NETWORKED CONTROL SYSTEM: THEORY AND SIMULATIONS. A Project by. Sandeep Bimali

Size: px
Start display at page:

Download "NETWORKED CONTROL SYSTEM: THEORY AND SIMULATIONS. A Project by. Sandeep Bimali"

Transcription

1 NETWORKED CONTROL SYSTEM: THEORY AND SIMULATIONS A Project by Sandeep Bimali Bacelor s Degree in Electronics Engineering, Tribvani University, Nepal December 21 Sbmitted to te Department of Electrical and Compter Engineering and te faclty of te Gradate Scool of Wicita State University in partial flfillment of te reqirements for te degree of Master of Science December 25

2 NETWORKED CONTROL SYSTEM: THEORY AND SIMULATIONS I ave examined te final copy of tis Project for form and content and recommend tat it be accepted in partial flfillment of te reqirement for te degree of Master of Science, wit a major in Electrical Engineering Dr Jon M Watkins, Committee Cair We ave read tis project And recommend its acceptance: Dr Steven R Skinner, Committee Member Dr Coskn Cetinkaya, Committee Member ii

3 ACKNOWLEDGEMENTS I wold like to express my tanks to my project advisor, Dr Jon M Watkins, for is gidance and continos spport trogot te project work He as been a continal sorce of information and fres ideas in te process of completing tis project I wold also like to tank Dr Steven R Skinner and Dr Coskn Cetinkaya for reviewing my project and serving on my project committee A big tanks to my friend, Deependra Malla, wo took is personal time to review and elped me edit te project report My family and my beloved wife Megna deserve my deepest gratitde for teir constant sorce of love and encoragement trogot my stdies iii

4 TABLE OF CONTENTS CHAPTERS 1 Introdction 1 2 Backgrond 2 21 Networks and Control 2 22 State Space Models for Systems wit Delay 3 23 Fndamental Isses in Networked Control Systems 6 24 Compensation for Network Indced Delays 7 3 Simlation Framework 1 31 TreTime A Simlation Environment 1 4 Simlation Reslts Simlation Model 17 5 Conclsion 21 List of References 22 iv

5 Capter 1 Introdction Te stdy of Networked Control Systems NCSs brings togeter te istorically separate disciplines of compter networks and control teory Feedback control systems, werein te loops sed to control te beavior of a plant are closed trog a real-time commnication network, are called networked control systems Te defining featre of an NCS is tat information is excanged sing a network among control system components sensors, controller, and actator Te insertion of te commnication network in te feedback control loops makes te analysis and design of an NCS complex Conventional control teories wit many ideal assmptions, sc as syncronized control and non-delayed sensing and actation, mst be reevalated before tey can be applied to NCSs Te isses tat needs to be addressed wile designing an NCS inclde, network-indced delays tat occrs wile excanging data among devices connected to te sared medim, and packet losses, becase of te nreliable network transmission pat, were packets not only sffer transmission delays bt, even worse, can be lost dring transmission In tis project, an attempt as been made to analyze te stability of an NCS reslting from te network-indced delay sensor-to-controller delay and controller-toactator delay A simple compensation sceme as been proposed to minimize its effect For tis prpose, I ave sed TreTime, a Matlab toolbox for simlation of distribted real-time control systems 1

6 Capter 2 Backgrond 21 Networks and Control Network control systems NCSs combine two engineering fields, control and compter networks Compter networks can be wired or wireless Becase NCSs are implemented over a network, a good nderstanding of nderlying commnication network protocols, sc as Eternet, Token Bs or Token Ring is reqired to analyze and model te system s beavior Te International Organization for Standardization ISO as created a reference model for compters in a network to commnicate wit eac oter, called Open System Interconnection OSI Te OSI model is te primary arcitectral model for networks It describes ow data and network information are transmitted from an application on one compter, trog te network media, to an application on anoter compter Te OSI reference model breaks tis approac into sever layers: te application layer, te presentation layer, te session layer, te transport layer, te network layer, te data link layer and te pysical layer from te top to te bottom respectively Media Access control MAC, wic is a sb layer of te data link layer, is responsible for te pysical transmission of data to te proper device on a local area networks LAN sing a ardware address and also andles error notification Te IEEE 82 committee as issed standards for LANs [2]: IEEE 823 Eternet, IEEE 824 token bs and IEEE 825 token bs 2

7 Eternet IEEE 823 ses carries sense mltiple access wit collision detection CSMA/CD protocol to control its commnication Te transmitting nodes terminate teir transmission after detected collisions Tey wait for a random period of time defined by an exponential back off algoritm and try to send te frames again Te token bs IEEE 824 is a token ring over a virtal ring on a coaxial cable A token is passed arond te network nodes and only te node processing te token may transmit If a node doesn t ave anyting to send, te token is passed on to te next node on te virtal ring Eac node mst know te address of its neigbors in te ring, so a special protocol is needed to notify te oter nodes of connections to, and disconnections from te ring Te token ring IEEE 825 as stations logically organized in a ring topology wit data being transmitted seqentially from one ring station to te next wit a control token circlating arond te ring controlling access Wen no station is transmitting a data frame, a special token frame circles te loop Te special token frame is repeated from station to station ntil arriving at a station tat needs to transmit te data Wen a station needs to transmit a data frame, it converts te token frame into a data frame for transmission 22 State-Space Model for Systems wit Delay Te time delay penomenon in control pats or state variables is navoidable in many pysical systems Time delays are common in networked control systems and te design of controllers for sc systems depends critically on knowledge of te delays Ignorance of te delay dring analysis and design of digital controllers may lead to 3

