NETWORKED CONTROL SYSTEM: THEORY AND SIMULATIONS. A Project by. Sandeep Bimali
|
|
- Ilene Little
- 6 years ago
- Views:
Transcription
1 NETWORKED CONTROL SYSTEM: THEORY AND SIMULATIONS A Project by Sandeep Bimali Bacelor s Degree in Electronics Engineering, Tribvani University, Nepal December 21 Sbmitted to te Department of Electrical and Compter Engineering and te faclty of te Gradate Scool of Wicita State University in partial flfillment of te reqirements for te degree of Master of Science December 25
2 NETWORKED CONTROL SYSTEM: THEORY AND SIMULATIONS I ave examined te final copy of tis Project for form and content and recommend tat it be accepted in partial flfillment of te reqirement for te degree of Master of Science, wit a major in Electrical Engineering Dr Jon M Watkins, Committee Cair We ave read tis project And recommend its acceptance: Dr Steven R Skinner, Committee Member Dr Coskn Cetinkaya, Committee Member ii
3 ACKNOWLEDGEMENTS I wold like to express my tanks to my project advisor, Dr Jon M Watkins, for is gidance and continos spport trogot te project work He as been a continal sorce of information and fres ideas in te process of completing tis project I wold also like to tank Dr Steven R Skinner and Dr Coskn Cetinkaya for reviewing my project and serving on my project committee A big tanks to my friend, Deependra Malla, wo took is personal time to review and elped me edit te project report My family and my beloved wife Megna deserve my deepest gratitde for teir constant sorce of love and encoragement trogot my stdies iii
4 TABLE OF CONTENTS CHAPTERS 1 Introdction 1 2 Backgrond 2 21 Networks and Control 2 22 State Space Models for Systems wit Delay 3 23 Fndamental Isses in Networked Control Systems 6 24 Compensation for Network Indced Delays 7 3 Simlation Framework 1 31 TreTime A Simlation Environment 1 4 Simlation Reslts Simlation Model 17 5 Conclsion 21 List of References 22 iv
5 Capter 1 Introdction Te stdy of Networked Control Systems NCSs brings togeter te istorically separate disciplines of compter networks and control teory Feedback control systems, werein te loops sed to control te beavior of a plant are closed trog a real-time commnication network, are called networked control systems Te defining featre of an NCS is tat information is excanged sing a network among control system components sensors, controller, and actator Te insertion of te commnication network in te feedback control loops makes te analysis and design of an NCS complex Conventional control teories wit many ideal assmptions, sc as syncronized control and non-delayed sensing and actation, mst be reevalated before tey can be applied to NCSs Te isses tat needs to be addressed wile designing an NCS inclde, network-indced delays tat occrs wile excanging data among devices connected to te sared medim, and packet losses, becase of te nreliable network transmission pat, were packets not only sffer transmission delays bt, even worse, can be lost dring transmission In tis project, an attempt as been made to analyze te stability of an NCS reslting from te network-indced delay sensor-to-controller delay and controller-toactator delay A simple compensation sceme as been proposed to minimize its effect For tis prpose, I ave sed TreTime, a Matlab toolbox for simlation of distribted real-time control systems 1
6 Capter 2 Backgrond 21 Networks and Control Network control systems NCSs combine two engineering fields, control and compter networks Compter networks can be wired or wireless Becase NCSs are implemented over a network, a good nderstanding of nderlying commnication network protocols, sc as Eternet, Token Bs or Token Ring is reqired to analyze and model te system s beavior Te International Organization for Standardization ISO as created a reference model for compters in a network to commnicate wit eac oter, called Open System Interconnection OSI Te OSI model is te primary arcitectral model for networks It describes ow data and network information are transmitted from an application on one compter, trog te network media, to an application on anoter compter Te OSI reference model breaks tis approac into sever layers: te application layer, te presentation layer, te session layer, te transport layer, te network layer, te data link layer and te pysical layer from te top to te bottom respectively Media Access control MAC, wic is a sb layer of te data link layer, is responsible for te pysical transmission of data to te proper device on a local area networks LAN sing a ardware address and also andles error notification Te IEEE 82 committee as issed standards for LANs [2]: IEEE 823 Eternet, IEEE 824 token bs and IEEE 825 token bs 2
7 Eternet IEEE 823 ses carries sense mltiple access wit collision detection CSMA/CD protocol to control its commnication Te transmitting nodes terminate teir transmission after detected collisions Tey wait for a random period of time defined by an exponential back off algoritm and try to send te frames again Te token bs IEEE 824 is a token ring over a virtal ring on a coaxial cable A token is passed arond te network nodes and only te node processing te token may transmit If a node doesn t ave anyting to send, te token is passed on to te next node on te virtal ring Eac node mst know te address of its neigbors in te ring, so a special protocol is needed to notify te oter nodes of connections to, and disconnections from te ring Te token ring IEEE 825 as stations logically organized in a ring topology wit data being transmitted seqentially from one ring station to te next wit a control token circlating arond te ring controlling access Wen no station is transmitting a data frame, a special token frame circles te loop Te special token frame is repeated from station to station ntil arriving at a station tat needs to transmit te data Wen a station needs to transmit a data frame, it converts te token frame into a data frame for transmission 22 State-Space Model for Systems wit Delay Te time delay penomenon in control pats or state variables is navoidable in many pysical systems Time delays are common in networked control systems and te design of controllers for sc systems depends critically on knowledge of te delays Ignorance of te delay dring analysis and design of digital controllers may lead to 3
