Cost Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks G. SNEHA PRANEETHA 1, DEEPTHI JANAGAMA 2, N.

Size: px
Start display at page:

Download "Cost Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks G. SNEHA PRANEETHA 1, DEEPTHI JANAGAMA 2, N."

Transcription

1 ISSN Vol.08,Issue.12, September-2016, Pages: Cost Aware Secure Routig (CASER) Protocol Desig for Wireless Sesor Networks G. SNEHA PRANEETHA 1, DEEPTHI JANAGAMA 2, N. ANJANEYULU 3 1 PG Scholar, Dept of CSE, Sphoorthy Egieerig College, Hyderabad, Idia, gudurisehapraeetha@gmail.com. 2 Associate Professor & HOD, Dept of CSE, Sphoorthy Egieerig College, Hyderabad, Idia. 3 Assistat Professor, Dept of CSE, Sphoorthy Egieerig College, Hyderabad, Idia. Abstract: Wireless sesor etwork of globally distributed autoomous sesors to moitor physical or evirometal coditios such as temperature, oise, pressure etc. ad to cooperatively pass their data through the etwork to a mai locatio. CASER protocol is used to icrease the lifetime of the etwork. Eergy cosumptio ad security are the two coflictig issues i WSN. To overcome this problem some parameters are used Eergy balace cotrol usig PSO (Particle swarm optimizatio) ad lifetime optimizatio TORA (Temporally ordered Routig Algorithm). For security Probabilistic radom walkig the proposed protocol ca achieve a high message delivery ratio while prevet routig from pollutig attacks. Keywords: Routig, Security, Eergy Efficiecy, Eergy Balace, Delivery Ratio, Deploymet, Simulatio. I. INTRODUCTION Wireless Sesor Networks (WSN) are emergig as both a importat ew tier i the IT ecosystem ad a rich domai of active research ivolvig hardware ad system desig, etworkig, distributed algorithms, programmig models, data maagemet, security ad social factors The basic idea of sesor etwork is to disperse tiy sesig devices; which are capable of sesig some chages of icidets/parameters ad commuicatig with other devices, over a specific geographic area for some specific purposes like target trackig, surveillace, evirometal moitorig etc. Today s sesors ca moitor temperature, pressure, humidity, soil makeup, vehicular movemet, oise levels, lightig coditios, the presece or absece of certai kids of objects or substaces, mechaical stress levels o attached objects, ad other properties Routig is aother very challegig desig issue for WSNs. A properly desiged routig protocol should ot oly esure high message delivery ratio ad low eergy cosumptio for message delivery, but also balace the etire sesor etwork eergy cosumptio, ad thereby exted the sesor etwork lifetime. Motivated by the fact that WSNs routig is ofte geography-based secure ad efficiet Cost-Aware secure routig (CASER) protocol for WSNs without relyig o floodig CASER allows messages to be trasmitted usig two routig strategies, radom walkig ad determiistic routig, i the same framework. The distributio of these two strategies is determied by the specific security requiremets IJATIR. All rights reserved. This sceario is aalogous to deliverig US Mail through USPS: express mails cost more tha regular mails; however, mails ca be delivered faster. The protocol also provides a secure message delivery optio to maximize the message delivery ratio uder adversarial attacks. CASER protocol has two major advatages: It esures balaced eergy cosumptio of the etire sesor etwork so that the lifetime of the WSNs ca be maximized. CASER protocol supports multiple routig strategies based o the routig requiremets, icludig fast/slow message delivery ad secure message delivery to prevet routig trace back attacks ad malicious traffic jammig attacks i WSNs II. EXISTING AND PROPOSED SYSTEMS A. Existig System I existig system geographic routig is used as the promisig solutio i the etwork. Geographic adaptive fidelity is used as the promisig solutio for the low power sesor etwork.a query based geographic ad eergy aware routig was implemeted for the dissemiatio of the ode. I Geographic ad eergy aware routig (Gear), the sik dissemiates requests with geographic attributes to the target regio istead of usig floodig. Each ode forwards messages to its eighborig odes based o the estimated cost ad the learig cost. Source-locatio privacy is provided through broadcastig that mixes valid messages ot oly cosumes sigificat amout of sesor eergy. But also icreases the etwork collisios ad decreases the packet delivery ratio. I phatom routig protocol each message is routed from the actual source to a phatom source alog a desiged directed walk through either sector based approach or hop based approach. The directio sector iformatio is stored i the header of the message. I this way, the phatom source ca be away from the actual source. Ufortuately, oce the message is captured o the radom walk path, the adversaries are able to get the directio sector iformatio stored i the header of the message. B. Proposed System To overcome this drawback ew scheme is implemeted ad amed as CASER. Here the data that is used for the secure trasmissio is eergy balacig. Thus

