Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN

Size: px
Start display at page:

Download "Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN"

Transcription

1 Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan Bi, Qiubo Xu No Troops of PLA Luoyang, hina Abstract Delay Tolerant Networks are characterized by interittent connectivity, long delays and often constrained bandwidth. Delay Tolerant Networks often use ulti-copy routing schees for essage transission. Multi-copy routing schees, such as Epideic Routing, usually lead to congestion probles. In this paper, we propose an Adaptive Paraeter Estiation based congestion Avoidance strategy () for Delay Tolerant Networks. The strategy includes buffer anageent policy and packet receiving policy. The buffer anageent policy is designed for iproving the delivery ratio, and the packet receiving policy is designed for reducing the network overhead. The siulation results show that the strategy significantly iproves the delivery ratio and reduces the network overhead, copared to the default Drop-First- Received strategy. Keywords-DTN; congestion avoidance; buffer anageent; packet dropping policy I. INTRODUTION Delay Tolerant Networks (DTNs) [] are characterized by interittent connectivity, long delays and often constrained bandwidth. DTNs represent a broad class of networks such as interplanetary internets, under water sensor networks, and vehicular networks. The characteristics ake routing and congestion control becoe challenges. Then, the DTNRG [] was created by the IRTF to research DTN, and a new protocol naed Bundle Protocol (BP) [3] was introduced to face the challenges. The BP includes a store and forward transfer echanis to eet these challenges. Many new technologies are studied in DTNs, such as new routing protocols, new congestion control strategies. DTNs often use ulti-copy routing schees for essage transission. Multi-copy routing schees, such as Epideic Routing [4], usually lead to congestion probles. So congestion control strategies can significantly iprove the overall perforance of DTNs. In this paper, we propose the Adaptive Paraeter Estiation based congestion Avoidance strategy () for DTNs. The strategy includes both buffer anageent policy and packet receiving policy. We ipleent the strategy in the siulator ONE [5] for evaluating its effects. The siulation uses Rando Way Point odel (RWP). The strategy is copared with the ost used (Drop the First Received packet in the buffer) strategy. To analyze the general perforance of the strategy, we evaluate four perforance etrics: delivery ratio, average latency, average hop count and overhead ratio. The siulation results show that the strategy significantly iproves the delivery ratio and reduces the network overhead. The rest part of this paper is organized as follows: section II presents the related works. In section III, we discuss the strategy. Section IV displays siulation results and analyzes the perforance of the strategy. Finally, we ake a short conclusion in section V. II. RELATED WORK The DTN characteristics ake routing and congestion control becoe challenges, such as interittent connectivity, long delays and often constrained bandwidth. DTNs often use ulti-copy routing schees for essage transission. These ulti-copy routing schees often lead to congestion probles, because there are too any copies in the network. Therefore, we need to study congestion control strategies to iprove the overall network perforance. There are about three categories of congestion control strategies in DTNs. The first category is congestion avoidance strategies. These strategies generally restraint the essage transission, to decrease the nuber of essage copies in the network. Paper [6] discusses a Token Based ongestion ontrol echanis. Network nodes ust possess a token in order to inject essages into the network. Tokens are initially uniforly distributed but thereafter ove randoly throughout the network. This echanis results in a reduction in the aount of network transit ties. In paper [7], the authors propose a new congestion avoidance echanis based on path avoidance for DTN. The echanis optiizes the anageent of node storage and divides the node state into noral state, congestion adjacent state, congestion state. Based on different node states, separate strategy is eployed correspondingly to avoiding congestion. The second category is flow control strategies. These strategies generally restraint the essage flow between neighbors. In paper [8], a hop-by-hop Local Flow ontrol over InterPlaNetary networks (IPN) is discussed. Its ain contribution is the introduction of an asynchronous congestion control echanis on the network that not presented in the traditional DTN protocol. Through the hopby-hop local flow control, this echanis tries to resolve buffer overflow, link saturation and useless retransission probles in order to better utilize the overall syste. The third category is buffer anageent strategies. When the network becoes congested, different buffer scheduling strategies are deployed for iproving the overall perforance. In paper [9], authors propose an optial joint scheduling and drop policy. This policy ais to optiize

