Interference-Aware Multicast for Wireless Multihop Networks

Size: px
Start display at page:

Download "Interference-Aware Multicast for Wireless Multihop Networks"

Transcription

1 Intefeence-Awae Multicast fo Wieless Multihop Netwoks Daniel Letpatchya School of Electical and Compute Engineeing Geogia Institute of Technology Atlanta, Geogia Douglas M. Blough School of Electical and Compute Engineeing Geogia Institute of Technology Atlanta, Geogia Geoge F. Riley School of Electical and Compute Engineeing Geogia Institute of Technology Atlanta, Geogia Abstact In this pape, we evisit the poblem of optimal tee-based outing stuctues fo multicast in wieless multihop netwoks, but accounting fo the impact of intefeence. Ou analysis is based on the most accuate known intefeence model, namely the SINR-based physical intefeence model. We fist study the poblem in a low-intensity multicast scenaio whee we deive optimal node selection stategies fo diffeent subtee stuctues. We then extend these analyses to account fo intefeence between consecutive packets in highe-ate multicast scenaios. Based on these analyses, we popose and evaluate two new multicast outing stuctues: the intefeence-awae Steine tee (IAST) algoithm, which equies global knowledge of node locations, and the fixed-distance tee meging (FTM) algoithm, which does not equie global knowledge. We show that ou poposed algoithms povide up to 57% eduction in schedule length and up to 41% incease in goodput ove existing tee-based outing stuctues. I. INTRODUCTION In multicast, a single message is deliveed to a goup of destinations in a netwok. This poblem has been studied fo both wied and wieless netwoks. A suvey of multicast potocols fo ad hoc netwoks can be found in [1]. A majo limitation of eseach in this aea, to date, is that the vast majoity of woks ignoe intefeence, which is a significant facto in wieless multihop netwoks. The few woks that do conside intefeence use inaccuate models. In this pape, we cay out the fist eseach study of end-to-end multicast outing stuctues fo wieless multihop netwoks that accounts fo intefeence using accuate intefeence models. We design new intefeence-awae multicast outing stuctues and show that thei pefomance substantially exceeds that of existing multicast algoithms that do not account fo intefeence. Multicast outing appoaches can be classified into thee main categoies: tee-based, mesh-based, and stuctue-less. Tee-based potocols [2], [3], [4], [5] use diffeent kinds of tees as undelying outing stuctue to oute multicast messages to all destinations. Tee stuctues povide simple and cost effective outing infastuctues at the cost of obustness in the pesence of mobility and link failues. Mesh-based potocols [6], [7], [8] use mesh stuctues to povide obustness by having multiple outes between the souce and destinations at the cost of mesh stuctue maintenance. Stuctue-less multicast potocols do not explicitly ceate a outing stuctue but ely on othe methods such as netwok coding [9], [10] and geogaphic outing [11], [12]. In this initial study of intefeence-awae multicast, we focus on tee-based potocols due to thei simplicity and cost effectiveness. Extending the analyses and concepts developed heein to mesh-based potocols is an inteesting topic fo futue eseach. Most tee-based potocols have been based on shotest path tees o Steine tees. The goal of shotest path tees (e.g. [3], [4]) is to minimize the distance between the souce and each destination, while the goal of Steine tees (e.g. [13], [14]) is to minimize the sum of the distances in the multicast tee. A few studies compaing these pedominant tee stuctues have been done. Ruiz and Gomez-Skameta [15] studied shotest path tees and Steine tees. The authos agued that Steine tee is not appopiate fo wieless netwoks and poposed that the poblem should be e-fomulated to minimize the cost in tems of the numbe of fowading nodes. They poposed a geedy heuistic algoithm, called, and showed that the poposed algoithm is able to educe the numbe of fowading nodes. Nguyen [16] evisited the study and evaluated the pefomance of shotest path tees, Steine tees, and the algoithm in tems of packet delivey atio. The autho showed that shotest path tees offe the best pefomance in tems of packet delivey atio. Howeve, neithe of these studies accounted fo intefeence in thei evaluations. Othe wok that studied multicast scaling law and stuctue ae [17], [18], [19]. The authos studied the asymptotic multicast capacity of multihop wieless netwoks. In [19], a comb stuctue fo multicast tees that achieves capacity in the ode sense was poposed. While the wok did account fo intefeence, they used the potocol model fo intefeence, which is not as accuate as the physical intefeence model, and they wee concened pimaily with asymptotic scaling esults, athe than best pefomance on finite netwoks. A numbe of studies conside the multicast poblem with diffeent goals such as enegy [20], [21], [22], cost of building and maintaining multicast tees [23], We do not study these issues in ou pape. Scheduling is an impotant aspect of wieless multihop netwoks with intefeence. Scheduling can incease netwok thoughput by letting devices access the channel in an odely

