAW: a Media Access Potocol fo Wieless LAN s, SIGCOMM 1994, London, UK, Septembe, [11] F. Talucci, M. Gela, L. Fatta, MACA-I (MACA y Invitation)-a eceive oiented access potocol fo wieless multihop netwoks, PIMRC 1997, Oulu, Finland, Septembe [12] A. Velayutham, H. Wang, Solution to the Exposed Node Poblem of in Wieless Ad-Hoc Netwoks, vel/eseach/e-mac.pdf. [13] S.-L. Wu, Y.-C. Tseng, C.-Y. Lin and J.-P. Sheu, A Multi-Channel MAC Potocol with Powe Contol fo Multi-Hop Mobile Ad Hoc Netwoks, The Compute Jounal, vol. 45, [14] J.So, N. Vaidya, A Multi-channel MAC Potocol fo Ad Hoc Wieless Netwoks, Dept. of Electical and Compute Engeneeing, Univesity of Illinois, USA, Technical Repot, Januay [15] T. Rappapot, Wieless Communications: Pinciples and Pactice, Pentice Hall, New Jesey, [16] J.P. Monks, V. haghavan, W.-M.W. Hwu, A powe contolled multiple access potocol fo wieless packet netwoks, INFOCOM 2001, Anchoage, Alaska, Apil [17] D. Hong and S. Rappapot, Taffic models and pefomance analysis fo cellula mobile adio telephone systems with pioitized and nonpioitized handoff pocedues, IEEE Tansactions on Vehicula Technology, Vol. 35, no. 3, August [18] A.. McDonald and T. F. Znati, A Path Availability Model fo Wieless Ad-Hoc Netwoks, WCNC 1999, New Oleans, LA, USA, Septembe [19]
Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System
Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet
More informationInterference Aware (IA) MAC: an Enhancement to IEEE802.11b DCF
Interference Aware (IA) MAC: an Enhancement to IEEE802.b DCF Matteo Cesana, Daniela Maniezzo, Pierpaolo ergamo, Mario Gerla Dipartimento di Elettronica e Informazione, Politecnico di Milano, Italy Computer
More informationAN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE
AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity
More informationIP Network Design by Modified Branch Exchange Method
Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management
More informationDynamic Topology Control to Reduce Interference in MANETs
Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity
More informationPrioritized Traffic Recovery over GMPLS Networks
Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing
More informationAdaptation of TDMA Parameters Based on Network Conditions
Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.
More informationMinimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks
Available online at www.sciencediect.com Ad Hoc Netwoks 7 (29) 23 247 www.elsevie.com/locate/adhoc Minimizing spatial and time esevation with Collision-Awae DCF in mobile ad hoc netwoks Lubo Song a, Chansu
More informationPerformance Optimization in Structured Wireless Sensor Networks
5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame
More informationThe concept of PARPS - Packet And Resource Plan Scheduling
The concept of PARPS - Packet And Resouce Plan Scheduling Magnus Eiksson 1 and Håkan Sätebeg 2 1) Dept. of Signals, Sensos and Systems, Royal Inst. of Technology, Sweden. E-mail: magnus.eiksson@ite.mh.se.
More informationOptical Flow for Large Motion Using Gradient Technique
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this
More informationINFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM
INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300
More informationTier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints
Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok 14260 Email:
More informationAn Improved Resource Reservation Protocol
Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing
More informationRT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver
1 RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Dive Amit Jain Daji Qiao Kang G. Shin The Univesity of Michigan Ann Abo, MI 4819, USA {amitj,dqiao,kgshin@eecs.umich.edu Abstact The cuent
More informationOn the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks
On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New
More informationInterference-Aware Multicast for Wireless Multihop Networks
Intefeence-Awae Multicast fo Wieless Multihop Netwoks Daniel Letpatchya School of Electical and Compute Engineeing Geogia Institute of Technology Atlanta, Geogia 30332 0250 Douglas M. Blough School of
More informationSegmentation of Casting Defects in X-Ray Images Based on Fractal Dimension
17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach
More informationJournal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012
2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo
More informationCommunication vs Distributed Computation: an alternative trade-off curve
Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,
More informationTopological Characteristic of Wireless Network
Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences
More informationA New Finite Word-length Optimization Method Design for LDPC Decoder
A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology
More informationAnalysis of Wired Short Cuts in Wireless Sensor Networks
Analysis of Wied Shot Cuts in Wieless Senso Netwos ohan Chitaduga Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles 90089, USA Email: chitadu@usc.edu Ahmed Helmy Depatment
More informationEE 6900: Interconnection Networks for HPC Systems Fall 2016
EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection
More informationAn Unsupervised Segmentation Framework For Texture Image Queries
An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu
More informationCombinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments
Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile
More informationControlled Information Maximization for SOM Knowledge Induced Learning
3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity
More informationIP Multicast Simulation in OPNET
IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok
More informationDetection and Recognition of Alert Traffic Signs
Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives
More informationA modal estimation based multitype sensor placement method
A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;
More informationWIRELESS sensor networks (WSNs), which are capable
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan
More informationA Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks
A Coss-Laye Famewok of QoS Routing and Distibuted Scheduling fo Mesh Netwoks Chi Haold Liu, Athanasios Gkelias, and Kin K. Leung Depatment of Electical and Electonic Engineeing, Impeial College London
More informationEvent-based Location Dependent Data Services in Mobile WSNs
Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,
More informationHierarchically Clustered P2P Streaming System
Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.
