Distributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks

Size: px
Start display at page:

Download "Distributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks"

Transcription

1 Dstrbuted Topology Control for Power Effcent Operaton n Multhop Wreless Ad Hoc Networks Roger Wattenhofer L L Paramvr Bahl Y-Mn Wang Mcrosoft Research CS Dept. Cornell Unversty Mcrosoft Research Mcrosoft Research Redmond, WA 9 Ithaca NY Redmond, WA 9 Redmond, WA 9 rogerwa@mcrosoft.com ll@cs.cornell.edu bahl@mcrosoft.com ymwang@mcrosoft.com Abstract The topology of wreless multhop ad hoc networks can be controlled by varyng the transmsson power of each node. We propose a smple dstrbuted algorthm where each node makes local decsons about ts transmsson power and these local decsons collectvely guarantee global connectvty. Specfcally, based on the drectonal nformaton, a node grows t transmsson power untl t fnds a neghbor node n every drecton. The resultng network topology ncreases network lfetme by reducng transmsson power and reduces traffc nterference by havng low node degrees. Moreover, we show that the routes n the multhop network are effcent n power consumpton. We gve an approxmaton scheme n whch the power consumpton of each route can be made arbtrarly close to the optmal by carefully choosng the parameters. Smulaton results demonstrate sgnfcant performance mprovements. I. INTRODUCTION The lfetme of a wreless network that s operatng on battery power s lmted by the capacty of ts energy source. For ncreasng longevty of such networks and thus ncreasng ther usefulness, t s mperatve that we fnd ways of ether ncreasng battery power or alternatve tether-less sources of energy that nodes n a wreless network can use. A complementary approach to tacklng the network longevty problem s to develop energy-effcent algorthms and mechansms that optmze the use of the battery power whle mantanng network connectvty. Generally speakng, a node n a wreless network ndependently explores ts surroundng regon and establshes connectons wth other neghborng nodes that are wthn ts transmsson and recepton range. In establshng these local connectons, t s desrable to choose only those local connectons that wll guarantee overall global network connectvty whle satsfyng dfferent and often contradctory performance metrcs such as overall throughput, network utlzaton, and power dsspaton. Unlke wred networks, each node n a multhop wreless network can potentally change ts set of one-hop neghbors and consequently the overall network topology by smply changng ts transmsson and receve power. Wthout proper topology control algorthms n place a randomly connected multhop wreless ad hoc network may suffer from poor network utlzaton, hgh end-to-end delays, and short network lfetme. Although the problem doman s farly clear, there has been only a lmted amount of work n the general area of topology control and network desgn for ncreasng network longevty. Hu [] descrbes a dstrbuted, Delaunay trangulaton-based algorthm for choosng logcal lnks and as a consequence carryng out topology control. In choosng these lnks he follows a few heurstc gudelnes such as not exceedng an upper bound on the degree of each node and choosng lnks that create a regular and unform graph structure. He does not take advantage of adaptve transmsson power control. Ramanathan and Rosales- Han [] descrbe a centralzed spannng tree algorthm for creatng connected and b-connected statc networks wth the objectve of mnmzng the maxmum transmsson power for each node. Addtonally, they descrbe two dstrbuted algorthms, that adjust the node transmt power to mantan network connectvty. Ther reasonng and algorthms are based on smple heurstcs and consequently do not guarantee network connectvty n all cases. Rodoplu and Meng [] propose an ngenous dstrbuted topology control algorthm that guarantees connectvty of the entre network. Ther algorthm reles on a smple rado propagaton model for transmt power roll-off as =d n ;n. Usng ths they acheve the mnmum power topology, whch contans the mnmum-power paths from each node to a desgnated master-ste node. Other researchers workng n the feld of packet rado networks, wreless ad hoc networks, and sensor networks have also consdered the ssue of power effcency and network lfetme but have taken dfferent approaches. For example, Hou and L [] analyze the effect of adjustng transmsson power to reduce nterference and hence acheve hgher throughput as compared to schemes that use fxed transmsson power []. Henzelman et al. [] descrbe an adaptve clusterng-based routng protocol that max-

2 mzes network lfetme by randomly rotatng the role of per-cluster local base statons (cluster-head) among nodes wth hgher energy reserves. In ths paper we descrbe our approach to tacklng the network longevty problem. Specfcally, we descrbe a novel dstrbuted cone-based topology control algorthm that ncreases network lfetme whle mantanng global connectvty wth reasonable throughput n a multhop wreless ad hoc network. Network lfetme s ncreased by determnng the mnmal operatonal power requrement for each node n the network whle guarantyng the same maxmum connected node set as when all nodes are transmttng wth full power. In contrast to prevous approaches that rely on knowng and sharng the global poston nformaton of the nodes n the network, our algorthm s a dstrbuted algorthm that reles solely on local nformaton, usng drectonal nformaton of ncomng sgnals from neghborng nodes. We show the valdty of our algorthm both theoretcally and va smulaton. We show that the routes n the multhop network are effcent n power consumpton. We gve an approxmaton scheme n whch the power consumpton of each route can be made arbtrarly close to the optmal by carefully choosng the parameters. Our work s smlar to [], n that we have the same goal as them - of desgnng locaton-based, dstrbuted topology-control algorthm that ncreases network lfetme. We desgned our algorthm wth the followng objectves n mnd: () Each node n the multhop wreless network must use local nformaton only for determnng ts transmsson radus and hence ts operatonal power. The local decsons must be made n such a way that they collectvely guarantee the node connectvty n the global topology just as f all nodes were operatng at full power; () As n [] our algorthm must mnmze power consumpton by fndng mnmum power paths, and thus ndrectly ncreases network lfetme; () Our algorthm must fnd a topology wth small node degree, so that nterference s mnmal and hence throughput s suffcent. () Our algorthm must be smple and effcent so that t s sutable for small and moble (sensor) nodes. () Fnally, our algorthm must make very few assumptons about the rado propagaton model and/or on the hardware of each node (e.g. non-avalablty of Global Postonng System). We descrbe and analyze our cone-based topology control algorthm, whch meets these objectves. Our algorthm s desgned specfcally for multhop wreless ad hoc networks deployed on a -dmensonal surface. It conssts of two phases, whch are summarzed as follows: Startng wth a small radus, each node (denoted by Node u) broadcasts a neghbor-dscovery message. Each recevng node acknowledges ths broadcast message. Node u records all acknowledgments and the drectons they came from. (We assume that the node can determne the drecton of the sender when recevng a message.) It then determnes whether there s at least one neghbor n every cone of ff degrees, centered on Node u. In ths frst phase, Node u contnues the neghbor dscoverng process by ncreasng ts transmsson radus (operatonal power) untl ether the above condton s met or the maxmum transmsson power P s reached. We prove that, for ff smaller than or equal to ß=, the algorthm guarantees maxmum connected node set. For smaller angles we also can guarantee good mnmum power routes. In the second phase, the algorthm performs a redundant edge removal process wthout mpactng the connectvty. Ths phase s desgned to reduce the node degrees, whch helps n reducng nterference and enhancng throughput []. Redundant edge removal s carred out wthout deteroratng the mnmum power routes of the network. Our work s dfferent from Rodoplu and Meng [] n the followng way: Frst, our algorthm guarantees that the maxmum connected set of nodes for the network wll always be found. Second, our algorthm s computatonally less demandng, and we do not need to specfy a deployment regon, whch s an mportant consderaton for the case when nodes regularly change deployment regon. Thrd, our algorthm does not need exact locaton nformaton but only drectonal nformaton. Ths can be a factor when cost of nodes s a consderaton. Forth, our algorthm s not coupled wth any rado propagaton model. Due to the large nfluence of envronmental factor on rado frequency communcatons rado propagaton models can be notorously naccurate. Fnally, ffth our algorthm s able to gve a worst-case analyss for both, the mnmum power routes and the maxmum node degrees n the network. The rest of our paper s organzed as follows. In secton II we descrbe our network model and the assumptons we make about the envronment. In Secton III we descrbe the cone-based topology control algorthm n detal. In Secton IV we prove the correctness of our algorthm. In Secton V we demonstrates that our algorthm s compettve wth respect to mnmum energy path metrc. In Secton VI we present the results from our performance evaluaton of the algorthm. Fnally we conclude n Secton VII. II. MODEL We are gven a set V of n nodes (ponts n the plane). A node conssts of a power supply entty, a processor and local memory to perform smple local computatons, and a rado communcaton unt to send and receve messages. A node does not know ts poston.