8 npredictable system performance For te ease of implementation, te realization of a discrete-time state space model of a system wit delay sorter and longer tan one sampling period is presented in te following section Delay Less Tan One Sampling Period Consider te linear state eqation wit inpt delayed by λ [1]: x& t = Ax t + B t λ, 1 yt = Cxt 2 were x is called te state vector, y is called te otpt vector, is called te inpt or control vector, A is te state matrix, B is te inpt matrix, and C is te otpt matrix Te general soltion to te eqation is x t = e A tt t A t x t + e τ B τ λ dτ t By sampling te system wit sampling period and assming a zero-order old on te inpt, te soltion for te state is x + = e A x + + A + τ e B τ λ dτ k=, 1, 2, 3 Since te delayed inpt signal t-λ is not piecewise constant over te sampling period interval, te delayed signal will cange dring one sampling period Te modified soltion to te eqation is x + = e A x + + λ A + τ A discrete-time state space model of te system is given by e + A + τ Bdτ + e Bdτ + λ 4

9 5 I 1 Γ + Γ Φ = + x x were = e A Φ, = Γ d e λ τ τ B A, and + + = Γ λ τ τ d e 1 B A Longer time Delay If te time delay,λ, is longer tan te sampling period,, one may receive zero, one, or more tan one control samples in a single sampling period Te analysis needs a little adaptation Decomposeλ, sc tat ' 1 λ λ + = d < ' λ were d is an integer Te analysis is modified to 1 1 d d + Γ + Γ = Φ + x x Te corresponding state-space description is I d x I I I d x + Γ Γ Φ = +

10 23 Fndamental Isses in NCSs Te basic problem in NCSs incldes network-indced delays, single-packet or mltiple-packet transmission of plant inpt and otpts, and dropping of network packets [1] and [3] Te network-indced delays in NCSs occr wen sensors, actators, and controllers excange data packet across te commnication network Tis delay can degrade te performance of control systems designed witot considering it and can even destabilize te system Categorized by te MAC algoritms, te media access protocols fall into two categories, ones tat prodces constant transmission periods and tose tat create time varying transmission periods Te algoritm sed in te IEEE 823 standard prodce time-varying transmission period, wereas te IEEE 824 standard and IEEE 825 standard yield constant transmission period Bonds for te transmission period will be needed to garantee stability of NCSs Also, depending on te MAC protocol, te delay between transmissions networked indced delay is divided into two grops, deterministic and nondeterministic If te MAC sb layer of a protocol access cannel is sing random backoff CSMA/CD, in te Eternet, for example, te delay from te protocol will be random On te oter and, te scedling protocols te IEEE 824 standard and IEEE 825 standard will give deterministic delay Tese isses were stdied in [1], [3], and [4] Oter concerns for stability of NCSs are lengt of transmitted packets and packet dropping Te nderlying protocol of te MAC sb layer in te network is te key to controlling te lengt of packets to be transmitted For example, in Eternet, te data field of te protocol is 15 bytes, so te size of transmitted packets is nlikely to affect 6

11 real-time feedback signals, wic are only few bytes eac Te information can even be lmped and transmitted in one packet Packet dropping is often an inevitable event in network data transmission despite te provision network protocols Network packet drops occasionally appen on an NCS wen tere are node failres or message collisions In real-time feedback control, data sc as sensor measrements and calclated control signals, it migt be advantageos to discard te old ntransmitted message and transmit a new packet if it becomes available In tis way, te controller always receives fres data for control calclation 24 Compensation for Network-Indced Delays Te compensation for NCSs in considered for sensor-to-controller delay, τ sc only Sensor-to-controller delay can be known wen te controller ses te sensor s data to generate te control signal, provided te sensor and controller clocks are syncronized and te message is time stamped Ts an estimator can be sed to reconstrct an approximation to te ndelayed plant state and make it available for te control calclation On te oter and, controller-to-actator delay is different, in tat te controller does not ave te information on ow long will it take te control signal to reac te actator, terefore, no exact correction can be made at te time of control calclation Feedback systems [1] are categorized as fll-state feedback or otpt feedback systems Wit fll-state feedback, te estimator compensates τ sc In te otpt feedback system, te estimator as to do bot compensation for τ sc and estimate te states of te system Tese metods are possible if te delays are measrable 7

12 Fll-state Feedback Wit fll-state feedback, te only task of te estimator is to compensate for te delay, τ sc, to acieve a more accrate plant state at te time te control signal is calclated Let a system be described as in 1 and 2 For every plant otpt, te data is time-stamped by te sensor in order to acqire te information abot crrent time delay, τ sc, k Sensor information reaces te estimator at time + τ sc,k By assming tere is no measrement noise and all states are measred, te plant information [3] at tat time is x + τ sc, k = x + τ sc, k = e A τ + sc k sc, k τ, A τ sc, k s x + e B s ds were, x + τ sc,k is te estimated state at time + τ sc,k Applying te state feedback control law to te system were δ k τ = τ sc, k + 1 sc, k Φ ~ δ = Φ δ + Γ δ K, k Aδ k Φ δ = e k Γ δ = k δ k e k, and A s + τ sc k = K x + τ sc,, k ~ x k τ sc k + 1 = Φ δ k x + τ sc, Bds k,,, k 8

13 Otpt Feedback In practice, all states of some systems are not measred Here we assme tat te otpts from te plant are te only information we know An estimator is needed to estimate te state A conventional crrent-state estimator is sed in tis stdy Witot te delay, a crrent estimator [4] is given by x k + 1 = xˆ k L c y k + 1 C xˆ k + 1, were, x ˆ k + 1 = Φ x + Γ, k + 1 = K x k + 1 and L c is te estimator gain Te estimator is calclated in two steps Te estimator state x is projected forward to te next sample, x ˆ k + 1 Ten te calclation is corrected wit te received plant otpt to give x k + 1 Wen τ sc is taken accont, te crrent estimator sceme is described by 1 Correction based on y : x = xˆ + L c y C xˆ, 2 Forward to x + τ : sc x + τ = e sc τ A sc + + τ sc A + τ sc s e B s ds, 3 Calclate te control law: + τ sc = K x + τ sc, 4 Forward to k+1 : + Aτ sc F + s xˆ k + 1 = e x + sc + e + τ sc τ B s ds 9