2 fashion instead of the moe consevative contention-based access. The only multicast scheduling woks of which we ae awae ae [24], [25]. Howeve, [24] is pimaily concened with powe contol and scheduling plays only a mino ole, while [25] only deals with one-hop (not end-to-end) multicast. In this pape, we conside the poblem of intefeenceawae multicast outing tee in wieless multihop netwoks, using an accuate physical intefeence model. Fist, we study the poblem fo low-intensity multicast. We classify nodes into diffeent classes and deive optimal intefeence-awae outing stategies fo each class. Based on those analyses, we popose a new multicast outing stuctue based on Steine tees fo the low-intensity case. Next, we conside a geneal multicast scenaio and popose a second new multicast outing stuctue that is not based on Steine tee. We evaluate ou poposed stuctues though simulation in both the TDMA and CSMA/CA settings. Simulation esults demonstate that, compaed to existing appoaches, ou poposed stuctues educe the schedule length up to 57% in TDMA netwoks and achieve up to 41% highe goodput in CSMA/CA netwoks. II. SYSTEM MODEL AND PROBLEM FORMULATION We conside a communication gaph G = (V,E), whee V is a set of all wieless nodes. An edge (u,v) E if and only if d(u,v) t, whee d(u,v) is the Euclidean distance between nodes u and v and t is the maximum tansmission ange. We ae given a multicast souce s V and a set of multicast destinations M V. The poblem is to constuct a multicast tee ooted at s that spans M, along with a patition of a set of non-leaf nodes in the multicast tee S 1,S 2,...,S k, whee S i is a set of feasible tansmissions with the given intefeence model. A feasible tansmission set is a set whee, if all nodes in the set tansmit to thei espective eceives at the same time, all eceives will successfully eceive the tansmissions. We call the patition S 1,S 2,...,S k a schedule with schedule length k. Ou goal is to constuct a minimum length schedule. We adopt the classical model fo adio signal popagation, which is efeed to as the log-distance popagation loss model. The adio signal stength at a distance d fom the tansmitte is given by P d α, whee P is the tansmission powe and α is the path loss coefficient. We assume that nodes ae not equipped with intefeence cancellation capabilities. In this pape, we conside the physical intefeence (PI) model [26]. In the PI model, intefeence fom all concuent tansmittes in the netwok, no matte how distant, is factoed into the signal-to-intefeence atio (SIR) value at the eceive. Specifically, the tansmission will be coectly eceived by the eceive if and only if the SIR value at the eceive is lage than the SIR theshold (SIR min ). III. INTERFERENCE-AWARE ROUTING FOR LOW INTENSITY MULTICAST In this section, we conside low intensity multicast, which is defined as a situation whee the time between two consecutive packets geneated by the souce is geate than the time it takes to delive one multicast packet to all destinations. We w 2 w d 1 θ u d v 1 v 2 Fig. 1. A banching node u banching into two paths. fist conside an ideal netwok whee we ae given a souce node s and a set of destination nodes M and we ae able to place exta nodes anywhee in the netwok when building a multicast tee. Ou goal is to constuct a tee ooted at s that spans M while taking intefeence into account. To achieve this, we classify nodes in a multicast tee into thee classes. Leaf nodes nodes with no child. Path nodes nodes with exactly one child. Banching nodes nodes with moe than one child. Accoding to ou classification, leaf nodes do not fowad data in the multicast tee and so they do not geneate intefeence. Futhemoe, along a single path, thee is no intefeence between nodes since thee is only one packet being tansmitted at a time. Thus, the optimal stuctue along a single path is fo each tansmission to tavel as fa as possible, i.e. to sepaate consecutive nodes by the tansmission ange. Next, we detemine optimal stuctues involving banching nodes, which ae non-tivial to analyze. A. Banching Nodes with Two Childen We fist conside a banching node u with two childen v 1 and w 1 as shown in Fig. 1. The distance of the fist hop fom u to v 1 and u to w 1 is d, whee d t. The fist tansmission fom u to v and w is done by using a multicast o boadcast. The second tansmissions fom v 1 to v 2 and fom w 1 to w 2 occu at almost the same time. The coss intefeence fom the concuent tansmission is given by P [ 2 +2d(1 cosθ)+2d 2 (1 cosθ)] α/2. Combining the eceived signal stength and the intefeence, we set SIR to SIR min and convet to decibel to get ) 0 = (1 10 SIRdB min 5α 2 +2d(1 cosθ)+2(1 cosθ)d 2. Solving the equation, we get = b 2 d whee b 2 = 1 cosθ + (cosθ 1)( ( SIRdB min 5α ) +cosθ) ( SIRdB min 5α ) The esult shows that the distance between nodes afte the banching point is popotional to the distance of the fist hop. Let i be the depth fom u and i be a distance between a node at depth i and a node at depth i + 1. Fo all i > 0, we can conside d as a sum of all j, whee 0 j < i, we get i 1 i = b 2 j = b 2 (b 2 +1) i 1 0, whee i t and 0 t j=0 This shows that the distance between v i and v i+1 gows as v i gets futhe away fom u until the distance eaches t,

