An Energy-Efficient Approach for Provenance Transmission in Wireless Sensor Networks

Size: px
Start display at page:

Download "An Energy-Efficient Approach for Provenance Transmission in Wireless Sensor Networks"

Transcription

1 An Enegy-Efficient Appoach fo Povenance Tansmission in Wieless Senso Netwoks S. M. Iftekhaul Alam Pudue Univesity Sonia Fahmy Pudue Univesity Abstact Assessing the tustwothiness of senso data and tansmittes of this data is citical fo quality assuance. Tust evaluation famewoks utilize data povenance along with the sensed data values to compute the tustwothiness of each data item. Howeve, in a sizeable multi-hop senso netwok, povenance infomation equies a lage and vaiable numbe of bits in each packet, esulting in high enegy dissipation due to the extended peiod of adio communication, and making tust systems unusable. We popose enegy-efficient povenance encoding and constuction schemes, which we efe to as Pobabilistic Povenance Flow (PPF). To the best of ou knowledge, ous is the fist wok to make the Pobabilistic Packet Making (PPM) appoach fo IP taceback feasible fo senso netwoks. We design two bit-efficient povenance encoding schemes along with a complementay vanilla scheme. Depending on the netwok size and bit budget, we select the best method using mathematical appoximations and numeical analysis. Ou TOSSIM simulations demonstate that the encoding schemes of PPF have identical pefomance with a low bit budget ( 32-bit), equiing 33% fewe packets and 3% less enegy than PPM vaiants to constuct povenance. With a two-fold incease in bit budget, PPF with the selected encoding scheme educes the enegy consumption by 6%. Index Tems povenance; tust famewok; pobabilistic packet making; enegy-efficiency; senso netwoks I. INTRODUCTION New mico sensos have enabled wieless senso netwoks (WSNs) to gathe eal-time data fom the physical wold [], [2]. Planet-wide senso netwoks [3], [4], senso netwoks fo lage-scale uban envionments [5], and physical infastuctue systems [6] indicate potential deployments of multihop netwoks consisting of hundeds of senso nodes. In such netwoks, data poduced by the sensos ae collected at the base station and made available to decision makes fo futhe analysis. As the quality of decision making is citically dependent on the quality of tansmitted infomation [5], tustwothiness of infomation and infomation-tansmitting nodes is impotant [7]. In a multi-hop netwok, povenance includes knowledge of the oiginato and pocessing path of data since its geneation. While a few povenance-based tust evaluation famewoks have been poposed [8], [9], they do not investigate enegy dissipation due to povenance tansmission. Povenance of a data item can be epesented as a tee which is embedded as meta-data with the item, and updated along the path used to fowad the item to the base station [9]. In this case, evey intemediate node caies povenance of This wok has been sponsoed in pat by NSF gant CNS length popotional to the hop count between that node and the oiginato of the data item. In a netwok with a lage diamete (hop count), this inceased meta-data length esults in an extended peiod of adio communication and enegy dissipation at evey intemediate node. We conside a eal deployment of a 46-hop netwok [] in ou simulations, and obseve that aggegated enegy dissipation of the netwok inceases by 27% when a taditional tust famewok is employed. Although lage netwoks can be hieachically oganized [], they still equie a significant numbe of hops [2], with non-negligible enegy usage fo povenance tansmission. Povenance encoding and constuction is simila in natue to the well-known IP taceback poblem [3], [4]. IP taceback aims to detemine the fowading paths of spoofed packets in taditional wied netwoks. Among the many poposed solutions to this poblem, Pobabilistic Packet Making (PPM) can be most easily adapted to WSNs [5]. In ou pevious wok [6], we showed that diect application of PPM to WSNs is infeasible since it embeds a single node identifie in each packet, and hence equies a lage numbe of packets to constuct the fowading path. Instead, we poposed a new appoach, Pobabilistic Povenance Flow (PPF), whee a connected subgaph of the fowading path is pobabilistically incopoated into a packet. In this pape, we extend PPF by designing and analyzing thee new bit-efficient povenance encoding schemes that ensue faste convegence of povenance constuction in an abitaily lage multi-hop netwok. We investigate the selection of encoding scheme and its paametes given a fixed bit budget fo povenance encoding. Ou simulation esults show that PPF with the selected encoding scheme can consume up to 6% less enegy than the taditional appoach, which significantly inceases the netwok life-time. The emainde of this pape is oganized as follows. We fomulate the poblem of enegy-efficient povenance tansmission in Section II. Section III discusses elated wok. Section IV explains thee diffeent encoding schemes unde PPF. We discuss the coesponding appoaches to decode and constuct povenance in Section V. In Section VI, we examine the selection of paametes fo one of the encoding methods. We analyze the bit equiements fo embedding povenance using all encoding schemes in Section VII. Section VIII pesents TOSSIM simulation esults. Finally, Section IX concludes the pape.