3 A node s able to send a broadcast message wth arbtrary power p. It s called broadcast because the sendng node has no control over the drecton n whch the message s transmtted. Nodes can vary ther broadcast power, but not beyond a maxmum power P, that s» p» P. We assume the exstence of an underlyng MAC layer that resolves nterference problems. For example, f node u broadcasts wth power p, the nodes that can receve node u s broadcast message (the set N) wll acknowledge (wth another broadcast message) to node u. After havng receved acknowledgments of all nodes n N, node u knows the set N. The assumpton to have a relable broadcast s not needed for the correctness of our algorthm, but t smplfes the presentaton. We assume that the rado communcaton unt s able to determne the drecton of the sender when recevng a message. Thus, f two nodes u; v exchange a broadcast/acknowledge message par, both of them know whch drecton the other node s, that s, node u knows that node v s n drecton ρ, and node v knows that node u s n drecton ρ + ß, wth wth» ρ<ß. Technques to estmate drecton wthout postonng nformaton are avalable, and dscussed n the IEEE antenna and propagaton communty as the Angle-of-Arrval (AOA) problem. It can be accomplshed by usng more than one drectonal antenna. We refer to []. If the rado communcaton unt s not capable to conclude the drecton of a message, we can alternatvely supply a node wth a more abundant global postonng unt, and calculate drectons from postons pggybacked to messages. Compared wth [], we have a weak physcal rado propagaton model. We assume that the envronment s not obstructed, and that the nodes are homogeneous. More formally, we assume that the power p s a unform and nondecreasng, but unknown functon of the dstance d. Due to unformty, f a node u can reach node v wth power p p, then node v can also reach node u wth power p p. In other words, a node u can fgure out how much power s needed to communcate wth node v but cannot deduce the dstance of v. Power models lke Rcan are ntutvely appealng, but t s very dffcult to determne the model parameters such as the local mean of the scattered power and the power of domnant component precsely as ths requres physcally solatng the drect wave from the scattered components. In order to keep our system smple and easy to deploy, we decded aganst models that are unduly complex. For an excellent dscusson on the applcablty of other power models we refer to Secton of []. III. ALGORITHM Our algorthm has two phases. In the frst phase we descrbe a decentralzed scheme that bulds a connected graph upon our node network by lettng nodes fnd close neghbor nodes n dfferent drectons. The second phase mproves the performance by elmnatng non-effcent edges n the communcaton graph. The algorthm s smple and does not need any complcated operatons. The algorthm s also dstrbuted and wthout synchronzaton. The two phases are merely for the ease of descrpton. The frst phase of the algorthm: Each node u beacons wth growng power p, ntally p = ffl. If node u dscovers a new neghbor node v, node u wll put v nto ts local set of neghbors N (u). Node u wll contnue to grow the transmsson power untl the neghbor set N (u) s bg enough such that, for any cone wth angle ff there s at least one neghbor v N (u), or untl node u hts the maxmum transmsson power P. The termnaton crteron can be easly determned. For a gven node u, each neghbor v N (u) covers a cone, as n Fgure. If the unon of these cones cover the whole ß angle, node u goes to phase. Fg.. Coverage determnaton Node u mght use heurstcs n order to optmze conflcts on the lower MAC layer. For example, node u wll grow the transmsson power so that exactly one new neghbor s expected to acknowledge, gven the probablty dstrbuton of the nodes n the plane. Moreover, node u mght nclude meta-nformaton n ts broadcast, n order to prevent already establshed neghbors to answer agan, or n order to fnd new neghbors n a specfc drecton, where no neghbor has been found yet. These optmzatons are not essental for the correctness of our algorthm;