2 G. SNEHA PRANEETHA, DEEPTHI JANAGAMA, N. ANJANEYULU developmet of the proposed scheme is used for the eergy balacig ad for secure trasmissio. A secure ad efficiet Cost Aware Secure Routig (CASER) protocol is used to address eergy balace ad routig security cocurretly i WSNs. I CASER routig protocol, each sesor ode eeds to maitai the eergy levels of its immediate adjacet eighborig grids i additio to their relative locatios. Usig this iformatio, each sesor ode ca create varyig filters based o the expected desig trade-off betwee security ad efficiecy. The quatitative security aalysis demostrates the proposed algorithm ca protect the source locatio iformatio from the adversaries. I this project, we will focus o two routig strategies for message forwardig: shortest path message forwardig, ad secure message forwardig through radom walkig to create routig path upredictability for source privacy ad jammig prevetio. C. System Overview The Eergy Balace Cotrol (EBC) is the oe of the problem i wireless sesor etwork. Here we discuss about the EBC. 1. Eergy Balace Cotrol (EBC): To balace the overall sesor etwork eergy cosumptio i all grids by cotrollig eergy spedig from sesor odes with low eergy levels. The source ode seds the message to eighborig odes, the move to the ext eighborig ode. Fig.1.System Overview. The Fig 1 shows that, the data is set the source ode to destiatio ode based o the eighbor s ode selectio. The EBC is the Eergy Balace cotrol; it is used to calculate the eergy. The eergy is calculatig based o the EBC algorithm. First select the eighborig ode for message forwardig. If the ode is has the highest ode meas select that ode. The sik ode has the iformatio about the etire ode, that iformatio is stored to the sik ode. The source ode seds the message to eighborig odes, the move to the ext eighborig ode. Fially the message is sed to sik ode. I wireless sesor etwork, sik ode has the all ode iformatio. The EBC method is used to calculate the eergy for the sesor ode. III. MODULES DESCRIPTION There are three modules: 1. Shortest path Allocatio 2. Eergy Balace Routig 3. Secure Routig Usig CASER A. Grid Creatio The etwork is ormally deployed with umber of sesor odes.the etwork is divided ito two or more equal size sectios. The umber of the sesor ode is determied by the size of the grid. The umber of sesor odes i each grid follows id. Whe the umber of sesor odes i each grid is large. The sum of the eergy i each grid should follow the ormal distributio accordig to the cetral limit theorem. I our proposed dyamic routig algorithm, the ext forwardig ode is selected based o the routig protocol. The message is forwardig ode based o the eighborig ode selectio ad estimate the distace. B. Eergy Balace Routig I the selectio of the eighborig ode selectio the eergy level of each ode to be cosidered. To achieve the eergy balace, moitor ad cotrol the eergy cosumptio for the odes with relatively low eergy levels. To select the grids with relatively higher remaiig eergy levels for message forwardig. For parameter α, αε [0, 1] to eforce the degree of the eergy balace cotrol. It ca be easily see that a larger a correspods to a better EBC. It is also clear that icreasig of a mai they also icrease the routig legth It ca effectively cotrol eergy cosumptio from the odes with eergy levels lower tha α, ε α (A). The CASER path selectio algorithm is derivate by the equatio, ε α A = 1 εri NA i NA Here ε is a parameter used for the Eergy Balaced Cotrol. Ad the the term α is used to deote challegig ratio. If the α value is maximum meas there is o shortest path i that ode. C. Secure Routig Usig CASER I the proposed model the data that are trasmitted accordig to the routig strategy. A routig strategy that ca provide routig path upredictability ad security the routig path become more chageable the routig protocol cotais two optios for message forwardig: oe is a determiistic shortest path routig grid selectio algorithm, ad the other is a secure routig grid selectio algorithm through radom walkig. I the determiistic routig approach, the ext hop grid is selected from N α A based o the relative locatios of the grids. The grid that is closest to the sik ode is selected for message forwardig. I the secure routig case, the ext hop grid is radomly selected from N α A for message forwardig. The distributio of these two algorithms is cotrolled by a security level called βϵ [0, 1], carried i each message. Whe a ode eeds to forward a message, the ode first selects a radom umber γϵ [0,1] If γ>β, the the ode selects the ext hop grid based o the shortest routig algorithm; otherwise, the ext hop grid is selected usig radom walkig. The security level β, is a adjustable parameter. Smaller β results i a shorter routig path ad is more eergy efficiet i message forwardig.

