Efficient Routing Algorithms Combining History and Social Predictors in Mobile Social Networks

Size: px
Start display at page:

Download "Efficient Routing Algorithms Combining History and Social Predictors in Mobile Social Networks"

Transcription

1 Effcent Routng Algorthms Combnng and Socal Predctors n Moble Socal Networks Xao Chen 1, Chengyn Lu 2, Cong Lu 2 1 Department of Computer Scence, Texas State Unversty, San Marcos, TX USA 2 Department of Computer Scence, Sun Yat-Sen Unversty, Guangzhou, Chna Emal: xc1@txstate.edu, luchyn@163.com, lucong3@mal.sysu.edu.cn Abstract A moble Socal Network (MSN) s a type of wreless networks formed by people movng around carryng moble devces. In ths paper, we specfcally study the MSNs that are formed mpromptu, e.g. when people gather together for a conference, event, or festval. We refer to them as Impromptu Moble Socal Networks (IMSNs), whch allow people to communcate n a lghtweght fashon based on contact opportuntes va local wreless bandwdth. In IMSNs, node connectons are tmedependent and short-term. The exstng MSN routng algorthms usng network analyss of socal network graphs and statc node socal features may not be sutable for IMSNs. Thus, we propose novel hybrd routng algorthms based on two tme-related factors node contact hstory and dynamc socal features to capture node moblty n IMSNs. We frst propose a hybrd algorthm called that makes a weghted combnaton of the hstory and the socal predctors based on these two factors. And then we upgrade t to by ntroducng a novel concept called socal crcle n the socal predctor to mprove message delvery. Smulaton results comparng our algorthms wth the exstng ones and wth the ones that only consder one factor show that our algorthms outperform the others n terms of delvery rato and latency wth a slght ncrease n the number of forwardngs. The results also confrm the effectveness of usng a node s socal crcle n our algorthms. Index Terms hstory-based, moble socal networks, routng, socal-based, socal features I. INTRODUCTION Moble Socal Networks (MSNs), formed by people movng around carryng moble devces such as smartphones, tablets, laptops, and so on, are becomng ubqutous n our daly lves. Dfferent from the popular socal networks lke Facebook [1] and LnkedIn [2], n ths paper, we study a specfc knd of MSNs that are formed mpromptu. We refer to them as Impromptu Moble Socal Networks (IMSNs). The IMSNs can be formed when people carryng moble devces attend a conference, event, or festval. The IMSNs allow people to communcate n a lghtweght mechansm based on contact opportuntes va local wreless bandwdth such as Bluetooth wthout a network nfrastructure. The lnks between nodes n IMSNs are tme-dependent and short-term and thus contnuous network connectvty s not guaranteed. Nodes n IMSNs communcate through a store-and-forward fashon. When two nodes move wthn each other s transmsson range, they communcate drectly and become neghbors durng that tme perod. When they move out of ther ranges, ther contact s lost. The message to be delvered needs to be stored n the local buffer untl a contact occurs n the next hop. Due to the uncertanty and tme-varyng nature of IMSNs, routng poses unque challenges: The conventonal ad-hoc network routng schemes, such as DSR [11], LAR [13], DSDV [16], AODV [17], etc., would fal. Routng n IMSNs requres a new model that conssts of a sequence of ndependent, local forwardng decsons, based on the current connectvty nformaton and the predctons of future connectvty to sut ts dstrbuted and dynamc nature. In IMSNs, routng algorthms can be measured by three performance metrcs. (1) Delvery rato. It s the fracton of generated messages that are successfully delvered to the destnaton. (2) Delvery latency. It s the tme between when a message s generated and when t s receved by the destnaton. (3). It s the number of forwardngs needed to delver a message to ts destnaton. An effcent routng algorthm should ental a hgh delvery rato and low latency wth an acceptable number of forwardngs. Despte ther smplcty, rudmentary approaches such as [25] where a message holder epdemcally sends a message to all of the nodes t contacts and [12] where a source only drectly delvers a message to the destnaton can stll work n IMSNs. But has a hgh cost of message forwardngs and can have a long latency. As mentoned above, the key to desgnng an effcent IMSN routng protocol s to have a good predctor for a message holder to locally dentfy a forwarder whch s most lkely to delver a message to the destnaton based on the message holder s current connectvty nformaton. In the lterature, researchers use dfferent