2 A. Netwok Model II. PROBLEM FORMULATION We conside a multi-hop WSN whee changes in topology due to failue o mobility can occu, but ae infequent. We make the following assumptions egading the netwok and taffic: () A Base Station (BS) acts as a cental command authoity and the oot of a outing tee. It has no esouce constaints and cannot be compomised by an attacke. (2) Senso nodes monito thei suoundings and peiodically epot to the base station o thei designated cluste head (if any). (3) Multiple sensos ae used to monito an event. Within a paticula time window, independent obsevations obtained at cluste heads (if any) o the base station fom diffeent sensos ae concened with the same event. (4) A povenance-based tust management method such as [8], [9] is used in the application laye to evaluate and manage tust in an adaptive manne. Moe details can be found in [6]. B. Poblem Statement We conside a netwok of N nodes, whee the maximum length (depth) of any fowading path (tee) is L. Assume that the maximum numbe of bits that can be used to embed povenance infomation in a single packet is B. Based on this bit budget, thee is an intege m, < m L such that at most m consecutive node identities (that is, m consecutive edges) can be embedded into a single packet. We must pefom the following thee opeations: () Povenance Embedding: In a fowading tee G = (V,E) ooted at the base station, each node n i V makes an independent decision whethe to embed its identity into the packet, stating a connected sub-gaph, with pobability p i. We need to design a povenance embedding method to cay a patial path P =< n i,n i2, n im > into a single packet whee n ij V, j m and (n ik,n ik+ ) E, k m. This poblem is a simple extension of the edge sampling appoach in IP taceback [3]. (2) Povenance Constuction: At the base station, we must constuct the entie povenance tee G = (V, E) by exploiting patial path infomation collected fom a numbe of eceived packets, with an uppe bound on the numbe of packets equied to constuct the povenance. (3) Povenance Evolution: Afte topological changes, e.g., due to failues o mobility, we must bound the time that it takes to eflect the changes in the constucted povenance. III. RELATED WORK A few povenance-based tust famewoks have been poposed to date [8], [9]. These famewoks do not conside enegy-efficiency in WSNs. The poblem of povenance tansmission is elated to the IP taceback poblem that detemines the fowading path of spoofed packets [7]. IP taceback methods include hop-by-hop tacing [8], [9], out-of-band ICMP taceback [2], and in-band pobabilistic packet making [3], [4]. Hop-by-hop tacing is not well-suited to WSNs due to its lage stoage equiement. Hot-spot based taceback methods designed fo mobile ad-hoc netwoks [2], [22] stoe packet infomation at the nodes, and taceback is pefomed hop-by-hop to detemine the hot-spot whee the attacke is located. In ou case, povenance infomation is continuously equied at the base station to compute tust scoes of descendant nodes. Hot-spot based methods would incu unnecessay delay in tust scoe calculation. Out-of-band ICMP taceback equies out-of-band communication and inceased bandwidth which limit its usability in esouce-constained WSNs. In this wok, we adapt Pobabilistic Packet Making (PPM) since it does not equie additional stoage o out-of-band communication. PPM assumes static outes which may not hold in ou case. Additionally, PPM equies a significant numbe of packets to constuct the fowading path. Netwok coding vaiants of PPM [23], [24] equie fewe packets to constuct the fowading path. Netwok coding appoaches, howeve, have a high computational complexity and incease the length of the packet, as making coefficients ae tansmitted with the packet. Cheng et al. [25] detemine the optimal making pobability fo each node to educe the numbe of packets equied to constuct the fowading path. IV. PROBABILISTIC PROVENANCE EMBEDDING In this section, we pesent thee povenance embedding schemes as pat of ou Pobabilistic Povenance Flow (PPF) appoach. All thee methods incopoate node identifies into a packet pobabilistically and only diffe in how they encode these identifies. A. Juxtaposition of Ranks In the ank method, instead of embedding the node ID diectly into a packet, ank(id) (defined in Definition below) of the node is embedded, since evey node ID is uniquely identifiable by its ank, and the ank would need fewe bits than the identity. Definition. Conside U = {ID,ID 2, ID N } as the set of N node IDs. Thee is a pemutation of U, σ(u) = {ID a,id a2, ID an }, such that, ID aj < ID aj+, fo j N. Rank of any node ID, ID i U, denoted as ank(id i ), is the position of ID i in σ(u). Assume that the packet meta-data has space to hold identities of up to m nodes. We use a counte of log 2 m bits to tack the numbe of aleady embedded anks in the packet. Initially, the buffe and counte contain zeoes. Evey node n i decides to stat a connected sub-gaph with pobability p i. Once it decides to do so, it ovewites the pevious infomation by doing the following: it zeoes out the entie povenance field and then embeds its ank at the beginning of the buffe and sets the counte to one. If a node decides not to ovewite, it checks fo empty buffe space using the counte field. If thee is space, it adds its ank into the fist available slot in the buffe and incements the counte. Fig. shows an example of this method whee the buffe space can hold at most thee node identities in a single packet.

3 Decision: Ovewite Not Ovewite Not Ovewite Ovewite Not Ovewite Ranks Binay counte Fig.. Povenance encoding using juxtaposition of anks (numbes inscibed in the cicles indicate ank of nodes). B. Pime Multiplication Ou second encoding scheme, the pime method, is based on pime multiplication. In a easonably lage netwok, this method can embed moe node IDs within same numbe of bits (on the aveage), compaed to the ank method. To the best of ou knowledge, this method has not been used in any pio wok. TABLE I BIT REQUIREMENTS FOR MULTIPLICATION OF m NODE IDS, PICKED RANDOMLY FROM THE FIRST f PRIME NUMBERS. f m = 3 m = 4 m = 6 Avg Max Avg Max Avg Max Definition 2. Let P n be the lagest pime numbe that is less than o equal to the positive intege n. We define the set of usable IDs, Q P,s whee P is a pime numbe and s is a positive intege: Q P,s = {n N 2 n P and n P n s} Definition 3. Fo any positive intege n Q P,s, fo some P and s, we define two functions: pime(n) = P n (the lagest pime numbe that is less than o equal to n). offset(n) = n P n. The pime method is motivated by the idea of using pime numbes as node IDs and encoding a set of IDs though thei multiplication which can be uniquely factoized. Howeve, pime multiplication incus computational and spatial ovehead when the paticipating pime numbes become lage. As shown in Table I, the aveage numbe of bits equied to multiply m pime numbes inceases with the inceasing size of the domain of these numbes. This shows the infeasibility of using pime numbes diectly as node IDs. Thus, we define Q P,s (Definition 2) to ensue that node IDs will not diffe by moe than s fom thei neaest pime numbes whee s is efeed as the speading facto. Then, we encode a sequence of node IDs by multiplying thei neaest pime numbes and summing up the coesponding offset values (Definition 3). Befoe descibing the details of encoding pocess, we descibe the assignment of node IDs using set Q P,s. ) Node ID Assignment: Fo a netwok of N nodes, we pick a set Q P,s = {q,q 2, q z } with the smallest z such that z N. An in-place algoithm is used to poduce a andom pemutation of Q P,s, σ(q P,s ) = {q a,q a2, q az } and membes of σ(q P,s ) ae assigned to all N nodes sequentially. Fo example, in an 8-node netwok, we can pick IDs fo the nodes fom a andom pemutation of Q,7 = {2,3,4,5,6,7,8,9,,}. Fo a given numbe of nodes (N), the bit equiements fo pime multiplication incease the most when s =, which makes Q P,s nothing but a set of pime numbes that ae less than o equal to P ( = Nth pime numbe). With an inceasing value of s, the set Q P,s can contain numbes uppe-bound by elatively smalle value of P ( Nth pime numbe). By tuning s, the lagest element (P ) of Q P,s can be made close to the total numbe of nodes (N). This bings about an inteesting tade-off: eduction of the numbe of bits equied fo pime multiplication vesus incease in the numbe of bits equied fo summation of offsets. We will investigate this tade-off in Section VI. 2) Encoding Pocess: To stoe povenance infomation, we divide the povenance buffe into two pats: poduct and offset. Evey node n i has an ID, say ID i, that is a membe of Q P,s fo some P and s. As with the ank method, once a node n i decides to stat a connected sub-gaph, it cleas the povenance buffe. It then insets pime(id i ) into the poduct pat and offset(id i ) into the offset pat (Definition 3). If a node n j decides not to ovewite, it etieves the values stoed in the poduct and offset pats. It then multiplies the value of the poduct with pime(id j ), adds offset(id j ) to the offset, and stoes the newly calculated values into the espective pats. Fig. 2 shows an example with m = 2. Decision: Ovewite Not Ovewite Not Ovewite Ovewite Not Ovewite 5 Pime multiplication Offset x3 + 5x3x x29 + Not Ovewite 3 9 7x29x7 Fig. 2. Povenance encoding using pime multiplication (numbes inscibed in the cicles indicate ID of nodes). We no longe need a counte field to tack the numbe of node identities encoded in the povenance buffe because thee is always a unique pime factoization of the poduct pat which gives the numbe of paticipating nodes. C. Rabin s The pime method can typically accommodate moe node identities (m) than the ank method, but pime multiplication esults incease in size as N and m incease. In ode to embed moe node IDs into a single packet without equiing additional bits and excessive computational complexity, we investigate Rabin fingepints [26]. A Rabin fingepint calculates a nea-pefect and spaceefficient unique epesentation of a sequence of bits. Fo a sequence of bits n,n 2, n m, of length m, the Rabin fingepint is given by the following expession, whee α and M ae constant integes: RF(n,n 2, n m ) =(n α m +n 2 α m 2 + +n m ) mod M ++2