3 Cost Aware Secure Routig (CASER) Protocol Desig for Wireless Sesor Networks E. Algorithm 1. Eergy Balace Cotrol Algorithm The eergy Balace Cotrol algorithm shows, poited out that the EBC parameter a ca be cofigured i the message level, or i the ode level based o the applicatio sceario ad the preferece. Whe a icreases from 0 to 1, more ad more sesor odes with relatively low eergy levels will be excluded from the active routig selectio. Therefore, the N α A shriks as a icreases. I other words, as a icreases, the routig flexibility may reduce. As a result, the overall routig hops may icrease. But sice ε α(a) is defied as the average eergy level of the odes i N A, this subset is dyamic ad will ever be empty. Therefore, the ext hop grid ca always be selected from N α A. IV.PERFORMANCE EVALUATION AND SIMULATION RESULTS I this sectio, we will aalyze the routig performace of the proposed CASER protocol from four differet areas: routig path legth, eergy balace, the umber of messages that ca be delivered ad the delivery ratio uder the same eergy cosumptio. Our simulatios were coducted i a targeted sesor area of size 1,500 1,500 meters divided ito grids of icrease the umber of routig hops ad the overall eergy cosumptio slightly. This is especially true whe the sesor odes have very ubalaced eergy levels. I our simulatios, show i Fig. 2, the message source is located at (332, 259) ad the message destiatio is located at (1,250, 1,250). The source ode ad the destiatio ode are 10 hops away i direct distace. There are three odes i each grid, ad each ode is deployed with eergy to trasmit 70 messages. We show the remaiig eergy levels of the sesor odes uder two differet α level. TABLE 1. Delay Results for Various Security Parameters from Simulatio A. Routig Efficiecy ad Delay For routig efficiecy, we coduct simulatios of the proposed CASER protocol usig OPNET to measure the average umber of routig hops for four differet security levels. We radomly deployed 1,000 sesor odes i the etire sesor domai. We also assume that the source ode ad destiatio ode are 10 hops away i direct distace. The routig hops icrease as the umber of trasmitted messages icrease. The routig hops also icrease with the security levels. We performed simulatios with differet α ad β values. I all cases, we derived cosistet results showig that the average umber of routig hops derived i this paper provides a very close approximatio to the actual umber of routig hops. As expected, whe the eergy level goes dow, the routig path spreads further wider for better eergy balace. We also provided simulatio results o ed-to-ed trasmissio delay i Table 1. B. Eergy Balace The CASER algorithm is desiged to balace the overall sesor etwork eergy cosumptio i all grids by cotrollig eergy spedig from sesor odes with low eergy levels. I this way, we ca exted the lifetime of the sesor etworks. Through the EBC a, eergy cosumptio from the sesor odes with relatively lower eergy levels ca be regulated ad cotrolled. Therefore, we ca effectively prevet ay major sectios of the sesor domai from completely ruig out of eergy ad becomig uavailable. I the CASER scheme, the parameter α ca be adjusted to achieve the expected efficiecy. As α icrease, better eergy balace ca be achieved. Meawhile, the average umber of routig hops may also icrease. Accordigly, the overall eergy cosumptio may go up. I other words, though the eergy cotrol ca balace the etwork eergy levels, it may Fig.2. Remaiig eergy distributio statistics after the source trasmitted about 600 messages. The darker gray-scale level correspods to a lower remaiig level. Fig. 2a, we set α = 0 ad there is oly oe source ode. The eergy cosumptio is cocetrated aroud the shortest routig path ad moves away oly util eergy rus out i that area. I Fig. 2b, we set α = 0.5, the the eergy cosumptio is spread over a large area betwee this ode ad the sik. While maximizig the availability of the sesor odes, or lifetime, this desig ca also guaratee a high message delivery ratio util the eergy rus out for all of the available sesor odes i the area. We also coducted simulatios to evaluate the eergy cosumptio for dyamic sources i Fig.3. We assume that the oly sik ode is located i the ceter of the sesor domai. There are three odes i each grid, ad each ode is deployed with eergy to trasmit 70 messages. I this case, the eergy cosumptio is highest for the ode aroud the sik ode. The cosumptio decreases based o the distace that the ode is away from the sik ode. I fact, the average eergy cosumptio for the ode with distace i to the sik ode ca be calculated as follows. Theorem 5: Assume that all sesor odes trasmit messages to the sik ode at the same frequecy, the iitial eergy level of each grid is equal, the the average eergy cosumptio for the grid with distace i to the sik ode is

4 2 ++i i 2 (1) 2i where is the distace betwee the sik ode ad the outmost grid. G. SNEHA PRANEETHA, DEEPTHI JANAGAMA, N. ANJANEYULU 47,040: Therefore, the eergy cosumptio is oly 8,400/47,040 = 5/ % whe the iermost grids ru out of eergy ad become uavailable. Fig.3. The remaiig eergy levels of the sesor odes i the sesor domai whe the iermost grid almost rus out of the eergy, where α = 0.5, β = 0.5. Proof: Sice all messages will be set to the sik ode, the eergy cosumptio for the grids with distace i to the sik ode ca be measured based o message forwardig for grids with distace larger tha i ad message trasmissio for grids with distace i. The umber of grids with distace j to the sik ode is 8j. The total eergy cosumptio of the grids with distace i to the sik ca be calculated as j =1 8j: the average grid eergy cosumptio is therefore: j =1 8i 8j = i i 2 2i To ivestigate the eergy cosumptio i the uiform eergy deploymet, we assume each sesor ode has equal probability to geerate packets ad acts as a source ode i Figs. 3 ad 4. I these simulatios, the sik ode is located i the ceter of the target area located at (750, 750), which makes the target area symmetrical to show the eergy cosumptio. Each ode has the same probability to geerate the packets. The maximum direct distace betwee the source ode ad sik is 7. Similar to the previous simulatio, we assume there are three odes i each grid, ad each ode is deployed with eergy to trasmit 70 messages. Fig. 3 gives the remaiig eergy levels close to the sik ode whe the sesor odes ru out almost the etire eergy, where = 7, α = 0.5, α = 0.5. The color eveess i each layer of the grids demostrates the eergy usage balace eforced through the EBC α. I fact, accordig to Equatio (1), we ca calculate the total umber of messages that ca be trasmitted from the outmost grid whe the iermost grid rus out of eergy as210/(( 2 + )/2)= 210/(( )/2= 7.5. I this case, the overall eergy cosumptio is oly 7.5 j =1 8j 2 = 8,400, whe the sesor etworks become uavailable. Recall that the overall eergy uits deployed are 210 ((2 + 1) 2-1) = Fig.4. Delivery ratio uder differet EBC α ad security level β. C. Delivery Ratio Oe of the major differeces betwee our proposed CASER routig protocol ad the existig routig schemes is that we try to avoid havig ay sesor odes ru out of eergy while the eergy levels of other sesor odes i that area are still high. We implemet this by eforcig balaced eergy cosumptio for all sesor odes so that all sesor odes will ru out of eergy at about the same time. This desig guaratees a high message delivery ratio util eergy rus out from all available sesor odes at about the same time. The the delivery ratio drops sharply. This has bee cofirmed through our simulatios, show i Fig.4. V. CONCLUSION I this paper, we preseted a secure ad efficiet Cost Aware secure Routig (CASER) protocol for WSNs to balace the eergy cosumptio ad icrease etwork lifetime. CASER protocol is support multiple routig strategies i message forwardig to exted the lifetime ad icreasig routig security. Both theoretical aalysis ad simulatio results provide that CASER has a excellet routig performace i terms of eergy balace ad routig path security. The CASER protocol provides a o-uiform eergy deploymet scheme to maximize the sesor etwork lifetime. VI. REFERENCES [1] Di Tag, Togtog Li, Jia Re, Seior Member, IEEE, ad Jie Wu, Fellow, IEEE, Cost-Aware SEcure Routig (CASER) Protocol Desig for Wireless Sesor Networks, IEEE Trasactios o Parallel ad Distributed Systems, Vol. 26, No. 4, April [2] Y. Li, J. Re, ad J. Wu, Quatitative measuremet ad desig of source-locatio privacy schemes for wireless sesor etworks, IEEE Tras. Parallel Distrib. Syst., vol. 23, o. 7, pp , Jul [3] Y. Li, J. Li, J. Re, ad J. Wu, Providig hop-by-hop autheticatio ad source privacy i wireless sesor