current connectvty nformaton to predct the future connectvty. Some researchers generate socal network graphs by lnkng nodes wth past encounters and apply complex socal analyss methods based on node centralty and smlarty to predct nodes future meetng probabltes [5], [1]. To facltate dscusson, we refer to ths method as socal-analyss-based method. In ths method, a lnk n the socal network graph means that two nodes have met n the past, whch has predctve value for future contacts. Nonetheless, the aggregaton of contacts between nodes over tme nto a statc socal graph presents an nherent mappng tradeoff, where some nformaton about tmng of contacts s lost [9], [27]. Some other researchers use socal features n user profles as the current nformaton to predct future connectvty [14], [26]. We refer to ths method as socal-proflebased method. The socal features F 1, F 2, F 3, may refer

2 to people s natonalty, cty, language, etc. And f 1, f 2, f 3, represent the values of these socal features. For example, the value of language can be Englsh. In ths paper, for convenence s sake, when we menton comparng node socal features, we mean comparng the values of ther socal features. The ntuton of ths method s that people come n contact more frequently f they have more socal features n common. In each hop of the routng process, the message holder selects a node that has the most common socal features wth the destnaton as the next forwarder. The advantage of ths method s that t does not need to record node contact hstory. Nevertheless, t may not work well f users actvtes do not match the statc socal features n ther profles. For example, someone who puts New York as hs state n hs profle may actually attend a conference n Texas. In the IMSNs we dscuss n ths paper, where lnks between nodes are tme-dependent, we need to use nformaton, especally tme-related nformaton, that can capture users dynamc behavor to be used as the current nformaton to predct future connectvty. Thus, we consder two peces of nformaton: node contact hstory and dynamc socal features. Node contact hstory records the contact tmes of nodes when they move wthn each other s range. Node contact hstory s often used by researchers n desgnng varous utlty functons such as average number of contacts [3], number of tmes nodes met last [6], and elapsed tme snce last contact [22] n Delay Tolerant Network (DTN) routng protocols. As ponted out by [6], the hstory of contact between nodes contans valuable, but nosy nformaton about the current network topology. Dynamc socal features, relatve to the statc socal features n user profles, are used to capture nodes dynamc behavor. We frst ntroduced the dea n our paper [19]. In dynamc socal features, we not only record f a node has partcular socal feature values, but also record the frequency ths node has met other nodes whch have these socal feature values. For example, we not only record that a node A s a New Yorker and a Student, but also record that t has met New Yorkers 9% of the tme and Students 8% of the tme durng the tme nterval we observe. Unlke statc socal features from user profles, dynamc socal features are tme-related. So they change as user actvtes change over tme. And thus we can have a more accurate way to choose the next best forwarder. For example, suppose the destnaton has socal feature values New Yorker and Student and we have two canddate nodes A and B, both of whch are New Yorkers and Students. Nodes A and B are equally good forwarders f we just look at ther statc socal feature values. However, f we know that A has met New Yorkers 9% of the tme and Students 8% of the tme and B has met New Yorkers 6% of the tme and Students 4% of the tme durng the tme nterval we observe, then obvously A s a better forwarder. Based on the above dscusson, n ths paper, we wll use node contact hstory and dynamc socal features as the current nformaton and desgn effcent hybrd routng algorthms usng predctors combnng the hstory predctor based on the node contact hstory and the socal predctor based on the dynamc socal features. As far as we know, we are the frst to combne these two tme-related factors to capture the dynamc behavor of nodes to make routng decsons n IMSNs. We frst put forward a routng algorthm called whch selects the next best forwarder based on the weghted combnaton of the hstory and the socal predctors. In, the hstory predctor s obtaned by applyng lnear regresson to the node contact hstory wth the destnaton. And the socal predctor s calculated by utlzng socal smlarty metrcs derved from data mnng [8] on the dynamc socal features. Next, we upgrade to by ntroducng a