2 Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) different perforance etrics, such as the average delivery rate and the average delivery delay. Paper [] introduces a novel congestion control strategy, called average forwarding nuber based on epideic routing (AFNER). According to the forwarding nuber queue, the strategy deterines the packet forwarding sequence. In this paper, our strategy includes both buffer anageent policy and packet receiving policy. The buffer anageent policy is designed for iproving the delivery ratio, and the packet receiving policy for reducing the network overhead. III. THE DESIGN OF THE STRATEGY In Delay Tolerant Networks, the average latency of network and average hop count are both finite and each is around soe value. Thus, when the network becoes congested, we consider dropping packets with ore hops and larger latency first. This is the idea of the buffer anageent policy. But this policy usually cannot observably reduce the network overhead, so we develop the packet receiving policy for reducing ost useless transission in the network. Packets with ore hops and larger latency will be received in very low probability. The buffer anageent policy and the packet receiving policy for our strategy. A. The Buffer Manageent Policy As entioned above, when the network becoes congested, we consider dropping packets with ore hops and larger latency first. We use the inforation contained in the node itself to estiate the average latency and the average hop count of network. Then, we use the estiation values to calculate the priority weight of each packet. Packets with ore hops and larger latency correspond to saller priority weights. When the network becoes congested, we drop the packet with sallest priority weight first. For node i in the network, i is the nuber of packets in its buffer, T ij is the living tie of packet j in node i, and H ij is the hop count of packet j in node i. The estiation values and the priority weight are calculated as follows: ) The average latency estiation i T= i Tij () i j= is the latency estiation constant, usually ~4. ) The average hop count estiation i H= i Hij () i j= is the hop count estiation constant, usually ~4. 3) The priority weight function for node i Wi = α exp( Tplt /( Ti)) (3) + ( α) exp( H / H ) p ni i α is the latency ter coefficient, α (,). T plt is the current packet living tie. H p is the current packet hop count. ni is the estiation for the average nuber of neighbor nodes. According to [], for an Ad Hoc network with N nodes, the average hop count is usually around N, and the average nuber of neighbor nodes is around ln( N ). Thus, we get the estiation for ni : ni = ln( H i) (4) The coefficients, and α do affect the perforance of. These coefficients can be set to different values for different scenarios. Usually, we set =.5, =.5 and α =.5, if there is no special request. Though the forulas, we can find that the calculating process just use the inforation contained in the node itself, so this policy can be deployed in various scenarios. B. The Packet Receiving Policy The buffer anageent policy usually cannot observably reduce the network overhead, so we develop the packet receiving policy for reducing ost useless transission in the network. Packets with ore hops and larger latency, which correspond to saller priority weights, will be received in lower probability. Thus, the packet receiving policy directly reduces the network traffic. The designed packet receiving policy is described as follows: ) If the buffer using rate is lower than r t (< r t <), we consider that the network is not in the congestion state, and there is nothing ore to do. ) If the buffer using rate equals to r t or is larger than r t, we consider that the network is in the congestion state. If the destination of the coing packet is the current node, this packet ust be received. 3) If the buffer using rate equals to r t or is larger than r t, we consider that the network is in the congestion state. If the destination of the coing packet is not the current node, The following echanis will work: We calculate the average priority weight W AVG and the axial priority weight W in the current node. Then we MAX calculate the priority weight W of the coing packet (in the W calculation, the hop count H p plus ). We copare W with W and AVG W : MAX a) if W < W, the current node will refuse to AVG receive the coing packet; b) if W > W, the current node ust receive the MAX coing packet; c) if W AVG W W MAX, the current node will receive the coing packet in probability p:

3 Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) W WAVG p = (5) WMAX WAVG When receiving the new packet, if there is not enough free space for the new packet, the current node will free enough space according to the buffer anageent policy. Usually, r t has little effect on the network perforance, and it is suitable to set r t =.8. Notice that, in step 3), when W < W AVG, the current node will refuse to receive the coing packet. This eans, when the network is in the congestion state, this policy will at least reduce half of the network traffic. This is designed for ulti-copy routing schees. Because there are ultiple copies of packets in the network, reducing half of the network traffic will not reduce the delivery ratio. ontrarily, it will help iproving the delivery ratio when in congestion state. IV. SIMULATION RESULTS AND ANALYSIS The ONE siulator is used for our siulation. We eploy Epideic Routing protocol to do the siulation. In the results of the siulation, we focus on delivery ratio, average latency, average hop count and overhead ratio. The delivery ratio and overhead ratio are defined as follows: delivery_ratio = delivered / created (6) overhead_ratio = (relayed-delivered)/delivered (7) The delivered is the nuber of packets received by destination nodes. The created is the nuber of packets created by source nodes. The relayed is the total nuber of packets relayed in the network. The average latency is average End-to-End latency of delivered packets, and the average hop count is the average hop count of delivered packets too. There are two scenarios in our siulation. The first scenario is the Ad Hoc scenario. There is only one group of nodes in the Ad Hoc scenario. The settings of every node are the sae. The second scenario is the city scenario. This scenario siulates the Helsinki city. There are six groups of nodes in the scenario. Different settings are deployed for different groups. In the following experients, we set =.5, =.5, α =.5, and r t =.8. A. The Ad Hoc Scenario In this scenario, we assue that all the nodes are with the sae counication ranges, and when every two nodes are in counication range, they can setup the connection, and stop transferring when they are out of counication range. There are ten rounds in the siulation. The node buffer size is MB for the first round and MB for the second round, and so on. The concrete paraeter settings are list in table I. Transission range Message size Message TTL Routing protocol Scenario size 5 Nuber of nodes 5 Siulation tie Message creation interval ~5 KB 6in Epideic Routing h One new essage every 8 to s We copare the strategy with the ost used strategy. The experient results in the Ad Hoc scenario are shown as follows: Delivery ratio Figure. Delivery ratio perforance in the Ad Hoc scenario Fro Figure, we can find that our strategy significantly iproves the delivery ratio. opared to the strategy, the average iproveent of the delivery ratio of the strategy is around 77%. When the buffer size is 4MB, copared to the strategy, the best iproveent of the delivery ratio of the strategy is about 94%. These results are ainly because is based on better buffer anageent policy and better packet receiving policy. TABLE I. SETTINGS OF THE AD HO SENARIO Node speed Transission speed.5~.5/s 5KB/s

4 Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Average latency (s) Figure. Average latency perforance in the Ad Hoc scenario Fro Figure, we can find that the average latency perforance of the strategy is siilar to the strategy. The average latency perforance of the strategy is not good enough, because the latency estiation value in forula () is not stable. When the siulation tie increases, even if there is no transission in the network for a while, the latency estiation value in forula () increases too, so the average latency perforance of the strategy is not very well. Average hop count Figure 3. Average hop count perforance in the Ad Hoc scenario Fro Figure 3, we can find that the average hop count perforance of the strategy is better than the strategy. This is because the strategy drops packets with ore hops and larger latency first. The hop count estiation value in forula () is unlike the latency estiation value. If there is no transission in the network for a while, the hop count estiation value will not change. Overhead ratio Figure 4. Overhead ratio perforance in the Ad Hoc scenario Fro Figure 4, we can find that the strategy gains lesser overhead ratio, copared to the strategy. The overhead ratio of the strategy is around, and the overhead ratio of the strategy is around. The overhead ratio perforance of the strategy is very good, because the packet receiving policy of the strategy reduces ost useless transission in the network. The strategy akes nodes just receive eaningful packets, which are with less hops and lower latency. These experient results in the Ad Hoc scenario show that: the strategy significantly iproves the delivery ratio and reduces the overhead ratio, copared to the strategy. The average hop count perforance of is good, but the average latency perforance of is not very well. B. The ity Scenario The city scenario is totally the default scenario in the ONE siulator. The city scenario is ore coplex than the Ad Hoc scenario. The city scenario siulates the Helsinki city. There are six groups of nodes in the network. Pedestrians (group and group 3) can ove anywhere in the ap, but cars (group ) can only ove on roads. There are three groups of tras in the city scenario, group 4 is with broadcast interfaces, and group 5 and group 6 are noral. Most of the nodes in the network are pedestrians and cars. There are ten rounds in the siulation. For group, group and group 3, the node buffer size is MB for the first round and MB for the second round, and so on. For the groups of tras, the node buffer size is always 5MB. The concrete paraeter settings are list in table II. Node speed TABLE II. SETTINGS OF THE ITY SENARIO Group :.5~.5/s, 4 pedestrians Group :.7 /s ~3.9 /s, 4 cars only on roads Group 3:.5 /s ~.5/s, 4 pedestrians Group 4: 7 /s ~ /s, tras with broadcast interfaces 3