4 The fingepint of the concatenation of two sequences X and Y can be computed as follows: RF(X Y) = RF(RF(X) Y) = RF(RF(X) α l )+RF(Y) whee, epesents concatenation and l is the length of Y. ) Encoding s: The patial path tavesed by a packet can be consideed as a bit sequence of IDs of the nodes on that patial path. We aim at tansmitting the fingepint of that bit sequence sequence instead of tansmitting the actual sequence. Evey node uses two constant integes α and M to compute its fingepint. As the packet taveses the path, we could easily compute the contibution of evey node to the fingepint and add it to the contibutions of its pedecesso nodes on that path. Fo example, if the packet taveses the patial path < n,n 2, n m >, node n i, i m has a contibution of ID i α b(m i+) to the fingepint associated with that path. Hee, b is the numbe of bits equied to epesent a single ID. Howeve, the incemental sum of these contibutions equies a lage and vaiable numbe of bits in the packet which is undesiable. Hence, we exploit the concatenation popety of Rabin fingepints, which allows any node n k to compute the fingepint of node IDs fom ID n to ID nk by concatenating its own ID (ID nk ) to the fingepint value of pevious nodes ID n to ID nk. The following equation makes this claim clea: RF(ID k,id k, ID ) = RF(ID k RF(ID k,id k 2, ID )) () Thus, evey node on a path can update the fingepint without equiing any exta bits as the fingepint value is always less than the diviso M. To stoe povenance infomation, we divide the povenance buffe into thee fields: fingepint, intemediate node, and length. As in othe PPF methods, evey noden i decides to stat a connected sub-gaph with pobability p i. Once it decides to do so, it cleas the buffe and insets ID i and into the fingepint and length fields, espectively. If a node n j decides not to ovewite, it etieves the values stoed in the fingepint and length fields. If the length is less than m, it updates the cuent fingepint value (say X) by computing ID j X and incements the cuent value of the length field by one. If the newly computed length is less than o equal to m, ID j is stoed in the intemediate node field that will aid in decoding the povenance as discussed late. 2) Patitioning s: Since we need to exploit pevious knowledge about node odeing to etieve povenance infomation fom the fingepint (as we will discuss in the next section), tansmitting lage patial povenance infomation using fingepints may not always be advantageous. In WSNs, nodes ae vulneable and eo-pone and the outing path may change due to the lossy natue of the wieless medium. This may cause inconsistency between the cuent and the peviously stoed odeing among nodes, making the entie fingepint-based povenance infomation useless. To mitigate this poblem, we divide the fingepint field into ( > ) pats aound the ( ) intemediate nodes so that changes in odeing in one pat do not affect othe pats and changes RF(5) Decision: Ovewite Not Ovewite Ovewite Not Ovewite RF(5) Intemediate node 5 RF(7, 6, 5) 7 3 RF(9) 9 RF(, 9) 2 Length (a) Embedding povenance with non-patitioned fingepint Decision: Ovewite Not Ovewite Not Ovewite Ovewite 5 Intemediate node Length RF(7, 6, 5) 7 3 RF(7, 6, 5) 7 RF(7, 8, 9) 5 RF() (b) Embedding povenance with m = 5 and = 2 Fig. 3. Povenance encoding using Rabin fingepints (numbes inscibed in the cicles indicate ID of nodes). in odeing can be eflected. Each pat contains fingepints of at most m+ node IDs whee the length field indicates the total numbe of paticipating node IDs. Fo example, assume we wish to embed infomation about a patial path < n,n 2, n m > into a single packet with m = 7 and = 2. As the packet taveses the netwok, node n 4 becomes the intemediate node and the fist pat of the fingepint contains RF(ID 4,ID 3,ID 2,ID ) and the second pat contains RF(ID 4,ID 5,ID 6,ID 7 ). Both pats of the fingepint ae calculated accoding to equation and the length field indicates the combined length of the both pats. Note that, a non-patitioned fingepint is a special case whee the intemediate node coesponds to the lone fingepint. Fig. 3(a) depicts an example of the nonpatitioned case and Fig. 3(b) depicts the patitioning appoach with m = 5 and = 2. Note that in adjacent fingepints, the ode in which the fingepints ae calculated is opposite. This ensues checking the integity of the patitioned fingepints at no additional cost. V. DECODING AND CONSTRUCTING PROVENANCE When a packet is eceived at the base station, the povenance buffe is examined to etieve the embedded patial povenance (o path) infomation. With the ank embedding appoach, we can easily extact the embedded identities fom the povenance buffe using the length field as the ank of each node ID uses a fixed numbe of bits. Howeve, with both the pime and fingepint embedding method, we assume that infomation about odeing among nodes is known befoehand using a peviously constucted povenance gaph,g pe = (V pe,e pe ) (as discussed in Section V-C). Hee, V pe is the set of node IDs and E pe is the set of edges among those nodes indicating povenance flow. A. Decoding Pocess fo Pime Method We apply a standad pime factoization algoithm ove the poduct pat of the povenance buffe to etieve the set of neaest pime numbes (say, X = {X,X 2, X m }). Then, we pefom a DFS (Depth-Fist-Seach) ove G pe to find all the possible paths consisting of m node IDs whose neaest pime numbes fom any pemutation of X. We need to modify the DFS to compae the neaest pime numbe of a paticula