4 they are subject of future work. For node u, let p(u) be the mnmum power to fnd a neghbor n every cone wth angle ff, or p(u) = P. Dependng on our goal we wll later specfy ff to be at most ß= (correctness only) or at most ß= (compettve performance). If a node u wth maxmum transmsson power P has a cone C = [ρ; ρ + ff] wthout any node n N (u), then node u wll decrease ts transmsson power, back to the mnmum power p such that there s no cone wthout a neghbor that has a neghbor when transmttng wth maxmum power P. The algorthm s symmetrc, that s, f node u wants node v to be n ts neghbor-set, then node v also needs to put node u n ts neghbor-set. From the algorthm descrpton of phase we conclude: Fact III.: For each node u and for each angle ρ (» ρ < ß), f there s a node v n the cone C = [ρ; ρ + ff] when sendng wth maxmum power P, then there s a node v n the cone C when sendng wth mnmum power p(u). Because of the smple nature of the frst phase of the algorthm there s room for mprovement. The second phase of the algorthm: If node u has two neghbor nodes v; w N (u), such that the power needed to send from u to w drectly s not less than the total power to send va v, we can remove w from N (u). More formally, f there are two nodes v; w wth v; w N (u) and w N (v), and p(u; v) +p(v; w)» p(u; w), then we remove node w from N (u). Ths mprovement gves us less neghbors, whle keepng all the best routes. We can determne two neghbors v; w for whch ths basc power nequalty holds by some smple local exchange of the transmsson powers, or, f dstances and power model are known, by a smple local computaton step wthout any message exchange. It s beleved that, from a performance pont of vew, a node should have as few neghbors as possble. Thus we mght consder removng nodes from our neghborhood even though a drect transmsson uses less power than an ndrect. One good canddate for removal s a neghbor node v that s n great dstance of the sendng node u, snce, whenever u transmts to dstant neghbor v, many other nodes experence nterference. We extend the frst dea n the followng way: If there are two nodes v; w wth v; w N (u) and w N (v) and p(u; v)» p(u; w), and p(u; v) +p(v; w)» q p(u; w), then we remove w from N (u) (and by symmetry also u from N (w)). If there s more than one node v that satsfes the power nequalty for node w, we chose the node wth mnmum p(u; v). By traversng the neghbor nodes wth ncreasng power dstance (wth tes broken by dentfer), we make sure that the edge (u; v) wll stay. Note that f constant q =we only remove edges that use more power than an ndrect path. From the algorthm descrpton of phase we conclude: Fact III.: For each node u, f there was a neghbor node w N (u) after the frst phase of the algorthm, there s a neghbor v N (u) after the second phase of the algorthm such that p(u; v) +p(v; w)» q p(u; w), for a constant q. Note that after phase of the algorthm Fact III. s not necessarly true anymore. Let us sum up ths secton. We have presented an algorthm that, startng from a set of nodes V, bulds an undrected graph G = (V;E) such that there s an edge e =(u; v) f and only f v N (u) (and because of symmetry also u N (v)). Ths graph G has several advantageous propertes, whch wll be proven n the next two sectons of ths paper: ffl If ff» ß=, the graph G wll be connected f t was connected when all nodes broadcast wth maxmum power P. ffl For a reasonable class of power cost functons and for ff» ß= we wll show that the graph G has very good power consumpton, n fact wthn an arbtrarly small constant factor of the optmal (acheved by a much more complcated algorthm). ffl The degree of any node can be bounded by a constant, for q. IV. CORRECTNESS In ths secton we wll prove that an angle ff» ß= s suffcent to make the graph G connected. Defnton IV.: A path p of nodes s an ordered set (u ;u, :::;u k ) of nodes such that there s an edge between consecutve nodes: e = (u ;u + ) for = ;:::;k wth e E. A graph s connected f there s a path from any node to any other node n the graph. Defnton IV.: The dstance of two nodes s ther Eucldean dstance n the plane. Let G = (V;E) be the graph constructed by our algorthm. On the other hand, let G = (V;E ) be the connecton graph when all nodes always beacon wth maxmum power P. Theorem IV.: We have ff» ß=. Let G be connected. Then graph G wll be connected. Proof: We prove the frst phase of the algorthm by contradcton. Assume that graph G s not connected, whle G s. Then there exsts a least a par of nodes such that there s no path between the par. Let the nodes u,v be the par wth mnmum power to beacon each other, that s p(u; v)» p(u ;v ) for any par of nodes u,v wthout a path. Snce G s connected we know that p(u; v)» P.

5 Let d := p (u; v), that s wth power p(u; v) one can reach dstance d. The algorthm has gven node u mnmum transmsson power p(u). Snce there s no edge e =(u; v) we have p (u) <d. The remander of the proof s geometrc. Let w be a neghbor node of u. We construct a trangle of the nodes u; v; w, such as n Fgure. b < d u w a = d c > d Fg.. Trangle u; v; w A basc trangle result s c = a + b ab cos fl. We have a = d(u; v) = p (u; v) = d, b = d(u; w) = p (u; w)» p (u) < d, and c = d(v; w) = p (v; w) p (u; v) d. We are nterested n the angle fl whch s on the opposte of sde c. We get mmedately: cos fl = a + b c ab» b db < : and thus fl>ß= ff=. Therefore there s no node v N (u) n the cone C = [ ff=; +ff=]; ths contradcts Fact III.. By symmetry the same holds for v. The second phase of the algorthm does not destroy connectvty snce we only remove an edge (u; w) when we made sure that there are edges (u; v) E and (v; w) E. V. COMPETITIVE ANALYSIS In ths secton we wll show that our algorthm s not only correct (results n a connected graph), but also that the routes that can be found n the graph are very power effcent. In ths secton, we need to make stronger assumptons on the power model. Defnton V.: A drect transmsson from node u to node v costs power p = p(u; v), where p s a functon of the dstance d = d(u; v). Any functon p(d) s elgble as long as cd x» p(d)» czd x, for parameters c; x; z, all ndependent of d, and wth z, and x. Defnton V.: The power consumpton P of route r = k (s = u ;u ;:::;u k = t) s C(r) = p(u = ;u + ). v Let G be the graph when all nodes transmt wth maxmum power P,as defned n Defnton IV.. For gven source node s and snk node t, let r Λ be a route such that C(r Λ )» C(r), for any elgble route r n G. Then route r Λ s a mnmum power route n G. After our algorthm has done the neghborhood detecton as descrbed n Facts III. and III., a routng algorthm s appled that fnds mnmum power routes n the graph G. In other words, nodes keep tables that tell them to whch neghbor they should send n order to route a message to a gven destnaton node. These tables are generally small snce the geometry of the plane can be used []. (Usually nodes n a destnaton regon wll be sent to the same neghbor.) We drectly get: Defnton V.: Let G be the graph constructed by our algorthm, as defned n Defnton IV.. For gven source node s and snk node t, let ^r be a route such that C(^r)» C(r), for any elgble route r n G. Then route ^r s a mnmum power route n G. Lemma V.: We are gven a trangle where angle fl ß=. Then a x + b x» c x for x. Proof: We have cos fl». Wth c = a + b ab cos fl, we get a + b» c. From a= sn ff = b= sn f = c= sn fl we know that» a; b» c and we drectly get a x + b x» a c x + b c x =(a + b )c x» c x. Lemma V.: We have a trangle wth nodes A; B; C, edges a; b; c and angles ff; f; fl. Let b < c and b < a and ff» ß=. Then fl ß=, and a<c. Proof: Wth a= sn ff = b= sn f and b<awe know that f<ff. Wth ff» ß= we get fl = ß ff f ß=, and wth a= sn ff = c= sn fl we get a<c. Lemma V.: We have a trangle wth nodes A; B; C, edges a; b; c and angles ff; f; fl. Let a» b < c and ff» ß=. Then a x + b x» c x ( + sn(ff=)) for x. Proof: We know that fl (ß ff)=. Wth c = a + b ab cos fl and a» b<c,weget a + b <c +c cos fl» c ( + sn(ff=)): We use the same method as n Lemma V. to extend ths result for x. Theorem V.: We have ff» ß=. Let s be a source node and t be a snk node. Let C(^r) resp. C(r Λ ) be the mnmum power routes n G resp. G,asnDefntons V. and V.. Then C(^r)» C(r Λ )zq( + sn(ff=)), for z from the rado model V. and q from Fact III.. Proof: Frst we consder phase of the algorthm: The mnmum power route r Λ s an ordered set of nodes r Λ = (s = u ;u ;:::;u k = t), where p(u ;u + )» P for all =;:::;k.

