Real-Time Wireless Routing for Industrial Internet of Things

Size: px
Start display at page:

Download "Real-Time Wireless Routing for Industrial Internet of Things"

Transcription

1 Real-Time Wireless Routing for Industrial Internet of Tings Cengjie Wu, Dolvara Gunatilaka, Mo Sa, Cenyang Lu Cyber-Pysical Systems Laboratory, Wasington University in St. Louis Department of Computer Science, State University of New York at Bingamton Abstract Wit te emergence of te Industrial Internet of Tings (IIoT), process industries ave started to adopt wireless sensor-actuator networks (WSANs) for control applications. It is crucial to acieve real-time communication in tis emerging class of networks, and routing as significant impacts on end-to-end communication delays in WSANs. However, despite considerable researc on real-time transmission sceduling and delay analysis for suc networks, real-time routing remains an open question for WSANs. Tis paper presents a conflict-aware real-time routing approac for WSANs, leveraging a key observation tat conflicts among transmissions involving a common field device can contribute significantly to communication delays in industrial WSANs, suc as WirelessHART networks. By incorporating conflict delays into te routing decisions, conflict-aware real-time routing algoritms allow a WSAN to accommodate more realtime flows wile meeting teir deadlines. Bot evaluations based on simulations and experiments on a pysical WSAN testbed sow tat conflict-aware real-time routing can lead to as muc as a tree-fold improvement in te real-time capacity of WSANs. I. INTRODUCTION Industrial networks connect sensors and actuators in te industrial facilities, suc as steel mills, oil refineries, and cemical plants, implementing complex monitoring and control processes. Te industrial Internet of Tings (IIoT) is a key enabling tecnology to realize te vision of Industry 4.. Wireless sensor-actuator networks (WSANs) provide an appealing solution to connect IIoT devices because tey require minimal infrastructure. Moreover, wireless modules can be used to easily and inexpensively retrofit existing sensors and actuators in industrial facilities, witout running cabling for communication and power [1]. Recent years ave witnessed world-wide deployment of WSANs implementing industrial standards, suc as WirelessHART [2] and ISA1.11a [3]. Feedback control loops for industrial automation impose stringent end-to-end delay requirements on data communication. To support a feedback control loop, te network periodically delivers data from sensors to a controller and ten delivers control commands to te actuators witin an end-toend deadline. Te effects of deadline misses in data communication may range from production inefficiency, equipment destruction, system failure for instability, to irreparable financial and environmental damage. Real-time communication in industrial WSANs is callenging due to teir limited bandwidt and multi-op mes topologies [1]. Furtermore, industrial standards, suc as WirelessHART and 6TiSCH [4] employ Time Slotted Cannel Hopping (TSCH), a TDMA-based MAC wit cannel opping, to acieve predictable and reliable communication. Endto-end communication delays in suc networks are affected by conflicts between transmissions involving a common device [5]. Because conflicting transmissions cannot be sceduled in a same time slot, transmission conflicts contribute significantly to te end-to-end communication delays of data flows. Recent studies demonstrated tat end-to-end delays of multi-op flows are eavily influenced by teir routes [6]. Wile real-time routing as received attention in te researc community, tere as been limited work on routing algoritms specifically designed for recent industrial WSAN standards. Moreover, tey generally ignore transmission conflicts in routing decisions, wic negatively affect te ability to meet te delay requirements of a large number of real-time flows. To meet tis open callenge, we propose conflict-aware routing, a novel approac to real-time routing in WirelessHART networks, a WSAN standard widely adopted in process industries. Te key novelty of conflict-aware routing is tat it incorporates transmission conflicts and sceduling into its routing decisions to improve real-time performance. Experiments on a pysical testbed and in numerical simulations sow tat conflict-aware routing can lead to as muc as a tree-fold improvement in te real-time capacity of a WSAN. Te rest of te paper is organized as follows. Section II reviews related work. Section III presents te network model. Section IV discusses te problem formulation. Section V provides a brief review of te existing delay analyses. Section VI presents our real-time routing algoritms. Section VII evaluates our routing algoritms troug experiments and simulations. Section VIII concludes te paper. II. RELATED WORK Te field of wireless sensor networks produced a multitude of sopisticated routing protocols (e.g., RPL [7] and ORPL [8], just to name a few). Designed for general-purpose applications tat do not demand real-time performance, tese routing protocols were optimized for efficiency and adaptivity to link dynamics. Tere were efforts to improve te real-time performance of traditional sensor networks in a best-effort manner suc as te works presented in [9] [12]. A common approac adopted by tese protocols is to employ localized algoritms to dynamically select te next op to forward a packet. However, tose decentralized approaces cannot

2 provide end-to-end delay guarantees and are incompatible wit recent standards for industrial WSANs. In contrast to traditional sensor networks, industrial WSAN standards adopt drastically different design coices in order to meet te stringent reliability and real-time requirements of IIoT. For example, in a WirelessHART network, links used for routing are usually more reliable and stable tan tose in traditional sensor networks. Furtermore, to acieve predictable latency, WirelessHART employs TSCH MAC protocol. Finally, WirelessHART adopts a centralized network manager responsible for computing routes for all flows in te network. Industrial WSANs tus need a new class of routing algoritms. Several groups proposed algoritms [13] [15] for reliable grap routing, a multi-pat routing approac supported by WirelessHART. Many efforts [16], [17] were geared toward improving te reliability and robustness of industrial WSANs. Oter routing algoritms suc as [18], [19] aimed to improve energy efficiency and prolong network lifetime. However, tese aforementioned algoritms were not targeted at improving te real-time performance of industrial WSANs. Te recent 6TiSCH standard combines te RPL routing protocol and te TSCH MAC to support decentralized adaptation [2]. Tis work is in contrast to our work tat is based on TSCH wit centralized sceduling. Tere exist real-time routing protocols for TDMA-based wireless sensor networks. Xu et al. [21] designed te PRTR protocol to minimize te delay of real-time traffic in a TDMAbased network. However, teir end-to-end delay bounds are probabilistic, wic is in contrast to many industrial applications tat require deterministic delay bounds. Nirjon et al. [22] proposed IAA, a real-time routing algoritm tat can guarantee end-to-end delay in TDMA-based networks. IAA employs euristics to assign sorter pats to flows wit tigter deadlines. It does not take into account transmission conflicts, wic play a significant role in communication delays in WirelessHART networks. Moreover, in contrast to our work tat is based on TSCH and WirelessHART, IAA is designed for a single-cannel TDMA network tat allows concurrent transmissions on te same cannel. III. NETWORK MODEL We consider a network model based on te WirelessHART standard [2] tat as been widely adopted in process industries. A WSAN consists of a gateway, multiple access points, and a set of field devices (e.g., sensors or actuators). Te access points and network devices are equipped wit alf-duplex radio transceivers compatible wit te IEEE pysical layer; togeter tey form a wireless mes network. A WSAN can use up to 16 cannels, as specified in te IEEE standard. Te access points are wired to te gateway and serve as bridges between te gateway and field devices. Te WSAN adopts a centralized network management approac, were te network manager (i.e., a software module running on te gateway or a ost connected to te gateway) manages all devices. Te network manager gaters te network topology information, and ten generates and disseminates te routes and transmission scedule to all network devices. Tis centralized network management arcitecture, adopted by te WirelessHART standard, enances te predictability and visibility of network operations at te cost of scalability. Te WSAN adopts te TSCH MAC on top of te IEEE pysical layer. TSCH is a TDMA-based protocol in wic all devices in te network are time syncronized. Time is divided into 1 ms slots, and eac slot can accommodate one packet transmission and its acknowledgment. In a slot, only one transmission is sceduled on eac cannel across te entire network to avoid cannel contention, and enance reliability. Moreover, TSCH supports cannel opping (i.e., eac node switces to a new receiving cannel in every time slot) to enance network resiliency troug cannel diversity. Te network operator can blacklist cannels wit poor quality. Te WirelessHART standard supports two types of routing: source routing and grap routing. Source routing provides a single route from a source to a destination, wereas grap routing provides multiple redundant routes in a routing grap. Hence, grap routing promotes reliability troug route diversity, at te cost of longer latency and iger energy cost [6]. Given our interest in real-time communication, tis paper focuses on source routing. In addition, wile our algoritms are designed for te WirelessHART standard, te insigts and approac may be extended to oter WSANs based on TSCH. IV. PROBLEM FORMULATION We consider a WSAN wit a set of N real-time flows F = {F 1,F 2,,F N }. For eac flow F k =(s k,d k, k,d k,t k ),a source s k generates a packet at a constant period T k. A packet must be delivered to a destination d k troug a source route k witin a relative deadline D k. Due to its simplicity and efficiency, fixed priority sceduling is commonly adopted as te real-time sceduling policy in CPU and traditional real-time networks (e.g., Control- Area Networks). A recent study [23] as sown tat fixed priority sceduling is an effective policy for real-time flows in WSANs. Hence, we will adopt te fixed priority sceduling framework in tis work. In practice, priorities are assigned based on deadlines, periods, or te criticality of te real-time flows. Priorities of flows remain constant during run-time unless te user requirements or te traffic demands are canged. In tis work, we use te deadline-monotonic priority assignment policy, were flows wit closer deadlines are assigned wit iger priorities. Priorities of flows wit te same deadline are randomly assigned. Our routing algoritms can be applied to any fixed priority assignment. Under a fixed priority sceduling policy, te transmissions of te flows are sceduled in te following way. We assume tat all flows are ordered by priorities. Flow F i as a iger priority tan flow F j if and only if i<j. Starting from te igest priority flow, F 1, te following procedure is repeated for every flow F i in decreasing order of priority. Te network manager scedules transmissions of te current flow F i in