5 Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Group 5: 7 /s ~ /s, tras Group 6: 7 /s ~ /s, tras Transission speed 5KB/s (MB/s for group 4) Transission range ( for group 4) Message size Message TTL Routing protocol Scenario size Nuber of nodes 6 Siulation tie Message creation interval 5KB ~ MB 3in Epideic Routing h One new essage every 5 to 35s We copare the strategy with the ost used strategy. The experient results in the city scenario are shown as follows: Delivery ratio Average latency (s) Figure 6. Average latency perforance in the city scenario Fro Figure 6, we can find that the average latency perforance of the strategy is siilar to the strategy. The average latency perforance of the strategy is not good enough, because the latency estiation value in forula () is not stable. When the siulation tie increases, even if there is no transission in the network for a while, the latency estiation value in forula () increases too, so the average latency perforance of the strategy is not very well. 6.. Figure 5. Delivery ratio perforance in the city scenario Fro Figure 5, we can find that, when the buffer size becoes larger, our strategy significantly iproves the delivery ratio. opared to the strategy, the average iproveent of the delivery ratio of the strategy is around 86%. When the buffer size is 5MB, copared to the strategy, the best iproveent of the delivery ratio of the strategy is about 3%. These results are ainly because is based on better buffer anageent policy and better packet receiving policy. When the buffer size is MB, the iproveent is not obvious, because there are so few packets (usually one or two) in the buffer to use for the latency estiation and the hop count estiation. When packets in the buffer are too few, the strategy will not work well. Average hop count Figure 7. Average hop count perforance in the city scenario Fro Figure 7, we can find that the average hop count perforance of the strategy is better than the strategy. This is because the strategy drops packets with ore hops and larger latency first. The hop count estiation value in forula () is unlike the latency estiation value. If there is no transission in the network for a while, the hop count estiation value will not change. 4

6 Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Overhead ratio Figure 8. Overhead ratio perforance in the city scenario Fro Figure 8, we can find that the strategy gains lesser overhead ratio, copared to the strategy. When the buffer size is MB, the strategy reduces about half of the overhead ratio. Because the packet receiving policy at least reduces half of the network traffic, even if the iproveent of delivery ratio is not obvious, still significantly reduces the overhead ratio. The overhead ratio perforance of the strategy is very good, because the packet receiving policy of the strategy reduces ost useless transission in the network. The strategy akes nodes just receive eaningful packets, which are with less hops and lower latency. These experient results in the city scenario show that: the strategy significantly iproves the delivery ratio and reduces the overhead ratio, copared to the strategy. But when there are too few packets in the buffer, the iproveent of delivery ratio of is not obvious. The average hop count perforance of is good, but the average latency perforance of is not very well. [4] A. Vahdat and D. Becker, Epideic routing for partially connected ad hoc networks, Technical Repor t S-6, Tech. Rep.,. [5] The Opportunistic Network Environent siulator hoepage [.6/.6], [6] E. oe,. Raghavendra, Token Based ongestion ontrol for DTNs, IEEE Aerospace onference, pp. 7, [7] Daowen Hua, Xuehui Du, Lifeng ao, Guoyu Xu, Yanbin Qian, A DTN congestion avoidance strategy based on path avoidance, nd International onference on Future oputer and ounication (IF), vol., pp , [8] F. De Rango, M. Tropea, G.B. Laratta, S. Marano, Hop-by-Hop Local Flow ontrol over InterPlaNetary Networks based on DTN Architecture, IEEE International onference on ounications, I '8, pp. 9 94, 8. [9] A. Krifa,. Barakat, T. Spyropoulos, An optial joint scheduling and drop policy for Delay Tolerant Networks, World of Wireless, Mobile and Multiedia Networks, pp: 6, 8. [] L. Yun,. Xinjian, L. Qilie, Y. Xiaohu, A Novel ongestion ontrol Strategy in Delay Tolerant Networks, Second International onference on Future Networks, IFN ', pp ,. [] P. Gupta, P.R. Kuar, The capacity of wireless networks, IEEE Transactions on Inforation Theory, pp , V. ONLUSION Delay Tolerant Networks often use ulti-copy routing schees for essage transission. Multi-copy routing schees, such as Epideic Routing, usually lead to congestion probles. In this paper, we present a new congestion avoidance strategy to solve congestion probles. The siulation results show that the strategy significantly iproves the delivery ratio and reduces the network overhead. The average hop count perforance of is good too. It is our future work to iprove the strategy for reducing the network latency. REFERENES [] K. Fall, A delay tolerant network architecture for challenged internets, in Proc. AM SIGOMM, pp.7-4, 3. [] DTN research group hoepage[.6/.6], [3] K. Scott, S. Burleigh, RF55: Bundle Protocol Specification, Noveber 7 5