3 Fig. 2. w 2 w 1 d θ = 2π 3 d s d v 1 u 1 v 2 u 2 A banching node s banching into thee paths. which is the tansmission ange and coesponds to the optimal distance fo the single-path case. B. Banching Nodes with Thee Childen Next, we conside a banching node s with thee childen u 1, v 1, and w 1 as shown in Fig. 2. Applying a simila analysis to the two-child case, we get = b 3 d whee b 3 = ( log 2+SIRdB min 5α ) 10log 2+SIRdB min 2(10 5α 1) Again, the distance between nodes gows as nodes get futhe away fom the banching node, albeit in a slightly diffeent manne. Hee also, the distance will eventually each the limit t. Using the peceding analyses, we pesent an appoximation algoithm to build a multicast tee. The algoithm applies diffeent outing stategies depending on which is the applicable case (single path, two-way banch, o thee-way banch). C. Intefeence-Awae Steine Tee Algoithm (IAST) Since the optimal outing stategies ae diffeent fo diffeent classes, ou goal is to use diffeent outing stategies fo diffeent classes when building a multicast tee. Howeve, one of the difficulties of applying the appoach is identifying whee banching should take place. Ou goal is to fist identify banching nodes locations and use diffeent outing stategies fo diffeent classes when building a multicast tee. The high level idea of the intefeence-awae Steine tee outing algoithm is as follows: we ae given nodes that must be connected in a multicast tee. These nodes ae the souce node and all the destination nodes. The fist step is to identify how these nodes should be connected in a tee. The algoithm uses a Euclidean Steine Tee appoximation algoithm to locate ideal Steine nodes in the netwok, using M {s} as input. We call the etuned Steine Tee a Steine Ovelay Tee since it shows the big pictue connections between nodes in the netwok. An edge between two nodes in the Steine Ovelay Tee suggests that the two nodes should be connected by a path in the oiginal gaph. Note that if we viewm {s} as a multicast goup. The multicast goup will have one Steine Ovelay Tee egadless of which node is a souce node. Fo each Steine node, the algoithm finds a eal node neaest to the ideal Steine node location to act as the Steine node. The algoithm consults the Steine Ovelay Tee to detemine if the cuent node should be consideed as the souce node, a path node, o a banching node. The algoithm. k u v Fig. 3. An infinitely-long, equally-spaced linea netwok. uses diffeent distances fo diffeent node classes based on the analyses in Sections III-A and III-B. Note that Steine tees contain only two-way banches and up to one thee-way banch (at the souce), meaning that ou analyses ae sufficient to handle all cases. IV. INTERFERENCE-AWARE ROUTING FOR GENERAL MULTICAST In this section, we conside a moe geneal multicast scenaio whee the souce node may begin tansmission of the next packet befoe all eceives have eceived the pevious packets. As a esult, thee may be moe than one application laye packet being fowaded in the netwok. Multiple application laye packets being fowaded in the netwok means that intefeence in the netwok will be highe than the low intensity multicast case. Since moe than one application laye packet may be pesented in the netwok, we ae unable to diectly apply the analyses fom Section III. The exta intefeence means that the distances between nodes must be shotened to allow fo concuent tansmissions. To tackle this poblem, we intoduce a scaling facto, f, to be used to scale down the distances analyzed fom the Section III. Ou goal is to find the most appopiate value fo the scaling facto f. A. Scaling Facto in Path Nodes Conside a linea path in one dimension with infinite length as shown in Fig. 3. If all nodes ae equally sepaated by a sepaation = t, then all links in the path ae on the edge of the SINR theshold and no concuent tansmission is possible. The schedule length in this case will be on the ode of the length of the path. This phenomenon is known as the black-gay link paadox [27]. Edges with distance exactly equal to the tansmission ange ae efeed to as black links, and they do not allow a single concuent tansmission, no matte how distant. Edges with distance slightly below the tansmission ange ae efeed to as gay links, and they do allow concuent tansmission, although the allowable spatial sepaation might be quite lage. Given the black-gay link paadox, if the sepaations between nodes ae scaled down to = f t, whee 0 < f < 1, it should be possible to have multiple nodes tansmit concuently. Suppose that the schedule length is k. Two consecutive tansmittes ae sepaated by a distance k. Conside a tansmission fom node u to node v, the total intefeence expeienced by v is given by [ i=1 P (ik+) α + ] P (ik ) α, The SIR at the eceive v can be obtained by combining the eceived signal stength and the total intefeence at v, the SIR at v is given by the equation

4 SIR(v) = i=1 1 ]. 1 1 i=1[ (ik+1) + α (ik 1) α The tansmission will be coectly eceived by v if and only if SIR(v) SIR min ; we get the following inequality: 1 [ ] 1 (ik +1) α + 1 (ik 1) α SIRmin 1. (1) We use the convegence integal test to the left hand side of (1) and get 1 (k +1) α + 1 (k 1) α + (k +1)1 α +(k 1) 1 α SIR 1 k(α 1) min. (2) Equation (2) shows that accoding to SIR, the schedule length of an infinitely-long equally-spaced linea netwok depends only on the path-loss coefficient and the SIR min. Thus, the scaling facto can incease spatial euse but Equation (2) shows that the schedule length will eventually convege. Fo the IAST algoithm, the goal of the scaling facto is to accommodate concuent tansmissions fom othe nodes. We scale down the distance used when building a multicast tee by a facto f instead of using distances diectly fom the analyses in Section III. Since the application of the scaling facto is not limited to IAST, we popose ou second intefeence-awae algoithm. B. Fixed-Distance Tee Meging Algoithm The IAST algoithm equies global knowledge of the netwok to appoximate a Euclidean Steine tee and identify candidates to act as Steine nodes. Ou second algoithm, the fixed-distance tee meging (FTM) algoithm, does not equie global knowledge of the netwok. The algoithm gows the souce tee by meging the souce tee with the neaest destination node until all destination nodes ae connected. The high level desciption of FTM algoithm is as follow. The algoithm takes a pefeed scaling facto (f p ) as an input, whee 0 < f p 1. The algoithm uses the same distance = f p t when building a multicast tee. Fo each destination node, the algoithm finds a shotest path in tems of hop counts fom the eceive to all nodes in the netwok. The algoithm now knows the destination node neaest to the souce tee. The algoithm gows the tee fom the souce tee towads the destination node by using the following citeia when selecting the next hop node. 1) the next hop node must be close to the destination node 2) if thee exist multiple next hop nodes, the algoithm picks the next hop node that is closest to all othe emaining destination nodes Afte the selected destination node is meged with the souce tee, the algoithm selects the next destination node neaest to the new souce tee and gows the tee towad the selected node until all destination nodes ae included in the 1 We assume that SIR min > 0, whee SIR min is in a linea atio. tee. In the case whee node density is too low and gowing the tee with = f p t is not possible, FTM gadually inceases until the selected node is successfully meged o = t. C. Scheduling Algoithm To accommodate the outing tee with diffeent distances fo diffeent node classes, we popose a modified vesion of GeedyPhysical scheduling algoithm [28], called Tee-Based GeedyPhysical. The idea of Tee-Based GeedyPhysical is to schedule all fowading nodes at the same depth in the same slot until no moe fowading nodes can be accomodated in the slot. Tee-Based GeedyPhysical then evets back to the oiginal GeedyPhysical. V. PERFORMANCE EVALUATION We evaluate ou algoithms in thee diffeent settings. Fist, we stat by evaluating ou algoithms in a low intensity multicast setting whee the analyses in Section III can be applied diectly. Next, we evaluate ou algoithms in a geneal multicast scenaio whee the analyses cannot be applied diectly and scheduling is equied. Finally, we also evaluate ou algoithms in a CSMA/CA setting whee nodes access the channel in a contention-based manne athe than with TDMA. A. Simulation Paametes and Assumptions We use ns-3.15 simulato to evaluate all algoithms. We use a physical model of g at the data ate of 6 Mbps in the simulation. All nodes use the tansmission powe of 40 mw and themal noise is computed at 290K. In all simulations, 2000 nodes wee unifomly distibuted in a deployment aea of 1000 m by 1000 m unless othewise noted. 2 We compae IAST and FTM against existing tee-based stuctues: [15], [16], and [19]. Fo IAST algoithm, we use GeoSteine [29] to find a Euclidean Steine Tee. All esults epoted ae aveaged fom 1000 simulations. B. Low Intensity Multicast We begin ou evaluation with a low intensity multicast scenaio. We vaied the numbe of multicast destination nodes fom 10 to 100. To pevent multiple nodes fom fowading packets at exactly the same time, we inseted andom delay between 0 µs and 1000 µs befoe nodes fowad packets to thei childen. We measued the delay between the time when the souce node tansmits the packet and the time when all destinations have eceived the packets. The simulation esults ae epoted in Fig. 4. As seen fom Fig. 4, the IAST algoithm has the lowest delivey delay among all algoithms, even though has the shotest distance between the souce and evey destination. has a lage numbe of nodes and this ceates moe contention in the netwok, which means that nodes have to delay thei tansmissions when the channel is sensed as busy. and both have even longe delays, because they have both longe paths and highe contention. 2 With g at 6 Mbps, tansmission ange is athe small and faily high node density is equied fo the netwok to be connected.

