Totally Disjoint Multipath Routing in Multihop Wireless Networks

Size: px
Start display at page:

Download "Totally Disjoint Multipath Routing in Multihop Wireless Networks"

Transcription

1 Totally isjoint Multipath Routing in Multihop Wieless Netwoks Sonia Wahate and Raouf outaba Univesity of Wateloo School of ompute Science Wateloo, anada bstact Speading taffic ove multiple paths has been shown to enhance netwok pefomance compaed to single path outing. Howeve, the oute coupling effect specific to wieless envionments (consequent to the shaed tansmission medium) can significantly educe the benefits of such an appoach. In this pape, we focus on the -path outing poblem in a non-mobile and non enegy-constained netwok. We evaluate the netwok pefomance and the effect of intefeence in a single soucedestination pai scenaio and fo multiple souce-destinations pais. In the fome case, we povide an analytical evaluation of the thoughput and popose a position-based algoithm to iteatively find a path between a souce and a destination. In the latte case, we demonstate how intefeence can significantly degade the nominal netwok capacity and void the benefits of multipath outing. I. INTROUTION Multipath outing is pomoted as an altenative to single path outing fo its potential to addess issues such as oute failue and ecovey, and netwok congestion. In enegy constained netwoks such as ad hoc netwoks and senso netwoks, it has been demonstated that multipath outing achieves highe pefomance than single path outing esulting in an oveall lowe powe consumption [] [11]. Recently, poposals fo multipath outing in wieless netwoks have flouished, the main contibutions focusing on eithe impoving path eliability though the establishment of backup paths [8] [1] [1] o on optimizing netwok esouce utilization via load distibution among seveal paths [9] [14]. Vaious path selection stategies have been poposed with diffeences in the paametes to optimize (packet dop atio, ovehead, o end-to-end delays), the level of fault toleance equied, o the congestion avoidance stategy (link-disjoint vs. node-disjoint paths). Seveal multipath outing appoaches consisted in adapting pominent single path outing potocols such as OV and SR [9] [13] fo multiple paths outing, by modifying the fowading pocess of esouce equests and the infomation maintenance at intemediay nodes [1] [1] []. These woks have consideed some (o all) of the constaints petaining to ad hoc netwoks: node mobility, enegy limita- This eseach is patially suppoted by NORTEL, ommunications and Infomation Technology Ontaio (ITO) and the Natual Sciences and Engineeing Reseach ouncil of anada (NSER). tions, high netwok density and limited computation capabilities. Howeve, only a few woks have actually consideed the effect of intefeence in multipath outing and, to the best of ou knowledge, none has povided an analytical evaluation of the netwok pefomance in this context. In this wok, we povide an evaluation of the thoughput in a multipath outing stategy while taking into consideation the impact of intefeence. We focus on netwoks with fixed and non-enegy constained wieless backbone, with potentially enhanced capabilities such as GPS systems. We adopt an incemental appoach to addess this poblem by fist consideing only the intefeence between a same souce-destination pai and next, between multiple souces and destinations. The emainde of the pape is oganized as follows. In Section II, we descibe the challenges of multipath outing in wieless envionments. We pesent the -path outing poblem in Section III. In Section IV, we povide an analytical evaluation of the netwok thoughput fo the single souce-destination scenaio and focus on the multiple souce-destination pais case in Section V. Section VI concludes this pape. II. MULTIPTH ROUTING IN MULTIHOP WIRELESS. Route coupling NETWORKS In wieless communications, sevee pefomance degadation can esult fom intefeence of concuent data tansmissions. The shaed tansmission medium constains all nodes in the intefeence ange of a sende o eceive to inactivity until completion of the ongoing communication. When adopting a multipath stategy, this poblem is futhe exacebated as, in ode to incease the nominal thoughput beyond what single path outing would offe, it is necessay to guaantee that the chosen paths do not intefee with each othe. The set of paths between a souce node s and a destination node t can be of two sots: link-disjoint paths: one communication link can not be shaed by seveal paths. node-disjoint paths: a same node can not be pat of seveal paths. To account fo the potential intefeence between concuent data tansmissions, it is impotant to distinguish the two following subcases, in which distinct paths can be:

2 1) edge-connected and theefoe intefee. This phenomenon of intefeence between two (o moe) paths is known as oute coupling. ) -edge-connected and do not intefee. This latte case is efeed to as totally disjoint paths in the emainde of this pape. To evaluate the impact of such topologies on the maximal achievable thoughput, let us conside that a souce node and a destination node ae hops away, with a nominal netwok capacity of (thoughput that can be achieved at the M laye in one hop [5]). In the example consideed, when the paths ae totally disjoint, the thoughput is limited to /5 (Fig. 1a) as the entie path is in the intefeence ange of the middle link (epesented in bold in Fig. 1). When the paths ae node-disjoint but ae 1-edge connected, the maximal thoughput is bounded by / (Fig. 1b). This thoughput is futhe educed to /9 when a node is shaed by paths (Fig. 1c).. Related Woks In [1], the authos emphasized the impact of oute coupling effect, which occus when two paths ae located close enough to intefee. They poposed a famewok fo multipath outing in ad hoc netwoks using diectional antennas. ontol packets ae exchanged in omni-diectional mode wheeas data packets ae tansmitted in diectional mode, theefoe allowing multiple tansmissions at the same time. This mechanism appeas nonetheless insufficient to pevent data collision as contol packets ae boadcast and can conceivably intefee with any ongoing data communication occuing in the vicinity of the sende o the eceive. Theefoe the usefulness of diectional antennas in this context is disputable. Inte-path intefeence has also been consideed in [19], in which the authos poposed a path selection mechanism based on the intefeence level between two paths (fo a given soucedestination pai), detemined empiically via measuements. Few woks have tied to deive an analytical fomulation of the pefomance of multipath and single path outing algoithms in multi-hop wieless netwoks. In [15], the authos assumed that, when the netwok density is high enough, outes can be appoximated by staight lines. Theefoe, by computing the numbe of outes going though a paticula node, the elayed taffic can be evaluated and the numbe of queued packets can be computed. simila appoach is used fo multipath outing but without specifically consideing the numbe of outes pe connection. [3] impoved ove the pevious wok by alleviating the esults obtained by [15] fom the assumption of unifom load distibution. The authos consideed that in k-shotest paths outing the outes between a souce and a destination ae contained within a ectangula aea and, given a destination node and a elay node, the position of the possible souce nodes can be detemined. ll the nodes satisfying these conditions ae assumed to be pat of a path going fom the souce to the destination. ut these two woks did not take into consideation the poblem of intefeence, limiting thei applicability to wieless netwoks. III. TOTLLY-ISJOINT -SHORTEST ROUTING. Poblem efinition In this pape, we focus on a special case of multipath outing: -path outing. efinition Given a diected gaph G(V,E) and two nodes (s, t) V, -path consists of finding two paths P 1 and P between s and t such that: a) all the nodes in P 1 and all the nodes in P fom a connected gaph; and b) thee exists no edge between any node in P 1 and any node in P.. ssumptions and esign ecisions In the emainde of the pape, the following assumptions and design decisions have been made. Fist, the nodes ae unifomly distibuted with a density ρ in an aea of adius R. Fo simplification, the intefeence ange is assumed to be the same as the tansmission ange (this does not impact the computation but simplifies the poblem fomulation). We futhe conside that the netwok density is high enough to appoximate the shotest path between any soucedestination pai by a staight line. Theefoe, the -path poblem can be educed to abstacting a path as a tajectoy and to detemining the pobability that a node is located on it. s we focus on totally-disjoint -shotest paths, the solution paths P 1 and P should be spaced by at least a distance of (intefeence ange) to pevent the oute coupling effect as peviously descibed. s we ae looking fo the shotest paths, the sets of possible solutions ae theefoe located in the bands of width (whose computation is futhe descibed). IV. THROUGHPUT ESTIMTION: THE SINGLE SOURE-ESTINTION SENRIO. Multipath outing vs. Single path outing To estimate the benefits of multipath outing ove single path outing, we un seveal simulations in the ns-.8 netwok simulato [4]. IEEE 8.11b is used as the undelying M potocol and UP as the tanspot potocol. The outing is static and no ovehead due to oute establishment is accounted fo. The netwok is composed of a souce node and a destination node located hops apat (Fig. ). We evaluate the thoughput fo a single path stategy, a multipath stategy with totally disjoint paths and a multipath stategy with intefeing paths (the paths ae 1m apat). single flow is sent fom Node to Node. The simulation paametes ae summaized in Table I. Souce Fig estination Netwok topology fo the multipath scenaio