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction Relocation of ateway for Enhanced Tieliness in Wireless Sensor Networks Keal Akkaya and Mohaed Younis Departent of oputer Science and Electrical Engineering University of Maryland, altiore ounty altiore,

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract

More information

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

Integrating fast mobility in the OLSR routing protocol

Integrating fast mobility in the OLSR routing protocol Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr

More information

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of

More information

Dynamical Topology Analysis of VANET Based on Complex Networks Theory

Dynamical Topology Analysis of VANET Based on Complex Networks Theory BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 14, Special Issue Sofia 014 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.478/cait-014-0053 Dynaical Topology Analysis

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS

COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS International Journal of Coputer Science and Counication Vol. 3, No. 1, January-June 2012, pp. 181-185 COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS A.H. Karode 1, S.R. Suralkar 2, Manoj Bagde

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION

DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION www.arpnjournals.co DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION N. Snehalatha 1 and Paul Rodrigues 2 1 School of Coputing, SRM University, Chennai, Tail Nadu, India 2 Departent

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information

Adaptive Holistic Scheduling for In-Network Sensor Query Processing

Adaptive Holistic Scheduling for In-Network Sensor Query Processing Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

Distributed Multicast Tree Construction in Wireless Sensor Networks

Distributed Multicast Tree Construction in Wireless Sensor Networks Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

Equation Based Congestion Control for Video Transmission over WCDMA Networks

Equation Based Congestion Control for Video Transmission over WCDMA Networks Equation Based Congestion Control for Video Transission over WCDMA Networks Antonios Alexiou, Diitrios Antonellis and Christos Bouras Research Acadeic Coputer Technology Institute, Greece and Coputer Engineering

More information

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Navodaya Garepalli Kartik Gopalan Ping Yang Coputer Science, Binghaton University (State University of New York) Contact:

More information

MAC schemes - Fixed-assignment schemes

MAC schemes - Fixed-assignment schemes MAC schees - Fixed-assignent schees M. Veeraraghavan, April 6, 04 Mediu Access Control (MAC) schees are echaniss for sharing a single link. MAC schees are essentially ultiplexing schees. For exaple, on

More information

The Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network

The Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network The Flaw Attack to the RTS/CTS Handshake Mechanis in Cluster-based Battlefield Self-organizing Network Zeao Zhao College of Counication Engineering, Hangzhou Dianzi University, Hangzhou 310018, China National

More information

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant

More information

Multipath Selection and Channel Assignment in Wireless Mesh Networks

Multipath Selection and Channel Assignment in Wireless Mesh Networks Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,

More information

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive and Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

A Network-based Seamless Handover Scheme for Multi-homed Devices

A Network-based Seamless Handover Scheme for Multi-homed Devices A Network-based Sealess Handover Schee for Multi-hoed Devices Md. Shohrab Hossain and Mohaed Atiquzzaan School of Coputer Science, University of Oklahoa, Noran, OK 7319 Eail: {shohrab, atiq}@ou.edu Abstract

More information

A Hybrid Network Architecture for File Transfers

A Hybrid Network Architecture for File Transfers JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,

More information

Redundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network

Redundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network (IJACSA) International Journal of Advanced Coputer Science and Applications Vol. 8, No. 1, 217 Redundancy Level Ipact of the Mean Tie to Failure on Wireless Sensor Network Alaa E. S. Ahed 1 College of

More information

Multi Packet Reception and Network Coding

Multi Packet Reception and Network Coding The 2010 Military Counications Conference - Unclassified Progra - etworking Protocols and Perforance Track Multi Packet Reception and etwork Coding Aran Rezaee Research Laboratory of Electronics Massachusetts

More information

Improve Peer Cooperation using Social Networks

Improve Peer Cooperation using Social Networks Iprove Peer Cooperation using Social Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Noveber 5, 2007 Corresponding

More information

Performance Analysis of Exposed Terminal Effect in IEEE Ad Hoc Networks in Finite Load Conditions

Performance Analysis of Exposed Terminal Effect in IEEE Ad Hoc Networks in Finite Load Conditions Perforance Analysis of Exposed Terinal Effect in IEEE 80.11 Ad Hoc Networks in Finite Load Conditions Diitris Vassis 1, Georgios Korentzas 1 1 Dept. of Inforation and Counication Systes Engineering University