8 npredictable system performance For te ease of implementation, te realization of a discrete-time state space model of a system wit delay sorter and longer tan one sampling period is presented in te following section Delay Less Tan One Sampling Period Consider te linear state eqation wit inpt delayed by λ [1]: x& t = Ax t + B t λ, 1 yt = Cxt 2 were x is called te state vector, y is called te otpt vector, is called te inpt or control vector, A is te state matrix, B is te inpt matrix, and C is te otpt matrix Te general soltion to te eqation is x t = e A tt t A t x t + e τ B τ λ dτ t By sampling te system wit sampling period and assming a zero-order old on te inpt, te soltion for te state is x + = e A x + + A + τ e B τ λ dτ k=, 1, 2, 3 Since te delayed inpt signal t-λ is not piecewise constant over te sampling period interval, te delayed signal will cange dring one sampling period Te modified soltion to te eqation is x + = e A x + + λ A + τ A discrete-time state space model of te system is given by e + A + τ Bdτ + e Bdτ + λ 4
9 5 I 1 Γ + Γ Φ = + x x were = e A Φ, = Γ d e λ τ τ B A, and + + = Γ λ τ τ d e 1 B A Longer time Delay If te time delay,λ, is longer tan te sampling period,, one may receive zero, one, or more tan one control samples in a single sampling period Te analysis needs a little adaptation Decomposeλ, sc tat ' 1 λ λ + = d < ' λ were d is an integer Te analysis is modified to 1 1 d d + Γ + Γ = Φ + x x Te corresponding state-space description is I d x I I I d x + Γ Γ Φ = +
10 23 Fndamental Isses in NCSs Te basic problem in NCSs incldes network-indced delays, single-packet or mltiple-packet transmission of plant inpt and otpts, and dropping of network packets [1] and [3] Te network-indced delays in NCSs occr wen sensors, actators, and controllers excange data packet across te commnication network Tis delay can degrade te performance of control systems designed witot considering it and can even destabilize te system Categorized by te MAC algoritms, te media access protocols fall into two categories, ones tat prodces constant transmission periods and tose tat create time varying transmission periods Te algoritm sed in te IEEE 823 standard prodce time-varying transmission period, wereas te IEEE 824 standard and IEEE 825 standard yield constant transmission period Bonds for te transmission period will be needed to garantee stability of NCSs Also, depending on te MAC protocol, te delay between transmissions networked indced delay is divided into two grops, deterministic and nondeterministic If te MAC sb layer of a protocol access cannel is sing random backoff CSMA/CD, in te Eternet, for example, te delay from te protocol will be random On te oter and, te scedling protocols te IEEE 824 standard and IEEE 825 standard will give deterministic delay Tese isses were stdied in [1], [3], and [4] Oter concerns for stability of NCSs are lengt of transmitted packets and packet dropping Te nderlying protocol of te MAC sb layer in te network is te key to controlling te lengt of packets to be transmitted For example, in Eternet, te data field of te protocol is 15 bytes, so te size of transmitted packets is nlikely to affect 6
11 real-time feedback signals, wic are only few bytes eac Te information can even be lmped and transmitted in one packet Packet dropping is often an inevitable event in network data transmission despite te provision network protocols Network packet drops occasionally appen on an NCS wen tere are node failres or message collisions In real-time feedback control, data sc as sensor measrements and calclated control signals, it migt be advantageos to discard te old ntransmitted message and transmit a new packet if it becomes available In tis way, te controller always receives fres data for control calclation 24 Compensation for Network-Indced Delays Te compensation for NCSs in considered for sensor-to-controller delay, τ sc only Sensor-to-controller delay can be known wen te controller ses te sensor s data to generate te control signal, provided te sensor and controller clocks are syncronized and te message is time stamped Ts an estimator can be sed to reconstrct an approximation to te ndelayed plant state and make it available for te control calclation On te oter and, controller-to-actator delay is different, in tat te controller does not ave te information on ow long will it take te control signal to reac te actator, terefore, no exact correction can be made at te time of control calclation Feedback systems [1] are categorized as fll-state feedback or otpt feedback systems Wit fll-state feedback, te estimator compensates τ sc In te otpt feedback system, te estimator as to do bot compensation for τ sc and estimate te states of te system Tese metods are possible if te delays are measrable 7
12 Fll-state Feedback Wit fll-state feedback, te only task of te estimator is to compensate for te delay, τ sc, to acieve a more accrate plant state at te time te control signal is calclated Let a system be described as in 1 and 2 For every plant otpt, te data is time-stamped by te sensor in order to acqire te information abot crrent time delay, τ sc, k Sensor information reaces te estimator at time + τ sc,k By assming tere is no measrement noise and all states are measred, te plant information [3] at tat time is x + τ sc, k = x + τ sc, k = e A τ + sc k sc, k τ, A τ sc, k s x + e B s ds were, x + τ sc,k is te estimated state at time + τ sc,k Applying te state feedback control law to te system were δ k τ = τ sc, k + 1 sc, k Φ ~ δ = Φ δ + Γ δ K, k Aδ k Φ δ = e k Γ δ = k δ k e k, and A s + τ sc k = K x + τ sc,, k ~ x k τ sc k + 1 = Φ δ k x + τ sc, Bds k,,, k 8
13 Otpt Feedback In practice, all states of some systems are not measred Here we assme tat te otpts from te plant are te only information we know An estimator is needed to estimate te state A conventional crrent-state estimator is sed in tis stdy Witot te delay, a crrent estimator [4] is given by x k + 1 = xˆ k L c y k + 1 C xˆ k + 1, were, x ˆ k + 1 = Φ x + Γ, k + 1 = K x k + 1 and L c is te estimator gain Te estimator is calclated in two steps Te estimator state x is projected forward to te next sample, x ˆ k + 1 Ten te calclation is corrected wit te received plant otpt to give x k + 1 Wen τ sc is taken accont, te crrent estimator sceme is described by 1 Correction based on y : x = xˆ + L c y C xˆ, 2 Forward to x + τ : sc x + τ = e sc τ A sc + + τ sc A + τ sc s e B s ds, 3 Calclate te control law: + τ sc = K x + τ sc, 4 Forward to k+1 : + Aτ sc F + s xˆ k + 1 = e x + sc + e + τ sc τ B s ds 9