novel concept called socal crcle n the socal predctor calculaton. A node s socal crcle here refers to a group of nodes that are socally smlar to ths node based on the dynamc socal features. In the socal predctor n, we not only consder the socal smlarty of a node wth the destnaton but also the meetng probablty and the socal smlarty of ths node wth the destnaton s socal crcle. The ntuton s that f a node s socally smlar to the destnaton or often meets a set of nodes that are socally smlar to the destnaton, then ths node wll have a hgher probablty to forward the message to the destnaton by tself or through one of the nodes n the destnaton s socal crcle. To evaluate the performance of our algorthms, we compare them wth the socal-analyss-based and socal-profle-based methods, and the pure hstory-based and pure dynamc-socalfeature-based algorthms that just adopt node contact hstory or dynamc socal features as the current nformaton by smulatons usng a real trace reflectng the scenaros of the IMSNs we dscuss. We mplement sngle-copy (only one copy of the message exsts n the network n the routng process) and mult-copy (multple copes of the message exst n the network n the routng process) versons of the algorthms. In both versons, the results consstently show that our algorthms outperform the exstng algorthms n terms of delvery rato and latency wth a slght ncrease n the number of forwardngs. Furthermore, the algorthm s shown to be better than due to the utlzaton of the socal crcle concept. These results demonstrate the effectveness of usng tme-related nformaton and a node s socal crcle n the routng algorthms for IMSNs. The rest of the paper s organzed as follows: Secton II references the related works; Secton III presents our routng algorthms; Secton IV explans the calculaton of the predctors; Secton V shows the smulaton results and the concluson and future work are n Secton VI. II. RELATED WORKS In ths secton, we reference some related routng algorthms n MSNs. The rudmentary and hstory-based approaches were orgnally developed for DTNs. But they can also be used n MSNs. The socal-based and hybrd approaches are desgned for the MSNs as they consder socal factors. A. Rudmentary Approaches One effcent yet costly routng approach n DTNs s [25] where a message holder forwards a message to all of

3 the hosts t meets. The opposte approach s [12], where the source just wats and sends the message to the destnaton drectly when they meet. It only has one forwardng but the latency can be very hgh. B. -based Approaches In DTN routng algorthms, several papers make routng decsons usng utlty functons based on the contact hstory of nodes. Dubos-Ferrere et al. [6] predct the nodes future meetng probablty by the number of tmes two nodes met last. Chen et al. [3] consder not only that but also the frequency of nodes contactng the destnaton n the past and calculate the average. There are also some varatons of these algorthms. For example, Spyropoulos et al. [22] record the tme elapsed snce every other node was last encountered as the elapsed tme contans the relatve locaton nformaton of the nodes. And Chen et al. [4] develop an extended nformaton model to capture more hstory nformaton and use regresson methods to predct nodes future meetng probablty to gude routng. C. Socal-based Approaches As socal network applcatons explode n recent years, analyss of these network graphs shows that some nodes are the common acquantances of other nodes and act as communcaton hubs [15], [24]. Therefore, one promsng way of predctng future contact probablty s to use metrcs such as centralty and smlarty n network analyss to assess the message delvery probablty of a node based on the connectons n the graphs [5], [1], [18]. Nevertheless, n these network graphs, past node contacts have been aggregated nto a statc socal graph. As ponted out by [9], [27], the statc socal graph has the tradeoff between tme-related nformaton lost and predctve capablty. Some other MSN routng algorthms use socal features n user profles to gude routng. Me et al. [14] fnd that ndvduals wth smlar socal features tend to meet more often n MSNs. The ndvduals are characterzed by hgh dmensonal feature profles, though usually only a small subset of mportant features are extracted and used n routng. Wu et al. [26] provde a systematc multcast routng approach to resolvng socal feature dfferences between a source and destnatons by takng advantage of the structural property of hypercubes. The advantage of these socal-profle-based approaches s that they do not need to record node contact hstory. They work well n socal networks where the actvtes