More information

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao

More information

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles

More information

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design A Fast Multi-Obective Genetic Algorith for Hardware-Software Partitioning In Ebedded Syste Design 1 M.Jagadeeswari, 2 M.C.Bhuvaneswari 1 Research Scholar, P.S.G College of Technology, Coibatore, India

More information

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San

More information

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium 1 A Distributed Multi-service Resource Allocation Algorith in Heterogeneous Wireless Access Mediu Muhaad Isail, Student Meber, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract In this paper, radio resource

More information

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade

More information

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University

More information

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.5, Septeber 205 AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM Xie Yang and Cheng Wushan College of Mechanical Engineering,

More information

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage 216 IEEE 23rd International Conference on High Perforance Coputing A Low-Cost Multi-Failure Resilient Replication Schee for High Data Availability in Cloud Storage Jinwei Liu* and Haiying Shen *Departent

More information

BP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks

BP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks BP-MAC: A High Reliable Backoff Preable MAC Protocol for Wireless Sensor Networks Alexander Klein* Jirka Klaue Josef Schalk EADS Innovation Works, Gerany *Eail: klein@inforatik.uni-wuerzburg.de ABSTRACT:

More information

Collaborative Web Caching Based on Proxy Affinities

Collaborative Web Caching Based on Proxy Affinities Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA

More information

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS Evaluation of the Tiing Properties of Two Control Networs: CAN and PROFIBUS Max Mauro Dias Santos 1, Marcelo Ricardo Steer 2 and Francisco Vasques 3 1 UnilesteMG, CEP 35170-056, Coronel Fabriciano MG Brasil.

More information

Research Article A Game Theory Based Congestion Control Protocol for Wireless Personal Area Networks

Research Article A Game Theory Based Congestion Control Protocol for Wireless Personal Area Networks Journal of Sensors Volue 216, Article ID 61683, 13 pages http://dx.doi.org/1.11/216/61683 Research Article A Gae Theory Based Congestion Control Protocol for Wireless Personal Area Networks Chuang Ma,

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

Ravine Streams: Persistent Data Streams in Disruptive Sensor Networks

Ravine Streams: Persistent Data Streams in Disruptive Sensor Networks Ravine Streas: Persistent Data Streas in Disruptive Sensor Networks Mingsen Xu, Wen-Zhan Song Departent of Coputer Science, Georgia State University Atlanta, Georgia 333, USA Eail: {xu4@student.gsu.edu,

More information

On the Accuracy of MANET Simulators

On the Accuracy of MANET Simulators On the ccuracy of MNT Siulators avid avin david.cavin@epfl.ch Yoav Sasson yoav.sasson@epfl.ch istributed Systes Laboratory cole Polytechnique Fédérale de Lausanne (PFL) H-115 Lausanne ndré Schiper andre.schiper@epfl.ch

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

Relief shape inheritance and graphical editor for the landscape design

Relief shape inheritance and graphical editor for the landscape design Relief shape inheritance and graphical editor for the landscape design Egor A. Yusov Vadi E. Turlapov Nizhny Novgorod State University after N. I. Lobachevsky Nizhny Novgorod Russia yusov_egor@ail.ru vadi.turlapov@cs.vk.unn.ru

More information

ACNS: Adaptive Complementary Neighbor Selection in BitTorrent-like Applications

ACNS: Adaptive Complementary Neighbor Selection in BitTorrent-like Applications ACNS: Adaptive Copleentary Neighbor Selection in BitTorrent-like Applications Zhenbao Zhou 1, 2, Zhenyu Li 1, 2, Gaogang Xie 1 1 Institute of Coputing Technology, Chinese Acadey of Sciences, Beijing 100190,

More information

IN many interactive multimedia streaming applications, such

IN many interactive multimedia streaming applications, such 840 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 5, MAY 06 A Geoetric Approach to Server Selection for Interactive Video Streaing Yaochen Hu, Student Meber, IEEE, DiNiu, Meber, IEEE, and Zongpeng Li, Senior

More information

Data & Knowledge Engineering

Data & Knowledge Engineering Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID

More information

QoS and Sensible Routing Decisions

QoS and Sensible Routing Decisions QoS and Sensible Routing Decisions Erol Gelenbe Dept. of Electrical & Electronic Engineering Iperial College London SW7 2BT e.gelenbe@iperial.ac.uk Abstract Network Quality of Service (QoS) criteria of