5 Delay (ms) Schedule length Fig IAST Numbe of multicast destinations End-to-end delivey delay fo low-intensity multicast Fig. 5. C. Geneal Multicast Scaling facto (f) IAST Schedule length vs. scaling facto In this set of simulations, we conside a geneal multicast application whee the application geneates packets faste than the time it takes to delive packets to all destinations. Thus, we use a scaling facto and scheduling in the algoithms. We fist evaluate the scaling facto since it is a significant paamete affecting IAST and FTM pefomances. In this simulation, the numbe of multicast destinations is fixed at 10. We vay the scaling facto fom 0.3 to 1.0 and collect the schedule lengths etuned by IAST algoithm. We did not use the scaling facto below 0.3 since the netwok became disconnected in some simulations. The simulation esults ae epoted in Fig. 5. Fig. 5 confims that using diffeent scaling facto affects IAST pefomance. If the scaling facto is too small, the exta nodes included in the multicast tee outweigh the gain of spatial euse. If the scaling facto is too lage, spatial euse is not possible. Howeve, pefomance is quite stable acoss a faily wide ange of scaling factos, e.g. 0.5 to 0.7. Based on this analysis, we have set the scaling facto to 0.7 in the emaining simulations. We now conside the schedule length poduced by diffeent multicast outing stuctues, including ou IAST and FTM stuctues. Fo these simulations, we vaied the numbe of destinations fom 10 to 100. Thee ae multiple possible combinations between outing and scheduling algoithms. IAST- GP efes to IAST outing combined with the GeedyPhysical scheduling, IAST-TGP efes to IAST outing combined with Tee-Based GeedyPhysical. Fo, and, we epot the esults fom GeedyPhysical only since the diffeence between GeedyPhysical and Tee-Based GeedyPhysical ae not statistically significant with 1000 simulations. The schedule length ae epoted in Fig. 6. The esults of Fig. 6 show that the schedule lengths of IAST and FTM ae substantially shote than,, and. FTM schedules ae appoximately half the length of schedules, 1/3 the length of schedules, and less than 1/4 the length of schedules fo highe numbes of destinations. The shote schedule lengths means that IAST (o FTM) can suppot moe tansmissions than othe stuctues within the same time peiod. As expected, and Schedule length Schedule length IAST-GP FTM IAST-TGP Numbe of multicast destinations Fig. 6. Schedule length vs. numbe of destinations IAST-GP 7 6 FTM 5 IAST-TGP Fig. 7. Numbe of nodes Schedule length vs. node density achieved thei espective goals of shotest aveage path length and minimum numbe of fowading nodes. Howeve, outes built by and mostly consist of black links that cannot be activated concuently with any othes. As a esult, most of the fowading nodes selected by and must be scheduled sequentially, which inceases the oveall schedule length. The pesence of black links is even moe poblematic in since the numbe of fowading nodes is not taken into account, esulting in a vey lage numbe of fowading nodes that must be scheduled sequentially. Fo stuctue, the igid stuctue of esults in longe schedule length. We also evaluate the pefomance of all algoithms with vaying netwok density. We kept the numbe of destinations at 10 and vaied the numbe of nodes in the netwok fom 500 to The minimum numbe of nodes could not dop below 500 nodes since the netwok becomes disconnected in some simulations with ou settings of g at 6Mbps. The schedule lengths ae epoted in Fig. 7. As seen fom Fig. 7, the schedule lengths of IAST and FTM algoithms incease as the node density deceases. This effect is paticulaly noticeable fo IAST, because the closest nodes to ideal Steine node locations can be quite fa, meaning that the tee stuctues begin to deviate significantly fom ideal Steine tees. Since FTM is not built on Steine tees, it is less susceptible to the lack of ideal node locations and its schedule length does not incease as damatically fo lowe node densities. Even at the lowest node density, FTM s schedule length is about 17% shote than s, almost 34% lowe than s, and moe than 55% lowe than s. D. Contention-based Channel Access Although in CSMA/CA netwoks, tansmissions cannot be pecisely scheduled, we hypothesized that the geate tansmission concuency facilitated by ou intefeence-awae algoithms would still tanslate into bette pefomance fo the CSMA/CA case. To evaluate this, we pefomed ns-3 simulations using the standad ns model. To pevent multiple nodes fom fowading packets at exactly the same