5 Cost Aware Secure Routig (CASER) Protocol Desig for Wireless Sesor Networks Mr.N.Ajaeyulu, received the B.Tech (IT) from CVR College of Egieerig, Hyderabad, ad M.Tech(IT) from Guru Naak Egieerig College, Hyderabad, Idia i He is curretly workig as Assistat Professor i Sphoorthy Egieerig College, Hyderabad, Idia. His area of iterest icludes Computer Networks, Network Security, Mobile Computig ad Adhoc Sesor Networks. etworks, i Proc. IEEE Cof. Comput. Commu. Mii- Cof., Orlado, FL, USA, Mar. 2012, pp [4] B. Karp ad H. T. Kug, GPSR: Greedy perimeter stateless routig for wireless etworks, i Proc. 6th Au. It. Cof. Mobile Comput. Netw., New York, NY, USA, 2000, pp [5] J. Li, J. Jaotti, D. S. J. De Couto, D. R. Karger, ad R. Morris, A scalable locatio service for geographic ad hoc routig, i Proc. 6th Au. It. Cof. Mobile Comput. Netw., 2000, pp [6] Y. Xu, J. Heidema, ad D. Estri, Geographyiformed eergy coservatio for ad-hoc routig, i Proc. 7th Au. ACM/IEEE It. Cof. Mobile Comput. Netw., 2001, pp [7] Y. Yu, R. Govida, ad D. Estri, Geographical ad eergy aware routig: A recursive data dissemiatio protocol for wireless sesor etworks, Comput. Sci. Dept., UCLA, TR , Los Ageles, CA, USA, Tech. Rep., May [8] N. Bulusu, J. Heidema, ad D. Estri, GPS-less low cost outdoor localizatio for very small devices, Comput. Sci. Dept., Uiv. Souther Califoria, Los Ageles, CA, USA, Tech. Rep , Apr [9] A. Savvides, C.-C. Ha, ad M. B. Srivastava, Dyamic fie graied localizatio i ad-hoc etworks of sesors, i Proc. 7 th ACM Au. It. Cof. Mobile Comput. Netw., Jul , pp [10] P. Bose, P. Mori, I. Stojmeovic, ad J. Urrutia, Routig with guarateed delivery i ad hoc wireless etworks, i Proc. 3rd It. Workshop Discrete Algorithms Methods Mobile Comput. Commu., 1999, pp [11] P. Bose, P. Mori, I. Stojmeovic, ad J. Urrutia, Routig with guarateed delivery i ad hoc wireless etworks, i Proc. 3 rd ACM It. Workshop Discrete Algorithms Methods Mobile Comput. Commu., Seattle, WA, USA, Aug. 1999, pp [12] T. Melodia, D. Pompili, ad I. Akyildiz, Optimal local topology kowledge for eergy efficiet geographical routig i sesor etworks, i Proc. IEEE Cof. Comput. Commu., Mar. 2004, vol. 3, pp Author s Profile: G. Seha Praeetha, PG Scholar, Dept of CSE, Sphoorthy Egieerig College, Hyderabad, Idia, gudurisehapraeetha@gmail.com. Mrs,Deepthi Jaagama has doe Master of Sciece i Texas A&M Uiversity Commerce, Texas, USA ad received the Bachelor Of Techology degree from Kamala Istitute Of Techology Ad Sciece. She is curretly workig as Associate Professor ad Head of the Departmet of CSE with Sphoorthy Egieerig College,Nadergul.Her iterested subjects are Database maagemet system, Data miig ad Data Warehousig, Digital logic desig, computer programmig. deepthi.jaagama@gmail.com.