14 Capter 3 Simlation Frameworks Tere are many different ways to simlate te dynamics of a network control system Likewise, many packages exist to simlate te discrete events of a network system Traditional control design sing Matlab/Simlink, often disregards te temporal effects arising from te actal implementation of te controllers Presently, controllers are often implemented as tasks in a real-time kernel and commnicate wit oter nodes over a network Conseqently, te constraints of te target system, eg, limited central processing nit speed and network bandwidt mst be taken into accont at a design time For tis prpose, I ave sed TreTime, a toolbox for simlation of distribted realtime control systems TreTime makes it possible to simlate te timely beavior of realtime kernels execting controller tasks TreTime also makes it possible to simlate simple models of network protocols and teir inflence on networked control loops 31 TreTime- A simlation environment TreTime is a Matlab/Simlink-based package written by Henriksson et al, [5] wic was designed to simlate te temporal beavior of mlti-tasking real-time kernels containing controller tasks Te TreTime simlation environment offers two simlation blocks a compter block and a network block as sown in te Figre 1 1
15 Figre 1: Te TreTime block library Te blocks are variable-step, discrete, Matlab S-fnctions written in C++ Te TreTime kernel block also called Compter block exectes ser-defined tasks and interrpts andlers Te TreTime network block distribtes messages between compter nodes according to a cosen network model Bot blocks are event driven wit te exection determined bot by external and internal events Te blocks inpts are assmed to be discrete-time signals, except te signals connected to te A/D converters of te compter block, wic can be continos time Te scedle and monitors signals indicate te allocation of common resorces dring te simlation Te TreTime Kernel Block Te TreTime kernel block S-fnction simlates a compter wit a simple bt flexible real-time kernel, A/D and D/A converters, a network interface, and external 11
16 interrpt cannels Te exection of te tasks and interrpt andlers is defined by te ser-written code fnctions Te task is te main constrct in te TreTime simlation environment Tasks are sed to simlate bot periodic activities, sc as controller and I/O tasks, and aperiodic activities sc as commnication tasks and event-driven controllers An arbitrary nmber of tasks can be created to rn in te TreTime kernel Eac task is defined by a set of attribtes and a code fnction Te attribtes inclde a name, a release time, a worst-case exection time, an exection time, a priority, and a period Interrpts may be generated in two ways: externally or internally An external interrpt is associated wit one of te external interrpt cannels of te compter block Te interrpt is triggered wen te signal of te corresponding cannel canges vales Internal interrpts are associated wit timers Te corresponding interrpt is triggered wen te timer expires Wen an external or internal interrpt occrs, a ser-defined interrpt andler is scedled to serve te interrpt An interrpt andler is defined by a name, a priority and a code fnction Te code associated wit tasks and interrpt andlers is scedled and exected by te kernel as simlation progresses Te simlated exection time of eac segment is retrned by te code fnction Te TreTime Network Block Te network block is event driven and exectes wen messages enter or leave te network A message contains information abot te sending and te receiving compter 12
17 node, arbitrary ser data typically control signals, te lengt of te message and optional real-time attribtes sc as priority or a deadline In te network block it is possible to specify te transmission rate and te medim access control protocols A long message can be split into frames tat are transmitted in seqence, eac wit an additional overead Wen te simlated transmission of a message is completed, it is pt in a bffer at te receiving compter node, wic is notified by a ardware interrpt Simlation Scenario Te scenario sed for te simlation is sown in Figre 2 Continos Plant Sensor Node Actator Node Network Controller Node Distrbance Node Figre 2: Continos plant to be controlled over a network 13
18 Te sensor, actator, controller and distrbance nodes are modeled sing te TreTime kernel block and te network block is modeled sing te TreTime network block Te TreTime blocks are connected wit ordinary Simlink blocks to form a realtime control system Te time-driven sensor node contains a periodic task, wic at eac invocation samples te process and transmits te sample package to te controller node Te controller node contains an event-driven task tat is triggered eac time a sample arrives over te network from te sensor node Upon receiving te sample, te controller comptes a control signal, wic is ten sent to te event-driven actator node, were it is actated Te model also contains a distrbance node wit a periodic task generating random interfering traffic over te network Figres 3 and 4 sow te implementation of te TreTime network and te TreTime kernel block Figre 3: TreTime network block 14
19 Figre 4: TreTime kernel block A Proportional-Integral-Derivative controller or PID controller is implemented for te controller A PID controller compares a measred vale from a process wit a reference set point vale Te difference or error signal is ten processed to calclate a new vale for a maniplated process inpt Te maniplated process inpt brings te process-measred vale back to its desired set point Te PID-controller is implemented according to te following eqations If t is te control signal sent to te system, yt it s measred otpt, a PID controller as te generical form t = K 1 [ e t + T i t e t dt + T d de t ] dt were, K= Gain of te controller et = difference between set point rt set point and measred otpt yt, ie et =r t-yt T i = integration time, and T d =derivative time Te PID controller is tned by adjsting te derivative control parameters to improve te oversoot and settling time 15
20 Te derivative part is given by D t = KT d de t d t Using te backward difference rle, a discrete version of te derivative part is given as Td KTd N D = D y y, k=, 1, 2, 3 T + N T + N d were, N = gain at iger freqencies = sampling period Te controller parameters are given by d A d Td = T + N d B d KTd N = T + N d 16