5 node ID with the membes of set X while visiting that node and tack the offset of the ID when a match is found. With this modification, DFS will take O(m( V pe + E pe )) time and poduce all possible sets of node IDs whose neaest pime numbes fom a pemutation of X. Since evey ID does not diffe fom its neaest pime numbe by moe than s, we can find at most s m such sets. Fo each such set, we will sum up the offset values and calculate its diffeence fom the offset value etieved fom the eceived packet. If the diffeence is zeo, we ecod the matched set as the etieved povenance. Othewise, we conclude that topological changes may have occued in the netwok and the peviously stoed povenance gaph may not be up-to-date. Futhe pocessing is necessay to detemine the povenance, such as checking othe combinations of patial paths by consideing nodes that ae o 2-hop away fom the nodes on the ecoded path, o tiggeing the ank ID embedding appoach to ecove the ode. These extensions will be the subject of ou futue wok. B. Decoding Pocess fo Method Upon eception of a packet, we etieve the fingepint(s), associated intemediate node ID(s), and the length field indicating the numbe of paticipating node IDs. Fo evey intemediate node, ID i, i, we pefom a DFS ove G pe = (V pe,e pe ) with following modifications: Set ID i as the oot fo DFS. Seach all the nodes within m+ -hops away fom the node ID i and compute the Rabin fingepint using the concatenation popety. Computing the fingepint takes constant numbe of shift and XOR opeations povided that a pe-computed hash table (of size < 4 kb) contains fequently used values. Afte computing evey fingepint of length m+, we compae them to the etieved fingepints RF i and RF i+. If a match is found, we ecod the matched path oiginating fom the node ID i ; othewise, futhe pocessing is necessay to detemine the exact povenance which we will conside in ou futue wok. Typically, fo evey intemediate node, we ae seaching a smalle potion of the gaph G pe using DFS. In the wost case, we may seach the entie gaph which can be pefomed in O( V pe + E pe ) time. False Positive Rate fo s: Assume that we have at most x = m+ node IDs pe patition whee m is the total numbe of node IDs embedded pe packet. Since decoding each pai of patitions is independent of othes, it suffices to analyze the false positive pobability of fingepinting a path of x node IDs oiginating fom a paticula intemediate node ID. Assume that thee ae n such paths in the povenance gaph. Then, the false positive pobability n2 x.b, whee k is 2 k the numbe of bits used fo fingepinting and b is the length of the bit epesentation of one node ID. If the maximum fan-out of the netwok isf, thennis uppebound by f x which gives, False positive pobability C. Constuction and Evolution of Povenance f2(x ) x.b 2 k (2) = 2(m ) b(m+ )f.2 k. (3) With ou identity embedding methods, povenance constuction is staightfowad once we have decoded patial path infomation fom the eceived packet. Afte collecting sufficient packets with embedded povenance (i.e., when we have at least one ID fom each node), we combine the patial paths to poduce the complete povenance gaph, G = (V,E). Hee, V is the set of nodes and fo some v i V,v j V, (v i,v j ) E iff (ID i,id j ) belongs to some patial povenance encoded in a eceived packet. Howeve, decoding using the pime and fingepint appoaches needs pio knowledge of the ode of nodes. This can be obtained by applying the ank method fist. Afte a configuable peiod of time (geneally geate than povenance convegence time) duing which the povenance is constucted using the ank method, the pime o fingepint embedding method can be employed. In ode to keep node ode infomation up-to-date, nodes utilize the ank appoach evey t embedding seconds. Thus, any topological changes ae eflected in the povenance. Based on the fequency of mobility o failues in the netwok,t embedding can be adjusted. Howeve, a small value of t embedding will educe the benefits of applying the bit-efficient pime and fingepint methods. We ae cuently consideing a eactive appoach to tigge the ank appoach only when necessay. D. Complexity Analysis Decoding using the ank method is staightfowad and takes only O(m) time, whee m is the maximum numbe of nodes embedded pe packet. In case of the pime method, we use the Geneal Numbe Field Sieve (GNFS) algoithm fo pime factoization. The asymptotic unning time fo this algoithm fo a b-bit numbe is O(exp(( 64b 9 ) 3(logb) 2 3)). In an N-node netwok, node IDs equie at most log 2 N bits with the appopiate choice of s and m. Thus, multiplication of m node IDs equies at most m log 2 N bits which makes the complexity of pime factoization O(exp(( 64m log 2 N 9 ) 3(log(m log 2 N )) 2 3)). Then, we need to pefom DFS which takes O(m( V + E )) and s m compaisons which take O(s m ) time. We know N π(n) that s can be appoximated as lnn (as discussed in the next section). Thus, the time equied to decode povenance fom a single packet becomes O(exp(( 64m log 2N ) 3 (log(m log2 N )) 2 3 )+mn 2 +(lnn) m ) 9 which is exponential in tems of mlnn. In case of the fingepint method, we need to seach the povenance gaph and update the fingepint using concatenation while visiting a node on that gaph. This takes O( V + E ) time which is O(N 2 ) in the wost case.

6 TABLE II PRIME GAPS BELOW THE NUMBER n. n Obseved mean (µ) Pime Gap µ Obseved stdev gap avg gap avg Regading the constuction of entie povenance in an N- node netwok, we epesent the povenance gaph using an adjacency matix. The total numbe of edges of the gaph can be at most O(N 2 ). Since edge insetion equies constant time, the wost case complexity fo constucting the entie povenance is O(N 2 ). We need O(N 2 ) space to hold the povenance gaph apat fom the space equied by the tust famewok. VI. SPREADING FACTOR The pime method equies two paametes s and P that define the set of node IDs, Q P,s. A. Appoximating the Speading Facto Fo a given numbe of nodes, N, we want to detemine the speading facto, s that minimizes the highest value of Q P,s. This value of s depends on the pime gap. Definition 4. A pime gap is the diffeence between two successive pime numbes, p k and p (k+), whee p k is the kth pime numbe. Thus, a pime gap of length n is a un of n consecutive composite numbes between two successive pimes. We use the Pime Numbe Theoem to appoximate the aveage length of pime gaps. The theoem gives an asymptotic fom fo the pime counting function π(n), which counts the numbe of pimes less than some intege n. Accoding to this theoem (poved independently by Hadamad (896) and de la Valle Poussin (896)), π(n) k= k!n (lnn) k+ n lnn + n (lnn) 2 + 2n + (4) (lnn) 3 It has been shown that summation of the fist thee tems in equation 4 is a bette estimate fo π(n) (Debyshie 24, pp. 6-7). Now, we can appoximate the aveage length of pime gaps below n as gap avg (N) n π(n) lnn + (lnn) (lnn) 3 Table II shows the theoetical mean along with empiical mean and standad deviation of pime gaps fo diffeent values of n. The last column of this table gives the atio between empiical and theoetical mean which justifies the appoximation above. Assume that P n denotes the nth pime numbe. By choosing a speading facto, s, that appoximates to gap avg (N) fo some N, we can obtain a set of numbes TABLE IV AVERAGE CASE BIT REQUIREMENTS FOR VARYING NUMBER OF NODES AND PER-PACKET NODE IDS WITH s. N m = 3 m = 4 m = 5 s avg s avg s avg uppe-bound by some pime numbe P π(n)+ N. We denote this set asq Pπ(N)+,gap avg(n). Due to the high vaiation in pime gaps with espect to gap avg (N) the cadinality of this set becomes less than N. Assume that using the same speading facto (s = gap avg (N)), we find a set of numbes, Q Pπ(N ),s such that Q Pπ(N ),s is the smallest numbe geate than o equal to N. Similaly, by choosing some values lage than gap avg (N) fo speading facto s, we can have a set of numbes Q Pπ(N ),s, whee Q Pπ(N ),s is the smallest numbe geate than o equal to N. Clealy, P π(n ) > P π(n ), which makes the latte set moe favoable in tems of bit equiements (as obseved in Table I). We use the following optimistic choice: s gap avg (N) N π(n) lnn + (lnn) + 2. (5) 2 (lnn) 3 B. Choice of Speading Facto Fo a netwok of size N, we fist calculate gap avg (N) and by setting s = gap avg (N), we pick a set Q Pπ(N ),s such that Q Pπ(N ),s is the smallest numbe geate than o equal to N. Consideing the equiements fo pime multiplication and summation of offset, we estimate the wost case bit equiements pe packet as: m Bwost(s,m) P = log 2 ( (P π(n ) i))+log 2 (m s), i= whee m is the numbe of node IDs embedded pe packet. Then we incease s by one and detemine the coesponding set of node IDs. Afte calculating the wost case bit equiements fo the new set, we compae the newly calculated value with the cuent one. If the newly calculated set outpefoms the cuent one in tems of wost case bit equiements, we set the new set to be the cuent one. We continue until the newly calculated set equies moe bits than the cuent one. Table III shows the compaison among the equied numbe of bits fo diffeent values of s with vaying numbes of nodes and numbe of pe-packet node IDs. Fo a paticula numbe of nodes and pe-packet node IDs, the last column gives the best choice fo s (s ). VII. BIT BUDGET A fixed budget of bits (B budget ) is available fo embedding povenance of at most m nodes within the meta-data of a packet. We give the value ofmfo ou thee encoding methods in this section.