6 Goodput (Mbps) IAST FTM Numbe of multicast destinations Fig. 8. Goodput of diffeent potocols. time, we inseted andom delay befoe nodes fowad packets to thei childen. The andom delay was chosen unifomly between 0 µs and 1000 µs. We measued the maximum goodput and epot the esults in Fig. 8. Note that thee is no scheduling in this CSMA/CA simulation, thus, only one vaiation of IAST is epoted. As seen fom Fig. 8, IAST and FTM still outpefom and even without explicit scheduling. In IAST and FTM, concuent tansmission is possible while black links in and ae intoleant of even a small intefeence fom concuent tansmissions. The andom delay helps mitigate the poblem in and. Without the andom delay, and pefomance was even lowe than the epoted esults. Thus, ou intefeence-awae multicast outing stuctues pemit highe levels of concuency and this esults in significant pefomance benefits even without explicit scheduling. VI. CONCLUSIONS In this pape, we have studied the poblem of multicast outing and scheduling fo wieless multihop netwoks. We have classified nodes in multicast tees into diffeent classes and shown by analyzing an accuate physical intefeence model that diffeent classes equie diffeent outing stategies to poduce optimal schedules. Based on these analyses, we have poposed two joint outing and scheduling algoithms fo multicasting in wieless multihop netwoks. We have evaluated the pefomance of diffeent algoithms though simulation and shown that the poposed algoithms outpefom othe algoithms in tems of schedule lengths and goodput. VII. ACKNOWLEDGEMENTS This eseach was suppoted in pat by the National Science Foundation unde Gants CNS and CNS REFERENCES [1] L. Junhai, Y. Danxia, X. Liu, and F. Mingyu, A suvey of multicast outing potocols fo mobile ad-hoc netwoks, Communications Suveys Tutoials, IEEE, vol. 11, no. 1, pp , [2] E. Roye and C. E. Pekins, Multicast opeation of the ad-hoc ondemand distance vecto outing potocol, in Poc. 5th Int. Conf. Mobile Computing and Netwoking, [3] L. Ji and M. S. Coson, Diffeential destination multicast-a MANET multicast outing potocol fo small goup, in Poc. 20th Annu. Joint Conf. IEEE Compute and Communications Societies, vol. 2, [4] A. Penttinen, Efficient multicast tee algoithm fo ad hoc netwoks, in IEEE Int. Conf. Mobile Ad-hoc and Senso Systems, 2004, pp [5] J. Yi and C. Poellabaue, Real-time multicast fo wieless multihop netwoks, Computes & Electical Engineeing, vol. 36, no. 2, pp , [6] S.-J. Lee, M. Gela, and C.-C. Chiang, On-demand multicast outing potocol, in Wieless Communications and Netwoking Conf., vol. 3, 1999, pp [7] R. Vaishampayan and J. Gacia-Luna-Aceves, Efficient and obust multicast outing in mobile ad hoc netwoks, in IEEE Int. Conf. Mobile Ad-hoc and Senso Systems, Oct. 2004, pp [8] I. I. E and W. K. Seah, Distibuted steine-like multicast path setup fo mesh-based multicast outing in ad hoc netwoks, in IEEE Int. Conf. Senso Netwoks, Ubiquitous, and Tustwothy Computing, vol. 2, 2006, pp [9] D. Lun, N. Ratnaka, R. Koette, M. Medad, E. Ahmed, and H. Lee, Achieving minimum-cost multicast: a decentalized appoach based on netwok coding, in INFOCOM 2005, vol. 3, 2005, pp [10] J.-S. Pak, M. Gela, D. Lun, Y. Yi, and M. Medad, Codecast: a netwok-coding-based ad hoc multicast potocol, Wieless Communications, IEEE, vol. 13, no. 5, pp , [11] J. A. Sanchez, P. M. Ruiz, and I. Stojmnenovic, GMR: Geogaphic multicast outing fo wieless, in 3d Annu. IEEE Communications Society Senso and Ad Hoc Communications and Netwoks, [12] D. Koutsonikolas, S. Das, Y. C. Hu, and I. Stojmenovic, Hieachical geogaphic multicast outing fo wieless senso netwoks, Wieless Netwoks, vol. 16, pp , [13] C. Gui and P. Mohapata, Efficient ovelay multicast fo mobile ad hoc netwoks, in IEEE Wieless Communications and Netwoking, vol. 2, 2003, pp [14] N. Meghanathan, Detemining a sequence of stable multicast steine tees in mobile ad hoc netwoks, in Poc. 44th Annu. Southeast egional Conf. ACM, 2006, pp [15] P. M. Ruiz and A. F. Gomez-Skameta, Appoximating optimal multicast tees in wieless multihop netwoks, in Poc. 10th IEEE Symp. Computes and Communications, 2005, pp [16] U. T. Nguyen, On multicast outing in wieless mesh netwoks, Compute Communications, vol. 31, no. 7, pp , [17] X.-Y. Li, S.-J. Tang, and O. Fiede, Multicast capacity fo lage scale wieless ad hoc netwoks, in Poc. 13th Annu. ACM Int. Conf. Mobile Computing and Netwoking. ACM, 2007, pp [18] G. Rodolakis, A. Laouiti, P. Jacquet, and A. M. Naimi, Multicast ovelay spanning tees in ad hoc netwoks: Capacity bounds, potocol design and pefomance evaluation, Compute Communications, vol. 31, no. 7, pp , [19] S. Shakkottai, X. Liu, and R. Sikant, The multicast capacity of lage multihop wieless netwoks, IEEE/ACM Tans. Netw., vol. 18, no. 6, pp , [20] J. E. Wieselthie, G. D. Nguyen, and A. Ephemides, Enegy-efficient boadcast and multicast tees in wieless netwoks, Mobile Netwoks and Applications, vol. 7, no. 6, pp , [21] Y. Wu, P. A. Chou, and S.-Y. Kung, Minimum-enegy multicast in mobile ad hoc netwoks using netwok coding, IEEE Tans. Commun., vol. 53, no. 11, pp , [22] M. X. Cheng, J. Sun, M. Min, Y. Li, and W. Wu, Enegy-efficient boadcast and multicast outing in multihop ad hoc wieless netwoks, Wieless Communications and Mobile Computing, vol. 6, no. 2, pp , [23] K. Chen and K. Nahstedt, Effective location-guided tee constuction algoithms fo small goup multicast in manet, in INFOCOM 2002, vol. 3, 2002, pp [24] K. Wang, C.-F. Chiasseini, R. R. Rao, and J. G. Poakis, A joint solution to scheduling and powe contol fo multicasting in wieless ad hoc netwoks, EURASIP Jounal on Advances in Signal Pocessing, vol. 2005, no. 2, [25] T. Elebach and T. Gant, Scheduling multicast tansmissions unde sin constaints, in Algoithms fo Senso Systems, C. Scheidele, Ed. Spinge Belin Heidelbeg, 2010, vol. 6451, pp [26] P. Gupta and P. Kuma, The capacity of wieless netwoks, IEEE Tans. Inf. Theoy, vol. 46, no. 2, pp , Ma [27] D. M. Blough, G. Resta, and P. Santi, Appoximation algoithms fo wieless link scheduling with sin-based intefeence, IEEE/ACM Tans. Netw., vol. 18, no. 6, pp , [28] G. Ba, D. M. Blough, and P. Santi, Computationally efficient scheduling with the physical intefeence model fo thoughput impovement in wieless mesh netwoks, Poc. ACM Annu. Int. Conf. Mobile Computing and Netwoking, pp. 2 13, [29] D. M. Wame, P. Winte, and M. Zachaiasen, Exact algoithms fo plane steine tee poblems: A computational study, INATORIAL OPTIMIZATION-DORDRECHT-, vol. 6, pp , 2000.