21 Capter 4 Simlation Reslts 41 Simlation Model Te simlation setp is sown in Figre 5 Te TreTime blocks are connected wit ordinary continos Simlink blocks to form a real-time control system Figre 5: Simlation model Reslts In te following simlations, an Eternet-type network is assmed A 1-ms sampling interval is sed in te sensor node Te exection time of te controller is 5 17
22 ms and te ideal transmission time from one node to anoter sensor-to-controller and controller-to-actator is 15ms, giving an ideal rond-trip delay of 35ms We frter assme tat an interfering, ig-priority task is execting in te controller node wit a 7- ms period and a 3-ms exection time In te first simlation, te network bandwidt occpied by te messages generated by te interfering node is set eqal to zero Te control performance reslting from tis sitation is sown in Figre 6 Figre 6: Control Performance witot interfering network messages Next we consider a more realistic simlation were messages generated by te interfering node occpy 5% of te network bandwidt Colliding transmissions in te network will case te rond-trip delay to be even longer wit te reslting degraded control performance sown in te simlated response in Figre 7 18
23 Figre 7: Control Performance wit interfering network messages and interfering task in te controller node Te transmission of messages over te network can be seen in detail in Figre 8 Controller Node Sensor Node Network Scedle Interf Node Time [ms] Figre 8: Network Scedles sowing te allocation of common resorces A ig means sending or execting, a medim signal means waiting, and a low means idle Finally, for an attempt to cope wit te delays a simple compensation is introdced By time-stamping te messages sent from te sensor node, it is possible for te controller to determine te actal delay from sensor to controller Te total delay is estimated by adding te expected vale of te delay from controller to actator assmed to be same as from te sensor to controller Te new control signal is ten calclated 19
24 taking a mean of te set of te controller parameters calclated for different delays Figre 9 and 1 sows te control performance and network scedle sing tis compensation Figre 9: Control Performance wit delay-compensation and interfering node occpying 5% of te network bandwidt Controller Node Network Scedle Sensor Node Interf Node Time [ms] Figre 1: Network Scedles sowing te allocation of common resorces A ig means sending or execting, a medim signal means waiting, and a low means idle To compare te reslts between te two scemes, it wold be necessary to rn many simlations nder different network conditions Tis as not been done for tis stdy 2
25 Capter 5 Conclsion Tis project analyzed some of te teoretical aspects and fndamental isses in networked control system Design of controllers in networked control system critically depends on te knowledge of delays Te discrete-time state space model of a system wit delay sorter and longer tan one sampling was presented Te fndamental isse in networked control system incldes network-indced delay, ie te delay tat occrs between sensor, controller and actator wen excanging data packet across te commnication network Sensor-to-controller delay and controller-to-actator delay ave different measres Sensor-to-controller delay can be known wen te controller ses te sensor s data to generate te control signal, provided te message is time stamped Controller-to-actator delay is different; owever, in tat te controller does not know ow long it will take te control signal to reac te actator, terefore, no exact correction can be made at te time of control calclation A simlation scenario was developed sing TreTime software, wic is a Matlab/Simlink toolbox to simlate distribted real-time control systems In te simlation, te data sent from sensor to controller were time stamped tere by giving an estimate of te sensor-to-controller delay Since time stamping does not compensate controller-to-actator delay, sing different delay estimation tecniqe and algoritm to compensate tis delay will obviosly prodce even better reslts 21
26 LIST OF REFERENCES 22
27 [1] W Zang, MS Branicky, SM Pilips, Stability of Networked Control Systems, IEEE Control System Magazine, Febrary 21 [2] AS Tanenbam, Compter Networks, 3 rd ed Upper Englewood Cliffs, NJ: Prentice-Hall, 1996 [3] GC Wals, H Ye, LG Bsnell, Stability Analysis of Networked Control Systems, IEEE Transactions on Control Systems tecnology, Vol 1, No 3, May 22 [4] GC Wals, H Ye, Scedling of Networked Control Systems, IEEE Transactions on Control Systems tecnology, Vol 21, No 1, Febrary 21 [5] M Anderson, D Henriksson, A Cervin, TreTime 13-Reference Manal, Department of Atomatic Control, Lnd Institte of Tecnology, Jne 25 23
X-Conference: Reinventing a Teleconferencing System
X-Conference: Reinventing a Teleconferencing System by Xin Wang Sbmitted to te Program in Media Arts and Sciences, Scool of Arcitectre and Planning, in partial flfillment of te reqirements for te degree
More informationMaster for Co-Simulation Using FMI
Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany
More informationThe Disciplined Flood Protocol in Sensor Networks
The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab
More informationCAPL Scripting Quickstart
CAPL Scripting Qickstart CAPL (Commnication Access Programming Langage) For CANalyzer and CANoe V1.01 2015-12-03 Agenda Important information before getting started 3 Visal Seqencer (GUI based programming
More informationOn the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing
1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity
More informationTDT4255 Friday the 21st of October. Real world examples of pipelining? How does pipelining influence instruction
Review Friday the 2st of October Real world eamples of pipelining? How does pipelining pp inflence instrction latency? How does pipelining inflence instrction throghpt? What are the three types of hazard
More informationAn Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast
University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna
More informationNetworks An introduction to microcomputer networking concepts
Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES
More informationChapter 6: Pipelining