3 te earliest available time slots and on available cannels. A time slot is available if no conflicting transmission is already sceduled in tat slot. Te goal of our routing algoritm is to find routes for te flows so tat every flow can meet its deadline. Te sortest pat algoritms based on op count [13] [15] are commonly adopted in WSANs. However, as sown in our simulation results, te effectiveness of tese algoritms is far from optimal. Based on te insigts from end-to-end delay analysis, we propose two new euristics to assign routes to meet real-time requirements. V. CONFLICT DELAY ANALYSIS In tis section, we summarize te delay analysis for WSANs. We later use tese insigts to design our routing algoritms. According to te previous work [23] on delay analysis, a packet can be delayed for two reasons: conflict delay and contention delay. Due to te alf-duplex radio, two transmissions conflict wit eac oter if tey sare a node (sender or receiver). In tis case, only one of tem can be sceduled in te current time slot. Terefore, if a packet conflicts wit anoter packet tat as already been sceduled in te current time slot, it as to be postponed to a later slot, resulting in conflict delay. Because a WSAN does not allow concurrent transmissions on te same cannel, eac cannel can accommodate only one transmission across te network in eac slot. If all cannels are assigned to transmissions of oter packets, a packet must be delayed to a later slot, resulting in contention delay. From te delay analyses presented in [23], [24], and our simulations, conflict delay plays a significant role in te endto-end delays of flows. Furtermore, routing directly impacts conflict delays, wereas contention delays largely depend on te number of cannels available. Terefore, in our routing design, we focus only on conflict delay. Saifulla et al. proposed Efficient Delay Analysis (EDA) [23], a state-of-teart delay analysis algoritm for WSANs. Here, we briefly discuss te EDA algoritm. We denote te total number of transmissions of flow F tat conflict wit flow F l as l. Here, flow F as a iger priority tan flow F l. l is counted based on te routes of te two flows. l equals te number of links in F s route tat sare nodes wit F l s route, times te number of transmissions sceduled on eac link. For example, given F s route is u! p! q! x! y, F l s route is v! p! q! z, and te number of transmissions over eac link is one, ten l = 3, i.e., tree links, {(u, p), (p, q), (q, x)}, in F s route sare nodes wit F l s route. Given a time interval of t slots, te number of packets of flow F tat contribute to te delay of a packet of flow F l during tis time interval is upper bounded by d t e, were is te period of flow, F. Terefore, te worst-case conflict delay of flow F l from all flows wit iger priority tan F l in a time interval t can be bounded as l (t) = X <l d t e l (1) Based on Equation (1), EDA uses an iterative fixed-point algoritm to get te upper bound of F l s conflict delay. We furter break down Equation (1) to learn ow muc a transmission of ig priority flow can delay a low priority flow. Here, we will give an approximation of conflict delay by a single transmission of ig priority flow. A packet of flow F l can be delayed only witin its lifetime D l (te relative deadline of flow F l ). To simplify Equation (1), we use F l s deadline as te lengt of te time window. We furter ignore te ceiling function and approximate te conflict delay tat F l can suffer from flow F as l = D l l (2) were l is te total conflict delay tat flow F brings to flow F l. Since te total number of transmissions of flow F tat conflict wit flow F l is l, we approximate te number of conflict delays from a single transmission of flow F as D l. We will use tis approximation in our routing design. VI. REAL-TIME ROUTING In tis section, we propose two real-time routing algoritms: Conflict-Aware Routing (CAR) and Iterative Conflict-Aware Routing (ICAR). A. Conflict-Aware Routing (CAR) As Section V sows, te conflict delay tat a single transmission of a ig priority flow, F, brings to a low priority flow, F l, is D l. We will incorporate tis idea into our Conflict- Aware Routing (CAR) algoritm, wic picks routes wit small conflict delays caused by ig-priority flows. Algoritm 1 presents te pseudocode of our CAR algoritm. Te two inputs to te algoritm are (1) a grap G(V,E), were V is te set of devices in te network and E is te set of links in te network, and (2) a flow set F = {F 1,F 2,,F N } ordered by priority. We assign routes for flows following te priority order, from te igest to te lowest. Eac link (u, v) as a link weigt w (u,v) and a delay coefficient c (u,v). For eac flow F l, we update te link weigts based on te routes of iger priority flows. If a link (u, v) sares at least one node wit a iger priority flow F s route, its weigt will be increased by D l, based on Equation (2). In our algoritm, we implement te link weigt update in two steps. In te first step, once te route R of a ig priority flow F is fixed, because every link on R will impose D l conflict delays on flows wit lower priority, we increase te delay coefficient of any link (u, v) tat sares at least one node wit R by 1. In te second step, wen we calculate te route for a lower priority flow F l, we update te weigt of eac link as w (u,v) = 1 + D l c (u,v), wic takes into account all flows tat ave iger priority. After updating te link weigts, we run Dijkstra s algoritm to find te pat l