More information

PERFORMANCE ANALYSIS OF THE UMTS SYSTEM FOR PACKET DATA TRANSFER OVER DEDICATED CHANNELS

PERFORMANCE ANALYSIS OF THE UMTS SYSTEM FOR PACKET DATA TRANSFER OVER DEDICATED CHANNELS PERFORMACE AALSIS OF THE MTS SSTEM FOR PACKET DATA TRASFER OVER DEDICATED CHAELS Manju Sarvagya, Ratna V. Raja Kuar Departent of Electronics and Electrical Counication Engineering Indian Institute of Technology,

More information

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

A Joint Replication-Migration-based Routing in Delay Tolerant Networks A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West

More information

A Periodic Dynamic Load Balancing Method

A Periodic Dynamic Load Balancing Method 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation

More information

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl. Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable

More information

Privacy-preserving String-Matching With PRAM Algorithms

Privacy-preserving String-Matching With PRAM Algorithms Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

Survivability Function A Measure of Disaster-Based Routing Performance

Survivability Function A Measure of Disaster-Based Routing Performance Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected

More information

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3 2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition

More information

End-to-end Quality Adaptation Scheme Based on QoE Prediction for Video Streaming Service in LTE Networks

End-to-end Quality Adaptation Scheme Based on QoE Prediction for Video Streaming Service in LTE Networks End-to-end Quality Adaptation Schee Based on QoE Prediction for Video Streaing Service in LTE etworks Huifang Chen 1,2 Xin Yu 1 Lei Xie 1,2 1 Dept. of Inforation Science and Electronic Engineering, Zhejiang

More information

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2 , pp.151-158 http://dx.doi.org/10.14257/ijfgcn.2014.7.1.15 Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey Namita Mehta 1 and Mehul Shah 2 1 Student, Department

More information

ELEN : Project Progress Report. Second Order Delay Computation for RC networks with Non-Tree Topology

ELEN : Project Progress Report. Second Order Delay Computation for RC networks with Non-Tree Topology ELEN 689-603: Project Progress eport Second Order Delay Coputation for C networks wi Non-Tree Topology ajeshwary Tayade 000 07 573 //003 PDF created wi pdffactory trial version www.pdffactory.co : Introduction

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada

More information

Reducing Crosspoint Buffers for Performance Guaranteed Asynchronous Crossbar Scheduling

Reducing Crosspoint Buffers for Performance Guaranteed Asynchronous Crossbar Scheduling educing Crosspoint Buffers for Perforance Guaranteed Asynchronous Crossbar Scheduling Masoueh Karii, Zhuo Sun, and Deng Pan Florida International University Eails: {kari001, zsun003, pand}@fiu.edu Abstract

More information

Feature Based Registration for Panoramic Image Generation

Feature Based Registration for Panoramic Image Generation IJCSI International Journal of Coputer Science Issues, Vol. 10, Issue 6, No, Noveber 013 www.ijcsi.org 13 Feature Based Registration for Panoraic Iage Generation Kawther Abbas Sallal 1, Abdul-Mone Saleh

More information

Medical Biophysics 302E/335G/ st1-07 page 1

Medical Biophysics 302E/335G/ st1-07 page 1 Medical Biophysics 302E/335G/500 20070109 st1-07 page 1 STEREOLOGICAL METHODS - CONCEPTS Upon copletion of this lesson, the student should be able to: -define the ter stereology -distinguish between quantitative

More information

Resource Optimization for Web Service Composition

Resource Optimization for Web Service Composition Resource Optiization for Web Coposition Xia Gao, Ravi Jain, Zulfikar Razan, Ulas Kozat Abstract coposition recently eerged as a costeffective way to quickly create new services within a network. Soe research

More information

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm roceedings of the 7th International Conference on Innovation & Manageent 893 Research on a Kind of QoS-Sensitive Seantic Web Services Coposition Method Based on Genetic Algorith Cao Hongjiang, Nie Guihua,

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

Efficient file search in non-dht P2P networks

Efficient file search in non-dht P2P networks Available online at www.sciencedirect.co Coputer Counications 3 (28) 34 37 www.elsevier.co/locate/coco Efficient file search in non-dht P2P networks Shiping Chen a, Zhan Zhang b, *, Shigang Chen b, Baile

More information

Hopcount in Application Layer Multicast Schemes

Hopcount in Application Layer Multicast Schemes 1 Hopcount in pplication Layer Multicast Schees Milena Janic, Novi Ineke epaka Wangi, Xiaoing Zhou and Piet Van Mieghe Delft University of Technology Faculty of Electrical Engineering, Matheatics and oputer