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Dynamic Topology Control to Reduce Interference in MANETs

Dynamic Topology Control to Reduce Interference in MANETs Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,

More information

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks Available online at www.sciencediect.com Ad Hoc Netwoks 7 (29) 23 247 www.elsevie.com/locate/adhoc Minimizing spatial and time esevation with Collision-Awae DCF in mobile ad hoc netwoks Lubo Song a, Chansu

More information

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

Gravitational Shift for Beginners

Gravitational Shift for Beginners Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

Analysis of Wired Short Cuts in Wireless Sensor Networks

Analysis of Wired Short Cuts in Wireless Sensor Networks Analysis of Wied Shot Cuts in Wieless Senso Netwos ohan Chitaduga Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles 90089, USA Email: chitadu@usc.edu Ahmed Helmy Depatment

More information

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver 1 RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Dive Amit Jain Daji Qiao Kang G. Shin The Univesity of Michigan Ann Abo, MI 4819, USA {amitj,dqiao,kgshin@eecs.umich.edu Abstact The cuent

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

Wormhole Detection and Prevention in MANETs

Wormhole Detection and Prevention in MANETs Womhole Detection and Pevention in MANETs Lija Joy Compute Science and Engineeing KMEA Engineeing College Enakulum, Keala, India lijavj@gmail.com Sheena Kuian K Compute Science and Engineeing KMEA Engineeing

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

Erasure-Coding Based Routing for Opportunistic Networks

Erasure-Coding Based Routing for Opportunistic Networks Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

Event-based Location Dependent Data Services in Mobile WSNs

Event-based Location Dependent Data Services in Mobile WSNs Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,

More information

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok 14260 Email:

More information

The concept of PARPS - Packet And Resource Plan Scheduling

The concept of PARPS - Packet And Resource Plan Scheduling The concept of PARPS - Packet And Resouce Plan Scheduling Magnus Eiksson 1 and Håkan Sätebeg 2 1) Dept. of Signals, Sensos and Systems, Royal Inst. of Technology, Sweden. E-mail: magnus.eiksson@ite.mh.se.

More information

Bo Gu and Xiaoyan Hong*

Bo Gu and Xiaoyan Hong* Int. J. Ad Hoc and Ubiquitous Computing, Vol. 11, Nos. /3, 1 169 Tansition phase of connectivity fo wieless netwoks with gowing pocess Bo Gu and Xiaoyan Hong* Depatment of Compute Science, Univesity of

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks Numbe of Paths and Neighbous Effect on Multipath Routing in Mobile Ad Hoc Netwoks Oday Jeew School of Infomation Systems and Accounting Univesity of Canbea Canbea ACT 2617, Austalia oday.jeew@canbea.edu.au

More information

Lecture # 04. Image Enhancement in Spatial Domain

Lecture # 04. Image Enhancement in Spatial Domain Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency

More information

Separability and Topology Control of Quasi Unit Disk Graphs

Separability and Topology Control of Quasi Unit Disk Graphs Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,

More information

Shortest Paths for a Two-Robot Rendez-Vous

Shortest Paths for a Two-Robot Rendez-Vous Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal

More information

MANET QoS support without reservations

MANET QoS support without reservations SECURITY AND COMMUNICATION NETWORKS Secuity Comm. Netwoks (2010) Published online in Wiley InteScience (www.intescience.wiley.com)..183 SPECIAL ISSUE PAPER MANET QoS suppot without esevations Soon Y. Oh,

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

Characterizing Data Deliverability of Greedy Routing in Wireless Sensor Networks

Characterizing Data Deliverability of Greedy Routing in Wireless Sensor Networks Chaacteizing Data Deliveability of Geedy Routing in Wieless Senso Netwoks Jinwei Liu, Lei Yu, Haiying Shen, Yangyang He and Jason Hallstom Depatment of Electical and Compute Engineeing, Clemson Univesity,