6 In ths proof we wll show that our algorthm fnds a path r = (s = u ;u ;u ;:::;u l ;u ;u ;u ;:::;u l ; u ;:::;u k ;u k ;u k ;:::;u l k k ;u k = t); where u n r s the same node as u n r Λ. We focus on the path between u and u +. Let l = l, and for convenence u = u, for any. Let us construct our path (u ;u ;u ;:::;ul +). We dstngush the followng cases. Case : Nodes u j and u + are neghbors n the graph G. Then l = j. Case : Nodes u j and u + are not neghbors. Snce there s a neghbor n each cone [ρ ff=;ρ + ff=] we know that node u j has a neghbor node uj+ such that the angle at node u j (n the trangle uj ;uj+ ;j + ) s less than ff=. Case a: If d(u j ;u +) < d(u j+ ;u + ), we know by Lemma V. that the angle at u j+ s at least ß=, and that node u j+ s strctly closer to u + than node u j was. Snce there are only a fnte number of nodes we wll eventually arrve at node u +, or get nto one of the other cases. Case b: If d(u j ;u +) d(u j+ ;u + ), we know that node u + s a neghbor of node u j+. Thus l = j +. Fgure shows an example of a path from u to u +, where we have a seres of cases a, followed by a sngle case b. u u u u l- u u + Fg.. Path from u to u + Let us calculate the cost of our path from u to u +. C(u ;u + ) = p(u ;u )+p(u ;u )+::: +p(u l ;u l )+p(ul ;u + ): By usng our rado model (Defnton V.) we know that p(d)» czd x, thus C(u ;u + )» czd x (u ;u )+czdx (u ;u )+::: +czd x (u l ;u l )+czdx (u l ;u + ): We know that all nodes except u l are of case a, therefore we can apply Lemma V. repeatedly, and get C(u ;u + )» czd x (u ;u l )+czdx (u l ;u +): u l By Lemma V. we know that C(u ;u + )» czd x (u ;u + )( + sn(ff=)): From the rado model (Defnton V.) we know that cd x» p(d), thus C(u ;u + )» p(u ;u + )z( + sn(ff=)): We can use the same analyss for all the peces of the optmal path. Wth fact V. we get C(^r)» C(r)» C(r Λ )z( + sn(ff=)): Wth Fact III., phase of the algorthm mght replace an edge wth two edges such that the total power consumpton s at most multpled wth a factor q. The Theorem follows drectly. Corollary V.: Let z = q =. In order to guarantee paths that use at most +ffl of the power of the optmal paths we need ff» arcsn(ffl=), whch s roughly ff» ffl. The second phase of the algorthm already helps to arrve at a sparse graph, as you can see n the smulaton secton. More formally: Theorem V.9: Let q of phase (confer Fact III.) be not less than. Then the degree at any node s at most. Proof: For node u, let v; w be two nodes n the neghborhood of u. Because of symmetry, ether () v N (w) and w N (v), or () both v = N (w) and w = N (v). Case (): If there are three nodes u; v; w such that they all are n each other s neghborhood, then phase wll at least remove the edge wth maxmum power between them. The largest angle fl n the trangle u; v; w s at least ß=. Therefore the edge that uses most power s at least the same sze as the other two, and q would remove that edge. Case (): We have p(u; v)» p(v) <p(v; w) >p(w) p(u; w). Therefore the sde opposte of node u s the largest n the trangle u; v; w, and the angle at node u s the largest,.e. larger than ß=. In both cases any two nodes v; w n the neghborhood of u have at least angle ß=. There cannot be more than neghbors. VI. SIMULATION RESULTS AND EVALUATION We measure the mpact of our topology control on the network through smulatons. To compare the performance of our algorthm wth pror work n topology control, we would also want to smulate topology control algorthms n the lterature. In a multhop wreless network, each node s expected to potentally send and receve messages from many nodes. Therefore an mportant requrement of such