14 Capter 3 Simlation Frameworks Tere are many different ways to simlate te dynamics of a network control system Likewise, many packages exist to simlate te discrete events of a network system Traditional control design sing Matlab/Simlink, often disregards te temporal effects arising from te actal implementation of te controllers Presently, controllers are often implemented as tasks in a real-time kernel and commnicate wit oter nodes over a network Conseqently, te constraints of te target system, eg, limited central processing nit speed and network bandwidt mst be taken into accont at a design time For tis prpose, I ave sed TreTime, a toolbox for simlation of distribted realtime control systems TreTime makes it possible to simlate te timely beavior of realtime kernels execting controller tasks TreTime also makes it possible to simlate simple models of network protocols and teir inflence on networked control loops 31 TreTime- A simlation environment TreTime is a Matlab/Simlink-based package written by Henriksson et al, [5] wic was designed to simlate te temporal beavior of mlti-tasking real-time kernels containing controller tasks Te TreTime simlation environment offers two simlation blocks a compter block and a network block as sown in te Figre 1 1

15 Figre 1: Te TreTime block library Te blocks are variable-step, discrete, Matlab S-fnctions written in C++ Te TreTime kernel block also called Compter block exectes ser-defined tasks and interrpts andlers Te TreTime network block distribtes messages between compter nodes according to a cosen network model Bot blocks are event driven wit te exection determined bot by external and internal events Te blocks inpts are assmed to be discrete-time signals, except te signals connected to te A/D converters of te compter block, wic can be continos time Te scedle and monitors signals indicate te allocation of common resorces dring te simlation Te TreTime Kernel Block Te TreTime kernel block S-fnction simlates a compter wit a simple bt flexible real-time kernel, A/D and D/A converters, a network interface, and external 11

16 interrpt cannels Te exection of te tasks and interrpt andlers is defined by te ser-written code fnctions Te task is te main constrct in te TreTime simlation environment Tasks are sed to simlate bot periodic activities, sc as controller and I/O tasks, and aperiodic activities sc as commnication tasks and event-driven controllers An arbitrary nmber of tasks can be created to rn in te TreTime kernel Eac task is defined by a set of attribtes and a code fnction Te attribtes inclde a name, a release time, a worst-case exection time, an exection time, a priority, and a period Interrpts may be generated in two ways: externally or internally An external interrpt is associated wit one of te external interrpt cannels of te compter block Te interrpt is triggered wen te signal of te corresponding cannel canges vales Internal interrpts are associated wit timers Te corresponding interrpt is triggered wen te timer expires Wen an external or internal interrpt occrs, a ser-defined interrpt andler is scedled to serve te interrpt An interrpt andler is defined by a name, a priority and a code fnction Te code associated wit tasks and interrpt andlers is scedled and exected by te kernel as simlation progresses Te simlated exection time of eac segment is retrned by te code fnction Te TreTime Network Block Te network block is event driven and exectes wen messages enter or leave te network A message contains information abot te sending and te receiving compter 12

17 node, arbitrary ser data typically control signals, te lengt of te message and optional real-time attribtes sc as priority or a deadline In te network block it is possible to specify te transmission rate and te medim access control protocols A long message can be split into frames tat are transmitted in seqence, eac wit an additional overead Wen te simlated transmission of a message is completed, it is pt in a bffer at te receiving compter node, wic is notified by a ardware interrpt Simlation Scenario Te scenario sed for te simlation is sown in Figre 2 Continos Plant Sensor Node Actator Node Network Controller Node Distrbance Node Figre 2: Continos plant to be controlled over a network 13

18 Te sensor, actator, controller and distrbance nodes are modeled sing te TreTime kernel block and te network block is modeled sing te TreTime network block Te TreTime blocks are connected wit ordinary Simlink blocks to form a realtime control system Te time-driven sensor node contains a periodic task, wic at eac invocation samples te process and transmits te sample package to te controller node Te controller node contains an event-driven task tat is triggered eac time a sample arrives over te network from te sensor node Upon receiving te sample, te controller comptes a control signal, wic is ten sent to te event-driven actator node, were it is actated Te model also contains a distrbance node wit a periodic task generating random interfering traffic over te network Figres 3 and 4 sow te implementation of te TreTime network and te TreTime kernel block Figre 3: TreTime network block 14

19 Figre 4: TreTime kernel block A Proportional-Integral-Derivative controller or PID controller is implemented for te controller A PID controller compares a measred vale from a process wit a reference set point vale Te difference or error signal is ten processed to calclate a new vale for a maniplated process inpt Te maniplated process inpt brings te process-measred vale back to its desired set point Te PID-controller is implemented according to te following eqations If t is te control signal sent to te system, yt it s measred otpt, a PID controller as te generical form t = K 1 [ e t + T i t e t dt + T d de t ] dt were, K= Gain of te controller et = difference between set point rt set point and measred otpt yt, ie et =r t-yt T i = integration time, and T d =derivative time Te PID controller is tned by adjsting te derivative control parameters to improve te oversoot and settling time 15

20 Te derivative part is given by D t = KT d de t d t Using te backward difference rle, a discrete version of te derivative part is given as Td KTd N D = D y y, k=, 1, 2, 3 T + N T + N d were, N = gain at iger freqencies = sampling period Te controller parameters are given by d A d Td = T + N d B d KTd N = T + N d 16

21 Capter 4 Simlation Reslts 41 Simlation Model Te simlation setp is sown in Figre 5 Te TreTime blocks are connected wit ordinary continos Simlink blocks to form a real-time control system Figre 5: Simlation model Reslts In te following simlations, an Eternet-type network is assmed A 1-ms sampling interval is sed in te sensor node Te exection time of te controller is 5 17