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

An Optimised Density Based Clustering Algorithm

An Optimised Density Based Clustering Algorithm Intenational Jounal of Compute Applications (0975 8887) Volume 6 No.9, Septembe 010 An Optimised Density Based Clusteing Algoithm J. Hencil Pete Depatment of Compute Science St. Xavie s College, Palayamkottai,

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

A Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks

A Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks A Coss-Laye Famewok of QoS Routing and Distibuted Scheduling fo Mesh Netwoks Chi Haold Liu, Athanasios Gkelias, and Kin K. Leung Depatment of Electical and Electonic Engineeing, Impeial College London

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced

More information

New Algorithms for Daylight Harvesting in a Private Office

New Algorithms for Daylight Harvesting in a Private Office 18th Intenational Confeence on Infomation Fusion Washington, DC - July 6-9, 2015 New Algoithms fo Daylight Havesting in a Pivate Office Rohit Kuma Lighting Solutions and Sevices Philips Reseach Noth Ameica

More information

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2 Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

i-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA

i-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA i-pcgrid Wokshop 2016 Apil 1 st 2016 San Fancisco, CA Liang Min* Eddy Banks, Bian Kelley, Met Kokali, Yining Qin, Steve Smith, Philip Top, and Caol Woodwad *min2@llnl.gov, 925-422-1187 LDRD 13-ERD-043

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

The Dual Round Robin Matching Switch with Exhaustive Service

The Dual Round Robin Matching Switch with Exhaustive Service The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line

More information

An Extension to the Local Binary Patterns for Image Retrieval

An Extension to the Local Binary Patterns for Image Retrieval , pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science

More information

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer Using the Gow-And-Pune Netwok to Solve Poblems of Lage Dimensionality B.J. Biedis and T.D. Gedeon School of Compute Science & Engineeing The Univesity of New South Wales Sydney NSW 2052 AUSTRALIA bbiedis@cse.unsw.edu.au

More information

10/29/2010. Rendering techniques. Global Illumination. Local Illumination methods. Today : Global Illumination Modules and Methods

10/29/2010. Rendering techniques. Global Illumination. Local Illumination methods. Today : Global Illumination Modules and Methods Rendeing techniques Compute Gaphics Lectue 10 Can be classified as Local Illumination techniques Global Illumination techniques Global Illumination 1: Ray Tacing and Radiosity Taku Komua 1 Local Illumination

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

How to outperform IEEE802.11: Interference Aware (IA) MAC

How to outperform IEEE802.11: Interference Aware (IA) MAC How to outpefom IEEE802.11: Intefeence Awae (IA) MAC Daniela Maniezzo, Piepaolo egamo, Matteo Cesana, Maio Gela CS Dept. - Univesity of Califonia Los Angeles - UCLA, Califonia, USA Engineeing Dept., Feaa

More information

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network An Efficient andove Mechanism Using the Geneal Switch Management Potocol on a Multi-Potocol abel Switching Netwok Seong Gon hoi, yun Joo Kang, and Jun Kyun hoi Using the geneal switch management potocol

More information

Totally Disjoint Multipath Routing in Multihop Wireless Networks

Totally Disjoint Multipath Routing in Multihop Wireless Networks Totally isjoint Multipath Routing in Multihop Wieless Netwoks Sonia Wahate and Raouf outaba Univesity of Wateloo School of ompute Science Wateloo, anada {spwahate,boutaba}@uwateloo.ca bstact Speading taffic

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1)

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1) 1 Multi Path PERT Ankit Singh and A. L. Naasimha Reddy Electical and Compute Engineeing Depatment, Texas A&M Univesity; email: eddy@ece.tamu.edu. Abstact This pape pesents a new multipath delay based algoithm,

More information

Embeddings into Crossed Cubes

Embeddings into Crossed Cubes Embeddings into Cossed Cubes Emad Abuelub *, Membe, IAENG Abstact- The hypecube paallel achitectue is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability

More information

Heterogeneous V2V Communications in Multi-Link and Multi-RAT Vehicular Networks

Heterogeneous V2V Communications in Multi-Link and Multi-RAT Vehicular Networks 1 Heteogeneous V2V Communications in Multi-Link and Multi-RAT Vehicula Netwoks Miguel Sepulce and Javie Gozalvez Abstact Connected and automated vehicles will enable advanced taffic safety and efficiency

More information

Image Enhancement in the Spatial Domain. Spatial Domain

Image Enhancement in the Spatial Domain. Spatial Domain 8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along

More information

Data mining based automated reverse engineering and defect discovery

Data mining based automated reverse engineering and defect discovery Data mining based automated evese engineeing and defect discovey James F. Smith III, ThanhVu H. Nguyen Naval Reseach Laboatoy, Code 5741, Washington, D.C., 20375-5000 ABSTRACT A data mining based pocedue

More information

Fifth Wheel Modelling and Testing

Fifth Wheel Modelling and Testing Fifth heel Modelling and Testing en Masoy Mechanical Engineeing Depatment Floida Atlantic Univesity Boca aton, FL 4 Lois Malaptias IFMA Institut Fancais De Mechanique Advancee ampus De lemont Feand Les

More information

EFFICIENT ENERGY BASED CONGESTION CONTROL SCHEME FOR MOBILE AD HOC NETWORKS

EFFICIENT ENERGY BASED CONGESTION CONTROL SCHEME FOR MOBILE AD HOC NETWORKS FFICINT NRGY BASD CONGSTION CONTROL SCHM FOR MOBIL AD HOC NTWORKS 1 S.SHJA, 2 DR.RAMACHANDRA V PUJRI 1 Reseach Schola, Bhaathia Univesity, Coimbatoe. 2 Vice-Pincipal, KGiSL Institute of Technology, Saavanampatti,