4 wit te smallest pat weigt. Te algoritm terminates wen te flow wit te lowest priority is assigned a route N. Algoritm 1: Conflict-Aware Routing 1 Function CAR(G, F) Input : A grap G(V,E), A flow set F = {F 1,F 2,,F N } ordered by priority wit F l =(s l,d l,t l,d l ) Variable: link weigt w, link delay coefficient c Output : A route l for eac flow F l 2 for eac link (u, v) 2 E do 3 w (u,v) =1; 4 c (u,v) =; 5 for eac flow F l from F 1 to F n do 6 if l>1 ten 7 for eac link (u, v) 2 E do 8 w (u,v) =1+D l c (u,v) ; 9 Find te sortest pat l connecting s l to d l ; 1 Assign l as flow F l s route; 11 for eac link (u, v) 2 E do 12 if (u, v) sares at least one node wit F l s route l ten 13 c (u,v) = c (u,v) + 1 T l ; Now, we discuss te complexity of te CAR algoritm. We first ceck te complexity for eac flow (one iteration witin te for loop at lines 5-13). Te complexity to update te link weigts is O( E ). It takes O( E + V log V ) to execute te Dijkstra s algoritm, and O( E ) to update te delay coefficients. Ten, te total complexity of eac flow is O( E + V log V ). Finally, te complexity of our CAR algoritm is O(N( E + V log V )), were N is te number of flows in te WSAN. B. Iterative Conflict-Aware Routing (ICAR) By reducing te conflict delay of low priority flows, we can accommodate more flows wile meeting teir deadlines. However, CAR is based on flow priorities, and ig priority flows are not aware of te routes of low priority flows. We furter improve te real-time capacity by introducing an approac were ig priority flows also take into account te routes of low priority flows to avoid te overlapping routes. Tis approac gives low priority flows a iger cance to find routes tat are scedulable. Hence, in tis section, we introduce our Iterative Conflict-Aware Routing (ICAR) algoritm, wic is an extension of CAR ICAR is an iterative algoritm tat runs in rounds. Witin eac round, flows compute teir routes one by one. As wit CAR, eac flow F l will first update link weigts based on te routes of oter flows, and ten use Dijkstra s algoritm to find te pat wit te smallest pat weigt. ICAR ten determines if flow F l wit tis new route is scedulable under EDA. If yes, tis new route is assigned to F l, and flow F l is indicated as scedulable. Te delay coefficients of te links belonging to te old route of F l are deducted by 1 T l, and te coefficients of te links on te new route are increased by 1 T l. Oterwise, flow F l will not update its route. ICAR terminates wen (1) none of te flows update teir routes or, (2) all flows are scedulable under EDA or, (3) te number of iterations exceeds te preset tresold M. Oterwise, te algoritm will enter a new round. Te complexity of one round is O(N( E + V log V + D max )). Compared wit te complexity of te CAR algoritm O(N( E + V log V )), ICAR incurs an additional complexity of O(ND max ) for te delay analysis EDA, were D max is te maximum deadline in F. Te total complexity of ICAR is O(MN( E + V log V +D max )), were M is te maximum number of rounds. M is no larger tan 5 in our simulation. VII. EVALUATION We evaluate our real-time routing algoritms troug bot experiments on a pysical WSAN testbed and numerical simulations. As discussed in Section II, routing protocols designed for traditional wireless sensor networks are incompatible wit te WirelessHART standard, wereas recent efforts on WirelessHART routing ave focused on enancing te reliability [13] [15] and energy efficiency [18], [19] of multi-pat grap routing wic usually lead to larger latency tan single-pat routing like our routing algoritms. Hencefort, we compare our conflict-aware routing algoritms (CAR and ICAR) against Sortest Pat Routing (SP) as a baseline for performance evaluation. Note tat, wile link quality is often incorporated in routing metrics for traditional wireless sensor networks as a routing metric, it is not as useful for WirelessHART networks in wic links are usually igly reliable due to aggressive link blacklisting and conservative deployment. In suc networks, te sortest pat is a reasonable euristic to reduce latency. Comparing conflict-aware routing against sortest pat routing quantifies te benefit of considering transmission conflicts to real-time performance. Our evaluation includes two parts: (1) experiments on a WSAN testbed and (2) simulations based on network topology traces collected from pysical experiments. We evaluate routing protocols wit tree metrics: (a) Acceptance ratio: te percentage of test cases tat are deemed scedulable, (b) Endto-end delay: te communication delay between te release of a packet from te source and te reception at te destination, and (c) Execution time: te total time required to compute routes at te network manager. A. Experiments on a WSAN Testbed We evaluate our routing designs on an indoor WSAN testbed consisting of 63 TelosB motes. Figure 1 sows te topology of te WSAN testbed, and te locations of access points, sources and destinations of flows. For eac link in te testbed, we measure its packet reception ratio (PRR) by counting te number of received packets among 25 packets transmitted on te link. Following te practice of industrial deployment, we add only links wit PRRs iger tan 9% to te topology of te testbed. Te motes in te testbed run a

5 Access Point Source Destination RelayNode F1 F2 F3 F4 F5 F6 F7 F8 Delay (ms) Flow Priority Conflict Delay (ms) Flow Priority Fig. 1: WSAN testbed topology tat includes te locations of access points, sources, and destinations of flows. (a) End-to-end delays Fig. 2: Delays in experiments. (b) Conflict delays protocol stack [6] implementing source routing and TSCH on top of te CC242X radio stack. In our experiment, we generate 8 distinct flows, and use 8 cannels for communication. Due to cannel opping, eac transmission of any flow can op troug all cannels used. Te period of eac flow is in te range of milliseconds, wic are typical periods used in process industries, as specified in te WirelessHART standard [2]. Te lengt of te yper-period is 128 milliseconds. Te relative deadline of eac flow is equal to its period. We run te experiments long enoug tat eac flow can deliver at least 1 packets. We evaluate ow muc our approac improves end-to-end and conflict delays over te performances of SP. Figure 2(a) presents te worst-case end-to-end delays of eac flow. CAR and ICAR consistently acieve similar or better end-to-end delays tan SP. Moreover, ICAR can furter improve te delays of some lower priority flows compared to CAR. Note tat since te locations of a source and destination of a flow, and te network topology also impact te end-to-end delay of a flow, some of te lower priority flows may ave smaller delays tan tose of iger priority flows. We next investigate conflict delays of flows under our approaces and te baseline. Since conflict delay contributes to te end-to-end delay of a flow, reducing te conflict delay can enance te end-to-end delay. As sown in Figure2(b), under CAR and ICAR, flows incur less conflict delay tan under SP. For flow 2 and flow 7, CAR and ICAR can eliminate te conflict delay, wile SP still incurs some conflict delay. In addition, ICAR can outperform CAR in many cases since it uses an iterative algoritm tat allows iger priority flows to take into account routes of lower priority flows. B. Simulations based on te WSAN Testbed Topology To provide a more compreensive evaluation, we also evaluate our routing algoritms troug simulations based on te WSAN testbed topology. Te simulator uses te same routing and sceduling algoritms as in our testbed experiments and is written in C++. All simulations are performed on a MacBook Pro laptop wit 2.4 GHz Intel Core 2 Duo processor. We evaluate our algoritms under different numbers of cannels (from 4 to 15). Wit a given set of cannels, we test our routing designs on different numbers of flows by increasing te numbers of source and destination pairs from 2 to 22. Te period of te eac flow is randomly picked witin te range of milliseconds. Te relative deadline of eac flow is equal to its period. For te same number of flows, we run 1 tests wit randomly generated pairs of sources and destinations. In summary, we perform numerical evaluations on about 1K different configurations. Te following results are from simulations wit 8 cannels. Figure 3(a) compares te acceptance ratios of CAR, ICAR, and SP in simulations. SP always as te lowest acceptance ratio, and bot CAR and ICAR ave muc iger acceptance ratios. ICAR as a iger acceptance ratio tan CAR, wic sows te benefit of letting flows wit iger priorities be aware of te routes of lower priority flows. Compared to SP, CAR and ICAR can respectively improve te acceptance ratio by 239% and 35% on average. We ten compare te delays of CAR, ICAR, and SP under 8 cannels. As sown in Figure 3(c), conflict delay indeed dominates contention delay. Moreover, altoug CAR and ICAR may lead to routes wit longer op counts, teir endto-end delays are smaller tan SP on average as presented in Figure 3(b). Tis is because CAR and ICAR ave fewer conflict delays tan SP in all cases. We obtain similar results wit 4-7 and 9-15 cannels used. Witin all simulations, our CAR and ICAR algoritms improve te acceptance ratio significantly, wit smaller conflict delays. Wen te number of cannels is small (4-8), te contention delays can be an important part of te end-to-end delays. However, wen more (12-15) cannels are used, te contention delays are zero, and conflict delays dominate. Execution Time: We compare te execution time of SP, CAR, and ICAR in Figure 4. Te execution time increases as te number of flows increases in all tree algoritms. Te execution times of te tree routing algoritms follow te order SP<CAR<ICAR. SP as te lowest execution time since it uses te breadt-first searc algoritm. ICAR as a iger execution time tan CAR because it is an iterative algoritm. Te execution time of ICAR is less tan 2 ms wen te number of flows is 22. According to te WirelessHART Standard [2], wen a node loses connectivity to its neigbor for a certain period of time (timeout period), a node will send a keep-alive packet to probe te connection. Tis timeout period is no less tan 3 seconds. If te node fails to