22 ms and te ideal transmission time from one node to anoter sensor-to-controller and controller-to-actator is 15ms, giving an ideal rond-trip delay of 35ms We frter assme tat an interfering, ig-priority task is execting in te controller node wit a 7- ms period and a 3-ms exection time In te first simlation, te network bandwidt occpied by te messages generated by te interfering node is set eqal to zero Te control performance reslting from tis sitation is sown in Figre 6 Figre 6: Control Performance witot interfering network messages Next we consider a more realistic simlation were messages generated by te interfering node occpy 5% of te network bandwidt Colliding transmissions in te network will case te rond-trip delay to be even longer wit te reslting degraded control performance sown in te simlated response in Figre 7 18

23 Figre 7: Control Performance wit interfering network messages and interfering task in te controller node Te transmission of messages over te network can be seen in detail in Figre 8 Controller Node Sensor Node Network Scedle Interf Node Time [ms] Figre 8: Network Scedles sowing te allocation of common resorces A ig means sending or execting, a medim signal means waiting, and a low means idle Finally, for an attempt to cope wit te delays a simple compensation is introdced By time-stamping te messages sent from te sensor node, it is possible for te controller to determine te actal delay from sensor to controller Te total delay is estimated by adding te expected vale of te delay from controller to actator assmed to be same as from te sensor to controller Te new control signal is ten calclated 19

24 taking a mean of te set of te controller parameters calclated for different delays Figre 9 and 1 sows te control performance and network scedle sing tis compensation Figre 9: Control Performance wit delay-compensation and interfering node occpying 5% of te network bandwidt Controller Node Network Scedle Sensor Node Interf Node Time [ms] Figre 1: Network Scedles sowing te allocation of common resorces A ig means sending or execting, a medim signal means waiting, and a low means idle To compare te reslts between te two scemes, it wold be necessary to rn many simlations nder different network conditions Tis as not been done for tis stdy 2

25 Capter 5 Conclsion Tis project analyzed some of te teoretical aspects and fndamental isses in networked control system Design of controllers in networked control system critically depends on te knowledge of delays Te discrete-time state space model of a system wit delay sorter and longer tan one sampling was presented Te fndamental isse in networked control system incldes network-indced delay, ie te delay tat occrs between sensor, controller and actator wen excanging data packet across te commnication network Sensor-to-controller delay and controller-to-actator delay ave different measres Sensor-to-controller delay can be known wen te controller ses te sensor s data to generate te control signal, provided te message is time stamped Controller-to-actator delay is different; owever, in tat te controller does not know ow long it will take te control signal to reac te actator, terefore, no exact correction can be made at te time of control calclation A simlation scenario was developed sing TreTime software, wic is a Matlab/Simlink toolbox to simlate distribted real-time control systems In te simlation, te data sent from sensor to controller were time stamped tere by giving an estimate of te sensor-to-controller delay Since time stamping does not compensate controller-to-actator delay, sing different delay estimation tecniqe and algoritm to compensate tis delay will obviosly prodce even better reslts 21

26 LIST OF REFERENCES 22

27 [1] W Zang, MS Branicky, SM Pilips, Stability of Networked Control Systems, IEEE Control System Magazine, Febrary 21 [2] AS Tanenbam, Compter Networks, 3 rd ed Upper Englewood Cliffs, NJ: Prentice-Hall, 1996 [3] GC Wals, H Ye, LG Bsnell, Stability Analysis of Networked Control Systems, IEEE Transactions on Control Systems tecnology, Vol 1, No 3, May 22 [4] GC Wals, H Ye, Scedling of Networked Control Systems, IEEE Transactions on Control Systems tecnology, Vol 21, No 1, Febrary 21 [5] M Anderson, D Henriksson, A Cervin, TreTime 13-Reference Manal, Department of Atomatic Control, Lnd Institte of Tecnology, Jne 25 23

X-Conference: Reinventing a Teleconferencing System

X-Conference: Reinventing a Teleconferencing System X-Conference: Reinventing a Teleconferencing System by Xin Wang Sbmitted to te Program in Media Arts and Sciences, Scool of Arcitectre and Planning, in partial flfillment of te reqirements for te degree

More information

Master for Co-Simulation Using FMI

Master for Co-Simulation Using FMI Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany

More information

The Disciplined Flood Protocol in Sensor Networks

The Disciplined Flood Protocol in Sensor Networks The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab

More information

CAPL Scripting Quickstart

CAPL Scripting Quickstart CAPL Scripting Qickstart CAPL (Commnication Access Programming Langage) For CANalyzer and CANoe V1.01 2015-12-03 Agenda Important information before getting started 3 Visal Seqencer (GUI based programming

More information

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity

More information

TDT4255 Friday the 21st of October. Real world examples of pipelining? How does pipelining influence instruction

TDT4255 Friday the 21st of October. Real world examples of pipelining? How does pipelining influence instruction Review Friday the 2st of October Real world eamples of pipelining? How does pipelining pp inflence instrction latency? How does pipelining inflence instrction throghpt? What are the three types of hazard

More information

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna

More information

Networks An introduction to microcomputer networking concepts

Networks An introduction to microcomputer networking concepts Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES

More information

Chapter 6: Pipelining

Chapter 6: Pipelining CSE 322 COPUTER ARCHITECTURE II Chapter 6: Pipelining Chapter 6: Pipelining Febrary 10, 2000 1 Clothes Washing CSE 322 COPUTER ARCHITECTURE II The Assembly Line Accmlate dirty clothes in hamper Place in

More information

Section 2.3: Calculating Limits using the Limit Laws

Section 2.3: Calculating Limits using the Limit Laws Section 2.3: Calculating Limits using te Limit Laws In previous sections, we used graps and numerics to approimate te value of a it if it eists. Te problem wit tis owever is tat it does not always give

More information

Tdb: A Source-level Debugger for Dynamically Translated Programs

Tdb: A Source-level Debugger for Dynamically Translated Programs Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,

More information

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness 1 Optimal In-etwork Packet Aggregation Policy for Maimum Information Fresness Alper Sinan Akyurek, Tajana Simunic Rosing Electrical and Computer Engineering, University of California, San Diego aakyurek@ucsd.edu,