More informationA Novel Automatic White Balance Method For Digital Still Cameras
A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing
More informationLifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks
788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,
More informationPositioning of a robot based on binocular vision for hand / foot fusion Long Han
2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,
More informationModelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set
Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;
More informationi-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA
i-pcgrid Wokshop 2016 Apil 1 st 2016 San Fancisco, CA Liang Min* Eddy Banks, Bian Kelley, Met Kokali, Yining Qin, Steve Smith, Philip Top, and Caol Woodwad *min2@llnl.gov, 925-422-1187 LDRD 13-ERD-043
More informationPoint-Biserial Correlation Analysis of Fuzzy Attributes
Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh
More informationDEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson
DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:
More informationSCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS
SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),
More informationColor Correction Using 3D Multiview Geometry
Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,
More informationAMERICAN UNIVERSITY OF BEIRUT IMPROVING DATA COMMUNICATIONS IN VEHICULAR AD HOC NETWORKS VIA COGNITIVE NETWORKS TECHNIQUES ALI JAWAD GHANDOUR
AMERICAN UNIVERSITY OF BEIRUT IMPROVING DATA COMMUNICATIONS IN VEHICULAR AD HOC NETWORKS VIA COGNITIVE NETWORKS TECHNIQUES by ALI JAWAD GHANDOUR A thesis submitted in patial fulfillment of the equiements
More informationarxiv: v2 [physics.soc-ph] 30 Nov 2016
Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity
More informationMulti-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples
Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits
More informationANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS
ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth
More informationA Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform
A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad
More informationA New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE
5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai
More informationBo Gu and Xiaoyan Hong*
Int. J. Ad Hoc and Ubiquitous Computing, Vol. 11, Nos. /3, 1 169 Tansition phase of connectivity fo wieless netwoks with gowing pocess Bo Gu and Xiaoyan Hong* Depatment of Compute Science, Univesity of
More informationTHE THETA BLOCKCHAIN
THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent
More informationImprovement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1
Impovement of Fist-ode Takagi-Sugeno Models Using Local Unifom B-splines Felipe Fenández, Julio Gutiéez, Gacián Tiviño and Juan Calos Cespo Dep. Tecnología Fotónica, Facultad de Infomática Univesidad Politécnica
More informationAnalysis of Coexistence between IEEE , BLE and IEEE in the 2.4 GHz ISM Band
Analysis of Coexistence between IEEE 82.5.4, BLE and IEEE 82. in the 2.4 GHz ISM Band Radhakishnan Nataajan, Pouia Zand, Majid Nabi Holst I. I NTRODUCTION In ecent yeas, the emegence of IoT has led to
More informationAssessment of Track Sequence Optimization based on Recorded Field Operations
Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment
More informationConfiguring RSVP-ATM QoS Interworking
Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP
More informationAn Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network
An Efficient andove Mechanism Using the Geneal Switch Management Potocol on a Multi-Potocol abel Switching Netwok Seong Gon hoi, yun Joo Kang, and Jun Kyun hoi Using the geneal switch management potocol
More informationSimulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM
J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on
More informationMANET QoS support without reservations
SECURITY AND COMMUNICATION NETWORKS Secuity Comm. Netwoks (2010) Published online in Wiley InteScience (www.intescience.wiley.com)..183 SPECIAL ISSUE PAPER MANET QoS suppot without esevations Soon Y. Oh,
More informationUser Specified non-bonded potentials in gromacs