ISSN Vol.04,Issue.12, September-2016, Pages:

ISSN Vol.04,Issue.12, September-2016, Pages: WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.12, September-2016, Pages:2134-2140 Secure Routing for Wireless Sensor Networks using Caser Protocol TAYYABA TAMKEEN 1, AMENA SAYEED 2 1 PG Scholar, Dept of

More information

S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea

S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea S. Mehta ad K.S. Kwak UWB Wireless Commuicatios Research Ceter, Iha Uiversity Icheo, 402-75, Korea suryaad.m@gmail.com ABSTRACT I this paper, we propose a hybrid medium access cotrol protocol (H-MAC) for

More information

A COMPARITIVE STUDY ON COST AWARE SECURE ROUTING (CASER) PROTOCOL WITH SLEEP WAKE STATE ROUTING PROTOCOL (SWSR)

A COMPARITIVE STUDY ON COST AWARE SECURE ROUTING (CASER) PROTOCOL WITH SLEEP WAKE STATE ROUTING PROTOCOL (SWSR) INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 A COMPARITIVE STUDY ON COST AWARE SECURE ROUTING (CASER) PROTOCOL WITH SLEEP WAKE STATE ROUTING PROTOCOL (SWSR) R.Sudha

More information

ISSN Vol.04,Issue.11, August-2016, Pages:

ISSN Vol.04,Issue.11, August-2016, Pages: WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.11, August-2016, Pages:1977-1981 Energy Efficient Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor with Power Optimization LAVUDIYA NAGARANI

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,

More information

An Algorithm of Mobile Robot Node Location Based on Wireless Sensor Network

An Algorithm of Mobile Robot Node Location Based on Wireless Sensor Network A Algorithm of Mobile Robot Node Locatio Based o Wireless Sesor Network https://doi.org/0.399/ijoe.v3i05.7044 Peg A Nigbo Uiversity of Techology, Zhejiag, Chia eirxvrp2269@26.com Abstract I the wireless

More information

Relay Placement Based on Divide-and-Conquer

Relay Placement Based on Divide-and-Conquer Relay Placemet Based o Divide-ad-Coquer Ravabakhsh Akhlaghiia, Azadeh Kaviafar, ad Mohamad Javad Rostami, Member, IACSIT Abstract I this paper, we defie a relay placemet problem to cover a large umber

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

Look-ahead Geographic Routing for Sensor Networks

Look-ahead Geographic Routing for Sensor Networks 1 Look-ahead Geographic Routig for Sesor Networks Jiaxi You 1, Domiik Lieckfeldt 1, Qi Ha, Jakob Salzma 1, ad Dirk Timmerma 1 1 Uiversity of Rostock, Germay 1 {jiaxi.you, domiik.lieckfeldt, jakob.salzma,

More information

Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation

Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation Malicious Node Detectio i Wireless Sesor Networks usig Weighted Trust Evaluatio Idris M. Atakli, Hogbig Hu, Yu Che* SUNY Bighamto, Bighamto, NY 1392, USA {iatakli1, hhu1, yche}@bighamto.edu Wei-Shi Ku

More information

Energy Efficinet Cluster Head Selection and Data Convening in Wireless Sensor Networks

Energy Efficinet Cluster Head Selection and Data Convening in Wireless Sensor Networks Idia Joural of Sciece ad Techology, Vol 9(15), DOI: 1.17485/ijst/216/v9i15/77749, April 216 ISSN (Prit) : 974-6846 ISSN (Olie) : 974-5645 Eergy Efficiet Cluster Head Selectio ad Data Coveig i Wireless

More information

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets Throughput-Delay Scalig i Wireless Networks with Costat-Size Packets Abbas El Gamal, James Mamme, Balaji Prabhakar, Devavrat Shah Departmets of EE ad CS Staford Uiversity, CA 94305 Email: {abbas, jmamme,

More information

BGP Attributes and Path Selection. ISP Training Workshops

BGP Attributes and Path Selection. ISP Training Workshops BGP Attributes ad Path Selectio ISP Traiig Workshops 1 BGP Attributes The tools available for the job 2 What Is a Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes the characteristics

More information

Random Network Coding in Wireless Sensor Networks: Energy Efficiency via Cross-Layer Approach

Random Network Coding in Wireless Sensor Networks: Energy Efficiency via Cross-Layer Approach Radom Network Codig i Wireless Sesor Networks: Eergy Efficiecy via Cross-Layer Approach Daiel Platz, Dereje H. Woldegebreal, ad Holger Karl Uiversity of Paderbor, Paderbor, Germay {platz, dereje.hmr, holger.karl}@upb.de

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

FCM-SEP (Fuzzy C-Means Based Stable Election Protocol) for Energy Efficiency in Wireless Sensor Networks

FCM-SEP (Fuzzy C-Means Based Stable Election Protocol) for Energy Efficiency in Wireless Sensor Networks FCM-SEP (Fuzzy C-Meas Based Stable Electio Protocol) for Eergy Efficiecy i Wireless Sesor Networks Sadeep Kaur Computer Sciece ad Egieerig, Giai Zail Sigh Campus College of Egieerig ad Techology, Bathida,

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

Lecture 10 Collision resolution. Collision resolution

Lecture 10 Collision resolution. Collision resolution Lecture 10 Collisio resolutio Collisio resolutio May applicatios ivolve a iquiry over a shared chael, which ca be ivoked for: discovery of eighborig devices i ad hoc etworks, coutig the umber of RFID tags

More information

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000. 5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator

More information

Managing Random Sensor Networks by means of Grid Emulation

Managing Random Sensor Networks by means of Grid Emulation Maagig Radom Sesor Networks by meas of Grid Emulatio Zvi Lotker 1 ad Alfredo Navarra 2 1 Cetrum voor Wiskude e Iformatica Kruislaa 413, NL-1098 SJ Amsterdam, Netherlads lotker@cwi.l 2 Computer Sciece Departmet,