More information

Making Full Use of Multi-Core ECUs with AUTOSAR Basic Software Distribution

Making Full Use of Multi-Core ECUs with AUTOSAR Basic Software Distribution Making Fll Use of Mlti-Core ECUs with AUTOSAR Basic Software Distribtion Webinar V0.1 2018-09-07 Agenda Motivation for Mlti-Core AUTOSAR Standard: SWC-Split MICROSAR Extension: BSW-Split BSW-Split: Technical

More information

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands

More information

Resolving Linkage Anomalies in Extracted Software System Models

Resolving Linkage Anomalies in Extracted Software System Models Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program

More information

EMC ViPR. User Guide. Version

EMC ViPR. User Guide. Version EMC ViPR Version 1.1.0 User Gide 302-000-481 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is accrate

More information

EXAMINATIONS 2010 END OF YEAR NWEN 242 COMPUTER ORGANIZATION

EXAMINATIONS 2010 END OF YEAR NWEN 242 COMPUTER ORGANIZATION EXAINATIONS 2010 END OF YEAR COPUTER ORGANIZATION Time Allowed: 3 Hors (180 mintes) Instrctions: Answer all qestions. ake sre yor answers are clear and to the point. Calclators and paper foreign langage

More information

The single-cycle design from last time

The single-cycle design from last time lticycle path Last time we saw a single-cycle path and control nit for or simple IPS-based instrction set. A mlticycle processor fies some shortcomings in the single-cycle CPU. Faster instrctions are not

More information

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically 2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use

More information

IN a recent paper [1], a class of number representations

IN a recent paper [1], a class of number representations 8 IEEE TRANSACTIONS ON COMPUTERS, VOL. 60, NO., FEBRUARY 011 Performing Aritmetic Operations on Rond-to-Nearest Representations Peter Kornerp, Member, IEEE, Jean-MicelMller,Senior Member, IEEE, andadrienpanalex

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY 2007 1 On the Analysis of the Bletooth Time Division Dplex Mechanism Gil Zssman Member, IEEE, Adrian Segall Fellow, IEEE, and Uri Yechiali

More information

Lecture 13: Traffic Engineering

Lecture 13: Traffic Engineering Lectre 13: Traffic Engineering CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Mike Freedman, Nick Feamster, and Ming Zhang Lectre 13 Overview Dealing with mltiple paths Mltihoming Entact

More information

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks Cost Based Local Forwarding Transmission Schemes for Two-hop Celllar Networks Zhenggang Zhao, Xming Fang, Yan Long, Xiaopeng H, Ye Zhao Key Lab of Information Coding & Transmission Sothwest Jiaotong University,

More information

Evaluating Influence Diagrams

Evaluating Influence Diagrams Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will

More information

PROGRAM LICENSE AGREEMENT LIMITED WARRANTY... 4 Trademarks Contents Preface... 11

PROGRAM LICENSE AGREEMENT LIMITED WARRANTY... 4 Trademarks Contents Preface... 11 . Contents PROGRAM LICENSE AGREEMENT... LIMITED WARRANTY... 4 Trademarks... 6. Contents... 8 Preface... 2. Overview... 3 2. Jst one other important thing... 3 2.2 Abot the ser manal... 4 2.3 Manal System

More information

Multi-lingual Multi-media Information Retrieval System

Multi-lingual Multi-media Information Retrieval System Mlti-lingal Mlti-media Information Retrieval System Shoji Mizobchi, Sankon Lee, Fmihiko Kawano, Tsyoshi Kobayashi, Takahiro Komats Gradate School of Engineering, University of Tokshima 2-1 Minamijosanjima,

More information

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various

More information

EEC 483 Computer Organization

EEC 483 Computer Organization EEC 483 Compter Organization Chapter 4.4 A Simple Implementation Scheme Chans Y The Big Pictre The Five Classic Components of a Compter Processor Control emory Inpt path Otpt path & Control 2 path and

More information

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment

More information

METAMODEL FOR SOFTWARE SOLUTIONS IN COMPUTED TOMOGRAPHY

METAMODEL FOR SOFTWARE SOLUTIONS IN COMPUTED TOMOGRAPHY VOL. 10, NO 22, DECEBER, 2015 ISSN 1819-6608 ETAODEL FOR SOFTWARE SOLUTIONS IN COPUTED TOOGRAPHY Vitaliy ezhyev Faclty of Compter Systems and Software Engineering, Universiti alaysia Pahang, Gambang, alaysia

More information

EXAMINATIONS 2003 END-YEAR COMP 203. Computer Organisation

EXAMINATIONS 2003 END-YEAR COMP 203. Computer Organisation EXAINATIONS 2003 COP203 END-YEAR Compter Organisation Time Allowed: 3 Hors (180 mintes) Instrctions: Answer all qestions. There are 180 possible marks on the eam. Calclators and foreign langage dictionaries

More information

New Architectures for Hierarchical Predictive Control

New Architectures for Hierarchical Predictive Control Preprint, 11th IFAC Symposim on Dynamics and Control of Process Systems, inclding Biosystems Jne 6-8, 216. NTNU, Trondheim, Norway New Architectres for Hierarchical Predictive Control Victor M. Zavala

More information

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks An Algoritm for Loopless Deflection in Potonic Packet-Switced Networks Jason P. Jue Center for Advanced Telecommunications Systems and Services Te University of Texas at Dallas Ricardson, TX 75083-0688

More information

Efficient Implementation of Binary Trees in LISP Systems

Efficient Implementation of Binary Trees in LISP Systems Efficient Implementation of Binary Trees in LISP Systems P. SIPALA Dipartimento di Eleltrotecnica, Eleltronica, Informatica, Universitd di Trieste, Italy In this paper, I consider how to implement the

More information

The extra single-cycle adders

The extra single-cycle adders lticycle Datapath As an added bons, we can eliminate some of the etra hardware from the single-cycle path. We will restrict orselves to sing each fnctional nit once per cycle, jst like before. Bt since

More information

dss-ip Manual digitalstrom Server-IP Operation & Settings

dss-ip Manual digitalstrom Server-IP Operation & Settings dss-ip digitalstrom Server-IP Manal Operation & Settings Table of Contents digitalstrom Table of Contents 1 Fnction and Intended Use... 3 1.1 Setting p, Calling p and Operating... 3 1.2 Reqirements...