Use Specified non-bonded potentials in gomacs Apil 8, 2010 1 Intoduction On fist appeaances gomacs, unlike MD codes like LAMMPS o DL POLY, appeas to have vey little flexibility with egads to the fom of
More informationErasure-Coding Based Routing for Opportunistic Networks
Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant
More informationFrequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters
Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using
More informationHeterogeneous V2V Communications in Multi-Link and Multi-RAT Vehicular Networks
1 Heteogeneous V2V Communications in Multi-Link and Multi-RAT Vehicula Netwoks Miguel Sepulce and Javie Gozalvez Abstact Connected and automated vehicles will enable advanced taffic safety and efficiency
More information= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2
Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used
More informationPOMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler
POMDP: Intoduction to Patially Obsevable Makov Decision Pocesses Hossein Kamalzadeh, Michael Hahsle 2019-01-02 The R package pomdp povides an inteface to pomdp-solve, a solve (witten in C) fo Patially
More informationA Two-stage and Parameter-free Binarization Method for Degraded Document Images
A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and
More informationTransmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design
Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced
More informationModeling spatially-correlated data of sensor networks with irregular topologies
This full text pape was pee eviewed at the diection of IEEE Communications Society subject matte expets fo publication in the IEEE SECON 25 poceedings Modeling spatially-coelated data of senso netwoks
More informationFACE VECTORS OF FLAG COMPLEXES
FACE VECTORS OF FLAG COMPLEXES ANDY FROHMADER Abstact. A conjectue of Kalai and Eckhoff that the face vecto of an abitay flag complex is also the face vecto of some paticula balanced complex is veified.
More informationThe Dual Round Robin Matching Switch with Exhaustive Service
The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line
More informationConversion Functions for Symmetric Key Ciphers
Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401
More information(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number.
Illustative G-C Simila cicles Alignments to Content Standads: G-C.A. Task (a, b) x y Fo this poblem, is a point in the - coodinate plane and is a positive numbe. a. Using a tanslation and a dilation, show
More informationNumber of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks
Numbe of Paths and Neighbous Effect on Multipath Routing in Mobile Ad Hoc Netwoks Oday Jeew School of Infomation Systems and Accounting Univesity of Canbea Canbea ACT 2617, Austalia oday.jeew@canbea.edu.au
More informationShortest Paths for a Two-Robot Rendez-Vous
Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal
More informationWormhole Detection and Prevention in MANETs
Womhole Detection and Pevention in MANETs Lija Joy Compute Science and Engineeing KMEA Engineeing College Enakulum, Keala, India lijavj@gmail.com Sheena Kuian K Compute Science and Engineeing KMEA Engineeing
More informationMultidimensional Testing
Multidimensional Testing QA appoach fo Stoage netwoking Yohay Lasi Visuality Systems 1 Intoduction Who I am Yohay Lasi, QA Manage at Visuality Systems Visuality Systems the leading commecial povide of
More informationQuality-of-Content (QoC)-Driven Rate Allocation for Video Analysis in Mobile Surveillance Networks
Quality-of-Content (QoC)-Diven Rate Allocation fo Video Analysis in Mobile Suveillance Netwoks Xiang Chen, Jenq-Neng Hwang, Kuan-Hui Lee, Ricado L. de Queioz Depatment of Electical Engineeing, Univesity
More informationHISTOGRAMS are an important statistic reflecting the
JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe
More informationClustering Interval-valued Data Using an Overlapped Interval Divergence
Poc. of the 8th Austalasian Data Mining Confeence (AusDM'9) Clusteing Inteval-valued Data Using an Ovelapped Inteval Divegence Yongli Ren Yu-Hsn Liu Jia Rong Robet Dew School of Infomation Engineeing,
More informationModule 6 STILL IMAGE COMPRESSION STANDARDS
Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.