CSE 322 COPUTER ARCHITECTURE II Chapter 6: Pipelining Chapter 6: Pipelining Febrary 10, 2000 1 Clothes Washing CSE 322 COPUTER ARCHITECTURE II The Assembly Line Accmlate dirty clothes in hamper Place in
More informationSection 2.3: Calculating Limits using the Limit Laws
Section 2.3: Calculating Limits using te Limit Laws In previous sections, we used graps and numerics to approimate te value of a it if it eists. Te problem wit tis owever is tat it does not always give
More informationTdb: A Source-level Debugger for Dynamically Translated Programs
Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,
More informationOptimal In-Network Packet Aggregation Policy for Maximum Information Freshness
1 Optimal In-etwork Packet Aggregation Policy for Maimum Information Fresness Alper Sinan Akyurek, Tajana Simunic Rosing Electrical and Computer Engineering, University of California, San Diego aakyurek@ucsd.edu,
More informationMaking Full Use of Multi-Core ECUs with AUTOSAR Basic Software Distribution
Making Fll Use of Mlti-Core ECUs with AUTOSAR Basic Software Distribtion Webinar V0.1 2018-09-07 Agenda Motivation for Mlti-Core AUTOSAR Standard: SWC-Split MICROSAR Extension: BSW-Split BSW-Split: Technical
More informationREPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips
REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands
More informationResolving Linkage Anomalies in Extracted Software System Models
Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program
More informationEMC ViPR. User Guide. Version
EMC ViPR Version 1.1.0 User Gide 302-000-481 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is accrate
More informationEXAMINATIONS 2010 END OF YEAR NWEN 242 COMPUTER ORGANIZATION
EXAINATIONS 2010 END OF YEAR COPUTER ORGANIZATION Time Allowed: 3 Hors (180 mintes) Instrctions: Answer all qestions. ake sre yor answers are clear and to the point. Calclators and paper foreign langage
More informationThe single-cycle design from last time
lticycle path Last time we saw a single-cycle path and control nit for or simple IPS-based instrction set. A mlticycle processor fies some shortcomings in the single-cycle CPU. Faster instrctions are not
More information2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically
2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use
More informationIN a recent paper [1], a class of number representations
8 IEEE TRANSACTIONS ON COMPUTERS, VOL. 60, NO., FEBRUARY 011 Performing Aritmetic Operations on Rond-to-Nearest Representations Peter Kornerp, Member, IEEE, Jean-MicelMller,Senior Member, IEEE, andadrienpanalex
More informationIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY 2007 1 On the Analysis of the Bletooth Time Division Dplex Mechanism Gil Zssman Member, IEEE, Adrian Segall Fellow, IEEE, and Uri Yechiali
More informationLecture 13: Traffic Engineering
Lectre 13: Traffic Engineering CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Mike Freedman, Nick Feamster, and Ming Zhang Lectre 13 Overview Dealing with mltiple paths Mltihoming Entact
More informationCost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks
Cost Based Local Forwarding Transmission Schemes for Two-hop Celllar Networks Zhenggang Zhao, Xming Fang, Yan Long, Xiaopeng H, Ye Zhao Key Lab of Information Coding & Transmission Sothwest Jiaotong University,
More informationEvaluating Influence Diagrams
Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will
More informationPROGRAM LICENSE AGREEMENT LIMITED WARRANTY... 4 Trademarks Contents Preface... 11
. Contents PROGRAM LICENSE AGREEMENT... LIMITED WARRANTY... 4 Trademarks... 6. Contents... 8 Preface... 2. Overview... 3 2. Jst one other important thing... 3 2.2 Abot the ser manal... 4 2.3 Manal System
More informationMulti-lingual Multi-media Information Retrieval System
Mlti-lingal Mlti-media Information Retrieval System Shoji Mizobchi, Sankon Lee, Fmihiko Kawano, Tsyoshi Kobayashi, Takahiro Komats Gradate School of Engineering, University of Tokshima 2-1 Minamijosanjima,
More informationBounding Tree Cover Number and Positive Semidefinite Zero Forcing Number
Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various
More informationEEC 483 Computer Organization
EEC 483 Compter Organization Chapter 4.4 A Simple Implementation Scheme Chans Y The Big Pictre The Five Classic Components of a Compter Processor Control emory Inpt path Otpt path & Control 2 path and
More informationThe Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment
This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment
More informationMETAMODEL FOR SOFTWARE SOLUTIONS IN COMPUTED TOMOGRAPHY
VOL. 10, NO 22, DECEBER, 2015 ISSN 1819-6608 ETAODEL FOR SOFTWARE SOLUTIONS IN COPUTED TOOGRAPHY Vitaliy ezhyev Faclty of Compter Systems and Software Engineering, Universiti alaysia Pahang, Gambang, alaysia
More informationEXAMINATIONS 2003 END-YEAR COMP 203. Computer Organisation
EXAINATIONS 2003 COP203 END-YEAR Compter Organisation Time Allowed: 3 Hors (180 mintes) Instrctions: Answer all qestions. There are 180 possible marks on the eam. Calclators and foreign langage dictionaries
More informationNew Architectures for Hierarchical Predictive Control
Preprint, 11th IFAC Symposim on Dynamics and Control of Process Systems, inclding Biosystems Jne 6-8, 216. NTNU, Trondheim, Norway New Architectres for Hierarchical Predictive Control Victor M. Zavala
More informationAn Algorithm for Loopless Deflection in Photonic Packet-Switched Networks
An Algoritm for Loopless Deflection in Potonic Packet-Switced Networks Jason P. Jue Center for Advanced Telecommunications Systems and Services Te University of Texas at Dallas Ricardson, TX 75083-0688
More informationEfficient Implementation of Binary Trees in LISP Systems
Efficient Implementation of Binary Trees in LISP Systems P. SIPALA Dipartimento di Eleltrotecnica, Eleltronica, Informatica, Universitd di Trieste, Italy In this paper, I consider how to implement the
More informationThe extra single-cycle adders
lticycle Datapath As an added bons, we can eliminate some of the etra hardware from the single-cycle path. We will restrict orselves to sing each fnctional nit once per cycle, jst like before. Bt since
More informationdss-ip Manual digitalstrom Server-IP Operation & Settings
dss-ip digitalstrom Server-IP Manal Operation & Settings Table of Contents digitalstrom Table of Contents 1 Fnction and Intended Use... 3 1.1 Setting p, Calling p and Operating... 3 1.2 Reqirements...