More information

Accuracy Improvement in Camera Calibration

Accuracy Improvement in Camera Calibration Accuracy Improvemet i Camera Calibratio FaJie L Qi Zag ad Reihard Klette CITR, Computer Sciece Departmet The Uiversity of Aucklad Tamaki Campus, Aucklad, New Zealad fli006, qza001@ec.aucklad.ac.z r.klette@aucklad.ac.z

More information

SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS. Tamil Nadu, INDIA

SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS. Tamil Nadu, INDIA ARTICLE SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS A Sethil Kumar 1, E Logashamugam 2 * 1 Research Scholar, Dept. of Electroics ad Commuicatio Egieerig, St. Peter

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today Admiistrative Fial project No office hours today UNSUPERVISED LEARNING David Kauchak CS 451 Fall 2013 Supervised learig Usupervised learig label label 1 label 3 model/ predictor label 4 label 5 Supervised

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

IS-IS in Detail. ISP Workshops

IS-IS in Detail. ISP Workshops IS-IS i Detail ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 27 th November

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN

A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN Iteratioal Joural of Digital Cotet Techology ad its Applicatios Vol. 2 No 1, March 2008 A Key Distributio method for Reducig Storage ad Supportig High Level Security i the Large-scale WSN Yoo-Su Jeog *1,

More information

1 Graph Sparsfication

1 Graph Sparsfication CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider

More information

The isoperimetric problem on the hypercube

The isoperimetric problem on the hypercube The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

Partition in mobile adhoc network with mobility-a new approach for effective use of fast IP address autoconfiguration

Partition in mobile adhoc network with mobility-a new approach for effective use of fast IP address autoconfiguration Mukesh Chad et al. / Iteratioal Joural of Egieerig ad Techology (IJET) Partitio i mobile adhoc etwork with mobility-a ew approach for effective use of fast IP address autocofiguratio Mukesh Chad *, HL

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

condition w i B i S maximum u i

condition w i B i S maximum u i ecture 10 Dyamic Programmig 10.1 Kapsack Problem November 1, 2004 ecturer: Kamal Jai Notes: Tobias Holgers We are give a set of items U = {a 1, a 2,..., a }. Each item has a weight w i Z + ad a utility

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

Traditional queuing behaviour in routers. Scheduling and queue management. Questions. Scheduling mechanisms. Scheduling [1] Scheduling [2]

Traditional queuing behaviour in routers. Scheduling and queue management. Questions. Scheduling mechanisms. Scheduling [1] Scheduling [2] Traditioal queuig behaviour i routers Schedulig ad queue maagemet Data trasfer: datagrams: idividual packets o recogitio of flows coectioless: o sigallig Forwardig: based o per-datagram, forwardig table

More information

DATA MINING II - 1DL460

DATA MINING II - 1DL460 DATA MINING II - 1DL460 Sprig 2017 A secod course i data miig http://www.it.uu.se/edu/course/homepage/ifoutv2/vt17/ Kjell Orsbor Uppsala Database Laboratory Departmet of Iformatio Techology, Uppsala Uiversity,

More information

Lecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein

Lecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein 068.670 Subliear Time Algorithms November, 0 Lecture 6 Lecturer: Roitt Rubifeld Scribes: Che Ziv, Eliav Buchik, Ophir Arie, Joatha Gradstei Lesso overview. Usig the oracle reductio framework for approximatig

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

Dynamic Programming and Curve Fitting Based Road Boundary Detection

Dynamic Programming and Curve Fitting Based Road Boundary Detection Dyamic Programmig ad Curve Fittig Based Road Boudary Detectio SHYAM PRASAD ADHIKARI, HYONGSUK KIM, Divisio of Electroics ad Iformatio Egieerig Chobuk Natioal Uiversity 664-4 Ga Deokji-Dog Jeoju-City Jeobuk

More information

QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks

QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks QoS Aware Geographic Opportuistic Routig i Wireless Sesor Networks Log Cheg, Member, IEEE, Jiawei Niu, Member, IEEE, Jiaog Cao, Seior Member, IEEE, Sajal K. Das, Seior Member, IEEE, ad Yu Gu, Member, IEEE

More information

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis IOSR Joural of Egieerig Redudacy Allocatio for Series Parallel Systems with Multiple Costraits ad Sesitivity Aalysis S. V. Suresh Babu, D.Maheswar 2, G. Ragaath 3 Y.Viaya Kumar d G.Sakaraiah e (Mechaical

More information

Introduction to OSPF. ISP Training Workshops

Introduction to OSPF. ISP Training Workshops Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged

More information

Identification of the Swiss Z24 Highway Bridge by Frequency Domain Decomposition Brincker, Rune; Andersen, P.

Identification of the Swiss Z24 Highway Bridge by Frequency Domain Decomposition Brincker, Rune; Andersen, P. Aalborg Uiversitet Idetificatio of the Swiss Z24 Highway Bridge by Frequecy Domai Decompositio Bricker, Rue; Aderse, P. Published i: Proceedigs of IMAC 2 Publicatio date: 22 Documet Versio Publisher's

More information

How do we evaluate algorithms?