More information

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read. The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5

More information

Uncertainty Determination for Dimensional Measurements with Computed Tomography

Uncertainty Determination for Dimensional Measurements with Computed Tomography Uncertainty Determination for Dimensional Measrements with Compted Tomography Kim Kiekens 1,, Tan Ye 1,, Frank Welkenhyzen, Jean-Pierre Krth, Wim Dewlf 1, 1 Grop T even University College, KU even Association

More information

Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN:

Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: 1137-3601 revista@aepia.org Asociación Española para la Inteligencia Artificial España Zaballos, Lis J.; Henning, Gabriela

More information

Review Multicycle: What is Happening. Controlling The Multicycle Design

Review Multicycle: What is Happening. Controlling The Multicycle Design Review lticycle: What is Happening Reslt Zero Op SrcA SrcB Registers Reg Address emory em Data Sign etend Shift left Sorce A B Ot [-6] [5-] [-6] [5-] [5-] Instrction emory IR RegDst emtoreg IorD em em

More information

MULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS

MULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS ULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS Nimmagadda Calamaia æ Dept. of CSE JNTU College of Engineering Kakinada, India 533 003. calm@cse.iitkgp.ernet.in Badrinat Ramamurty y Dept.

More information

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003 From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information

More information

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer

More information

Topic Continuity for Web Document Categorization and Ranking

Topic Continuity for Web Document Categorization and Ranking Topic Continity for Web ocment Categorization and Ranking B. L. Narayan, C. A. Mrthy and Sankar. Pal Machine Intelligence Unit, Indian Statistical Institte, 03, B. T. Road, olkata - 70008, India. E-mail:

More information

Cautionary Aspects of Cross Layer Design: Context, Architecture and Interactions

Cautionary Aspects of Cross Layer Design: Context, Architecture and Interactions Cationary Aspects of Cross Layer Design: Context, Architectre and Interactions Vikas Kawadia and P. R. Kmar Dept. of Electrical and Compter Engineering, and Coordinated Science Lab University of Illinois,

More information

A UPnP-based Decentralized Service Discovery Improved Algorithm

A UPnP-based Decentralized Service Discovery Improved Algorithm Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol.1, No.1, Marc 2013, pp. 21~26 ISSN: 2089-3272 21 A UPnP-based Decentralized Service Discovery Improved Algoritm Yu Si-cai*, Wu Yan-zi,

More information

Distributed and Optimal Rate Allocation in Application-Layer Multicast

Distributed and Optimal Rate Allocation in Application-Layer Multicast Distributed and Optimal Rate Allocation in Application-Layer Multicast Jinyao Yan, Martin May, Bernard Plattner, Wolfgang Mülbauer Computer Engineering and Networks Laboratory, ETH Zuric, CH-8092, Switzerland

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 11: Semaphores Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Last time Worked throgh software implementation

More information

5 Performance Evaluation

5 Performance Evaluation 5 Performance Evalation his chapter evalates the performance of the compared to the MIP, and FMIP individal performances. We stdy the packet loss and the latency to restore the downstream and pstream of

More information

Switched state-feedback controllers with multi-estimators for MIMO systems

Switched state-feedback controllers with multi-estimators for MIMO systems Proceedings of the th WEA Int Conf on COMPUTATIONAL INTELLIGENCE MAN-MACHINE YTEM AND CYBERNETIC Venice Ital November - 6 89 witched state-feedback controllers with mlti-estimators for MIMO sstems LIBOR

More information

Unit Testing with VectorCAST and AUTOSAR

Unit Testing with VectorCAST and AUTOSAR Unit Testing with VectorCAST and AUTOSAR Vector TechDay Software Testing with VectorCAST V1.0 2018-11-15 Agenda Introdction Unit Testing Demo Working with AUTOSAR Generated Code Unit Testing AUTOSAR SWCs

More information

Review. A single-cycle MIPS processor

Review. A single-cycle MIPS processor Review If three instrctions have opcodes, 7 and 5 are they all of the same type? If we were to add an instrction to IPS of the form OD $t, $t2, $t3, which performs $t = $t2 OD $t3, what wold be its opcode?

More information

Method to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot

Method to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot Method to bild an initial adaptive Nero-Fzzy controller for joints control of a legged robot J-C Habmremyi, P. ool and Y. Badoin Royal Military Academy-Free University of Brssels 08 Hobbema str, box:mrm,

More information

webinar series

webinar series Ethernet@Atomotive webinar series Moving Forward: Tool Spported Development for Atomotive Ethernet in Time Sensitive Networks V1.06 2016-07-04 Agenda Introdction 3 Recap: Physical layers, network topology

More information

Isilon InsightIQ. Version 2.5. User Guide

Isilon InsightIQ. Version 2.5. User Guide Isilon InsightIQ Version 2.5 User Gide Pblished March, 2014 Copyright 2010-2014 EMC Corporation. All rights reserved. EMC believes the information in this pblication is accrate as of its pblication date.

More information

IP Multicast Fault Recovery in PIM over OSPF

IP Multicast Fault Recovery in PIM over OSPF 1 IP Mlticast Falt Recovery in PIM over OSPF Abstract Relatively little attention has been given to nderstanding the falt recovery characteristics and performance tning of native IP mlticast networks.