More informationThe final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.
The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5
More informationUncertainty Determination for Dimensional Measurements with Computed Tomography
Uncertainty Determination for Dimensional Measrements with Compted Tomography Kim Kiekens 1,, Tan Ye 1,, Frank Welkenhyzen, Jean-Pierre Krth, Wim Dewlf 1, 1 Grop T even University College, KU even Association
More informationInteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN:
Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: 1137-3601 revista@aepia.org Asociación Española para la Inteligencia Artificial España Zaballos, Lis J.; Henning, Gabriela
More informationReview Multicycle: What is Happening. Controlling The Multicycle Design
Review lticycle: What is Happening Reslt Zero Op SrcA SrcB Registers Reg Address emory em Data Sign etend Shift left Sorce A B Ot [-6] [5-] [-6] [5-] [5-] Instrction emory IR RegDst emtoreg IorD em em
More informationMULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS
ULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS Nimmagadda Calamaia æ Dept. of CSE JNTU College of Engineering Kakinada, India 533 003. calm@cse.iitkgp.ernet.in Badrinat Ramamurty y Dept.
More informationPavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003
From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information
More informationCESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm
Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer
More informationTopic Continuity for Web Document Categorization and Ranking
Topic Continity for Web ocment Categorization and Ranking B. L. Narayan, C. A. Mrthy and Sankar. Pal Machine Intelligence Unit, Indian Statistical Institte, 03, B. T. Road, olkata - 70008, India. E-mail:
More informationCautionary Aspects of Cross Layer Design: Context, Architecture and Interactions
Cationary Aspects of Cross Layer Design: Context, Architectre and Interactions Vikas Kawadia and P. R. Kmar Dept. of Electrical and Compter Engineering, and Coordinated Science Lab University of Illinois,
More informationA UPnP-based Decentralized Service Discovery Improved Algorithm
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol.1, No.1, Marc 2013, pp. 21~26 ISSN: 2089-3272 21 A UPnP-based Decentralized Service Discovery Improved Algoritm Yu Si-cai*, Wu Yan-zi,
More informationDistributed and Optimal Rate Allocation in Application-Layer Multicast
Distributed and Optimal Rate Allocation in Application-Layer Multicast Jinyao Yan, Martin May, Bernard Plattner, Wolfgang Mülbauer Computer Engineering and Networks Laboratory, ETH Zuric, CH-8092, Switzerland
More informationCS 153 Design of Operating Systems Spring 18
CS 153 Design of Operating Systems Spring 18 Lectre 11: Semaphores Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Last time Worked throgh software implementation
More information5 Performance Evaluation
5 Performance Evalation his chapter evalates the performance of the compared to the MIP, and FMIP individal performances. We stdy the packet loss and the latency to restore the downstream and pstream of
More informationSwitched state-feedback controllers with multi-estimators for MIMO systems
Proceedings of the th WEA Int Conf on COMPUTATIONAL INTELLIGENCE MAN-MACHINE YTEM AND CYBERNETIC Venice Ital November - 6 89 witched state-feedback controllers with mlti-estimators for MIMO sstems LIBOR
More informationUnit Testing with VectorCAST and AUTOSAR
Unit Testing with VectorCAST and AUTOSAR Vector TechDay Software Testing with VectorCAST V1.0 2018-11-15 Agenda Introdction Unit Testing Demo Working with AUTOSAR Generated Code Unit Testing AUTOSAR SWCs
More informationReview. A single-cycle MIPS processor
Review If three instrctions have opcodes, 7 and 5 are they all of the same type? If we were to add an instrction to IPS of the form OD $t, $t2, $t3, which performs $t = $t2 OD $t3, what wold be its opcode?
More informationMethod to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot
Method to bild an initial adaptive Nero-Fzzy controller for joints control of a legged robot J-C Habmremyi, P. ool and Y. Badoin Royal Military Academy-Free University of Brssels 08 Hobbema str, box:mrm,
More informationwebinar series
Ethernet@Atomotive webinar series Moving Forward: Tool Spported Development for Atomotive Ethernet in Time Sensitive Networks V1.06 2016-07-04 Agenda Introdction 3 Recap: Physical layers, network topology
More informationIsilon InsightIQ. Version 2.5. User Guide
Isilon InsightIQ Version 2.5 User Gide Pblished March, 2014 Copyright 2010-2014 EMC Corporation. All rights reserved. EMC believes the information in this pblication is accrate as of its pblication date.