7 TABLE III WORST CASE BIT REQUIREMENTS FOR VARYING NUMBER OF NODES, PER-PACKET NODE IDS, AND CHOICE OF s. s = gap m N gap avg s = gap avg + s = gap avg + 2 s = gap avg + 3 s = gap avg + 4 avg P max Bits P max Bits P max Bits P max Bits P max Bits s TABLE V CHOOSING (, m) FOR DIFFERENT BIT BUDGETS IN A 5-NODE NETWORK WITH b = 3 AND ǫ = 5. B budget = 32 B budget = 64 B budget = 28 m x m x m x n.a. n.a n.a. n.a. n.a. n.a n.a. n.a. n.a. n.a. 9 3 Aveage numbe of bits Nodes Nodes 5 Nodes Rank Pime Rank Pime Rank Pime Rank Pime A. Bit Usage fo Rank Method In an N-node netwok, bit equiements fo the ank method ae B R (m) = m log 2 N +log 2 m, whee, the fist tem on the ight hand side indicates the equied numbe of bits to embed m anks, and the second tem accounts fo the counte that tacks the numbe of embedded anks. Thus, we choose the lagest m such that B R (m) B budget. B. Bit Usage fo Pime Method In an N-node netwok, we can pessimistically pick a value of m such that B P wost(m,s ) B budget. This does not guaantee the best usage of available bits since pime multiplication of m node IDs does not always need a fixed numbe of bits (as in the case of ank appoach) andb P wost(m,s ) can hold moe than m node IDs in many cases. Hence, we conside aveage case bit equiements befoe choosing an m fo a paticula bit budget. The aveage bit equiements pe packet ae B P avg(s,m) = m π(n ) ( log 2 π(n ) i=2 (i [π(2 i ) π(2 i )]) +log 2 π(n ) [π(n ) π(2 log 2 π(n ) )] ) +log 2 (m s). Table IV shows the aveage numbe of bits calculated fo diffeent numbes of nodes and pe-packet node IDs with thei coesponding s. We choose an m such that B P avg(s,m ) B budget B P avg(s,m ). Fo example, in a -node netwok with 4 bits available fo povenance embedding, we choose m to be 4 since B P avg(5,3) 4 B P avg(7,4) (Table IV). This choice povides the oppotunity to embed moe node IDs pe packet on the aveage. m=2 m=3 m=4 m=5 Numbe of IDs embedded pe packet Fig. 4. Aveage bit equiements fo pe packet povenance in netwoks of diffeent sizes. (Stacked data along a single column is given in elative values that need to be added to get the absolute values of each textued ba.) C. Bit Usage fo Method In an N-node netwok, the bit equiements fo embedding m IDs pe packet can be expessed as { B F b+log (,m) = 2 m+k, =, (6) ( )b+log 2 m+k, >, whee is the numbe of patitions in the povenance buffe, k is the numbe of bits equied fo each fingepint and b is the numbe of bits equied to epesent one node ID. We need to choose an m and such that B F (,m) B budget. Hee, = denotes the non-patitioned case, whee the entie povenance buffe can be egaded as a single patition. Assuming a false positive pobability of 2 ǫ,ǫ, fom equation 2, k = 2(x )log 2 f +log 2 b+log 2 x+ǫ (7) whee m = (x +). Fist, we conside the case when =, which leads to x = m. Then, combining (6) and (7) we have, 2(m )log 2 f +2log 2 m B budget b log 2 b ǫ. (8) Similaly, consideing >, we have (2(x )log 2 f +log 2 x+b+log 2 b+ǫ)+ log 2 (x +) B budget +b. (9) We detemine the maximum value of m fo diffeent values of using the above two equations. System designes ae left to choose the appopiate pai of(,m) based on the ate of

8 Numbe of packets PPM PPM+NC PPF-Rank PPF-Pime PPF Numbe of hops Numbe of packets PPF-Rank PPF-Pime PPF Numbe of hops Enegy Consumption (mj).4e+6.2e+6 e PPM PPM+NC PPF-32 bits PPF-64 bits Numbe of hops (a) Povenance constuction with 32-bit budget (b) Povenance constuction with 64-bit budget (c) Aggegate enegy consumption (in mj) Fig. 5. Compaison among diffeent encoding schemes of PPF and PPM vaiants. link failue o changes, and the aveage fan-out of the netwok. In Table V, we conside a 5-node netwok with aveage fan-out f = 4, b = 3 bits, and ǫ = 5 to show the possible choices fo (,m) whee x indicates maximum numbe of node IDs contained in each patition. Note that fanout should be esticted so that excessive enegy consumption at the junction node does not patition the netwok [27]. We also compae the theoetically calculated aveage bit equiements of the fingepint method with the two othe encoding schemes in Fig. 4. Clealy, the fingepint method equies fewe bits than the othe methods, as the value of N and m incease. VIII. TOSSIM RESULTS We conduct simulations using TOSSIM [28] fo netwoks with hop counts anging fom 2 to 3, and numbe of nodes anging fom 3 to 5. Fo enegy analysis, we use POWER- TOSSIMZ [29] which uses the micaz enegy model. We do not conside enegy consumption elated to CPU computations since TOSSIM cannot captue the active CPU time [29]. Howeve, all nodes othe than the base station only pefom encoding opeations which have low computational complexity and ae likely to daw insignificant level of CPU powe. A base station with no esouce constaints can pefom the decoding opeations, e.g., pime factoization, fo a modeate numbe of nodes in easonable time. All expeiments ae pefomed using a tansmission ate of 25 kbps, the default tansmission ate of the micaz mote, whee evey data-geneating senso sends data towads the base station evey 2 s. The pobability fo embedding a node ID is p = 25. All esults ae aveaged ove uns, and we find the standad deviation to be extemely small. We conside a 5-node netwok to compae the pefomance of the encoding schemes of PPF with two vaiants of pobabilistic packet making: PPM [3], [4] and PPM with Netwok Coding [23], [24], as they ae the closest to ou appoach (though they wee designed fo wied IP netwoks). We place the same constaint on usable bits (32 bits) fo povenance embedding pe packet on all schemes. Fig. 5(a) shows the numbe of packets equied to constuct povenance fo inceasing numbes of hops fom a single souce to the base station. The esults eveal that all thee schemes of PPF have identical pefomance in this case since they can embed only 3 node IDs on aveage pe packet using 32 bits. Howeve, they equie at least 33% fewe packets than both PPM vaiants. The oiginal PPM scheme equies a lage numbe of packets since it embeds a single node ID pe packet. Netwok coding-based PPM (PPM+NC) embeds a linea combination of 3 node IDs in a packet. Howeve, in ode to constuct a fowading path of length d hops, PPM+NC conveges upon eception of d unique linea combinations of node IDs, wheeas PPF only equies d + diffeent node IDs. We pefom the same expeiment in a 5-node netwok with a 64-bit budget in Fig. 5(b). Since TOSSIM does not scale to 5 nodes, we andomly assign node IDs fom a set of 5 numbes and take the aveage ove expeimental esults of seveal TOSSIM uns. We find that the pime method equies fewe packets than the ank method, while the fingepint method outpefoms both in this case. The eason is that with a 64-bit budget, the fingepint method ( = 2) embeds 7 node IDs pe packet with a low false positive ate (<.), wheeas the pime and ank methods embed 5 and 4 node IDs on aveage, espectively. Fig. 5(c) compaes the aggegate enegy consumption fo the two PPM vaiants and the two PPF methods that equie the lowest numbe of packets fo the two bit budgets (i.e., pime method with 32-bit budget and fingepint method with 64-bit budget). PPF with 32-bit budget consumes at least 3% less enegy than the PPM vaiants. PPF with 64-bit budget educes enegy consumption by moe than 6% compaed to its 32-bit countepat. Pecentage of eo (=, m=9) (=2, m=7) (=3, m=7) Failue ate (a) Decoding eo of the fingepint method (B budget = 64 bits) Numbe of packets (=, m=9) (=2, m=7) (=3, m=7) Failue ate (b) Povenance constuction using fingepint method (B budget = 64 bits) Fig. 6. Povenance and associated decoding eo with vaying ate of link changes. To obseve the effect of patitioning fingepints, we study the decoding eo of the fingepint method with espect to the ate of link changes. Hee, decoding eo denotes pecentage of node IDs that cannot be decoded due to link changes o false positive ates, whee ate of link changes indicates the aveage numbe of link changes pe unit time. We atificially intoduce link failues and associated path changes which ae andomly distibuted ove a time window of 2 s along a 3-hop path. Fig. 6(a) shows that as link changes incease, the fingepint method with two patitions ( = 2) has a decoding eo lowe