7 network s strong connectvty. Besdes strong connectvty, the most mportant desgn metrc of multhop wreless networks s perhaps energy effcency. As t drectly mpact the network lfetme. As far as we know, among the topology control algorthms n the lterature [], [], [], [], [], only Rodoplu and Meng s algorthm [] attempts to optmze for energy effcency subject to mantanng strong network connectvty. The work n [], [], [] tres to maxmze network throughput. Ther algorthms do not guarantee strong connectvty. Ramanathan and Rosales-Han [] has consdered optmzng for the mnmax transmsson power n centralzed algorthms, however ther dstrbuted heurstc algorthms do not guarantee strong connectvty. Therefore, we only compare wth []. We refer to ther algorthm as R&M. We refer to our basc algorthm as PhaseOnly, and to our complete algorthm wth ConeBased. Sometmes we gve the parameter ff, the sze of the angle of the cone. As a reference, we also compare wth the no topology control case where each node always uses the maxmum transmsson radus for broadcastng a packet (MaxPower). For example, the AODV [9] route request packet s sent usng neghbor broadcast. Uncast packet only needs to use the mnmum power to reach a gven next hop. The use of maxmum transmsson radus for broadcast packets s the only way to avod unnecessary partton f no topology control s used. A. Smulaton Envronment Our topology control algorthm s mplemented n ns- [], usng the wreless extenson developed at Carnege Mellon []. Our smulaton s done for a network of nodes wth WaveLAN-I rados. The nodes are placed unformly at random n a rectangular regon of by meters. There has been some work on realstc topology generaton such as [], []. However, ther work has the Internet n mnd. Snce large multhop wreless networks such as sensor networks are deployed automatcally, we beleve unform random assumpton s vald n most such networks. We assume the two-ray propagaton model for terrestral communcatons. It has a =d transmt roll-off []. The model has been shown to be close to realty n many envronment settngs []. The carrer frequency s 9MHz, and the transmsson raw bandwdth MHz. We assume omn-drectonal antennas wth db gan,and the antenna s placed : meter above a node. The receve threshold s 9dBW. The carrer sense threshold s dbw and the capture threshold s db. These parameters smulate the 9MHz Lucent WaveLAN DSSS rado nterface. In order to smulate the effect of power control, we made changes to the physcal layer of the ns- smulaton code. Specfcally, for every neghbor broadcast packet, a node s transmsson power uses the fnal transmsson power of ts neghbor dscovery process of each topology control algorthm. For every uncast packet, a node s transmsson power uses the mnmum power for the source to reach the destnaton, as determned durng the neghbor dscovery process. A node s energy reserve s then subtracted by the approprate amount for any transmsson and recepton. To smulate nterference and collson, we choose the WaveLAN-I CSMA/CA MAC protocol. Snce topology control s ndependent of routng, a routng protocol s needed. We choose AODV n our smulaton. Other protocols to dssemnate applcaton data wthout an explct routng protocol n sensor network can also be used [], []. Snce [] optmzes for mnmum energy path metrc, we modfy the ns- AODV mplementaton wth the mnmum energy path metrc nstead of usng the current shortest path metrc. To smulate the network applcaton traffc, we use the followng applcaton scenaro: All nodes perodcally send UDP traffc to the master data collecton ste stuated at the boundary of the network. Ths applcaton scenaro has also been used n []. Network traffc characterstcs has been studed extensvely n the telephony network and the Internet [], []. Although our applcaton traffc scenaro s not vald n those settngs, t does represent a set of envronment montorng sensor applcatons. In ths settng, sensors perodcally transmt data to the data collecton ste. The data collecton ste wll analyze the data for nterestng events. B. Analyss of the Resultng Topology of Dfferent Topology Control Algorthms Before we move on to smulate dfferent topology control algorthms, we would lke to understand the characterstcs of the resultng topology of dfferent topology control algorthms. Fgure shows the topology generated by dfferent topology control algorthms. The average node degree of each topology s shown n Table I. The average degree μ d of the multhop wreless networks should not be too large because a large μ d typcally mples that a node has to communcate wth other dstant nodes drectly. Ths ncreases nterference and collson, and would waste energy. The average degree μ d should not be too small ether because that tends to ncrease the overall network energy consumpton as longer paths have to be taken. So we beleve the average node degree s an mportant performance metrc for multhop wreless network topology. Other metrcs lke k-connectvty and regular structure are also mportant. Those metrcs wll be our future research. The average node degree of our PhaseOnly ncreases as the ff

8 (a) Phase Only ff =ß= (b) Phase Only ff = ß= (c) Cone Based ff =ß= (d) Cone Based ff = ß= (e) R&M [] (f) Max Power Fg.. Topology Graph of dfferent topology control algorthms parameter decreases. We remark that the boundary node contrbutes more to the average degree statstcs. Ths s because, n tryng to cover the maxmum angle, t tends to nvolve more dstant nodes. The average node degree of the nner nodes are much less than the average (as shown n Fgure ). We remark that the average node degree can be reduced f we know the boundary of the network. It s true that our PhaseOnly topology has a much hgher μd than R&M. However, n the envronment where there s only drectonal nformaton, PhaseOnly works whle R&M does not. Our ConeBased algorthm mplements the redundant

9 edge removal as descrbed n Secton III wth q =. As shown n both Table I and Fgure, t generates smlar low degree topology graph as R&M algorthm. C. Network Performance Analyss of Dfferent Topology Control Algorthms Number of Nodes Alve Average Number of Neghbors Cone Based R & M [] Phase Only Max Power Tme Fg.. Network lfetme Cone Based R & M [] Phase Only Max Power Tme Fg.. Average node degree over tme We would lke to measure the network performance usng dfferent topology control algorthms. We partcularly care about network lfetme n the multhop wreless networks envronment. We measure the network lfetme as the number of nodes stll alve over tme. We also want to understand how the network topology evolves over tme. We only smulated a statc network. If moblty s low, a proactve approach to reconfgure the network topology may be used. If the moblty s hgh, an on-demand approach to reconfgure the network topology may be the only vable way to keep the reconfguraton control traffc low. How to make the topology control algorthm deal wth moblty effcently s our future research. In our smulaton, we do not smulate the process of adjustng to the rght transmsson radus. It s adjusted to the rght transmsson radus mmedately after AODV detects a node that has faled. As can be seen from Fgure, our ConeBased algorthm performs as good as the R&M algorthm, whle usng only drectonal nformaton.. They both perform sgnfcantly better than MaxPower. From Fgure, we see that when % of the MaxPower nodes are dead, both ConeBased and R&M stll have around % percent of nodes alve. Our PhaseOnly algorthm performs not as good as our ConeBased algorthm and the R&M algorthm, but t performs much better than no topology control case. When % of the MaxPower nodes are dead, PhaseOnly stll has more than % of nodes alve. It s nterestng to see that some constant number of nodes stay alve for all the topology control algorthms except MaxPower. The reason s that, when a node s parttoned from the rest of the network, f ts lower layer receves an AODV route request packet whch s a broadcast packet, t wll be sent wth zero transmsson range due to topology control. However, MaxPower wll stll be broadcastng wth maxmum radus snce t has a pre-confgured transmsson power. Fgure shows how the network topology evolves over tme. It s nterestng to note that the topology control algorthms tend to mantan the same average node degree for the remanng alve nodes as nodes de over tme. The average node degree decreases notceably only when the network has less than % nodes alve. Snce MaxPower do not respond to topologcal changes, the average node degree wll decrease quckly over tme. We also collected throughput statstcs at the end of our smulaton. Our ConeBased algorthm and the R&M algorthm acheve tmes the throughput of the Max- Power. Our basc PhaseOnly algorthm acheves tmes the throughput of the MaxPower. The throughput statstcs show that t s undesrable to transmt over large radus. Ths wll ncrease energy consumpton and also cause unnecessary nterference. Increased nterference wll result n decreased throughput. VII. CONCLUSION The lfetme of a wreless network operatng on battery power s crtcal to ts usefulness. Network lfetme can be