More informationIP Multicast Fault Recovery in PIM over OSPF
1 IP Mlticast Falt Recovery in PIM over OSPF Abstract Relatively little attention has been given to nderstanding the falt recovery characteristics and performance tning of native IP mlticast networks.
More informationOptimal Sampling in Compressed Sensing
Optimal Sampling in Compressed Sensing Joyita Dtta Introdction Compressed sensing allows s to recover objects reasonably well from highly ndersampled data, in spite of violating the Nyqist criterion. In
More informationCANoe/CANalyzer New Features
CANoe/CANalyzer New Featres Version 11.0 V1.0 2018-04-10 Agenda Release Information General Diagnostics Testing (CANoe only) VT System AMD/XCP (CANoe only) Scope Sensor CAN / CAN FD Ethernet LIN Car2x
More informationA Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks
Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,
More informationLecture 14: Congestion Control
Lectre 14: Congestion Control CSE 222A: Compter Commnication Networks George Porter Thanks: Amin Vahdat, Dina Katabi Lectre 14 Overview TCP congestion control review XCP Overview CSE 222A Lectre 14: Congestion
More informationTu P7 15 First-arrival Traveltime Tomography with Modified Total Variation Regularization
T P7 15 First-arrival Traveltime Tomography with Modified Total Variation Reglarization W. Jiang* (University of Science and Technology of China) & J. Zhang (University of Science and Technology of China)
More informationEfficient and Accurate Delaunay Triangulation Protocols under Churn
Efficient and Accrate Delanay Trianglation Protocols nder Chrn Dong-Yong Lee and Simon S. Lam Department of Compter Sciences The University of Texas at Astin {dylee, lam}@cs.texas.ed November 9, 2007 Technical
More informationEMC VNX Series. Problem Resolution Roadmap for VNX with ESRS for VNX and Connect Home. Version VNX1, VNX2 P/N REV. 03
EMC VNX Series Version VNX1, VNX2 Problem Resoltion Roadmap for VNX with ESRS for VNX and Connect Home P/N 300-014-335 REV. 03 Copyright 2012-2014 EMC Corporation. All rights reserved. Pblished in USA.
More informationComputer-Aided Mechanical Design Using Configuration Spaces
Compter-Aided Mechanical Design Using Configration Spaces Leo Joskowicz Institte of Compter Science The Hebrew University Jersalem 91904, Israel E-mail: josko@cs.hji.ac.il Elisha Sacks (corresponding athor)
More informationPOWER-OF-2 BOUNDARIES
Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of
More informationBias of Higher Order Predictive Interpolation for Sub-pixel Registration
Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz
More informationImage Compression Compression Fundamentals
Compression Fndamentals Data compression refers to the process of redcing the amont of data reqired to represent given qantity of information. Note that data and information are not the same. Data refers
More information4.2 The Derivative. f(x + h) f(x) lim
4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially
More informationContinuity Smooth Path Planning Using Cubic Polynomial Interpolation with Membership Function
J Electr Eng Technol Vol., No.?: 74-?, 5 http://dx.doi.org/.537/jeet.5..?.74 ISSN(Print) 975- ISSN(Online) 93-743 Continity Smooth Path Planning Using Cbic Polomial Interpolation with Membership Fnction
More informationVessel Tracking for Retina Images Based on Fuzzy Ant Colony Algorithm
Vessel Tracking for Retina Images Based on Fzzy Ant Colony Algorithm Sina Hooshyar a, Rasol Khayati b and Reza Rezai c a,b,c Department of Biomedical Engineering, Engineering Faclty, Shahed University,
More informationLecture 10. Diffraction. incident
1 Introdction Lectre 1 Diffraction It is qite often the case that no line-of-sight path exists between a cell phone and a basestation. In other words there are no basestations that the cstomer can see
More informationMaximum Weight Independent Sets in an Infinite Plane
Maximm Weight Independent Sets in an Infinite Plane Jarno Nosiainen, Jorma Virtamo, Pasi Lassila jarno.nosiainen@tkk.fi, jorma.virtamo@tkk.fi, pasi.lassila@tkk.fi Department of Commnications and Networking
More informationIllumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY
Illmina LIMS Software Gide Jne 2017 ILLUMINA PROPRIETARY This docment and its contents are proprietary to Illmina, Inc. and its affiliates ("Illmina"), and are intended solely for the contractal se of
More informationToday s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of
Today s Lectre Lectre 27: Introdction to Software Architectre Kenneth M. Anderson Fondations of Software Engineering CSCI 5828 - Spring Semester, 1999 Introdction and Backgrond of Software Architectre
More informationChapter 5 Network Layer
Chapter Network Layer Network layer Physical layer: moe bit seqence between two adjacent nodes Data link: reliable transmission between two adjacent nodes Network: gides packets from the sorce to destination,
More informationMore on Functions and Their Graphs
More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in
More informationCongestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems
Congestion-adaptive Data Collection with Accracy Garantee in Cyber-Physical Systems Nematollah Iri, Lei Y, Haiying Shen, Gregori Calfield Department of Electrical and Compter Engineering, Clemson University,
More informationMaximal Cliques in Unit Disk Graphs: Polynomial Approximation
Maximal Cliqes in Unit Disk Graphs: Polynomial Approximation Rajarshi Gpta, Jean Walrand, Oliier Goldschmidt 2 Department of Electrical Engineering and Compter Science Uniersity of California, Berkeley,
More informationSLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS. Hewlett-Packard Company East Mission Avenue. Bogazici University
SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS Sanuj V. Sarin 1, Hakan Delic 2 and Jung H. Kim 3 1 Hewlett-Packard Company 24001 East Mission Avenue Spokane, Wasington 99109, USA 2 Signal
More informationNETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS
ETWORK PRESERVATIO THROUGH A TOPOLOGY COTROL ALGORITHM FOR WIRELESS MESH ETWORKS F. O. Aron, T. O. Olwal, A. Krien, Y. Hamam Tshwane University of Technology, Pretoria, Soth Africa. Dept of the French
More informationFast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation
P R E P R N T CPWS XV Berlin, September 8, 008 Fast Calculation of Termodynamic Properties of Water and Steam in Process Modelling using Spline nterpolation Mattias Kunick a, Hans-Joacim Kretzscmar a,
More informationReal-Time Wireless Routing for Industrial Internet of Things
Real-Time Wireless Routing for Industrial Internet of Tings Cengjie Wu, Dolvara Gunatilaka, Mo Sa, Cenyang Lu Cyber-Pysical Systems Laboratory, Wasington University in St. Louis Department of Computer
More informationA sufficient condition for spiral cone beam long object imaging via backprojection
A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral
More informationAn Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng
An ffective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Ciming Huang and ei-heng Ceng 5 De c e mbe r0 International Journal of Advanced Information Tecnologies (IJAIT),
More information4.1 Tangent Lines. y 2 y 1 = y 2 y 1
41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange
More informationStaCo: Stackelberg-based Coverage Approach in Robotic Swarms
Maastricht University Department of Knowledge Engineering Technical Report No.:... : Stackelberg-based Coverage Approach in Robotic Swarms Kateřina Staňková, Bijan Ranjbar-Sahraei, Gerhard Weiss, Karl
More informationRequirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems
Reqirements Engineering Objectives An introdction to reqirements Gerald Kotonya and Ian Sommerville To introdce the notion of system reqirements and the reqirements process. To explain how reqirements
More informationCS 153 Design of Operating Systems
CS 153 Design of Operating Systems Spring 18 Lectre 3: OS model and Architectral Spport Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Last time/today
More information4.13 Advanced Topic: An Introduction to Digital Design Using a Hardware Design Language 345.e1
.3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage 35.e.3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage to Describe and odel a Pipeline
More informationQoS-driven Runtime Adaptation of Service Oriented Architectures
Qo-driven Rntime Adaptation of ervice Oriented Architectres Valeria ardellini 1 Emiliano asalicchio 1 Vincenzo Grassi 1 Francesco Lo Presti 1 Raffaela Mirandola 2 1 Dipartimento di Informatica, istemi
More informationLecture 17: Wireless Networking
Lectre 17: 802.11 Wireless Networking CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Lili Qi, Nitin Vaidya Lectre 17 Overview Project discssion Intro to 802.11 WiFi Jigsaw discssion CSE
More informationFault Tolerance in Hypercubes
Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different
More informationVirtuOS: an operating system with kernel virtualization
VirtOS: an operating system with kernel virtalization Rslan Nikolaev, Godmar Back SOSP '13 Proceedings of the Twenty-Forth ACM Symposim on Oper ating Systems Principles 이영석, 신현호, 박재완 Index Motivation Design
More informationHardware Design Tips. Outline
Hardware Design Tips EE 36 University of Hawaii EE 36 Fall 23 University of Hawaii Otline Verilog: some sbleties Simlators Test Benching Implementing the IPS Actally a simplified 6 bit version EE 36 Fall
More informationPARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT
PAAMETE OPTIMIZATION FO TAKAGI-SUGENO FUZZY MODELS LESSONS LEANT Manfred Männle Inst. for Compter Design and Falt Tolerance Univ. of Karlsrhe, 768 Karlsrhe, Germany maennle@compter.org Brokat Technologies
More informationAbstract 1 Introduction
Combining Relevance Information in a Synchronos Collaborative Information Retrieval Environment Colm Foley, Alan F. Smeaton and Gareth J. F. Jones Centre for Digital Video Processing and Adaptive Information
More informationMillimeter-Wave Multi-Hop Wireless Backhauling for 5G Cellular Networks
2017 IEEE 85th Vehiclar Technology Conference (VTC-Spring) Millimeter-Wave Mlti-Hop Wireless Backhaling for 5G Celllar Networks B. P. S. Sahoo, Chn-Han Yao, and Hng-Y Wei Gradate Institte of Electrical
More informationIntra- and Inter-Session Network Coding in Wireless Networks
Intra- and Inter-Session Network Coding in Wireless Networks Hulya Seferoglu, Member, IEEE, Atina Markopoulou, Member, IEEE, K K Ramakrisnan, Fellow, IEEE arxiv:857v [csni] 3 Feb Abstract In tis paper,
More informationComputer Architecture Chapter 5. Fall 2005 Department of Computer Science Kent State University
Compter Architectre Chapter 5 Fall 25 Department of Compter Science Kent State University The Processor: Datapath & Control Or implementation of the MIPS is simplified memory-reference instrctions: lw,
More informationUtilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks
Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Okan Yilmaz and Ing-Ray Cen Computer Science Department Virginia Tec {oyilmaz, ircen}@vt.edu
More information