9 than the non-patitioned case because of its low sensitivity to topological changes. Howeve, the fingepint method with = 3 suffes fom a false positive ate of about.6 with 64- bit budget in this paticula expeiment, and pefoms wose than the = 2 case in the pesence of low ate of link changes (when decoding eo due to link changes is small). With a high ate of link changes, the case of = 3 shows a small impovement ove the = 2 case, but a elatively highe false positive ate in a dense netwok will nullify that impovement (as indicated in Table V). Fig. 6(b) shows the effect of the decoding eo in constucting povenance whee the fingepint method with = 2 conveges with a fewe numbe of packets even in the pesence of a high ate of link changes and suffes fom a negligible false positive ate. Tust scoe Fig. 7. Taditional Tust Model Tust Model with PPF Numbe of iteations Tust scoes in a -hop netwok. We also integate PPF with a povenance-based tust famewok to iteatively compute tust scoes. Fig. 7 shows that the tust scoe calculated using PPF evolves coectly as soon as the entie povenance is constucted at the base station. PPF accuacy in tust scoe calculation is simila to the taditional appoach that includes evey node ID on the fowading path in the povenance. IX. CONCLUSIONS We have pesented an enegy-efficient povenance tansmission and constuction appoach fo lage-scale multi-hop wieless senso netwoks, based on the idea of pobabilistic incopoation of node identities. We adapt the pobabilistic packet making (PPM) appoach fo IP taceback, and popose thee povenance encoding methods with a space constaint on the size of povenance data in each packet. We analyze the suitability of the methods based on the netwok size and bit budget via mathematical appoximations and numeical methods. In contast to PPM, ou poposed appoach equies fewe packets to constuct netwok-wide povenance, and significantly educes the aggegate enegy consumption of the netwok. PPF integation with a povenance-based tust famewok on the TinyOS emulato TOSSIM eveals no degadation in accuacy of tust scoes. In ou futue wok, we plan to design a eactive appoach to accuately eflect topological changes and senso duty cycling. We will also study how well a complete tust famewok can detect and eact to diffeent attacks and failue scenaios. REFERENCES [] D. Butle, 22 computing: Eveything, eveywhee, Natue, vol. 44, pp , 26. [2] M. Zuniga and B. Kishnamachai, Integating futue lage-scale wieless senso netwoks with the Intenet, USC Compute Science, Tech. Rep., 23, cs [3] K. Fehenbache, A global senso netwok launches to fight climate change, Januay 2. [Online]. Available: [4] Shell to use CeNSE fo cleae pictue of oil and gas esevois, 29. [Online]. Available: [5] A. Doboli and et al., Cities of the futue: Employing wieless senso netwoks fo efficient decision making in complex envionments, SUNYSB, Tech. Rep., Apil 28, ceas Technical Repot N 83. [6] Senso Andew at Pennsylvania Smat Infastuctue Incubato. [Online]. Available: [7] J. Ledlie, C. Ng, D. A. Holland, K. kuma Muniswamy-eddy, U. Baun, and M. Seltze, Povenance-awae senso data stoage, in Poc. of Wokshop on Netwoking Meets Databases (NetDB), 25. [8] X. Wang, K. Govindan, and P. Mohapata, Povenance based infomation tustwothiness evaluation in multi-hop netwoks, in Poc. of IEEE GLOBECOM, 2. [9] H.-S. Lim, Y.-S. Moon, and E. Betino, Povenance-based tustwothiness assessment in senso netwoks, in Poc. of Intenational Wokshop on Data Management fo Senso Netwoks, 2. [] S. Kim, S. Pakzad, D. Culle, J. Demmel, G. Fenves, S. Glase, and M. Tuon, Health monitoing of civil infastuctues using wieless senso netwoks, in Poc. of IPSN, 27, pp [] A. Aoa et al., ExScal: Elements of an exteme scale wieless senso netwok, in Poc. of IEEE Intenational Confeence on Real-Time Computing Systems and Applications, 25. [2] K. Iwanicki and M. van Steen, On hieachical outing in wieless senso netwoks, in Poc. of IPSN, 29. [3] S. Savage, D. Wetheall, A. Kalin, and T. Andeson, Pactical netwok suppot fo IP taceback, in Poc. of ACM SIGCOMM, 2. [4] D. X. Song and A. Peig, Advanced and authenticated making schemes fo IP taceback, in Poc. of IEEE INFOCOM, 2. [5] V. Thing and H. Lee, IP taceback fo wieless ad-hoc netwoks, in Poc. of IEEE Vehicula Technology Confeence, 24. [6] S. M. I. Alam and S. Fahmy, Enegy-efficient povenance tansmission in lage-scale wieless senso netwoks, in Poc. of IEEE Intenational Wokshop on D-SPAN, 2. [7] A. Belenky and N. Ansai, On IP taceback, Communications Magazine, IEEE, vol. 4, no. 7, pp , July 23. [8] H. Buch, Tacing anonymous packets to thei appoximate souce, in Poc. of USENIX confeence on system administation, 2. [9] A. C. Snoeen, Hash-based IP taceback, in Poc. of ACM SIGCOMM, 2. [2] ICMP taceback messages. [Online]. Available: [2] Y. an Huang and W. Lee, Hotspot-based taceback fo mobile ad hoc netwoks, in Poc. of ACM Wokshop on Wieless Secuity, 25. [22] H. Hsu, S. Zhu, and A. Huson, A hotspot-based potocol fo attack taceback in mobile ad hoc netwoks, in Poc. of ACM Symposium on Infomation, Compute and Communications Secuity, 2. [23] P. Sattai, M. Gjoka, and A. Makopoulou, A netwok coding appoach to IP taceback, in Poc. of IEEE Intenational Symposium on Netwok Coding, 2. [24] D. Dean, M. Fanklin, and A. Stubblefield, An algebaic appoach to IP taceback, ACM Tans. Inf. Syst. Secu., vol. 5, pp. 9 37, 22. [25] B.-C. Cheng, H. Chen, Y.-J. Li, and R.-Y. Tseng, A packet making with fai pobability distibution function fo minimizing the convegence time in wieless senso netwoks, Compute Communication, vol. 3, pp , 28. [26] M. O. Rabin, ing by andom polynomials, Cente fo Reseach in Computing Technology, Havad Univesity, Tech. Rep. TR- CSE-3-, 98. [27] H. S. Kim, T. F. Abdelzahe, and W. H. Kwon, Minimum-enegy asynchonous dissemination to mobile sinks in wieless senso netwoks, in Poc. of ACM Sensys, 23, pp [28] P. Levis, N. Lee, M. Welsh, and D. Culle, TOSSIM: Accuate and scalable simulation of entie TinyOS applications, in Poc. of ACM Sensys, 23. [29] E. Pela, A. Catháin, S. Cabajo, M. Huggad, and C. McGoldick, PoweTOSSIM z: ealistic enegy modelling fo wieless senso netwok envionments, in Poc. of ACM wokshop on Pefomance monitoing and measuement of heteogeneous wieless and wied netwoks, 28.