6 Acceptance Ratio (%) Delay (ms) Delay (ms) SP-Conf CAR-Conf ICAR-Conf SP-Cont CAR-Cont ICAR-Cont (a) Acceptance ratios. (b) End-to-end delays (c) Conflict (Conf) and contention (Cont) delays. Fig. 3: Simulation results: acceptance ratio and delays. Execution Time (ms) SP CAR ICAR Fig. 4: Execution time receive a response from its neigbor, a node will issue a patdown alarm to te network manager, wic will recalculate a new route. Tis indicates tat te 2 ms execution time is acceptable for te real-world operations. VIII. CONCLUSIONS As process industries start to embrace WSANs, it becomes critical for WSANs to support real-time communication for IIoT. Due to limited results on real-time routing for industrial WSANs, tis paper proposes conflict-aware routing, a new approac to real-time routing in industrial WSANs tat considers transmission conflict delays in routing decisions. As a result, a WSAN can accommodate more real-time flows wile meeting teir deadlines. Evaluations based on bot testbed experiments and simulations sow tat conflict-aware routing can lead to up to tree-fold improvement in te real-time capacity of a WSAN wen compared to sortest pat routing. ACKNOWLEDGMENT Tis work is supported, in part, by te NSF troug grants (NeTS), (CPS), and (CRII). REFERENCES [1] C. Lu, A. Saifulla, B. Li, M. Sa, H. Gonzalez, D. Gunatilaka, C. Wu, L. Nie, and Y. Cen, Real-Time Wireless Sensor-Actuator Networks for Industrial Cyber-Pysical Systems, in Proceedings of te IEEE, Special Issue on Industrial Cyber Pysical Systems, vol. 14, pp , May 216. [2] WirelessHART Sfpecification, 27. ttp:// [3] ISA1: Wireless Systems for Automation. ttps:// isa1/. [4] IPv6 Over te TSCH Mode of IEEE e (6TiSCH). ttps://datatracker.ietf.org/wg/6tisc/about/. [5] A. Saifulla, Y. Xu, C. Lu, and Y. Cen, Real-Time Sceduling for WirelessHART Networks, in RTSS, 21. [6] M. Sa, D. Gunatilaka, C. Wu, and C. Lu, Empirical Study and Enancements of Industrial Wireless Sensor-Actuator Network Protocols, IEEE Internet of Tings Journal, vol. 4, pp , June 217. [7] RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. ttps://tools.ietf.org/tml/rfc655. [8] S. Duquennoy, O. Landsiedel, and T. Voigt, Let te Tree Bloom: Scalable Opportunistic Routing wit ORPL, in Sensys, 213. [9] T. He, J. A. Stankovic, C. Lu, and T. Abdelzaer, SPEED: A Stateless Protocol for Real-Time Communication in Sensor Networks, in ICDCS, 23. [1] O. Cipara, Z. He, G. Xing, Q. Cen, X. Wang, C. Lu, J. Stankovic, and T. Abdelzaer, Real-time Power-Aware Routing in Sensor Networks, in IEEE International Worksop on Quality of Service, 26. [11] J. Heo, J. Hong, and Y. Co, EARQ: Energy Aware Routing for Real-Time and Reliable Communication in Wireless Industrial Sensor Networks, IEEE Transactions on Industrial Informatics, vol. 5, pp. 3 11, Feb 29. [12] P. T. A. Quang and D. S. Kim, Enancing Real-Time Delivery of Gradient Routing for Industrial Wireless Sensor Networks, IEEE Transactions on Industrial Informatics, vol. 8, pp , Feb 212. [13] J. Zao, Z. Liang, and Y. Zao, ELHFR: A Grap Routing in Industrial Wireless Mes Network, in ICIA, 29. [14] S. Han, X. Zu, A. K. Mok, D. Cen, and M. Nixon, Reliable and Real-time Communication in Industrial Wireless Mes Networks, in RTAS, 211. [15] G. Gao, H. Zang, and L. Li, A Reliable Multipat Routing Strategy for WirelessHART Mes Networks Using Subgrap Routing, Journal of Computational Information Systems, vol. 9, Marc 213. [16] J. Niu, L. Ceng, Y. Gu, L. Su, and S. K. Das, R3E: Reliable Reactive Routing Enancement for Wireless Sensor Networks, IEEE Transactions on Industrial Informatics, vol. 1, pp , Feb 214. [17] L. Pradittasnee, S. Camtepe, and Y. C. Tian, Efficient Route Update and Maintenance for Reliable Routing in Large-Scale Sensor Networks, IEEE Transactions on Industrial Informatics, vol. 13, pp , Feb 217. [18] C. Wu, D. Gunatilaka, A. Saifulla, M. Sa, P. B. Tiwari, C. Lu, and Y. Cen, Maximizing Network Lifetime of WirelessHART Networks under Grap Routing, in IoTDI, 216. [19] S. Zang, A. Yan, and T. Ma, An Energy-Balanced Grap Routing Algoritm for WirelessHART Networks, in IHMSC, 213. [2] S. Duquennoy, B. Al Naas, O. Landsiedel, and T. Watteyne, Orcestra: Robust Mes Networks Troug Autonomously Sceduled TSCH, in Sensys, 215. [21] Y. Xu, F. Ren, T. He, C. Lin, C. Cen, and S. K. Das, Real-time Routing in Wireless Sensor Networks: A Potential Field Approac, ACM Transactions on Sensor Networks, pp. 35:1 35:24, June 213. [22] S. M. S. Nirjon, J. A. Stankovic, and K. Witeouse, IAA: Interference Aware Anticipatory Algoritm for Sceduling and Routing Periodic Real-time Streams in Wireless Sensor Networks, in INSS, 21. [23] A. Saifulla, Y. Xu, C. Lu, and Y. Cen, End-to-End Delay Analysis for Fixed Priority Sceduling in WirelessHART Networks, in RTAS, 211. [24] C. Wu, M. Sa, D. Gunatilaka, A. Saifulla, C. Lu, and Y. Cen, Analysis of EDF Sceduling for Wireless Sensor-Actuator Networks, in IWQoS, 214.