How do we evaluate algorithms? F2 Readig referece: chapter 2 + slides Algorithm complexity Big O ad big Ω To calculate ruig time Aalysis of recursive Algorithms Next time: Litterature: slides mostly The first Algorithm desig methods:

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem Exact Miimum Lower Boud Algorithm for Travelig Salesma Problem Mohamed Eleiche GeoTiba Systems mohamed.eleiche@gmail.com Abstract The miimum-travel-cost algorithm is a dyamic programmig algorithm to compute

More information

IPv6 Autoconfiguration in Large Scale Mobile Ad-Hoc Networks

IPv6 Autoconfiguration in Large Scale Mobile Ad-Hoc Networks IPv6 Autocofiguratio i Large Scale Mobile Ad-Hoc Networks Kilia Weiger, Martia Zitterbart Istitute of Telematics Uiversity of Karlsruhe, 768 Karlsruhe, Germay Ph:++9 7 608-{65/600}, Email: {weiger,zit}@tm.uka.de

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 9, 85-0 (2003) Evaluatio of Distributed ad Replicated HLR for Locatio Maagemet i PCS Network Departmet of Computer Sciece ad Iformatio Egieerig Natioal Chiao

More information

Avid Interplay Bundle

Avid Interplay Bundle Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers

More information

Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols

Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols Rushig Attacks ad Defese i Wireless Ad Hoc Network Routig Protocols Yih-Chu Hu Caregie Mello Uiversity yihchu@cs.cmu.edu Adria Perrig Caregie Mello Uiversity perrig@cmu.edu David B. Johso Rice Uiversity

More information

PERFORMANCE ANALYSIS OF COST AWARE SECURE ROUTING PROTOCOL. Bharathi P 1, Nithyalakshmi R 2. M.E Communication Systems 1, Assistant Professor 1

PERFORMANCE ANALYSIS OF COST AWARE SECURE ROUTING PROTOCOL. Bharathi P 1, Nithyalakshmi R 2. M.E Communication Systems 1, Assistant Professor 1 PERFORMANCE ANALYSIS OF COST AWARE SECURE ROUTING PROTOCOL Bharathi P 1, Nithyalakshmi R 2 M.E Communication Systems 1, Assistant Professor 1 Department of Electronics and Communication Engineering Bharathiyar

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

World Scientific Research Journal (WSRJ) ISSN: Research on Fresnel Lens Optical Receiving Antenna in Indoor Visible

World Scientific Research Journal (WSRJ) ISSN: Research on Fresnel Lens Optical Receiving Antenna in Indoor Visible World Scietific Research Joural (WSRJ) ISSN: 2472-3703 www.wsr-j.org Research o Fresel Les Optical Receivig Atea i Idoor Visible Light Commuicatio Zhihua Du College of Electroics Egieerig, Chogqig Uiversity

More information

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers * Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of

More information

Admission control issues in sensor clusters

Admission control issues in sensor clusters Admissio cotrol issues i 802.15.4 sesor clusters Jelea Mišić, Shairmia Shafi, ad Vojislav B. Mišić Departmet of Computer Sciece, Uiversity of Maitoba Wiipeg, Maitoba, Caada PACS umbers: Valid PACS appear

More information

Data-Driven Nonlinear Hebbian Learning Method for Fuzzy Cognitive Maps

Data-Driven Nonlinear Hebbian Learning Method for Fuzzy Cognitive Maps Data-Drive Noliear Hebbia Learig Method for Fuzzy Cogitive Maps Wociech Stach, Lukasz Kurga, ad Witold Pedrycz Abstract Fuzzy Cogitive Maps (FCMs) are a coveiet tool for modelig of dyamic systems by meas

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk Chapter Objectives Lear how resiliecy strategies reduce risk Discover automatio strategies to reduce risk Chapter #16: Architecture ad Desig Resiliecy ad Automatio Strategies 2 Automatio/Scriptig Resiliet

More information

Lecture 2: Spectra of Graphs

Lecture 2: Spectra of Graphs Spectral Graph Theory ad Applicatios WS 20/202 Lecture 2: Spectra of Graphs Lecturer: Thomas Sauerwald & He Su Our goal is to use the properties of the adjacecy/laplacia matrix of graphs to first uderstad

More information

GTS Scheduling Scheme for Real-Time Communication in IEEE Industrial Wireless Sensor Networks

GTS Scheduling Scheme for Real-Time Communication in IEEE Industrial Wireless Sensor Networks Idia Joural of Sciece ad Techology, Vol 9(7), DOI:.7485/ijst/6/v9i7/87734, February 6 ISSN (Prit) : 974-6846 ISSN (Olie) : 974-5645 GTS Schedulig Scheme for Real-Time Commuicatio i IEEE8.5.4 Idustrial

More information

Cubic Polynomial Curves with a Shape Parameter

Cubic Polynomial Curves with a Shape Parameter roceedigs of the th WSEAS Iteratioal Coferece o Robotics Cotrol ad Maufacturig Techology Hagzhou Chia April -8 00 (pp5-70) Cubic olyomial Curves with a Shape arameter MO GUOLIANG ZHAO YANAN Iformatio ad

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:

More information

arxiv: v2 [cs.ds] 24 Mar 2018

arxiv: v2 [cs.ds] 24 Mar 2018 Similar Elemets ad Metric Labelig o Complete Graphs arxiv:1803.08037v [cs.ds] 4 Mar 018 Pedro F. Felzeszwalb Brow Uiversity Providece, RI, USA pff@brow.edu March 8, 018 We cosider a problem that ivolves

More information

1&1 Next Level Hosting

1&1 Next Level Hosting 1&1 Next Level Hostig Performace Level: Performace that grows with your requiremets Copyright 1&1 Iteret SE 2017 1ad1.com 2 1&1 NEXT LEVEL HOSTING 3 Fast page loadig ad short respose times play importat

More information

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process Vol.133 (Iformatio Techology ad Computer Sciece 016), pp.85-89 http://dx.doi.org/10.1457/astl.016. Euclidea Distace Based Feature Selectio for Fault Detectio Predictio Model i Semicoductor Maufacturig

More information

Course Site: Copyright 2012, Elsevier Inc. All rights reserved.