10 Phase Only Cone Based R&M [] Max Power Average ff =ß= ff = ß= ff =ß= ff = ß= Node Degree TABLE I AVERAGE DEGREE OF DIFFERENT TOPOLOGY CONTROL ALGORITHMS ncreased by effcently managng the power-consumpton n each ndvdual node belongng to the network. In ths paper we descrbe a dstrbuted cone-based topology control algorthm that determnes the mnmal power consumpton operatng pont for each node n a multhop wreless ad hoc network. Our algorthm s unque n that t requres only local reachablty nformaton to determne the node power-consumpton that guarantees a maxmum connected node set. Runnng on every node n the wreless mode, our algorthm uses n-exact drecton nformaton about the locaton of neghborng nodes for makng operatng pont decsons. The result s an approxmaton scheme that s able to brng the total power consumed for each route arbtrarly close to optmal. We prove our algorthm theoretcally and present results obtaned va extensve ns- based smulatons that show ts valdty. We focus prmarly on the statc ad hoc multhop network topology case, leavng the case of moble nodes and changng network topology to future research. [] THE VINT PROJECT, The ucb/lbnl/vnt network smulator-ns (verson ), [] THE CMU MONARCH GROUP, Wreless and moblty extensons to ns-, October 9. [] E.W. Zegura, K. Calvert, and S. Bhattacharjee, How to model and nternetwork, n Proc. IEEE Infocom,. [] K. Calvert, M. Doar, and E.W. Zegura, Modelng nternet topology, IEEE Communcatons, June. [] T.S. Rappaport, Wreless communcatons: prncples and practce, Prentce Hall,. [] C. Intanagonwwat, R. Govndan, and D. Estrn, Drected dffuson: a scalable and robust communcaton paradgm for sensor networks, n Proc. ACM/IEEE MOBICOM,. [] W. Henzelman, J. Kulk, and H. Balakrshnan, Adaptve protocols for nformaton dssemnaton n wreless sensor networks, n Proc. ACM/IEEE MOBICOM, 9. [] V. Paxson and S. Floyd, Wde-area traffc: the falure of Posson modelng, IEEE/ACM Transactons on Networkng, vol., no., pp.,. [] V. Paxson and S. Floyd, Why we don t know how to smulate the nternet, Proceedngs of the Wnter Smulaton Conference, pp.,. REFERENCES [] L. Hu, Topology control for multhop packet rado networks, IEEE Trans. on Communcatons, vol., no., October. [] R. Ramanathan and R. Rosales-Han, Topology control of multhop wreless networks usng transmt power adjustment, n Proc. IEEE Infocom, March. [] V. Rodoplu and T. H. Meng, Mnmum energy moble wreless networks, IEEE J. Selected Areas n Communcatons, vol., no., August 9. [] T.-C. Hou and V. O. K. L, transmsson range control n multhop rado networks, IEEE Trans. on Communcatons, vol., no., pp., January 9. [] H. Takag and L. Klenrock, Optmal transmsson ranges for randomly dstrbuted packet rado termnals, IEEE Trans. on Communcatons, vol., March 9. [] W. R. Henzelman, A. Chandrakasan, and H. Balakrshnan, Energy-effcent communcaton protocol for wreless mcrosensor networks, n Proc. IEEE Hawa Int. Conf. on System Scences, January, pp.. [] K. Krzman, T. E. Bedka, and T.S. Rappaport, Wreless poston locaton: fundamentals, mplementaton strateges, and source of error, n IEEE th Vehcular Technology Conference,, vol.. [] B. Karp and H.T. Kung, Greedy permeter stateless routng (gpsr) for wreless networks, n Proc. ACM/IEEE MOBICOM,. [9] C. Perkns, Ad hoc on demand dstance vector(aodv) routng, Internet Draft, draft-etf-manet-aodv-.txt, October 9.

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Distributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks

Distributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks Distributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks Roger Wattenhofer Li Li Paramvir Bahl Yi-Min Wang Microsoft Research CS Dept. Cornell University Microsoft

More information

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor

More information

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems Fast Retransmsson of Real-Tme Traffc n HIPERLAN/ Systems José A Afonso and Joaqum E Neves Department of Industral Electroncs Unversty of Mnho, Campus de Azurém 4800-058 Gumarães, Portugal {joseafonso,

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

IJCTA Nov-Dec 2016 Available

IJCTA Nov-Dec 2016 Available Dr K Santh et al, Internatonal Journal of Computer Technology & Applcatons,Vol 7(6),773-779 Optmzed Route Technque for DSR Routng Protocol n MANET Dr.K.Santh, Assocate Professor, Dept. of Computer Scence,

More information

Cognitive Radio Resource Management Using Multi-Agent Systems

Cognitive Radio Resource Management Using Multi-Agent Systems Cogntve Rado Resource Management Usng Mult- Systems Jang Xe, Ivan Howtt, and Anta Raja Department of Electrcal and Computer Engneerng Department of Software and Informaton Systems The Unversty of North

More information

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol 2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen

More information

Cost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network

Cost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network Cost-Effectve Lfetme Predcton Based Routng Protocol for Wreless Network ABU MD. ZAFOR ALAM, MUHAMMAD ARIFUR RAHMAN, MOHAMMED ABUL HASAN 2,M. LUTFAR RAHMAN Faculty of Scence and IT, Daffodl Internatonal

More information

K-means and Hierarchical Clustering

K-means and Hierarchical Clustering Note to other teachers and users of these sldes. Andrew would be delghted f you found ths source materal useful n gvng your own lectures. Feel free to use these sldes verbatm, or to modfy them to ft your

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1

PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1 PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF 1- RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1 A Thess Presented to The Faculty of the College of Engneerng and Technology Oho Unversty

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

MULTIHOP wireless networks are a paradigm in wireless

MULTIHOP wireless networks are a paradigm in wireless 400 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 17, NO. 1, JANUARY 2018 Toward Optmal Dstrbuted Node Schedulng n a Multhop Wreless Network Through Local Votng Dmtros J. Vergados, Member, IEEE, Natala

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton

More information

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks 12 IEEE Wreless Communcatons and Networkng Conference: Moble and Wreless Networks Onlne Polces for Opportunstc Vrtual MISO Routng n Wreless Ad Hoc Networks Crstano Tapparello, Stefano Tomasn and Mchele

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Optimizing Energy-Latency Trade-off in Sensor Networks with Controlled Mobility