More information

Research on the Classification and Selection of Archive Texts with the Improved C4.5 Algorithm

Research on the Classification and Selection of Archive Texts with the Improved C4.5 Algorithm INTERNATIONAL JOURNAL OF IRUITS, SYSTEMS AND SIGNAL PROESSING Volue 2, 208 Research on the lassification and Selection of Archive Texts with the Iproved 4.5 Algorith Xianbin Lv Abstract In the age of inforation

More information

Real-Time Detection of Invisible Spreaders

Real-Time Detection of Invisible Spreaders Real-Tie Detection of Invisible Spreaders MyungKeun Yoon Shigang Chen Departent of Coputer & Inforation Science & Engineering University of Florida, Gainesville, FL 3, USA {yoon, sgchen}@cise.ufl.edu Abstract

More information

Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models

Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models 2016 7th International Conference on Intelligent Systems, Modelling and Simulation Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models Bhed Bahadur

More information

A Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems

A Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems A Low-cost Meory Architecture with XIP for Mobile Ebedded Systes Chanik Park, Jaeyu Seo, Sunghwan Bae, Hyojun Ki, Shinhan Ki and Busoo Ki Software Center, SAMSUNG Electronics, Co., Ltd. Seoul 135-893,

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

Deterministic Voting in Distributed Systems Using Error-Correcting Codes

Deterministic Voting in Distributed Systems Using Error-Correcting Codes IEEE TRASACTIOS O PARALLEL AD DISTRIBUTED SYSTEMS, VOL. 9, O. 8, AUGUST 1998 813 Deterinistic Voting in Distributed Systes Using Error-Correcting Codes Lihao Xu and Jehoshua Bruck, Senior Meber, IEEE Abstract

More information

Closing The Performance Gap between Causal Consistency and Eventual Consistency

Closing The Performance Gap between Causal Consistency and Eventual Consistency Closing The Perforance Gap between Causal Consistency and Eventual Consistency Jiaqing Du Călin Iorgulescu Aitabha Roy Willy Zwaenepoel EPFL ABSTRACT It is well known that causal consistency is ore expensive

More information

A Generic Architecture for Programmable Trac. Shaper for High Speed Networks. Krishnan K. Kailas y Ashok K. Agrawala z. fkrish,

A Generic Architecture for Programmable Trac. Shaper for High Speed Networks. Krishnan K. Kailas y Ashok K. Agrawala z. fkrish, A Generic Architecture for Prograable Trac Shaper for High Speed Networks Krishnan K. Kailas y Ashok K. Agrawala z fkrish, agrawalag@cs.ud.edu y Departent of Electrical Engineering z Departent of Coputer

More information

Verifying the structure and behavior in UML/OCL models using satisfiability solvers

Verifying the structure and behavior in UML/OCL models using satisfiability solvers IET Cyber-Physical Systes: Theory & Applications Review Article Verifying the structure and behavior in UML/OCL odels using satisfiability solvers ISSN 2398-3396 Received on 20th October 2016 Revised on

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networs F. Mousavi Madani Departent of coputer engineering Alzahra University Tehran, Iran, osavif@alzahra.ac.ir Received:

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

Modeling epidemic data diffusion for wireless mobile networks

Modeling epidemic data diffusion for wireless mobile networks WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Coun. Mob. Coput. (212) Published online in Wiley Online Library (wileyonlinelibrary.co)..2233 RESEARCH ARTICLE Modeling epideic data diffusion for wireless

More information

Implementation of fast motion estimation algorithms and comparison with full search method in H.264

Implementation of fast motion estimation algorithms and comparison with full search method in H.264 IJCSNS International Journal of Coputer Science and Network Security, VOL.8 No.3, March 2008 139 Ipleentation of fast otion estiation algoriths and coparison with full search ethod in H.264 A.Ahadi, M.M.Azadfar

More information

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University

More information

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We

More information

Identifying Converging Pairs of Nodes on a Budget

Identifying Converging Pairs of Nodes on a Budget Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering

More information

Routing Protocol Approaches in Delay Tolerant Networks

Routing Protocol Approaches in Delay Tolerant Networks Routing Protocol Approaches in Delay Tolerant Networks Shivi Shukla 1, Amit Munjal 2 and Y. N. Singh 2 AIM & ACT Dept., Banasthali Vidyapith, Rajasthan 1 EE Dept., Indian Institute of Technology, Kanpur

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information