More information

Optimal Sampling in Compressed Sensing

Optimal Sampling in Compressed Sensing Optimal Sampling in Compressed Sensing Joyita Dtta Introdction Compressed sensing allows s to recover objects reasonably well from highly ndersampled data, in spite of violating the Nyqist criterion. In

More information

CANoe/CANalyzer New Features

CANoe/CANalyzer New Features CANoe/CANalyzer New Featres Version 11.0 V1.0 2018-04-10 Agenda Release Information General Diagnostics Testing (CANoe only) VT System AMD/XCP (CANoe only) Scope Sensor CAN / CAN FD Ethernet LIN Car2x

More information

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,

More information

Lecture 14: Congestion Control

Lecture 14: Congestion Control Lectre 14: Congestion Control CSE 222A: Compter Commnication Networks George Porter Thanks: Amin Vahdat, Dina Katabi Lectre 14 Overview TCP congestion control review XCP Overview CSE 222A Lectre 14: Congestion

More information

Tu P7 15 First-arrival Traveltime Tomography with Modified Total Variation Regularization

Tu P7 15 First-arrival Traveltime Tomography with Modified Total Variation Regularization T P7 15 First-arrival Traveltime Tomography with Modified Total Variation Reglarization W. Jiang* (University of Science and Technology of China) & J. Zhang (University of Science and Technology of China)

More information

Efficient and Accurate Delaunay Triangulation Protocols under Churn

Efficient and Accurate Delaunay Triangulation Protocols under Churn Efficient and Accrate Delanay Trianglation Protocols nder Chrn Dong-Yong Lee and Simon S. Lam Department of Compter Sciences The University of Texas at Astin {dylee, lam}@cs.texas.ed November 9, 2007 Technical

More information

EMC VNX Series. Problem Resolution Roadmap for VNX with ESRS for VNX and Connect Home. Version VNX1, VNX2 P/N REV. 03

EMC VNX Series. Problem Resolution Roadmap for VNX with ESRS for VNX and Connect Home. Version VNX1, VNX2 P/N REV. 03 EMC VNX Series Version VNX1, VNX2 Problem Resoltion Roadmap for VNX with ESRS for VNX and Connect Home P/N 300-014-335 REV. 03 Copyright 2012-2014 EMC Corporation. All rights reserved. Pblished in USA.

More information

Computer-Aided Mechanical Design Using Configuration Spaces

Computer-Aided Mechanical Design Using Configuration Spaces Compter-Aided Mechanical Design Using Configration Spaces Leo Joskowicz Institte of Compter Science The Hebrew University Jersalem 91904, Israel E-mail: josko@cs.hji.ac.il Elisha Sacks (corresponding athor)

More information

POWER-OF-2 BOUNDARIES

POWER-OF-2 BOUNDARIES Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of

More information

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz

More information

Image Compression Compression Fundamentals

Image Compression Compression Fundamentals Compression Fndamentals Data compression refers to the process of redcing the amont of data reqired to represent given qantity of information. Note that data and information are not the same. Data refers

More information

4.2 The Derivative. f(x + h) f(x) lim

4.2 The Derivative. f(x + h) f(x) lim 4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially

More information

Continuity Smooth Path Planning Using Cubic Polynomial Interpolation with Membership Function

Continuity Smooth Path Planning Using Cubic Polynomial Interpolation with Membership Function J Electr Eng Technol Vol., No.?: 74-?, 5 http://dx.doi.org/.537/jeet.5..?.74 ISSN(Print) 975- ISSN(Online) 93-743 Continity Smooth Path Planning Using Cbic Polomial Interpolation with Membership Fnction

More information

Vessel Tracking for Retina Images Based on Fuzzy Ant Colony Algorithm

Vessel Tracking for Retina Images Based on Fuzzy Ant Colony Algorithm Vessel Tracking for Retina Images Based on Fzzy Ant Colony Algorithm Sina Hooshyar a, Rasol Khayati b and Reza Rezai c a,b,c Department of Biomedical Engineering, Engineering Faclty, Shahed University,

More information

Lecture 10. Diffraction. incident

Lecture 10. Diffraction. incident 1 Introdction Lectre 1 Diffraction It is qite often the case that no line-of-sight path exists between a cell phone and a basestation. In other words there are no basestations that the cstomer can see

More information

Maximum Weight Independent Sets in an Infinite Plane

Maximum Weight Independent Sets in an Infinite Plane Maximm Weight Independent Sets in an Infinite Plane Jarno Nosiainen, Jorma Virtamo, Pasi Lassila jarno.nosiainen@tkk.fi, jorma.virtamo@tkk.fi, pasi.lassila@tkk.fi Department of Commnications and Networking

More information

Illumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY

Illumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY Illmina LIMS Software Gide Jne 2017 ILLUMINA PROPRIETARY This docment and its contents are proprietary to Illmina, Inc. and its affiliates ("Illmina"), and are intended solely for the contractal se of

More information

Today s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of

Today s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of Today s Lectre Lectre 27: Introdction to Software Architectre Kenneth M. Anderson Fondations of Software Engineering CSCI 5828 - Spring Semester, 1999 Introdction and Backgrond of Software Architectre

More information

Chapter 5 Network Layer

Chapter 5 Network Layer Chapter Network Layer Network layer Physical layer: moe bit seqence between two adjacent nodes Data link: reliable transmission between two adjacent nodes Network: gides packets from the sorce to destination,

More information

More on Functions and Their Graphs

More on Functions and Their Graphs More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in

More information

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems Congestion-adaptive Data Collection with Accracy Garantee in Cyber-Physical Systems Nematollah Iri, Lei Y, Haiying Shen, Gregori Calfield Department of Electrical and Compter Engineering, Clemson University,

More information

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation Maximal Cliqes in Unit Disk Graphs: Polynomial Approximation Rajarshi Gpta, Jean Walrand, Oliier Goldschmidt 2 Department of Electrical Engineering and Compter Science Uniersity of California, Berkeley,

More information

SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS. Hewlett-Packard Company East Mission Avenue. Bogazici University

SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS. Hewlett-Packard Company East Mission Avenue. Bogazici University SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS Sanuj V. Sarin 1, Hakan Delic 2 and Jung H. Kim 3 1 Hewlett-Packard Company 24001 East Mission Avenue Spokane, Wasington 99109, USA 2 Signal