3 Souce estination Souce estination Souce estination (a) without connection (b) with link connection (c) with node connection Fig. 1. ollision domains (shadowed aeas) (a) Single Path (b) Intefeing -path (c) Non-intefeing -path Fig. 3. Thoughput ataate Packet size Tansmission ange Taffic Tanspot Potocol Routing Potocol 11Mbps 15 bytes 5m R at.5 packets/s UP Static TLE I SIMULTION PRMETERS Fig. 3 epesents the thoughput measued at the destination node. We can obseve that the highest pefomance is achieved in the multipath scenaio without intefeence (Fig. 3c), wheeas the pefomance significantly deceases when intefeence is intoduced and with single path outing. This esult cooboates the necessity of using non intefeing paths when a multipath outing stategy is adopted.. Thoughput Estimation: Methodology lthough we ae focusing in this pape on the evaluation of the thoughput in a totally-disjoint -shotest path poblem, a simila method can be applied to addess the k-shotest paths outing poblem. Let and be a souce-destination pai and F a node pat of a path between and. The evaluation of the thoughput at F necessitates to evaluate the taffic geneated by the node itself and the taffic fowaded by F but geneated by nodes geogaphically distant fom F. Theefoe, the thoughput computation can be boken into two steps: Step 1: etemine the maximum numbe of paths going though node F. Step : etemine the pobability of paticipation of Node F in the fowading pocess. Indeed, being geogaphically located on the tajectoy between and does not necessaily imply a node paticipation in the fowading pocess. Fo instance, if the communication between node and node necessitates 4 hops, only 3 elay nodes ae needed, although moe nodes (depending on the netwok density) can be potential candidates.. etailed nalysis 1) Relay Taffic: To compute the numbe of paths going though a paticula node F, we need to locate the souce and destination nodes that can potentially have a path going though F. The method consists in computing the tangents to the cicle centeed at F of adius /. The tangents and thei paallel located at define an aea in which the souce and destination node should be located. The equation of the cicle F centeed at F with adius / can be staightfowadly deived as: x + y xx F yy F + x F + y F (/) = (1) The equation of the tangent to F at P 1 (x 1,y 1 ) is: xx 1 +yy 1 x F (x+x 1 ) y F (y +y 1 )+x F +y F (/) = () The coodinates of the intesection points (x,y ) and (x,y ) between the tangent and the cicle O centeed at can be detemined fom Eq. 1 and Eq.. Fo each point P 1

4 F, we can theefoe compute the aea whee the possible souce and destination nodes ae located, and by consequence the maximal numbe of paths going though F at P 1.We obtain: N max( F,P 1) = (x x 1 ) +(y y 1 ) (x x 1 ) +(y y 1 ) ρ (3) Fom this, we need to emove the paths whose length is less than (meaning that the souce node and destination node ae in diect tansmission ange of each othe). This can be deived by applying ofton s fomula [18]. Let us conside n points ξ 1,..,ξ n andomly distibuted on a domain S, let H be some event dependent on the nodes position. Let δs be a small pat of S. ofton s fomula states that: δp[h] =n(p [H ξ 1 δs] P [H])S 1 δs (4) We can theefoe obtain: P (X >)= 1 P (X >)= 1 x dx The total numbe of paths to be emoved is theefoe: N em = Let N F (α 1 ) be the numbe of paths going though F at P 1. N F (α 1 ) is the esult of subtacting Eq. 5 to Eq. 3. The next step of the computation consists in detemining the total numbe of paths fo all the points located on F.We fist pefom a tansfomation of P 1 s euclidian coodinates into pola coodinates: x1 = F cosθ F + cosα y 1 = F sinθ F + sinα The maximal numbe of paths N paths going though F can theefoe be obtained by summing up all the possible soucedestination pais on the tangents to F. N paths (, θ) = π (5) N F (α)dα () This can be evaluated with analytical methods. ) Expected Numbe of Fowading Nodes: Let us define the expected pogess as the distance coveed in 1 hop []. This paamete is of significant inteest in ou computation as it is diectly elated to the numbe of hops along a path fom a souce to a destination. The geate the expected pogess, the smalle the numbe of hops. This paamete depends on the netwok density and node distibution. Let z be the maximum expected pogess. With a unifom nodes distibution, the numbe of nodes follow a Poisson distibution. To have a maximum expected pogess z, thee should be at least one node in the aea located between and z, that is to say the pobability p that thee is no node between and z should be vey small: P (N = ) = e ρz = p We can thus deive the following equation: = log(p ) ρz The expected elay taffic pe node (, θ) is theefoe:. Validations (, θ) = () 1 ρz N paths(, θ) (8) To validate ou analysis, we used two methods: 1) We implemented a outing algoithm based on node positioning ) We computed the total elay taffic in a single path outing stategy and compaed it against the total elay taffic in a -path outing stategy. 1) Iteative Position-based Multipath Routing lgoithm: Given the assumptions of ou wok (fixed wieless backbone and possibility to easily obtain the nodes positions), we popose a localization-based outing potocol. The algoithm is implemented as follows. Let V be the set of nodes, S the souce node, T the destination node, N c the cuent elay node, N the next hop node and N oth the othogonal pojection of N on (S, T ). The algoithm consists in iteatively finding the next hop node on each path within the tansmission ange of the cuent elay node and satisfying the intefeence constaints (i.e. the chosen node should be in one of the bands descibed in Fig.??). lgoithm 1 Multipath Routing lgoithm N c = S set = V cuent distance = dist(s, T ) while set = do if dist(n,n oth ) > (/) && dist(n,n oth ) < (/)+ && dist(n c,n) <then if dist(n,t) <cuentdistance then N c = N cuent distance = dist(n,t) end if end if set = set{n} pick N in set end while The algoithm is un fo each souce-destination pai.