More informationMobility Pattern Recognition in Mobile Ad-Hoc Networks
Mobility Patten Recognition in Mobile Ad-Hoc Netwoks S. M. Mousavi Depatment of Compute Engineeing, Shaif Univesity of Technology sm_mousavi@ce.shaif.edu H. R. Rabiee Depatment of Compute Engineeing, Shaif
More informationWorst-Case Delay Bounds for Uniform Load-Balanced Switch Fabrics
Wost-Case Delay Bounds fo Unifom Load-Balanced Switch Fabics Spyidon Antonakopoulos, Steven Fotune, Rae McLellan, Lisa Zhang Bell Laboatoies, 600 Mountain Ave, Muay Hill, NJ 07974 fistname.lastname@alcatel-lucent.com
More informationTotally Disjoint Multipath Routing in Multihop Wireless Networks
Totally isjoint Multipath Routing in Multihop Wieless Netwoks Sonia Wahate and Raouf outaba Univesity of Wateloo School of ompute Science Wateloo, anada {spwahate,boutaba}@uwateloo.ca bstact Speading taffic
More informationSeparability and Topology Control of Quasi Unit Disk Graphs
Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,
More informationCharacterizing Data Deliverability of Greedy Routing in Wireless Sensor Networks
Chaacteizing Data Deliveability of Geedy Routing in Wieless Senso Netwoks Jinwei Liu, Lei Yu, Haiying Shen, Yangyang He and Jason Hallstom Depatment of Electical and Compute Engineeing, Clemson Univesity,
More informationCellular Neural Network Based PTV
3th Int Symp on Applications of Lase Techniques to Fluid Mechanics Lisbon, Potugal, 6-9 June, 006 Cellula Neual Netwok Based PT Kazuo Ohmi, Achyut Sapkota : Depatment of Infomation Systems Engineeing,
More information(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1)
1 Multi Path PERT Ankit Singh and A. L. Naasimha Reddy Electical and Compute Engineeing Depatment, Texas A&M Univesity; email: eddy@ece.tamu.edu. Abstact This pape pesents a new multipath delay based algoithm,
More informationAccurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen
Accuate Diffaction Efficiency Contol fo Multiplexed Volume Hologaphic Gatings Xuliang Han, Gichel Kim, and Ray T. Chen Micoelectonic Reseach Cente Depatment of Electical and Compute Engineeing Univesity
More informationRANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES
RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class
More informationAnalysis of uniform illumination system with imperfect Lambertian LEDs
Optica Applicata, Vol. XLI, No. 3, 2011 Analysis of unifom illumination system with impefect Lambetian LEDs JIAJIE TAN 1, 2, KECHENG YANG 1*, MIN XIA 1, YING YANG 1 1 Wuhan National Laboatoy fo Optoelectonics,
More informationA Stable Traffic Engineering Technique for Performance Enhancement of the Non-TCP Elastic Flows *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 30, 1115-1129 (2014) A Stable Taffic Engineeing Technique fo Pefomance Enhancement of the Non-TCP Elastic Flows * Ian Telecom Reseach Cente (ITRC) Tehan,
More informationGeneralized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences
Ameican Jounal of ata ining and Knowledge iscovey 27; 2(4): 2-8 http://www.sciencepublishinggoup.com//admkd doi:.648/.admkd.2724.2 Genealized Gey Taget ecision ethod Based on ecision akes Indiffeence Attibute
More informationModeling Spatially Correlated Data in Sensor Networks
Modeling Spatially Coelated Data in Senso Netwoks Apoova Jindal and Konstantinos Psounis Univesity of Southen Califonia The physical phenomena monitoed by senso netwoks, e.g. foest tempeatue, wate contamination,
More informationAn Assessment of the Efficiency of Close-Range Photogrammetry for Developing a Photo-Based Scanning Systeminthe Shams Tabrizi Minaret in Khoy City
Austalian Jounal of Basic and Applied Sciences, 5(1): 80-85, 011 ISSN 1991-8178 An Assessment of the Efficiency of Close-Range Photogammety fo Developing a Photo-Based Scanning Systeminthe Shams Tabizi
More informationConcomitants of Upper Record Statistics for Bivariate Pseudo Weibull Distribution
Available at http://pvamuedu/aam Appl Appl Math ISSN: 93-9466 Vol 5, Issue (Decembe ), pp 8 9 (Peviously, Vol 5, Issue, pp 379 388) Applications and Applied Mathematics: An Intenational Jounal (AAM) Concomitants
More informationa Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives
SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which
More informationTitle. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information
Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220
More informationA Recommender System for Online Personalization in the WUM Applications
A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based
More informationSYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH
I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,
More information1.3 Multiplexing, Time-Switching, Point-to-Point versus Buses
http://achvlsi.ics.foth.g/~kateveni/534 1.3 Multiplexing, Time-Switching, Point-to-Point vesus Buses n R m Aggegation (multiplexing) Distibution (demultiplexing) Simplest Netwoking, like simplest pogamming:
More informationADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM
ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,
More information