Conflict-Aware Real-Time Routing for Industrial Wireless Sensor-Actuator Networks

Conflict-Aware Real-Time Routing for Industrial Wireless Sensor-Actuator Networks Washington University in St. Louis Washington University Open Scholarship All Computer Science and Engineering Research Computer Science and Engineering Report Number: WUCSE-2-2-9-29 Conflict-Aware Real-Time

More information

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness 1 Optimal In-etwork Packet Aggregation Policy for Maimum Information Fresness Alper Sinan Akyurek, Tajana Simunic Rosing Electrical and Computer Engineering, University of California, San Diego aakyurek@ucsd.edu,

More information

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various

More information

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks An Algoritm for Loopless Deflection in Potonic Packet-Switced Networks Jason P. Jue Center for Advanced Telecommunications Systems and Services Te University of Texas at Dallas Ricardson, TX 75083-0688

More information

Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks

Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Okan Yilmaz and Ing-Ray Cen Computer Science Department Virginia Tec {oyilmaz, ircen}@vt.edu

More information

A UPnP-based Decentralized Service Discovery Improved Algorithm

A UPnP-based Decentralized Service Discovery Improved Algorithm Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol.1, No.1, Marc 2013, pp. 21~26 ISSN: 2089-3272 21 A UPnP-based Decentralized Service Discovery Improved Algoritm Yu Si-cai*, Wu Yan-zi,

More information

Piecewise Polynomial Interpolation, cont d

Piecewise Polynomial Interpolation, cont d Jim Lambers MAT 460/560 Fall Semester 2009-0 Lecture 2 Notes Tese notes correspond to Section 4 in te text Piecewise Polynomial Interpolation, cont d Constructing Cubic Splines, cont d Having determined

More information

Intra- and Inter-Session Network Coding in Wireless Networks

Intra- and Inter-Session Network Coding in Wireless Networks Intra- and Inter-Session Network Coding in Wireless Networks Hulya Seferoglu, Member, IEEE, Atina Markopoulou, Member, IEEE, K K Ramakrisnan, Fellow, IEEE arxiv:857v [csni] 3 Feb Abstract In tis paper,

More information

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks Downloaded from vbn.aau.dk on: April 7, 09 Aalborg Universitet etwork Coding to Enance Standard Routing Protocols in Wireless Mes etworks Palevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank;

More information

On the Use of Radio Resource Tests in Wireless ad hoc Networks

On the Use of Radio Resource Tests in Wireless ad hoc Networks Tecnical Report RT/29/2009 On te Use of Radio Resource Tests in Wireless ad oc Networks Diogo Mónica diogo.monica@gsd.inesc-id.pt João Leitão jleitao@gsd.inesc-id.pt Luis Rodrigues ler@ist.utl.pt Carlos

More information

Author's personal copy

Author's personal copy Autor's personal copy Information Processing Letters 09 (009) 868 875 Contents lists available at ScienceDirect Information Processing Letters www.elsevier.com/locate/ipl Elastic tresold-based admission

More information

An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng

An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng An ffective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Ciming Huang and ei-heng Ceng 5 De c e mbe r0 International Journal of Advanced Information Tecnologies (IJAIT),

More information

An Anchor Chain Scheme for IP Mobility Management

An Anchor Chain Scheme for IP Mobility Management An Ancor Cain Sceme for IP Mobility Management Yigal Bejerano and Israel Cidon Department of Electrical Engineering Tecnion - Israel Institute of Tecnology Haifa 32000, Israel E-mail: bej@tx.tecnion.ac.il.

More information

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer

More information

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science A Cost Model for Distributed Sared Memory Using Competitive Update Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, Texas, 77843-3112, USA E-mail: fjkim,vaidyag@cs.tamu.edu

More information

Real-Time Internet of Things

Real-Time Internet of Things Real-Time Internet of Things Chenyang Lu Cyber-Physical Systems Laboratory h7p://www.cse.wustl.edu/~lu/ Internet of Things Ø Convergence of q Miniaturized devices: integrate processor, sensors and radios.

More information

Cubic smoothing spline

Cubic smoothing spline Cubic smooting spline Menu: QCExpert Regression Cubic spline e module Cubic Spline is used to fit any functional regression curve troug data wit one independent variable x and one dependent random variable

More information

Investigating an automated method for the sensitivity analysis of functions

Investigating an automated method for the sensitivity analysis of functions Investigating an automated metod for te sensitivity analysis of functions Sibel EKER s.eker@student.tudelft.nl Jill SLINGER j..slinger@tudelft.nl Delft University of Tecnology 2628 BX, Delft, te Neterlands

More information

Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks

Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks Hulya Seferoglu, Atina Markopoulou EECS Dept, University of California, Irvine {seferog, atina}@uci.edu Abstract We

More information

Distributed and Optimal Rate Allocation in Application-Layer Multicast

Distributed and Optimal Rate Allocation in Application-Layer Multicast Distributed and Optimal Rate Allocation in Application-Layer Multicast Jinyao Yan, Martin May, Bernard Plattner, Wolfgang Mülbauer Computer Engineering and Networks Laboratory, ETH Zuric, CH-8092, Switzerland

More information

Multi-Stack Boundary Labeling Problems

Multi-Stack Boundary Labeling Problems Multi-Stack Boundary Labeling Problems Micael A. Bekos 1, Micael Kaufmann 2, Katerina Potika 1 Antonios Symvonis 1 1 National Tecnical University of Atens, Scool of Applied Matematical & Pysical Sciences,

More information

More on Functions and Their Graphs

More on Functions and Their Graphs More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in

More information

A Statistical Approach for Target Counting in Sensor-Based Surveillance Systems

A Statistical Approach for Target Counting in Sensor-Based Surveillance Systems Proceedings IEEE INFOCOM A Statistical Approac for Target Counting in Sensor-Based Surveillance Systems Dengyuan Wu, Decang Cen,aiXing, Xiuzen Ceng Department of Computer Science, Te George Wasington University,

More information

4.1 Tangent Lines. y 2 y 1 = y 2 y 1

4.1 Tangent Lines. y 2 y 1 = y 2 y 1 41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange

More information

Protecting Storage Location Privacy in Sensor Networks

Protecting Storage Location Privacy in Sensor Networks Protecting Storage Location Privacy in Sensor Networks Jianming Zou, Wenseng Zang, and Daji Qiao Iowa State University Ames, IA 511 Email: {jmzou,wzang,daji}@iastate.edu ASTAT Numerous scemes ave been

More information

MULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS

MULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS ULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS Nimmagadda Calamaia æ Dept. of CSE JNTU College of Engineering Kakinada, India 533 003. calm@cse.iitkgp.ernet.in Badrinat Ramamurty y Dept.

More information

Extended Synchronization Signals for Eliminating PCI Confusion in Heterogeneous LTE

Extended Synchronization Signals for Eliminating PCI Confusion in Heterogeneous LTE 1 Extended Syncronization Signals for Eliminating PCI Confusion in Heterogeneous LTE Amed H. Zaran Department of Electronics and Electrical Communications Cairo University Egypt. azaran@eecu.cu.edu.eg

More information

An experimental framework to investigate context-aware schemes for content delivery

An experimental framework to investigate context-aware schemes for content delivery An experimental framework to investigate context-aware scemes for content delivery Pietro Lungaro +, Cristobal Viedma +, Zary Segall + and Pavan Kumar + Mobile Service Lab, Royal Institute of Tecnology

More information

Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks

Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks Peyman Faizian, Md Safayat Raman, Md Atiqul Molla, Xin Yuan Department of Computer Science Florida State University

More information

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation P R E P R N T CPWS XV Berlin, September 8, 008 Fast Calculation of Termodynamic Properties of Water and Steam in Process Modelling using Spline nterpolation Mattias Kunick a, Hans-Joacim Kretzscmar a,

More information

SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS. Hewlett-Packard Company East Mission Avenue. Bogazici University

SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS. Hewlett-Packard Company East Mission Avenue. Bogazici University SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS Sanuj V. Sarin 1, Hakan Delic 2 and Jung H. Kim 3 1 Hewlett-Packard Company 24001 East Mission Avenue Spokane, Wasington 99109, USA 2 Signal

More information

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically 2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use

More information

Density Estimation Over Data Stream

Density Estimation Over Data Stream Density Estimation Over Data Stream Aoying Zou Dept. of Computer Science, Fudan University 22 Handan Rd. Sangai, 2433, P.R. Cina ayzou@fudan.edu.cn Ziyuan Cai Dept. of Computer Science, Fudan University

More information

Symmetric Tree Replication Protocol for Efficient Distributed Storage System*

Symmetric Tree Replication Protocol for Efficient Distributed Storage System* ymmetric Tree Replication Protocol for Efficient Distributed torage ystem* ung Cune Coi 1, Hee Yong Youn 1, and Joong up Coi 2 1 cool of Information and Communications Engineering ungkyunkwan University