More information

NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS

NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS ETWORK PRESERVATIO THROUGH A TOPOLOGY COTROL ALGORITHM FOR WIRELESS MESH ETWORKS F. O. Aron, T. O. Olwal, A. Krien, Y. Hamam Tshwane University of Technology, Pretoria, Soth Africa. Dept of the French

More information

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation P R E P R N T CPWS XV Berlin, September 8, 008 Fast Calculation of Termodynamic Properties of Water and Steam in Process Modelling using Spline nterpolation Mattias Kunick a, Hans-Joacim Kretzscmar a,

More information

Real-Time Wireless Routing for Industrial Internet of Things

Real-Time Wireless Routing for Industrial Internet of Things Real-Time Wireless Routing for Industrial Internet of Tings Cengjie Wu, Dolvara Gunatilaka, Mo Sa, Cenyang Lu Cyber-Pysical Systems Laboratory, Wasington University in St. Louis Department of Computer

More information

A sufficient condition for spiral cone beam long object imaging via backprojection

A sufficient condition for spiral cone beam long object imaging via backprojection A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral

More information

An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng

An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng An ffective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Ciming Huang and ei-heng Ceng 5 De c e mbe r0 International Journal of Advanced Information Tecnologies (IJAIT),

More information

4.1 Tangent Lines. y 2 y 1 = y 2 y 1

4.1 Tangent Lines. y 2 y 1 = y 2 y 1 41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange

More information

StaCo: Stackelberg-based Coverage Approach in Robotic Swarms

StaCo: Stackelberg-based Coverage Approach in Robotic Swarms Maastricht University Department of Knowledge Engineering Technical Report No.:... : Stackelberg-based Coverage Approach in Robotic Swarms Kateřina Staňková, Bijan Ranjbar-Sahraei, Gerhard Weiss, Karl

More information

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems Reqirements Engineering Objectives An introdction to reqirements Gerald Kotonya and Ian Sommerville To introdce the notion of system reqirements and the reqirements process. To explain how reqirements

More information

CS 153 Design of Operating Systems

CS 153 Design of Operating Systems CS 153 Design of Operating Systems Spring 18 Lectre 3: OS model and Architectral Spport Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Last time/today

More information

4.13 Advanced Topic: An Introduction to Digital Design Using a Hardware Design Language 345.e1

4.13 Advanced Topic: An Introduction to Digital Design Using a Hardware Design Language 345.e1 .3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage 35.e.3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage to Describe and odel a Pipeline

More information

QoS-driven Runtime Adaptation of Service Oriented Architectures

QoS-driven Runtime Adaptation of Service Oriented Architectures Qo-driven Rntime Adaptation of ervice Oriented Architectres Valeria ardellini 1 Emiliano asalicchio 1 Vincenzo Grassi 1 Francesco Lo Presti 1 Raffaela Mirandola 2 1 Dipartimento di Informatica, istemi

More information

Lecture 17: Wireless Networking

Lecture 17: Wireless Networking Lectre 17: 802.11 Wireless Networking CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Lili Qi, Nitin Vaidya Lectre 17 Overview Project discssion Intro to 802.11 WiFi Jigsaw discssion CSE

More information

Fault Tolerance in Hypercubes

Fault Tolerance in Hypercubes Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different

More information

VirtuOS: an operating system with kernel virtualization

VirtuOS: an operating system with kernel virtualization VirtOS: an operating system with kernel virtalization Rslan Nikolaev, Godmar Back SOSP '13 Proceedings of the Twenty-Forth ACM Symposim on Oper ating Systems Principles 이영석, 신현호, 박재완 Index Motivation Design

More information

Hardware Design Tips. Outline

Hardware Design Tips. Outline Hardware Design Tips EE 36 University of Hawaii EE 36 Fall 23 University of Hawaii Otline Verilog: some sbleties Simlators Test Benching Implementing the IPS Actally a simplified 6 bit version EE 36 Fall

More information

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT PAAMETE OPTIMIZATION FO TAKAGI-SUGENO FUZZY MODELS LESSONS LEANT Manfred Männle Inst. for Compter Design and Falt Tolerance Univ. of Karlsrhe, 768 Karlsrhe, Germany maennle@compter.org Brokat Technologies

More information

Abstract 1 Introduction

Abstract 1 Introduction Combining Relevance Information in a Synchronos Collaborative Information Retrieval Environment Colm Foley, Alan F. Smeaton and Gareth J. F. Jones Centre for Digital Video Processing and Adaptive Information

More information

Millimeter-Wave Multi-Hop Wireless Backhauling for 5G Cellular Networks

Millimeter-Wave Multi-Hop Wireless Backhauling for 5G Cellular Networks 2017 IEEE 85th Vehiclar Technology Conference (VTC-Spring) Millimeter-Wave Mlti-Hop Wireless Backhaling for 5G Celllar Networks B. P. S. Sahoo, Chn-Han Yao, and Hng-Y Wei Gradate Institte of Electrical

More information

Intra- and Inter-Session Network Coding in Wireless Networks

Intra- and Inter-Session Network Coding in Wireless Networks Intra- and Inter-Session Network Coding in Wireless Networks Hulya Seferoglu, Member, IEEE, Atina Markopoulou, Member, IEEE, K K Ramakrisnan, Fellow, IEEE arxiv:857v [csni] 3 Feb Abstract In tis paper,

More information

Computer Architecture Chapter 5. Fall 2005 Department of Computer Science Kent State University

Computer Architecture Chapter 5. Fall 2005 Department of Computer Science Kent State University Compter Architectre Chapter 5 Fall 25 Department of Compter Science Kent State University The Processor: Datapath & Control Or implementation of the MIPS is simplified memory-reference instrctions: lw,

More information

Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks

Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Okan Yilmaz and Ing-Ray Cen Computer Science Department Virginia Tec {oyilmaz, ircen}@vt.edu

More information