5 ) Single path outing: In ode to detemine the numbe of nodes involved in the total elay taffic fo a single path stategy, we need to compute: 1) the total numbe of paths ) the pobability that a path length is less than the tansmission distance (i.e. the souce and destination can communicate diectly) in ode to exclude these paths fom the set of feasible paths 3) the aveage path length M(R) between two nodes located in a disk of adius R given that the path length exceeds the tansmission ange The total numbe of paths N paths is staightfowadly obtained: N paths = ρπr (ρπr 1) (9) The pobability density fo the distance between two andom points located in a cicle of adius R can be expessed as [] [18]: p(x) = x R ( π accos( x R x πr (1 x ))) (1) 4R Theefoe, the pobability that the distance between nodes exceeds the tansmission ange can be deived easily: P (x >)= R p(x)dx (11) Finally, we need to calculate the mean distance between two nodes andomly dopped in a disk given that the distance between these two nodes is geate than a distance (tansmission ange). Let be the mean distance between a node located on the cicumfeence of a cicle of adius R and any othe node located in the cicle whose distance exceeds the tansmission adius. can be expessed as follows: = 1 πr R x accos( x )dx (1) R = KR with K = 1 pi ( α 3 cos3 (α) sin(α) 1 9 sin3 (α)) and α = accos( R ). Theefoe, fo any two points located in a cicle of adius R, the mean distance is: M(R) = 4KR (13) 5 Fom Eq. 9, Eq. 11 and Eq. 1, we can finally deduce the total elay taffic tot : tot = N paths P (x >) ( M 1) (14) The implementation of the methods peviously descibed has been ealized in Matlab.4. oth methods necessay etun the same esults that is efeed as theoy in Fig. 4. We can obseve that both the poposed mathematical fomulation and the theoetical fomulation match closely. Fig. 4. Numbe of paths.4 x implementation theoy density ssessment of the analytical method V. THROUGHPUT ESTIMTION: THE MULTIPLE SOURE-ESTINTION SENRIO In the pevious section, we demonstated that unde cetain conditions, namely when the paths do not intefee, the netwok pefomance in tems of thoughput and end-to-end delay can be significantly impoved. Howeve, this is without consideing the effects of concuent tansmissions between diffeent souce-destination pais. Let us look at the following scenaio with two flows fom to and fom to (Fig. 5). The nodes ae m apat, and the same taffic chaacteistics ae assumed fo both flows (R taffic at.5 packets/s and UP tanspot potocol) (a) Single Path Fig (b) Multipath Netwok topology with coss taffic To estimate the impact of the coss taffic on the nominal capacity, we detemine the maximum collision domains fo a single path and multipath scenaio. The bottleneck links ae epesented by lage solid aows in Fig. ). With a single path outing appoach, the maximal achievable thoughput is /8 wheeas in a multipath outing stategy, the uppe bound is as / (8 /+3) (a) Single Path Fig.. ollision omains (b) Multipath