More information

Mean Waiting Time Analysis in Finite Storage Queues for Wireless Cellular Networks

Mean Waiting Time Analysis in Finite Storage Queues for Wireless Cellular Networks Mean Waiting Time Analysis in Finite Storage ueues for Wireless ellular Networks J. YLARINOS, S. LOUVROS, K. IOANNOU, A. IOANNOU 3 A.GARMIS 2 and S.KOTSOOULOS Wireless Telecommunication Laboratory, Department

More information

Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs

Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs Per Ostlund Department of Computer and Information Science Linkoping University SE-58183 Linkoping, Sweden per.ostlund@liu.se Kristian

More information

Haar Transform CS 430 Denbigh Starkey

Haar Transform CS 430 Denbigh Starkey Haar Transform CS Denbig Starkey. Background. Computing te transform. Restoring te original image from te transform 7. Producing te transform matrix 8 5. Using Haar for lossless compression 6. Using Haar

More information

Proceedings of the 8th WSEAS International Conference on Neural Networks, Vancouver, British Columbia, Canada, June 19-21,

Proceedings of the 8th WSEAS International Conference on Neural Networks, Vancouver, British Columbia, Canada, June 19-21, Proceedings of te 8t WSEAS International Conference on Neural Networks, Vancouver, Britis Columbia, Canada, June 9-2, 2007 3 Neural Network Structures wit Constant Weigts to Implement Dis-Jointly Removed

More information

Section 2.3: Calculating Limits using the Limit Laws

Section 2.3: Calculating Limits using the Limit Laws Section 2.3: Calculating Limits using te Limit Laws In previous sections, we used graps and numerics to approimate te value of a it if it eists. Te problem wit tis owever is tat it does not always give

More information

An Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks

An Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks Tis paper was presented as part of te main tecnical program at IEEE INFOCOM 20 An Analytical Approac to Real-Time Misbeavior Detection in IEEE 802. Based Wireless Networks Jin Tang, Yu Ceng Electrical

More information

Sensor Data Collection with Expected Reliability Guarantees

Sensor Data Collection with Expected Reliability Guarantees Sensor Data Collection wit Expected Reliability Guarantees Qi Han, Iosif Lazaridis, Sarad Merotra, Nalini Venkatasubramanian Department of Computer Science, University of California, Irvine, CA 9697 qan,iosif,sarad,nalini

More information

Linear Interpolating Splines

Linear Interpolating Splines Jim Lambers MAT 772 Fall Semester 2010-11 Lecture 17 Notes Tese notes correspond to Sections 112, 11, and 114 in te text Linear Interpolating Splines We ave seen tat ig-degree polynomial interpolation

More information

Minimizing Memory Access By Improving Register Usage Through High-level Transformations

Minimizing Memory Access By Improving Register Usage Through High-level Transformations Minimizing Memory Access By Improving Register Usage Troug Hig-level Transformations San Li Scool of Computer Engineering anyang Tecnological University anyang Avenue, SIGAPORE 639798 Email: p144102711@ntu.edu.sg

More information

2.8 The derivative as a function

2.8 The derivative as a function CHAPTER 2. LIMITS 56 2.8 Te derivative as a function Definition. Te derivative of f(x) istefunction f (x) defined as follows f f(x + ) f(x) (x). 0 Note: tis differs from te definition in section 2.7 in

More information

Computing geodesic paths on manifolds

Computing geodesic paths on manifolds Proc. Natl. Acad. Sci. USA Vol. 95, pp. 8431 8435, July 1998 Applied Matematics Computing geodesic pats on manifolds R. Kimmel* and J. A. Setian Department of Matematics and Lawrence Berkeley National

More information

Forward End-To-End delay Analysis for AFDX networks

Forward End-To-End delay Analysis for AFDX networks Forward End-To-End delay Analysis for AFDX networks Nassima Benammar, Frederic Ridouard, Henri Bauer and Pascal Ricard e-mail: {nassima.benammar,frederic.ridouard, pascal.ricard}@univ-poitiers.fr enri.bauer@ensma.fr

More information

The Euler and trapezoidal stencils to solve d d x y x = f x, y x

The Euler and trapezoidal stencils to solve d d x y x = f x, y x restart; Te Euler and trapezoidal stencils to solve d d x y x = y x Te purpose of tis workseet is to derive te tree simplest numerical stencils to solve te first order d equation y x d x = y x, and study

More information

Packet Switching Networks. Jonathan S. Turner. Computer and Communications Research Center. the result of user connections that pass through the

Packet Switching Networks. Jonathan S. Turner. Computer and Communications Research Center. the result of user connections that pass through the Fluid Flow Loading Analysis of Packet Switcing Networks Jonatan S. Turner Computer and Communications Researc Center Wasington University, St. Louis, MO 63130 Abstract Recent researc in switcing as concentrated

More information

12.2 TECHNIQUES FOR EVALUATING LIMITS

12.2 TECHNIQUES FOR EVALUATING LIMITS Section Tecniques for Evaluating Limits 86 TECHNIQUES FOR EVALUATING LIMITS Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing tecnique to evaluate its of

More information

George Xylomenos and George C. Polyzos. with existing protocols and their eæciency in terms of

George Xylomenos and George C. Polyzos. with existing protocols and their eæciency in terms of IP MULTICASTING FOR WIRELESS MOBILE OSTS George Xylomenos and George C. Polyzos fxgeorge,polyzosg@cs.ucsd.edu Computer Systems Laboratory Department of Computer Science and Engineering University of California,

More information

Search-aware Conditions for Probably Approximately Correct Heuristic Search

Search-aware Conditions for Probably Approximately Correct Heuristic Search Searc-aware Conditions for Probably Approximately Correct Heuristic Searc Roni Stern Ariel Felner Information Systems Engineering Ben Gurion University Beer-Seva, Israel 85104 roni.stern@gmail.com, felner@bgu.ac.il

More information

Vector Processing Contours

Vector Processing Contours Vector Processing Contours Andrey Kirsanov Department of Automation and Control Processes MAMI Moscow State Tecnical University Moscow, Russia AndKirsanov@yandex.ru A.Vavilin and K-H. Jo Department of

More information

Real-Time and Energy-Efficient Routing for Industrial Wireless Sensor-Actuator Networks

Real-Time and Energy-Efficient Routing for Industrial Wireless Sensor-Actuator Networks Washington University in St. Louis Washington University Open Scholarship Engineering and Applied Science Theses & Dissertations Engineering and Applied Science Winter 12-15-2014 Real-Time and Energy-Efficient

More information

Alternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method

Alternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method Te Open Plasma Pysics Journal, 2010, 3, 29-35 29 Open Access Alternating Direction Implicit Metods for FDTD Using te Dey-Mittra Embedded Boundary Metod T.M. Austin *, J.R. Cary, D.N. Smite C. Nieter Tec-X

More information

3.6 Directional Derivatives and the Gradient Vector

3.6 Directional Derivatives and the Gradient Vector 288 CHAPTER 3. FUNCTIONS OF SEVERAL VARIABLES 3.6 Directional Derivatives and te Gradient Vector 3.6.1 Functions of two Variables Directional Derivatives Let us first quickly review, one more time, te

More information

Asynchronous Power Flow on Graphic Processing Units

Asynchronous Power Flow on Graphic Processing Units 1 Asyncronous Power Flow on Grapic Processing Units Manuel Marin, Student Member, IEEE, David Defour, and Federico Milano, Senior Member, IEEE Abstract Asyncronous iterations can be used to implement fixed-point

More information

DraXRouter: Global Routing in X-Architecture with Dynamic Resource Assignment*

DraXRouter: Global Routing in X-Architecture with Dynamic Resource Assignment* DraXRouter: Global Routing in X-Arcitecture wit Dynamic Resource Assignment* Zen Cao 1, Tong Jing 1, Yu Hu 2, Yiyu Si 2, Xianlong Hong 1, Xiaodong Hu 3, Guiying Yan 3 1 Computer Science & Tecnology Department