More information

Monte Carlo Techniques for Rendering

Monte Carlo Techniques for Rendering Monte Calo Techniques fo Rendeing CS 517 Fall 2002 Compute Science Conell Univesity Announcements No ectue on Thusday Instead, attend Steven Gotle, Havad Upson Hall B17, 4:15-5:15 (efeshments ealie) Geomety

More information

A Stable Traffic Engineering Technique for Performance Enhancement of the Non-TCP Elastic Flows *

A Stable Traffic Engineering Technique for Performance Enhancement of the Non-TCP Elastic Flows * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 30, 1115-1129 (2014) A Stable Taffic Engineeing Technique fo Pefomance Enhancement of the Non-TCP Elastic Flows * Ian Telecom Reseach Cente (ITRC) Tehan,

More information

On Error Estimation in Runge-Kutta Methods

On Error Estimation in Runge-Kutta Methods Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment

More information

Reducing Information Gathering Latency through Mobile Aerial Sensor Network

Reducing Information Gathering Latency through Mobile Aerial Sensor Network Reducing Infomation Gatheing Latency though Mobile Aeial Senso Netwok Zhaoquan Gu, Qiang-Sheng Hua, Yuexuan Wang and Fancis C.M. Lau Institute fo Theoetical Compute Science, Institute fo Intedisciplinay

More information

5 4 THE BERNOULLI EQUATION

5 4 THE BERNOULLI EQUATION 185 CHATER 5 the suounding ai). The fictional wok tem w fiction is often expessed as e loss to epesent the loss (convesion) of mechanical into themal. Fo the idealied case of fictionless motion, the last

More information

Improved Utility-based Congestion Control for Delay-Constrained Communication

Improved Utility-based Congestion Control for Delay-Constrained Communication Impoved Utility-based Congestion Contol fo Delay-Constained Communication Stefano D Aonco, Laua Toni, Segio Mena, Xiaoqing Zhu, and Pascal Fossad axiv:5.2799v3 [cs.ni] 2 Jan 27 Abstact Due to the pesence

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

EE 6900: Interconnection Networks for HPC Systems Fall 2016

EE 6900: Interconnection Networks for HPC Systems Fall 2016 EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection

More information

Extract Object Boundaries in Noisy Images using Level Set. Final Report

Extract Object Boundaries in Noisy Images using Level Set. Final Report Extact Object Boundaies in Noisy Images using Level Set by: Quming Zhou Final Repot Submitted to Pofesso Bian Evans EE381K Multidimensional Digital Signal Pocessing May 10, 003 Abstact Finding object contous

More information

Minimizing Application-Level Delay of Multi-Path TCP in Wireless networks: A Receiver-Centric Approach

Minimizing Application-Level Delay of Multi-Path TCP in Wireless networks: A Receiver-Centric Approach Minimizing Application-Level Delay of Multi-Path TCP in Wieless netwoks: A Receive-Centic Appoach Se-Yong Pak, Changhee Joo, Yongseok Pak, and Saewoong Bahk Depament of ECE and INMC, Seoul National Univesity,

More information

Lecture 27: Voronoi Diagrams

Lecture 27: Voronoi Diagrams We say that two points u, v Y ae in the same connected component of Y if thee is a path in R N fom u to v such that all the points along the path ae in the set Y. (Thee ae two connected components in the

More information

An Assessment of the Efficiency of Close-Range Photogrammetry for Developing a Photo-Based Scanning Systeminthe Shams Tabrizi Minaret in Khoy City

An Assessment of the Efficiency of Close-Range Photogrammetry for Developing a Photo-Based Scanning Systeminthe Shams Tabrizi Minaret in Khoy City Austalian Jounal of Basic and Applied Sciences, 5(1): 80-85, 011 ISSN 1991-8178 An Assessment of the Efficiency of Close-Range Photogammety fo Developing a Photo-Based Scanning Systeminthe Shams Tabizi

More information

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits

More information

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs Fault-Toleant Routing Schemes in RDT(,,)/α-Based Inteconnection Netwok fo Netwoks-on-Chip Designs Mei Yang, Tao Li, Yingtao Jiang, and Yulu Yang Dept. of Electical & Compute Engineeing Univesity of Nevada,

More information

Fast quality-guided flood-fill phase unwrapping algorithm for three-dimensional fringe pattern profilometry

Fast quality-guided flood-fill phase unwrapping algorithm for three-dimensional fringe pattern profilometry Univesity of Wollongong Reseach Online Faculty of Infomatics - Papes (Achive) Faculty of Engineeing and Infomation Sciences 2010 Fast quality-guided flood-fill phase unwapping algoithm fo thee-dimensional

More information

Mobility Pattern Recognition in Mobile Ad-Hoc Networks

Mobility Pattern Recognition in Mobile Ad-Hoc Networks Mobility Patten Recognition in Mobile Ad-Hoc Netwoks S. M. Mousavi Depatment of Compute Engineeing, Shaif Univesity of Technology sm_mousavi@ce.shaif.edu H. R. Rabiee Depatment of Compute Engineeing, Shaif

More information

Modeling spatially-correlated data of sensor networks with irregular topologies

Modeling spatially-correlated data of sensor networks with irregular topologies This full text pape was pee eviewed at the diection of IEEE Communications Society subject matte expets fo publication in the IEEE SECON 25 poceedings Modeling spatially-coelated data of senso netwoks

More information

Computer Networks. TCP Libra: Derivation, analysis, and comparison with other RTT-fair TCPs

Computer Networks. TCP Libra: Derivation, analysis, and comparison with other RTT-fair TCPs Compute Netwoks 54 (2010) 2327 2344 Contents lists available at ScienceDiect Compute Netwoks jounal homepage: www.elsevie.com/locate/comnet TCP Liba: Deivation, analysis, and compaison with othe RTT-fai

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,

More information