of ndvduals follow the nformaton n ther profles. In our recent work [19], we make our frst attempt to desgn routng algorthms for the IMSNs we address n ths paper. We fnd that n many moble socal networks, user actvtes are tme-dependent and may devate from ther socal features n ther profles. For example, someone who puts New York as hs state n hs user profle may actually attend a conference n Texas. Therefore, n order to capture nodes dynamc behavor to steer the routng n the rght drecton, we use dynamc socal features whch not only record a node s socal features but also ts meetng frequences wth other nodes havng the consdered socal features. Wth the smlarty metrcs derved from data mnng [8], we put forward a routng algorthm called [19] whch makes routng decsons based on the smlarty of nodes dynamc socal features. D. Hybrd Approaches In the lterature, there are also some hybrd approaches that consder more than one factor to make routng decsons. Sm- Bet [5] routng algorthm uses a hybrd forwardng rule that makes effectve use of two metrcs (centralty and smlarty) to determne the brdge nodes and nodes socal smlarty to the destnaton to delver data from one node to another. The centralty here refers to the betweenness centralty of each node, whch s estmated only n ts local neghborhood to avod exchangng the network topology nformaton. For the smlarty metrc, the number of common neghbors of the current node wth the destnaton s calculated. The Bubble rap algorthm [1] consders two characterstcs of a node- ts communty and centralty to make routng decsons. Here, a node can be a member of more than one communty and t has a local centralty showng ts popularty n ts own communty and a global centralty showng the popularty of the node n the network. Both the SmBet and the Bubble rap algorthms apply complex network analyss methods to socal network graphs bult by aggregatng past node contacts. III. OUR ROUTING ALGORITHMS In ths secton, we propose two hybrd routng algorthms and that select the next best forwarder based on ts hghest probablty to meet the destnaton resulted from the predctors usng node contact hstory and dynamc socal features as the current nformaton. Though these two algorthms use dfferent predctors, they use the same routng algorthm framework whch s presented n the next paragraph. A. Routng Framework of Our Algorthms Our algorthms and Enhance use the same routng framework as shown n Fg. 1 to delver messages from a source to a destnaton. The dfference between them s that they use a dfferent predctor r u d to make routng decsons. In the routng framework, we adopt delegaton forwardng [7], whch s proved by the authors to brng down the expected cost of message delvery from O(N) to O( N), where N s the number of nodes n the network. In delegaton forwardng, each node u s assgned a qualty r ud whch n our algorthms ndcates u s probablty to meet destnaton d n the future based on node contact hstory and dynamc socal features, and a level value τ. Intally, the level of each node s equal to ts qualty. In each hop of delegaton forwardng, a message holder u only consders forwardng the message to a node u j whch has a hgher qualty than u s level hopng that u j has a better chance to delver the message to the destnaton. At the same tme, node u mproves ts level to the qualty of u j. In the rest of the routng process, each message holder does the same thng untl the destnaton receves the message. The essence of delegaton forwardng s that a copy s transferred

4 Routng Algorthm Framework based on Node Contact and Dynamc Socal Features 1: Let u 1, u 2,, u N 1 be nodes n the network, d be the destnaton, and r ud be the probablty that node u wll meet d n the future based on node contact hstory and dynamc socal features. The calculatons of r ud n and are explaned n Sectons III-B and III-C. 2: Each node u has qualty r u d and level τ. 3: INITIALIZE : τ r ud 4: On contact between message holder u and node u j : 5: f u j s the destnaton d then 6: u forwards the message to u j and the algorthm s termnated 7: else f τ < r uj d then 8: τ r ujd 9: f u j does not have the message then 1: u forwards the message to u j 11: end f 12: end f Fg. 1. The routng algorthm framework to a newly encountered node f the node s closer to the destnaton based on a certan predctor than other nodes that the current node has already met. B. The Algorthm The predctor r ud of the algorthm s shown n Formula (1). It predcts the probablty of u meetng destnaton d usng a weghted combnaton of the hstory predctor h ud based on node contact hstory and the socal predctor s ud based on the smlarty of nodes dynamc socal