6 We confimed these esults via simulations implemented in NS- (Fig. ). We can obseve that multipath outing still achieves slightly bette pefomance than single path outing. s expected, the thoughput fo both the single path scenaio and the multipath scenaio degades compaed to the pefomance esults obtained in Section III due to the inceased level of intefeence. The benefit of multipath outing ove single path outing becomes quite insignificant and is expected to vanish if the actual cost of the paths establishment is accounted fo. Thoughput (bit/s) Fig.. x 1 5 single path multipath Simulation time Impact of coss taffic on the thoughput VI. ONLUSION The need to povide pevasive communication at anytime, anywhee and the necessity to cope with the existing constaints of wieless envionments opened new eseach avenues to impove the netwok utilization and optimize the netwok capacity. Multipath outing has been put fowad as a potential solution to addess these issues, and many poposals have been popounded. Howeve, the poblem of intefeence has not been popely addessed, which questions the efficiency of these potocols in eal-wold deployments. In this pape, we focused on two elated poblems: 1) the estimation of the thoughput if only the intefeence of a single souce-destination pai is consideed; and ) the impact of intefeence when multiple souce-destination pais ae consideed. We povided an evaluation of the thoughput fo a -path outing scheme while accounting fo the intefeence of concuent data tansmissions fo a given souce-destination pai. We demonstated the complexity of the poblem and deived an analytical fomulation of the expected thoughput at each node consideing a unifom node distibution. We also poposed a simple method to establish multiple paths between a souce node and a destination node based on thei coodinates. With multiple souce-destinations pais, although a moe efficient netwok utilization due to a bette load balancing can justify the use of a multipath outing stategy compaed to single path outing, the benefits of multipath outing in tems of thoughput quickly vanish when intefeence is accounted fo. Theefoe, multipath outing can only be of inteest if the taffic distibution is known and if the effect of intefeence can be popely evaluated. Howeve, in most cases, assuming that such infomation is known o can be obtained easily is unealistic paticulaly due to the instability of netwok conditions in wieless envionments and the staleness of infomation (low convegence due to medium contention). In such context, multipath outing does not appea as a sound outing stategy. REFERENES [1].M. bbas and.n. Jain. Path diminution in disjoint multipath outing fo mobile ad hoc netwoks. In 15th IEEE Intenational Symposium on Pesonal, Indoo and Mobile Radio ommunications, volume 1, pages , Sep. 4. [] eepak Ganesan, Ramesh Govindan, Scott Shenke, and eboah Estin. Highly-esilient, enegy-efficient multipath outing in wieless senso netwoks. Mobile omputing and ommunications Review, 5(4):11 5, 1. [3] Y. Ganjali and. Keshavazian. Load balancing in ad hoc netwoks: Single-path outing vs. multi-path outing. In INFOOM, 4. [4] The netwok simulato - ns. [5] Jangeun Jun and M.L Sichitiu. The nominal capacity of wieless mesh netwoks. IEEE Wieless ommunications, 1(5):8 14, Oct. 3. [] M.G. Kendall and P..P Moan. Geometical Pobability. Giffin, London, 193. [] L. Kleinock and J. Silveste. Optimum tansmission adii fo packet adio netwoks o why six is a magic numbe. In Poceedings of the IEEE National Telecommunications onfeence, ecembe 198. [8] S.-J. Lee and M. Gela. odv-b: backup outing in ad hoc netwoks. In IEEE Wieless ommunications and Netwoking onfeence, volume 3, pages , Sept.. [9] S.-J. Lee and M. Gela. Split multipath outing with maximally disjoint paths in ad hoc netwoks. In IEEE Intenational onfeence on ommunications, volume 1, pages 31 35, June 1. [1] Xuefei Li and Lauie uthbet. Node-disjointness-based multipath outing fo mobile ad hoc netwoks. In PE-WSUN 4: Poceedings of the 1st M intenational wokshop on Pefomance evaluation of wieless ad hoc, senso, and ubiquitous netwoks, pages 3 9, 4. [11] Yuzhe Liu and W.K.G. Seah. pioity-based multi-path outing potocol fo senso netwoks. In 15th IEEE Intenational Symposium on Pesonal, Indoo and Mobile Radio ommunications, volume 1, pages 1, Sept. 4. [1]. Nasipui and S.R. as. On-demand multipath outing fo mobile ad hoc netwoks. In Eight Intenational onfeence on ompute ommunications and Netwoks, pages 4, Oct [13] sis Nasipui, Robet astaneda, and Sami R. as. Pefomance of multipath outing fo on-demand potocols in mobile ad hoc netwoks. M/altze Mobile Netwoks and pplications(monet) Jounal, : , 1. [14] M.R. Pealman, Z.J. Haas, P. Sholande, and S.S. Tabizi. On the impact of altenate path outing fo load balancing in mobile ad hoc netwoks. In Fist nnual Wokshop on Mobile and d Hoc Netwoking and omputing, pages 3 1, ug.. [15] P. Pham and S. Peeau. Pefomance analysis of eactive shotest path and multi-path outing mechanism with load balance. In INFOOM, 3. [1] J. Raju and J.J. Gacia-Luna-ceves. new appoach to on-demand loop-fee multipath outing. In Eight Intenational onfeence on ompute ommunications and Netwoks, pages 5 5, Oct [1]. Saha, S. Roy, S. andyopadhyay, T. Ueda, and S. Tanaka. n adaptive famewok fo multipath outing via maximally zone-disjoint shotest paths in ad hoc wieless netwoks with diectional antenna. In IEEE Global Telecommunications onfeence, volume 1, pages 3, ec. 3. [18] Hebet Solomon. Geometic Pobability [19] Ying-Hong Wang, Hung-Zu Lin, and Shu-Min hang. Intefeing-awae qos multipath outing fo ad hoc wieless netwok. In 18th Intenational onfeence on dvanced Infomation Netwoking and pplications, volume 1, pages 9 34, 4. [] Zhongbang Yao, Junfeng Jiang, Pingyi Fan, Zhigang ao, and V.O.K. Li. neighbo-table-based multipath outing in ad hoc netwoks. In The 5th IEEE Semiannual Technology onfeence, volume 3, pages , pil 3.