Course Site:   Copyright 2012, Elsevier Inc. All rights reserved. Course Site: http://cc.sjtu.edu.c/g2s/site/aca.html 1 Computer Architecture A Quatitative Approach, Fifth Editio Chapter 2 Memory Hierarchy Desig 2 Outlie Memory Hierarchy Cache Desig Basic Cache Optimizatios

More information

Calculation and Simulation of Transmission Reliability in Wireless Sensor Network Based on Network Coding

Calculation and Simulation of Transmission Reliability in Wireless Sensor Network Based on Network Coding Calculatio ad Simulatio of Trasmissio Reliability i Wireless Sesor Network Based o Network Codig https://doi.org/0.399/ijoe.v3i2.7883 Zhifu Lua Weifag Uiversity of Sciece ad Techology, Weifag, Chia 92268476@qq.com

More information

A Study on the Performance of Cholesky-Factorization using MPI

A Study on the Performance of Cholesky-Factorization using MPI A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio

More information

Using VTR Emulation on Avid Systems

Using VTR Emulation on Avid Systems Usig VTR Emulatio o Avid Systems VTR emulatio allows you to cotrol a sequece loaded i the Record moitor from a edit cotroller for playback i the edit room alog with other sources. I this sceario the edit

More information

Lower Bounds for Sorting

Lower Bounds for Sorting Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig

More information

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems

More information

Operating System Concepts. Operating System Concepts

Operating System Concepts. Operating System Concepts Chapter 4: Mass-Storage Systems Logical Disk Structure Logical Disk Structure Disk Schedulig Disk Maagemet RAID Structure Disk drives are addressed as large -dimesioal arrays of logical blocks, where the

More information

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1 Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)

More information

Markov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size

Markov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size Markov Chai Model of HomePlug CSMA MAC for Determiig Optimal Fixed Cotetio Widow Size Eva Krimiger * ad Haiph Latchma Dept. of Electrical ad Computer Egieerig, Uiversity of Florida, Gaiesville, FL, USA

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute

More information

ISSN (Print) Research Article. *Corresponding author Nengfa Hu

ISSN (Print) Research Article. *Corresponding author Nengfa Hu Scholars Joural of Egieerig ad Techology (SJET) Sch. J. Eg. Tech., 2016; 4(5):249-253 Scholars Academic ad Scietific Publisher (A Iteratioal Publisher for Academic ad Scietific Resources) www.saspublisher.com

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

Properties and Embeddings of Interconnection Networks Based on the Hexcube

Properties and Embeddings of Interconnection Networks Based on the Hexcube JOURNAL OF INFORMATION PROPERTIES SCIENCE AND AND ENGINEERING EMBEDDINGS OF 16, THE 81-95 HEXCUBE (2000) 81 Short Paper Properties ad Embeddigs of Itercoectio Networks Based o the Hexcube JUNG-SING JWO,

More information

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8)

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8) CIS 11 Data Structures ad Algorithms with Java Fall 017 Big-Oh Notatio Tuesday, September 5 (Make-up Friday, September 8) Learig Goals Review Big-Oh ad lear big/small omega/theta otatios Practice solvig

More information

THE deployment of router-based IP multicast has been

THE deployment of router-based IP multicast has been 88 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 8, NO. 9, SEPTEMBER 2007 ACOM: Ay-Source Capacity-Costraied Overlay Multicast i No-DHT P2P Networks Shipig Che, Baile Shi, Shigag Che, ad

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved.

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved. Itroductio to Wireless & Mobile Systems Chapter 6 Multiple Radio Access 1 Outlie Itroductio Multiple Radio Access Protocols Cotetio-based Protocols Pure ALOHA Slotted ALOHA CSMA (Carrier Sese Multiple

More information

Stone Images Retrieval Based on Color Histogram

Stone Images Retrieval Based on Color Histogram Stoe Images Retrieval Based o Color Histogram Qiag Zhao, Jie Yag, Jigyi Yag, Hogxig Liu School of Iformatio Egieerig, Wuha Uiversity of Techology Wuha, Chia Abstract Stoe images color features are chose

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Multiprocessors. HPC Prof. Robert van Engelen

Multiprocessors. HPC Prof. Robert van Engelen Multiprocessors Prof. Robert va Egele Overview The PMS model Shared memory multiprocessors Basic shared memory systems SMP, Multicore, ad COMA Distributed memory multicomputers MPP systems Network topologies

More information

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks Iterferece Aware Chael Assigmet Scheme i Multichael Wireless Mesh Networks Sumyeg Kim Departmet of Computer Software Egieerig Kumoh Natioal Istitute of Techology Gum South Korea Abstract Wireless mesh

More information

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard 1 A wireless keyboard is supplied with your computer. The wireless keyboard uses a stadard key arragemet with additioal keys that perform specific fuctios. Usig the Wireless Keyboard Two AA alkalie batteries

More information

Improved Random Graph Isomorphism

Improved Random Graph Isomorphism Improved Radom Graph Isomorphism Tomek Czajka Gopal Paduraga Abstract Caoical labelig of a graph cosists of assigig a uique label to each vertex such that the labels are ivariat uder isomorphism. Such

More information