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

Erasure-Coding Based Routing for Opportunistic Networks

Erasure-Coding Based Routing for Opportunistic Networks Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New

More information

Analysis of Wired Short Cuts in Wireless Sensor Networks

Analysis of Wired Short Cuts in Wireless Sensor Networks Analysis of Wied Shot Cuts in Wieless Senso Netwos ohan Chitaduga Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles 90089, USA Email: chitadu@usc.edu Ahmed Helmy Depatment

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks Numbe of Paths and Neighbous Effect on Multipath Routing in Mobile Ad Hoc Netwoks Oday Jeew School of Infomation Systems and Accounting Univesity of Canbea Canbea ACT 2617, Austalia oday.jeew@canbea.edu.au

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the

More information

Any modern computer system will incorporate (at least) two levels of storage:

Any modern computer system will incorporate (at least) two levels of storage: 1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe

More information

A Practical Approach for Provenance Transmission in Wireless Sensor Networks

A Practical Approach for Provenance Transmission in Wireless Sensor Networks A Practical Approach for Provenance Transmission in Wireless Sensor Networks S. M. Iftekharul Alam School of Electrical and Computer Engineering, Purdue University, West Lafayette, IN, 4797 Sonia Fahmy

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

Separability and Topology Control of Quasi Unit Disk Graphs

Separability and Topology Control of Quasi Unit Disk Graphs Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,

More information

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

Dynamic Topology Control to Reduce Interference in MANETs

Dynamic Topology Control to Reduce Interference in MANETs Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity

More information

Lecture # 04. Image Enhancement in Spatial Domain

Lecture # 04. Image Enhancement in Spatial Domain Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency

More information

Shortest Paths for a Two-Robot Rendez-Vous

Shortest Paths for a Two-Robot Rendez-Vous Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,

More information

Event-based Location Dependent Data Services in Mobile WSNs

Event-based Location Dependent Data Services in Mobile WSNs Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,

More information

An Optimised Density Based Clustering Algorithm

An Optimised Density Based Clustering Algorithm Intenational Jounal of Compute Applications (0975 8887) Volume 6 No.9, Septembe 010 An Optimised Density Based Clusteing Algoithm J. Hencil Pete Depatment of Compute Science St. Xavie s College, Palayamkottai,

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1)

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1) 1 Multi Path PERT Ankit Singh and A. L. Naasimha Reddy Electical and Compute Engineeing Depatment, Texas A&M Univesity; email: eddy@ece.tamu.edu. Abstact This pape pesents a new multipath delay based algoithm,

More information

Interference-Aware Multicast for Wireless Multihop Networks

Interference-Aware Multicast for Wireless Multihop Networks Intefeence-Awae Multicast fo Wieless Multihop Netwoks Daniel Letpatchya School of Electical and Compute Engineeing Geogia Institute of Technology Atlanta, Geogia 30332 0250 Douglas M. Blough School of

More information

Bo Gu and Xiaoyan Hong*

Bo Gu and Xiaoyan Hong* Int. J. Ad Hoc and Ubiquitous Computing, Vol. 11, Nos. /3, 1 169 Tansition phase of connectivity fo wieless netwoks with gowing pocess Bo Gu and Xiaoyan Hong* Depatment of Compute Science, Univesity of

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Decentalized Tust Management fo Ad-Hoc Pee-to-Pee Netwoks Thomas Repantis Vana Kalogeaki Depatment of Compute Science & Engineeing Univesity of Califonia, Riveside Riveside, CA 92521 {tep,vana}@cs.uc.edu

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

Image Enhancement in the Spatial Domain. Spatial Domain

Image Enhancement in the Spatial Domain. Spatial Domain 8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along

More information

Data mining based automated reverse engineering and defect discovery

Data mining based automated reverse engineering and defect discovery Data mining based automated evese engineeing and defect discovey James F. Smith III, ThanhVu H. Nguyen Naval Reseach Laboatoy, Code 5741, Washington, D.C., 20375-5000 ABSTRACT A data mining based pocedue

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

MANET QoS support without reservations

MANET QoS support without reservations SECURITY AND COMMUNICATION NETWORKS Secuity Comm. Netwoks (2010) Published online in Wiley InteScience (www.intescience.wiley.com)..183 SPECIAL ISSUE PAPER MANET QoS suppot without esevations Soon Y. Oh,

More information

UCLA Papers. Title. Permalink. Authors. Publication Date. Localized Edge Detection in Sensor Fields. https://escholarship.org/uc/item/3fj6g58j

UCLA Papers. Title. Permalink. Authors. Publication Date. Localized Edge Detection in Sensor Fields. https://escholarship.org/uc/item/3fj6g58j UCLA Papes Title Localized Edge Detection in Senso Fields Pemalink https://escholashipog/uc/item/3fj6g58j Authos K Chintalapudi Govindan Publication Date 3-- Pee eviewed escholashipog Poweed by the Califonia

More information

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

A ROI Focusing Mechanism for Digital Cameras

A ROI Focusing Mechanism for Digital Cameras A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok 14260 Email:

More information

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2 Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Modeling spatially-correlated data of sensor networks with irregular topologies

Modeling spatially-correlated data of sensor networks with irregular topologies This full text pape was pee eviewed at the diection of IEEE Communications Society subject matte expets fo publication in the IEEE SECON 25 poceedings Modeling spatially-coelated data of senso netwoks