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

Analysis of Wired Short Cuts in Wireless Sensor Networks

Analysis of Wired Short Cuts in Wireless Sensor Networks Analysis of Wied Shot Cuts in Wieless Senso Netwos ohan Chitaduga Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles 90089, USA Email: chitadu@usc.edu Ahmed Helmy Depatment

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks Numbe of Paths and Neighbous Effect on Multipath Routing in Mobile Ad Hoc Netwoks Oday Jeew School of Infomation Systems and Accounting Univesity of Canbea Canbea ACT 2617, Austalia oday.jeew@canbea.edu.au

More information

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New

More information

Dynamic Topology Control to Reduce Interference in MANETs

Dynamic Topology Control to Reduce Interference in MANETs Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

Erasure-Coding Based Routing for Opportunistic Networks

Erasure-Coding Based Routing for Opportunistic Networks Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant

More information

Interference-Aware Multicast for Wireless Multihop Networks

Interference-Aware Multicast for Wireless Multihop Networks Intefeence-Awae Multicast fo Wieless Multihop Netwoks Daniel Letpatchya School of Electical and Compute Engineeing Geogia Institute of Technology Atlanta, Geogia 30332 0250 Douglas M. Blough School of

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300

More information

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number.

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number. Illustative G-C Simila cicles Alignments to Content Standads: G-C.A. Task (a, b) x y Fo this poblem, is a point in the - coodinate plane and is a positive numbe. a. Using a tanslation and a dilation, show

More information

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok 14260 Email:

More information

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

Bo Gu and Xiaoyan Hong*

Bo Gu and Xiaoyan Hong* Int. J. Ad Hoc and Ubiquitous Computing, Vol. 11, Nos. /3, 1 169 Tansition phase of connectivity fo wieless netwoks with gowing pocess Bo Gu and Xiaoyan Hong* Depatment of Compute Science, Univesity of

More information

Characterizing Data Deliverability of Greedy Routing in Wireless Sensor Networks

Characterizing Data Deliverability of Greedy Routing in Wireless Sensor Networks Chaacteizing Data Deliveability of Geedy Routing in Wieless Senso Netwoks Jinwei Liu, Lei Yu, Haiying Shen, Yangyang He and Jason Hallstom Depatment of Electical and Compute Engineeing, Clemson Univesity,

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

Wormhole Detection and Prevention in MANETs

Wormhole Detection and Prevention in MANETs Womhole Detection and Pevention in MANETs Lija Joy Compute Science and Engineeing KMEA Engineeing College Enakulum, Keala, India lijavj@gmail.com Sheena Kuian K Compute Science and Engineeing KMEA Engineeing

More information

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE 5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

EFFICIENT ENERGY BASED CONGESTION CONTROL SCHEME FOR MOBILE AD HOC NETWORKS

EFFICIENT ENERGY BASED CONGESTION CONTROL SCHEME FOR MOBILE AD HOC NETWORKS FFICINT NRGY BASD CONGSTION CONTROL SCHM FOR MOBIL AD HOC NTWORKS 1 S.SHJA, 2 DR.RAMACHANDRA V PUJRI 1 Reseach Schola, Bhaathia Univesity, Coimbatoe. 2 Vice-Pincipal, KGiSL Institute of Technology, Saavanampatti,

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

EE 6900: Interconnection Networks for HPC Systems Fall 2016

EE 6900: Interconnection Networks for HPC Systems Fall 2016 EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

Separability and Topology Control of Quasi Unit Disk Graphs

Separability and Topology Control of Quasi Unit Disk Graphs Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

Time-Constrained Big Data Transfer for SDN-Enabled Smart City

Time-Constrained Big Data Transfer for SDN-Enabled Smart City Emeging Tends, Issues, and Challenges in Big Data and Its Implementation towad Futue Smat Cities Time-Constained Big Data Tansfe fo SDN-Enabled Smat City Yuanguo Bi, Chuan Lin, Haibo Zhou, Peng Yang, Xuemin

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1)

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1) 1 Multi Path PERT Ankit Singh and A. L. Naasimha Reddy Electical and Compute Engineeing Depatment, Texas A&M Univesity; email: eddy@ece.tamu.edu. Abstact This pape pesents a new multipath delay based algoithm,

More information

A Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks

A Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks A Coss-Laye Famewok of QoS Routing and Distibuted Scheduling fo Mesh Netwoks Chi Haold Liu, Athanasios Gkelias, and Kin K. Leung Depatment of Electical and Electonic Engineeing, Impeial College London

More information

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2 Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used

More information

Event-based Location Dependent Data Services in Mobile WSNs

Event-based Location Dependent Data Services in Mobile WSNs Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,