More information

Numerical Derivatives

Numerical Derivatives Lab 15 Numerical Derivatives Lab Objective: Understand and implement finite difference approximations of te derivative in single and multiple dimensions. Evaluate te accuracy of tese approximations. Ten

More information

Computer Physics Communications. Multi-GPU acceleration of direct pore-scale modeling of fluid flow in natural porous media

Computer Physics Communications. Multi-GPU acceleration of direct pore-scale modeling of fluid flow in natural porous media Computer Pysics Communications 183 (2012) 1890 1898 Contents lists available at SciVerse ScienceDirect Computer Pysics Communications ournal omepage: www.elsevier.com/locate/cpc Multi-GPU acceleration

More information

A Novel QC-LDPC Code with Flexible Construction and Low Error Floor

A Novel QC-LDPC Code with Flexible Construction and Low Error Floor A Novel QC-LDPC Code wit Flexile Construction and Low Error Floor Hanxin WANG,2, Saoping CHEN,2,CuitaoZHU,2 and Kaiyou SU Department of Electronics and Information Engineering, Sout-Central University

More information

Maximizing Network Lifetime of WirelessHART Networks under Graph Routing

Maximizing Network Lifetime of WirelessHART Networks under Graph Routing 2016 IEEE First International Conference on Internet-of-Things Design and Implementation Maximizing Network Lifetime of WirelessHART Networks under Graph Routing Chengjie Wu, Dolvara Gunatilaka, Abusayeed

More information

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry Our Calibrated Model as No Predictive Value: An Example from te Petroleum Industry J.N. Carter a, P.J. Ballester a, Z. Tavassoli a and P.R. King a a Department of Eart Sciences and Engineering, Imperial

More information

Dynamic Channel Assignment and Reassignment for Exploiting Channel Reuse Opportunities in Ad Hoc Wireless Networks

Dynamic Channel Assignment and Reassignment for Exploiting Channel Reuse Opportunities in Ad Hoc Wireless Networks Dynamic Cannel Assignment and Reassignment for Exploiting Cannel Reuse Opportunities in Ad Hoc Wireless Networks Ci-Yung Cang *, Po-Ci Huang *, Cao-Tsun Cang +, and Yu-Syan Cen ++ * Department of Computer

More information

Maximizing Network Lifetime of WirelessHART Networks under Graph Routing

Maximizing Network Lifetime of WirelessHART Networks under Graph Routing Maximizing Network Lifetime of WirelessHART Networks under Graph Routing Chengjie Wu, Dolvara Gunatilaka, Abusayeed Saifullah*, Mo Sha^, Paras Tiwari, Chenyang Lu, Yixin Chen Cyber-Physical Systems Lab,

More information

SEATTLE: A Scalable Ethernet Architecture for Large Enterprises

SEATTLE: A Scalable Ethernet Architecture for Large Enterprises TRC00349 ACM (Typeset by SPi, Manila, Pilippines) 1 of 35 February 23, 2011 14:31 SEATTLE: A Scalable Eternet Arcitecture for Large Enterprises 1 CHANGHOON KIM, Microsoft MATTHEW CAESAR, University of

More information

Redundancy Awareness in SQL Queries

Redundancy Awareness in SQL Queries Redundancy Awareness in QL Queries Bin ao and Antonio Badia omputer Engineering and omputer cience Department University of Louisville bin.cao,abadia @louisville.edu Abstract In tis paper, we study QL

More information

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 Note: Tere will be a very sort online reading quiz (WebWork) on eac reading assignment due one our before class on its due date. Due dates can be found

More information

Unsupervised Learning for Hierarchical Clustering Using Statistical Information

Unsupervised Learning for Hierarchical Clustering Using Statistical Information Unsupervised Learning for Hierarcical Clustering Using Statistical Information Masaru Okamoto, Nan Bu, and Tosio Tsuji Department of Artificial Complex System Engineering Hirosima University Kagamiyama

More information

Multi-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art

Multi-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art Multi-Objective Particle Swarm Optimizers: A Survey of te State-of-te-Art Margarita Reyes-Sierra and Carlos A. Coello Coello CINVESTAV-IPN (Evolutionary Computation Group) Electrical Engineering Department,

More information

12.2 Techniques for Evaluating Limits

12.2 Techniques for Evaluating Limits 335_qd /4/5 :5 PM Page 863 Section Tecniques for Evaluating Limits 863 Tecniques for Evaluating Limits Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing

More information

Fault Localization Using Tarantula

Fault Localization Using Tarantula Class 20 Fault localization (cont d) Test-data generation Exam review: Nov 3, after class to :30 Responsible for all material up troug Nov 3 (troug test-data generation) Send questions beforeand so all

More information

HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS

HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS N.G.Bardis Researc Associate Hellenic Ministry of te Interior, Public Administration and Decentralization 8, Dragatsaniou str., Klatmonos S. 0559, Greece

More information

Brief Contributions. A Hybrid Flash File System Based on NOR and NAND Flash Memories for Embedded Devices 1 INTRODUCTION

Brief Contributions. A Hybrid Flash File System Based on NOR and NAND Flash Memories for Embedded Devices 1 INTRODUCTION 1002 IEEE TRANSACTIONS ON COMPUTERS, VOL. 57, NO. 7, JULY 2008 Brief Contributions A Hybrid Flas File System Based on NOR and NAND Flas Memories for Embedded Devices Cul Lee, Student Member, IEEE, Sung

More information

An Interactive X-Ray Image Segmentation Technique for Bone Extraction

An Interactive X-Ray Image Segmentation Technique for Bone Extraction An Interactive X-Ray Image Segmentation Tecnique for Bone Extraction Cristina Stolojescu-Crisan and Stefan Holban Politenica University of Timisoara V. Parvan 2, 300223 Timisoara, Romania {cristina.stolojescu@etc.upt.ro

More information

Test Generation for Acyclic Sequential Circuits with Hold Registers

Test Generation for Acyclic Sequential Circuits with Hold Registers Test Generation for Acyclic Sequential Circuits wit Hold Registers Tomoo Inoue, Debes Kumar Das, Ciio Sano, Takairo Miara, and Hideo Fujiwara Faculty of Information Sciences Computer Science and Engineering

More information

Energy efficient temporal load aware resource allocation in cloud computing datacenters

Energy efficient temporal load aware resource allocation in cloud computing datacenters Vakilinia Journal of Cloud Computing: Advances, Systems and Applications (2018) 7:2 DOI 10.1186/s13677-017-0103-2 Journal of Cloud Computing: Advances, Systems and Applications RESEARCH Energy efficient

More information

An Evaluation of Alternative Continuous Media Replication Techniques in Wireless Peer-to-Peer Networks

An Evaluation of Alternative Continuous Media Replication Techniques in Wireless Peer-to-Peer Networks An Evaluation of Alternative Continuous Media eplication Tecniques in Wireless Peer-to-Peer Networks Saram Gandearizade and Tooraj Helmi Department of Computer Science University of Soutern California

More information

Abstract Application and System Model /DATE EDAA

Abstract Application and System Model /DATE EDAA Analysis and Optimization of Fault-Tolerant Embedded Systems wit Hardened Processors Viaceslav Izosimov, Ilia Polian, Paul Pop, Petru Eles, Zebo Peng {viaiz petel zebpe}@ida.liu.se Dept. of Computer and

More information

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result RT. Complex Fractions Wen working wit algebraic expressions, sometimes we come across needing to simplify expressions like tese: xx 9 xx +, xx + xx + xx, yy xx + xx + +, aa Simplifying Complex Fractions

More information

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method International Journal of Statistics and Applications 0, (): -0 DOI: 0.9/j.statistics.000.0 Comparison of te Efficiency of te Various Algoritms in Stratified Sampling wen te Initial Solutions are Determined

More information

h,k 2 Following the poison-antidote terminology of [4], we call antidotes the packets of

h,k 2 Following the poison-antidote terminology of [4], we call antidotes the packets of I 2 NC: Intra- and Inter-Session Network Coding for Unicast Flows in Wireless Networks Hulya Seferoglu, Atina Markopoulou Dept. of EECS, University of California, Irvine {seferog, atina}@uci.edu K. K.