Optimizing Energy-Latency Trade-off in Sensor Networks with Controlled Mobility Optmzng Energy-Latency Trade-off n Sensor Networks wth Controlled Moblty Ryo Sughara Rajesh K. Gupta Computer Scence and Engneerng Department Unversty of Calforna, San Dego La Jolla, Calforna 9293 Emal:

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks Mddle-East Journal of Scentfc Research 2 (): 566-574, 202 ISSN 990-9233 IDOSI Publcatons, 202 DOI: 0.5829/dos.mejsr.202.2..43 Performance Improvement of Drect Dffuson Algorthm n Sensor Networks Akbar Bemana

More information

Mobile Adaptive Distributed Clustering Algorithm for Wireless Sensor Networks

Mobile Adaptive Distributed Clustering Algorithm for Wireless Sensor Networks Internatonal Journal of Computer Applcatons (975 8887) Volume No.7, Aprl Moble Adaptve Dstrbuted Clusterng Algorthm for Wreless Sensor Networks S.V.Mansekaran Department of Informaton Technology Anna Unversty

More information

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks A Load-balancng and Energy-aware Clusterng Algorthm n Wreless Ad-hoc Networks Wang Jn, Shu Le, Jnsung Cho, Young-Koo Lee, Sungyoung Lee, Yonl Zhong Department of Computer Engneerng Kyung Hee Unversty,

More information

CS 534: Computer Vision Model Fitting

CS 534: Computer Vision Model Fitting CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

On Selfishness, Local Information, and Network Optimality: A Topology Control Example

On Selfishness, Local Information, and Network Optimality: A Topology Control Example On Selfshness, Local Informaton, and Network Optmalty: A Topology Control Example Ramakant S. Komal, Allen B. MacKenze, and Petr Mähönen Department of Wreless Networks, RWTH Aachen Unversty, 52072 Aachen

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

A Decentralized Lifetime Maximization Algorithm for Distributed Applications in Wireless Sensor Networks

A Decentralized Lifetime Maximization Algorithm for Distributed Applications in Wireless Sensor Networks A Decentralzed Lfetme Maxmzaton Algorthm for Dstrbuted Applcatons n Wreless Sensor Networks Vrgna Pllon, Mauro Franceschell, Lug Atzor, Alessandro Gua Dept. of Electrcal and Electronc Engneerng, Unversty

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks 1 Chen-Mn Wu, 2 Hu-Ka Su, 3 Wang-Has Yang *1,Correspondng Author Nanhua Unversty, cmwu@mal.nhu.edu.tw 2 Natonal Formosa Unversty, hksu@nfu.edu.tw 3 Hsupng Insttute of Technology, yangwh@mal.ht.edu.tw do:10.4156/jact.vol3.

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Cost-Effective Lifetime Prediction Based Routing Protocol for Mobile Ad Hoc Network

Cost-Effective Lifetime Prediction Based Routing Protocol for Mobile Ad Hoc Network Cost-Effectve Lfetme Predcton Based Routng Protocol for Moble Ad Hoc Network ABU MD. ZAFOR ALAM, MUHAMMAD ARIFUR RAHMAN, M. LUTFAR RAHMAN 1 Faculty of Scence and Informaton Technology, Daffodl Internatonal

More information

Future Generation Computer Systems

Future Generation Computer Systems Future Generaton Computer Systems 29 (2013) 1631 1644 Contents lsts avalable at ScVerse ScenceDrect Future Generaton Computer Systems journal homepage: www.elsever.com/locate/fgcs Gosspng for resource

More information

Chapter 6 Programmng the fnte element method Inow turn to the man subject of ths book: The mplementaton of the fnte element algorthm n computer programs. In order to make my dscusson as straghtforward

More information

ENERGY EFFICIENT ROUTING PROTOCOLS FOR WIRELESS AD HOC NETWORKS A SURVEY

ENERGY EFFICIENT ROUTING PROTOCOLS FOR WIRELESS AD HOC NETWORKS A SURVEY K SANKAR: ENERGY EFFICIENT ROUTING PROTOCOLS FOR WIRELESS AD HOC NETWORKS A SURVEY ENERGY EFFICIENT ROUTING PROTOCOLS FOR WIRELESS AD HOC NETWORKS A SURVEY K. Sankar Department of Computer Scence and Engneerng,

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Applied Mathematics. Elixir Appl. Math. 84 (2015)

Applied Mathematics. Elixir Appl. Math. 84 (2015) 3341 V.Vnoba and S.M.Chthra/ Elxr Appl. Math. 84 (015) 3341-3349 Avalable onlne at www.elxrpublshers.com (Elxr Internatonal Journal) Appled Mathematcs Elxr Appl. Math. 84 (015) 3341-3349 Bayesan Inference

More information

Towards Mobility as a Network Control Primitive

Towards Mobility as a Network Control Primitive Towards Moblty as a Network Control Prmtve Davd K. Goldenberg Dept. Comp. Sc. Yale Unversty New Haven, CT 6517 davd.goldenberg@yale.edu Brad E. Rosen Dept. Comp. Sc. Yale Unversty New Haven, CT 6517 brad.rosen@yale.edu

More information

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like:

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like: Self-Organzng Maps (SOM) Turgay İBRİKÇİ, PhD. Outlne Introducton Structures of SOM SOM Archtecture Neghborhoods SOM Algorthm Examples Summary 1 2 Unsupervsed Hebban Learnng US Hebban Learnng, Cntd 3 A

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your

More information

Hierarchical clustering for gene expression data analysis

Hierarchical clustering for gene expression data analysis Herarchcal clusterng for gene expresson data analyss Gorgo Valentn e-mal: valentn@ds.unm.t Clusterng of Mcroarray Data. Clusterng of gene expresson profles (rows) => dscovery of co-regulated and functonally

More information

Aggregated traffic flow weight controlled hierarchical MAC protocol for wireless sensor networks

Aggregated traffic flow weight controlled hierarchical MAC protocol for wireless sensor networks Ann. Telecommun. (29) 64:75 721 DOI.7/s12243-9-95- Aggregated traffc flow weght controlled herarchcal MAC protocol for wreless sensor networks M. Abdur Razzaque M. Mamun-Or-Rashd Muhammad Mahbub Alam Choong

More information

DECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks

DECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks da Rocha Henrques et al. EURASIP Journal on Wreless Communcatons and Networkng (2016) 2016:163 DOI 10.1186/s13638-016-0662-9 RESEARCH Open Access DECA: dstrbuted energy conservaton algorthm for process