More information

Mobility Pattern Recognition in Mobile Ad-Hoc Networks

Mobility Pattern Recognition in Mobile Ad-Hoc Networks Mobility Patten Recognition in Mobile Ad-Hoc Netwoks S. M. Mousavi Depatment of Compute Engineeing, Shaif Univesity of Technology sm_mousavi@ce.shaif.edu H. R. Rabiee Depatment of Compute Engineeing, Shaif

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network An Efficient andove Mechanism Using the Geneal Switch Management Potocol on a Multi-Potocol abel Switching Netwok Seong Gon hoi, yun Joo Kang, and Jun Kyun hoi Using the geneal switch management potocol

More information

High performance CUDA based CNN image processor

High performance CUDA based CNN image processor High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

The concept of PARPS - Packet And Resource Plan Scheduling

The concept of PARPS - Packet And Resource Plan Scheduling The concept of PARPS - Packet And Resouce Plan Scheduling Magnus Eiksson 1 and Håkan Sätebeg 2 1) Dept. of Signals, Sensos and Systems, Royal Inst. of Technology, Sweden. E-mail: magnus.eiksson@ite.mh.se.

More information

MANET QoS support without reservations

MANET QoS support without reservations SECURITY AND COMMUNICATION NETWORKS Secuity Comm. Netwoks (2010) Published online in Wiley InteScience (www.intescience.wiley.com)..183 SPECIAL ISSUE PAPER MANET QoS suppot without esevations Soon Y. Oh,

More information

Positioning of a robot based on binocular vision for hand / foot fusion Long Han

Positioning of a robot based on binocular vision for hand / foot fusion Long Han 2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,

More information

i-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA

i-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA i-pcgrid Wokshop 2016 Apil 1 st 2016 San Fancisco, CA Liang Min* Eddy Banks, Bian Kelley, Met Kokali, Yining Qin, Steve Smith, Philip Top, and Caol Woodwad *min2@llnl.gov, 925-422-1187 LDRD 13-ERD-043

More information

UCLA Papers. Title. Permalink. Authors. Publication Date. Localized Edge Detection in Sensor Fields. https://escholarship.org/uc/item/3fj6g58j

UCLA Papers. Title. Permalink. Authors. Publication Date. Localized Edge Detection in Sensor Fields. https://escholarship.org/uc/item/3fj6g58j UCLA Papes Title Localized Edge Detection in Senso Fields Pemalink https://escholashipog/uc/item/3fj6g58j Authos K Chintalapudi Govindan Publication Date 3-- Pee eviewed escholashipog Poweed by the Califonia

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences Ameican Jounal of ata ining and Knowledge iscovey 27; 2(4): 2-8 http://www.sciencepublishinggoup.com//admkd doi:.648/.admkd.2724.2 Genealized Gey Taget ecision ethod Based on ecision akes Indiffeence Attibute

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

Heterogeneous V2V Communications in Multi-Link and Multi-RAT Vehicular Networks

Heterogeneous V2V Communications in Multi-Link and Multi-RAT Vehicular Networks 1 Heteogeneous V2V Communications in Multi-Link and Multi-RAT Vehicula Netwoks Miguel Sepulce and Javie Gozalvez Abstact Connected and automated vehicles will enable advanced taffic safety and efficiency

More information

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the

More information

Gravitational Shift for Beginners

Gravitational Shift for Beginners Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

Annales UMCS Informatica AI 2 (2004) UMCS

Annales UMCS Informatica AI 2 (2004) UMCS Pobane z czasopisma Annales AI- Infomatica http://ai.annales.umcs.pl Annales Infomatica AI 2 (2004) 33-340 Annales Infomatica Lublin-Polonia Sectio AI http://www.annales.umcs.lublin.pl/ Embedding as a

More information

Image Enhancement in the Spatial Domain. Spatial Domain

Image Enhancement in the Spatial Domain. Spatial Domain 8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along

More information

Topic -3 Image Enhancement

Topic -3 Image Enhancement Topic -3 Image Enhancement (Pat 1) DIP: Details Digital Image Pocessing Digital Image Chaacteistics Spatial Spectal Gay-level Histogam DFT DCT Pe-Pocessing Enhancement Restoation Point Pocessing Masking

More information

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits

More information

Quality Aware Privacy Protection for Location-based Services

Quality Aware Privacy Protection for Location-based Services In Poceedings of the th Intenational Confeence on Database Systems fo Advanced Applications (DASFAA 007), Bangkok, Thailand, Apil 9-, 007. Quality Awae Pivacy Potection fo Location-based Sevices Zhen Xiao,,