More information

1.4 RATIONAL EXPRESSIONS

1.4 RATIONAL EXPRESSIONS 6 CHAPTER Fundamentals.4 RATIONAL EXPRESSIONS Te Domain of an Algebraic Epression Simplifying Rational Epressions Multiplying and Dividing Rational Epressions Adding and Subtracting Rational Epressions

More information

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes Coarticulation: An Approac for Generating Concurrent Plans in Markov Decision Processes Kasayar Roanimanes kas@cs.umass.edu Sridar Maadevan maadeva@cs.umass.edu Department of Computer Science, University

More information

Tuning MAX MIN Ant System with off-line and on-line methods

Tuning MAX MIN Ant System with off-line and on-line methods Université Libre de Bruxelles Institut de Recerces Interdisciplinaires et de Développements en Intelligence Artificielle Tuning MAX MIN Ant System wit off-line and on-line metods Paola Pellegrini, Tomas

More information

RECONSTRUCTING OF A GIVEN PIXEL S THREE- DIMENSIONAL COORDINATES GIVEN BY A PERSPECTIVE DIGITAL AERIAL PHOTOS BY APPLYING DIGITAL TERRAIN MODEL

RECONSTRUCTING OF A GIVEN PIXEL S THREE- DIMENSIONAL COORDINATES GIVEN BY A PERSPECTIVE DIGITAL AERIAL PHOTOS BY APPLYING DIGITAL TERRAIN MODEL IV. Évfolyam 3. szám - 2009. szeptember Horvát Zoltán orvat.zoltan@zmne.u REONSTRUTING OF GIVEN PIXEL S THREE- DIMENSIONL OORDINTES GIVEN Y PERSPETIVE DIGITL ERIL PHOTOS Y PPLYING DIGITL TERRIN MODEL bsztrakt/bstract

More information

4.2 The Derivative. f(x + h) f(x) lim

4.2 The Derivative. f(x + h) f(x) lim 4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially

More information

Asynchronous Power Flow on Graphic Processing Units

Asynchronous Power Flow on Graphic Processing Units Asyncronous Power Flow on Grapic Processing Units Manuel Marin, David Defour, Federico Milano To cite tis version: Manuel Marin, David Defour, Federico Milano. Asyncronous Power Flow on Grapic Processing

More information

Optimal motion planning for a tethered robot: Efficient preprocessing for fast shortest paths queries

Optimal motion planning for a tethered robot: Efficient preprocessing for fast shortest paths queries 2015 IEEE International Conference on Robotics and Automation (ICRA) Wasington State Convention Center Seattle, Wasington, May 26-30, 2015 Optimal motion planning for a tetered robot: Efficient preprocessing

More information

Analytical CHEMISTRY

Analytical CHEMISTRY ISSN : 974-749 Grap kernels and applications in protein classification Jiang Qiangrong*, Xiong Zikang, Zai Can Department of Computer Science, Beijing University of Tecnology, Beijing, (CHINA) E-mail:

More information

Real-Time Scheduling for WirelessHART Networks

Real-Time Scheduling for WirelessHART Networks Real-Time Scheduling for WirelessHART Networks Abusayeed Saifullah, You Xu, Chenyang Lu, and Yixin Chen Department of Computer Science and Engineering Washington University in St. Louis {saifullaha, yx2,

More information

The (, D) and (, N) problems in double-step digraphs with unilateral distance

The (, D) and (, N) problems in double-step digraphs with unilateral distance Electronic Journal of Grap Teory and Applications () (), Te (, D) and (, N) problems in double-step digraps wit unilateral distance C Dalfó, MA Fiol Departament de Matemàtica Aplicada IV Universitat Politècnica

More information

BRICK: A Novel Exact Active Statistics Counter Architecture

BRICK: A Novel Exact Active Statistics Counter Architecture BRICK: A ovel Exact Active Statistics Counter Arcitecture an Hua Bill Lin Jun (Jim) Xu Haiquan (Cuck) Zao College of Computing, Georgia Tec Dept of ECE, UCSD ABSTRACT In tis paper, we present an exact

More information

Soft sensor modelling by time difference, recursive partial least squares and adaptive model updating

Soft sensor modelling by time difference, recursive partial least squares and adaptive model updating Soft sensor modelling by time difference, recursive partial least squares adaptive model updating Y Fu 1, 2, W Yang 2, O Xu 1, L Zou 3, J Wang 4 1 Zijiang College, Zejiang University of ecnology, Hangzou

More information

H-Adaptive Multiscale Schemes for the Compressible Navier-Stokes Equations Polyhedral Discretization, Data Compression and Mesh Generation

H-Adaptive Multiscale Schemes for the Compressible Navier-Stokes Equations Polyhedral Discretization, Data Compression and Mesh Generation H-Adaptive Multiscale Scemes for te Compressible Navier-Stokes Equations Polyedral Discretization, Data Compression and Mes Generation F. Bramkamp 1, B. Gottsclic-Müller 2, M. Hesse 1, P. Lamby 2, S. Müller

More information

Generalizing Timing Predictions to Set-Associative Caches. Frank Mueller. Humboldt-Universitat zu Berlin. Institut fur Informatik

Generalizing Timing Predictions to Set-Associative Caches. Frank Mueller. Humboldt-Universitat zu Berlin. Institut fur Informatik Generalizing Timing Predictions to Set-Associative Caces Frank Mueller Humboldt-Universitat zu Berlin Institut fur Informatik 10099 Berlin (Germany) e-mail: mueller@informatik.u-berlin.de pone: (+49) (30)

More information

The navigability variable is binary either a cell is navigable or not. Thus, we can invert the entire reasoning by substituting x i for x i : (4)

The navigability variable is binary either a cell is navigable or not. Thus, we can invert the entire reasoning by substituting x i for x i : (4) A Multi-Resolution Pyramid for Outdoor Robot Terrain Perception Micael Montemerlo and Sebastian Trun AI Lab, Stanford University 353 Serra Mall Stanford, CA 94305-9010 {mmde,trun}@stanford.edu Abstract

More information

Energy Efficient Caching for Phase-Change Memory

Energy Efficient Caching for Phase-Change Memory Energy Efficient Cacing for Pase-Cange Memory Neal Barcelo, Miao Zou, Daniel Cole, Micael Nugent, and Kirk Prus Department of Computer Science University of Pittsburg, Pittsburg, Pennsylvania 15260 Email:

More information

SlidesGen: Automatic Generation of Presentation Slides for a Technical Paper Using Summarization

SlidesGen: Automatic Generation of Presentation Slides for a Technical Paper Using Summarization Proceedings of te Twenty-Second International FLAIRS Conference (2009) SlidesGen: Automatic Generation of Presentation Slides for a Tecnical Paper Using Summarization M. Sravanti, C. Ravindranat Cowdary

More information

Efficient Content-Based Indexing of Large Image Databases

Efficient Content-Based Indexing of Large Image Databases Efficient Content-Based Indexing of Large Image Databases ESSAM A. EL-KWAE University of Nort Carolina at Carlotte and MANSUR R. KABUKA University of Miami Large image databases ave emerged in various

More information

Materials: Whiteboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector.

Materials: Whiteboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector. Adam Clinc Lesson: Deriving te Derivative Grade Level: 12 t grade, Calculus I class Materials: Witeboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector. Goals/Objectives:

More information