More information

The Dual Round Robin Matching Switch with Exhaustive Service

The Dual Round Robin Matching Switch with Exhaustive Service The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

Quality Aware Privacy Protection for Location-based Services

Quality Aware Privacy Protection for Location-based Services In Poceedings of the th Intenational Confeence on Database Systems fo Advanced Applications (DASFAA 007), Bangkok, Thailand, Apil 9-, 007. Quality Awae Pivacy Potection fo Location-based Sevices Zhen Xiao,,

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology, (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Efficient Candidacy Reduction Fo Fequent Patten Mining M.H Nadimi-Shahaki 1, Nowati Mustapha 2, Md Nasi B Sulaiman 2, Ali B Mamat

More information

Gravitational Shift for Beginners

Gravitational Shift for Beginners Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

Secure Collaboration in Mediator-Free Environments

Secure Collaboration in Mediator-Free Environments Secue Collaboation in Mediato-Fee Envionments Mohamed Shehab School of Electical and Compute Engineeing Pudue Univesity West Lafayette, IN, USA shehab@pudueedu Elisa Betino Depatment of Compute Sciences

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

Characterizing Data Deliverability of Greedy Routing in Wireless Sensor Networks

Characterizing Data Deliverability of Greedy Routing in Wireless Sensor Networks Chaacteizing Data Deliveability of Geedy Routing in Wieless Senso Netwoks Jinwei Liu, Lei Yu, Haiying Shen, Yangyang He and Jason Hallstom Depatment of Electical and Compute Engineeing, Clemson Univesity,

More information

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences Ameican Jounal of ata ining and Knowledge iscovey 27; 2(4): 2-8 http://www.sciencepublishinggoup.com//admkd doi:.648/.admkd.2724.2 Genealized Gey Taget ecision ethod Based on ecision akes Indiffeence Attibute

More information

Coded Distributed Computing

Coded Distributed Computing Coded Distibuted Computing Salman Avestimeh USC joint wok with Songze Li (USC), Qian Yu (USC), and Mohammad Maddah-Ali (Bell-Labs) Asiloma Confeence Nov. 2016 Infastuctues fo (Big) Data Analytics How to

More information

FACE VECTORS OF FLAG COMPLEXES

FACE VECTORS OF FLAG COMPLEXES FACE VECTORS OF FLAG COMPLEXES ANDY FROHMADER Abstact. A conjectue of Kalai and Eckhoff that the face vecto of an abitay flag complex is also the face vecto of some paticula balanced complex is veified.

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

On Error Estimation in Runge-Kutta Methods

On Error Estimation in Runge-Kutta Methods Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment

More information

EE 6900: Interconnection Networks for HPC Systems Fall 2016

EE 6900: Interconnection Networks for HPC Systems Fall 2016 EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection

More information

Effective Missing Data Prediction for Collaborative Filtering

Effective Missing Data Prediction for Collaborative Filtering Effective Missing Data Pediction fo Collaboative Filteing Hao Ma, Iwin King and Michael R. Lyu Dept. of Compute Science and Engineeing The Chinese Univesity of Hong Kong Shatin, N.T., Hong Kong { hma,

More information

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes On the Convesion between Binay Code and BinayReflected Gay Code on Boolean Cubes The Havad community has made this aticle openly available. Please shae how this access benefits you. You stoy mattes Citation

More information

POMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler

POMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler POMDP: Intoduction to Patially Obsevable Makov Decision Pocesses Hossein Kamalzadeh, Michael Hahsle 2019-01-02 The R package pomdp povides an inteface to pomdp-solve, a solve (witten in C) fo Patially

More information

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,

More information

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE 1 YAROSLAVTSEV A.F., 2 Al-THUNEIBAT S.A., 3 AL TAWALBEH N.A 1 Depatment of Netwoking, SSUTI, Novosibisk, Russia

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad

More information

The International Conference in Knowledge Management (CIKM'94), Gaithersburg, MD, November 1994.

The International Conference in Knowledge Management (CIKM'94), Gaithersburg, MD, November 1994. The Intenational Confeence in Knowledge Management (CIKM'94), Gaithesbug, MD, Novembe 994. Hashing by Poximity to Pocess Duplicates in Spatial Databases Walid G. Aef Matsushita Infomation Technology Laboatoy

More information

Monte Carlo Techniques for Rendering

Monte Carlo Techniques for Rendering Monte Calo Techniques fo Rendeing CS 517 Fall 2002 Compute Science Conell Univesity Announcements No ectue on Thusday Instead, attend Steven Gotle, Havad Upson Hall B17, 4:15-5:15 (efeshments ealie) Geomety

More information

Worst-Case Delay Bounds for Uniform Load-Balanced Switch Fabrics

Worst-Case Delay Bounds for Uniform Load-Balanced Switch Fabrics Wost-Case Delay Bounds fo Unifom Load-Balanced Switch Fabics Spyidon Antonakopoulos, Steven Fotune, Rae McLellan, Lisa Zhang Bell Laboatoies, 600 Mountain Ave, Muay Hill, NJ 07974 fistname.lastname@alcatel-lucent.com

More information

DUe to the recent developments of gigantic social networks

DUe to the recent developments of gigantic social networks Exploing Communities in Lage Pofiled Gaphs Yankai Chen, Yixiang Fang, Reynold Cheng Membe, IEEE, Yun Li, Xiaojun Chen, Jie Zhang 1 Abstact Given a gaph G and a vetex q G, the community seach (CS) poblem

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks Available online at www.sciencediect.com Ad Hoc Netwoks 7 (29) 23 247 www.elsevie.com/locate/adhoc Minimizing spatial and time esevation with Collision-Awae DCF in mobile ad hoc netwoks Lubo Song a, Chansu

More information

Effective Data Co-Reduction for Multimedia Similarity Search

Effective Data Co-Reduction for Multimedia Similarity Search Effective Data Co-Reduction fo Multimedia Similaity Seach Zi Huang Heng Tao Shen Jiajun Liu Xiaofang Zhou School of Infomation Technology and Electical Engineeing The Univesity of Queensland, QLD 472,

More information

Root Cause Analysis for Long-Lived TCP Connections

Root Cause Analysis for Long-Lived TCP Connections Root Cause Analysis fo Long-Lived TCP Connections M. Siekkinen, G. Uvoy-Kelle, E. W. Biesack, T. En-Najjay Institut Euécom BP 93, 694 Sophia-Antipolis Cedex, Fance Email: {siekkine,uvoy,ebi,ennajja}@euecom.f

More information

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number.

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number. Illustative G-C Simila cicles Alignments to Content Standads: G-C.A. Task (a, b) x y Fo this poblem, is a point in the - coodinate plane and is a positive numbe. a. Using a tanslation and a dilation, show

More information

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer Using the Gow-And-Pune Netwok to Solve Poblems of Lage Dimensionality B.J. Biedis and T.D. Gedeon School of Compute Science & Engineeing The Univesity of New South Wales Sydney NSW 2052 AUSTRALIA bbiedis@cse.unsw.edu.au

More information

On using circuit-switched networks for file transfers

On using circuit-switched networks for file transfers On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information