More information

Monte Carlo Techniques for Rendering

Monte Carlo Techniques for Rendering Monte Calo Techniques fo Rendeing CS 517 Fall 2002 Compute Science Conell Univesity Announcements No ectue on Thusday Instead, attend Steven Gotle, Havad Upson Hall B17, 4:15-5:15 (efeshments ealie) Geomety

More information

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE 1 YAROSLAVTSEV A.F., 2 Al-THUNEIBAT S.A., 3 AL TAWALBEH N.A 1 Depatment of Netwoking, SSUTI, Novosibisk, Russia

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks Available online at www.sciencediect.com Ad Hoc Netwoks 7 (29) 23 247 www.elsevie.com/locate/adhoc Minimizing spatial and time esevation with Collision-Awae DCF in mobile ad hoc netwoks Lubo Song a, Chansu

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

1.3 Multiplexing, Time-Switching, Point-to-Point versus Buses

1.3 Multiplexing, Time-Switching, Point-to-Point versus Buses http://achvlsi.ics.foth.g/~kateveni/534 1.3 Multiplexing, Time-Switching, Point-to-Point vesus Buses n R m Aggegation (multiplexing) Distibution (demultiplexing) Simplest Netwoking, like simplest pogamming:

More information

Analysis of Coexistence between IEEE , BLE and IEEE in the 2.4 GHz ISM Band

Analysis of Coexistence between IEEE , BLE and IEEE in the 2.4 GHz ISM Band Analysis of Coexistence between IEEE 82.5.4, BLE and IEEE 82. in the 2.4 GHz ISM Band Radhakishnan Nataajan, Pouia Zand, Majid Nabi Holst I. I NTRODUCTION In ecent yeas, the emegence of IoT has led to

More information

How to outperform IEEE802.11: Interference Aware (IA) MAC

How to outperform IEEE802.11: Interference Aware (IA) MAC How to outpefom IEEE802.11: Intefeence Awae (IA) MAC Daniela Maniezzo, Piepaolo egamo, Matteo Cesana, Maio Gela CS Dept. - Univesity of Califonia Los Angeles - UCLA, Califonia, USA Engineeing Dept., Feaa

More information

New Algorithms for Daylight Harvesting in a Private Office

New Algorithms for Daylight Harvesting in a Private Office 18th Intenational Confeence on Infomation Fusion Washington, DC - July 6-9, 2015 New Algoithms fo Daylight Havesting in a Pivate Office Rohit Kuma Lighting Solutions and Sevices Philips Reseach Noth Ameica

More information

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs Fault-Toleant Routing Schemes in RDT(,,)/α-Based Inteconnection Netwok fo Netwoks-on-Chip Designs Mei Yang, Tao Li, Yingtao Jiang, and Yulu Yang Dept. of Electical & Compute Engineeing Univesity of Nevada,

More information

On using circuit-switched networks for file transfers

On using circuit-switched networks for file transfers On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed

More information

Computer Networks. TCP Libra: Derivation, analysis, and comparison with other RTT-fair TCPs

Computer Networks. TCP Libra: Derivation, analysis, and comparison with other RTT-fair TCPs Compute Netwoks 54 (2010) 2327 2344 Contents lists available at ScienceDiect Compute Netwoks jounal homepage: www.elsevie.com/locate/comnet TCP Liba: Deivation, analysis, and compaison with othe RTT-fai

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver 1 RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Dive Amit Jain Daji Qiao Kang G. Shin The Univesity of Michigan Ann Abo, MI 4819, USA {amitj,dqiao,kgshin@eecs.umich.edu Abstact The cuent

More information

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,

More information

Monte Carlo Simulation for the ECAT HRRT using GATE

Monte Carlo Simulation for the ECAT HRRT using GATE Monte Calo Simulation fo the ECAT HRRT using GATE F. Bataille, C. Comtat, Membe, IEEE, S. Jan, and R. Tébossen Abstact The ECAT HRRT (High Resolution Reseach Tomogaph, CPS Innovations, Knoxville, TN, U.S.A.)

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced

More information

Embeddings into Crossed Cubes

Embeddings into Crossed Cubes Embeddings into Cossed Cubes Emad Abuelub *, Membe, IAENG Abstact- The hypecube paallel achitectue is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability

More information

2. PROPELLER GEOMETRY

2. PROPELLER GEOMETRY a) Fames of Refeence 2. PROPELLER GEOMETRY 10 th Intenational Towing Tank Committee (ITTC) initiated the pepaation of a dictionay and nomenclatue of ship hydodynamic tems and this wok was completed in

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes CS630 Repesenting and Accessing Digital Infomation Infomation Retieval: Basics Thosten Joachims Conell Univesity Infomation Retieval Basics Retieval Models Indexing and Pepocessing Data Stuctues ~ 4 lectues

More information