More information

VFH*: Local Obstacle Avoidance with Look-Ahead Verification

VFH*: Local Obstacle Avoidance with Look-Ahead Verification 2000 IEEE Internatonal Conference on Robotcs and Automaton, San Francsco, CA, Aprl 24-28, 2000, pp. 2505-25 VFH*: Local Obstacle Avodance wth Look-Ahead Verfcaton Iwan Ulrch and Johann Borensten The Unversty

More information

Efficient Broadcast Disks Program Construction in Asymmetric Communication Environments

Efficient Broadcast Disks Program Construction in Asymmetric Communication Environments Effcent Broadcast Dsks Program Constructon n Asymmetrc Communcaton Envronments Eleftheros Takas, Stefanos Ougaroglou, Petros copoltds Department of Informatcs, Arstotle Unversty of Thessalonk Box 888,

More information

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL)

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL) Crcut Analyss I (ENG 405) Chapter Method of Analyss Nodal(KCL) and Mesh(KVL) Nodal Analyss If nstead of focusng on the oltages of the crcut elements, one looks at the oltages at the nodes of the crcut,

More information

Optimizing Document Scoring for Query Retrieval

Optimizing Document Scoring for Query Retrieval Optmzng Document Scorng for Query Retreval Brent Ellwen baellwe@cs.stanford.edu Abstract The goal of ths project was to automate the process of tunng a document query engne. Specfcally, I used machne learnng

More information

SPEED: A Stateless Protocol for Real-Time Communication in Sensor Networks

SPEED: A Stateless Protocol for Real-Time Communication in Sensor Networks Internatonal Conference on Dstrbuted Computng Systems ICDCS 2003 : A Stateless Protocol for Real-Tme Communcaton n Sensor Networks Tan He a John A Stankovc a Chenyang Lu b Tarek Abdelzaher a a Department

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks Moblty Based Routng Protocol wth MAC Collson Improvement n Vehcular Ad Hoc Networks Zhhao Dng, Pny Ren, Qnghe Du Shaanx Smart Networks and Ubqutous Access Rearch Center School of Electronc and Informaton

More information

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Long Lifetime Routing in Unreliable Wireless Sensor Networks

Long Lifetime Routing in Unreliable Wireless Sensor Networks 211 Internatonal Conference on Networkng, Sensng and Control Delft, the Netherlands, 11-13 Aprl 211 Long Lfetme Routng n Unrelable Wreless Sensor Networks Hamed Yousef, Mohammad Hossen Yeganeh, Al Movaghar

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

IP mobility support is becoming very important as the

IP mobility support is becoming very important as the 706 IEEE TRANSACTIONS ON COMPUTERS, VOL. 52, NO. 6, JUNE 2003 A New Scheme for Reducng Lnk and Sgnalng Costs n Moble IP Young J. Lee and Ian F. Akyldz, Fellow, IEEE Abstract IP moblty support s provded

More information

AMath 483/583 Lecture 21 May 13, Notes: Notes: Jacobi iteration. Notes: Jacobi with OpenMP coarse grain

AMath 483/583 Lecture 21 May 13, Notes: Notes: Jacobi iteration. Notes: Jacobi with OpenMP coarse grain AMath 483/583 Lecture 21 May 13, 2011 Today: OpenMP and MPI versons of Jacob teraton Gauss-Sedel and SOR teratve methods Next week: More MPI Debuggng and totalvew GPU computng Read: Class notes and references

More information

VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES

VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES UbCC 2011, Volume 6, 5002981-x manuscrpts OPEN ACCES UbCC Journal ISSN 1992-8424 www.ubcc.org VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES

More information

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT 3. - 5. 5., Brno, Czech Republc, EU APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT Abstract Josef TOŠENOVSKÝ ) Lenka MONSPORTOVÁ ) Flp TOŠENOVSKÝ

More information

Unsupervised Learning

Unsupervised Learning Pattern Recognton Lecture 8 Outlne Introducton Unsupervsed Learnng Parametrc VS Non-Parametrc Approach Mxture of Denstes Maxmum-Lkelhood Estmates Clusterng Prof. Danel Yeung School of Computer Scence and

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

Extending Network Life by Using Mobile Actors in Cluster-based Wireless Sensor and Actor Networks

Extending Network Life by Using Mobile Actors in Cluster-based Wireless Sensor and Actor Networks Extendng Networ Lfe by Usng Moble Actors n Cluster-based Wreless Sensor and Actor Networs Nauman Aslam, Wllam Phllps, Wllam Robertson and S. Svaumar Department of Engneerng Mathematcs & Internetworng Dalhouse

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Improving Low Density Parity Check Codes Over the Erasure Channel. The Nelder Mead Downhill Simplex Method. Scott Stransky

Improving Low Density Parity Check Codes Over the Erasure Channel. The Nelder Mead Downhill Simplex Method. Scott Stransky Improvng Low Densty Party Check Codes Over the Erasure Channel The Nelder Mead Downhll Smplex Method Scott Stransky Programmng n conjuncton wth: Bors Cukalovc 18.413 Fnal Project Sprng 2004 Page 1 Abstract

More information

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors Optmal Fault-Tolerant Routng n Hypercubes Usng Extended Safety Vectors Je Wu Department of Computer Scence and Engneerng Florda Atlantc Unversty Boca Raton, FL 3343 Feng Gao, Zhongcheng L, and Ynghua Mn

More information

Research Article Energy Efficient Interest Forwarding in NDN-Based Wireless Sensor Networks

Research Article Energy Efficient Interest Forwarding in NDN-Based Wireless Sensor Networks Moble Informaton Systems Volume 2016, Artcle ID 3127029, 15 pages http://dx.do.org/10.1155/2016/3127029 Research Artcle Energy Effcent Interest Forwardng n NDN-Based Wreless Sensor Networks Shua Gao, 1

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks Communcatons and Network, 2016, 8, 45-55 Publshed Onlne February 2016 n ScRes. http://www.scrp.org/journal/cn http://dx.do.org/10.4236/cn.2016.81006 Performance Comparson of a QoS Aware Routng Protocol

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

CSE 326: Data Structures Quicksort Comparison Sorting Bound

CSE 326: Data Structures Quicksort Comparison Sorting Bound CSE 326: Data Structures Qucksort Comparson Sortng Bound Steve Setz Wnter 2009 Qucksort Qucksort uses a dvde and conquer strategy, but does not requre the O(N) extra space that MergeSort does. Here s the

More information