features. The detaled calculatons of h ud and s ud wll be explaned n Sectons IV-A and IV-B, respectvely. In the formula, parameters α and β are weghts and α + β = 1. Note that when α s 1, the algorthm becomes the pure hstory-based algorthm and when β s 1, t becomes the pure dynamcsocal-feature-based algorthm. The ntuton of ths formula s that f u often met d drectly n hstory and/or t s very socally smlar to d based on the dynamc socal features, then t wll very lkely meet d agan n the future. r ud = α hstory predctor + β socal predctor = α h ud + β s ud (1) C. The Algorthm In the predctor r ud shown n Formula (2) for the, the socal predctor s enhanced by consderng not only the socal smlarty between u and d but also coverng a broader scope - the socal closeness between u and d s socal crcle. A node s socal crcle means a group of nodes that are socally smlar to the node. Here, specfcally, socal smlarty refers to the smlarty of nodes based on ther dynamc socal features. The ntuton of ths dea s that f u s socally smlar to d or often meets a set of nodes that are socally smlar to d, node u wll have a hgher probablty to successfully forward the message to d by tself or through one of the nodes n d s socal crcle. In Formula (2), parameters α and β are weghts and α + β = 1. Set L u contans the top L nodes that are socally smlar to d and frequently meet u, and s zd s the socal smlarty between a node z L u and d. Agan, how to calculate h ud and s zd wll be explaned n Sectons IV-A and IV-B, respectvely. r ud = α hstory predctor + β socal predctor z L = α h ud + β u s zd h uz (2) z L u h uz The becomes when we only consder the socal smlarty of u to d. In other words, when L u only contans u. IV. PREDICTOR CALCULATION In ths secton, we explan the calculatons of the hstory and socal predctors. We normalze each predctor to the range of [, 1] so that they can be of smlar order of magntude - otherwse they may overshadow each other when combned. A. Predctor For the hstory predctor, n [4], we proposed an nformaton model to capture more contact nformaton of nodes n hstory and used lnear regresson to predct future contacts for routng algorthms n DTNs. Snce t can catch more hstory nformaton and make good predctons [4], we adopt t to calculate the hstory predctor for routng algorthms n IMSNs as well. Its dea s as follows: We observe the past t tme ntervals {1, 2,, t} n hstory. Each tme nterval has a length of l unts. Let n (n l) be the number of contacts between node u and destnaton d n tme nterval. Let X- axs represent the tme nterval and Y -axs represent the number of contacts n. For t ntervals, we can obtan t ponts (, n ) (1 t) n the 2-D space as shown n Fg. 2. Although these t ponts (, n ) may not all le on a lne, t s reasonable to examne d = n (a+b) = n a b, whch s the dfference between the y-coordnates of the pont (, n ) and the correspondng pont on the lne y = ax + b. The Least-Squares-Method crteron for the best lnear model approxmaton s to determne the values of a and b that mnmze the sum of squares of all of the y-dfferences denoted by F (a, b) as follows: t F (a, b) = (n a b) 2. To mnmze F (a, b), we take the partal dervatves of F (a, b) and set them equal to to fnd the unque crtcal pont for F (a, b). F a(a, b) = t 2(n a b) =, F b (a, b) = t 2(n a b) =. Thus [ a b and ] = [ t 2 t t t ] 1 [ t n t n ]

5 Number of contacts n y d 1 1 d2 d3 d4 d5 d 6 d7 y = ax + b Tme nterval Fg. 2. Node contacts n the past tme ntervals [ ] a n t+1 = a(t + 1) + b = [ t ] b [ t t = [ t ] 2 ] 1 [ t t t n ] t n t t [ t ] t t = n t t 2 n t t ( 2 t )2. The value of n t+1 s the predcted future contacts of u and d n tme nterval + 1 based on ther contacts n the past t ntervals. We set h ud = n t+1 lt after normalzaton as our hstory predctor to estmate ther future meetng probablty. B. Socal Predctor For the socal predctor, the key ponts are how to represent nodes dynamc socal features and how to measure the socal smlarty of two nodes based on them. We explan them as follows. Suppose we consder m socal features F 1, F 2,, F m of nodes n IMSNs. We assocate each node wth a vector of ts socal features. For convenence, we use a node s label as ts vector s label. Thus, a node x has a vector x of x 1, x 2,, x m and a node y has a vector y of y 1, y 2,, y m. A node x s dynamc socal features are contaned n ts vector, whch s < x 1, x 2,, x m >= M1 M M total, 2 M total, M 3 M M total, m M total, where M s the number of meetngs of node x wth nodes whose value f of feature F s the same as that of destnaton d, and M total s the total number of meetngs of node x wth any other node n the hstory we observe. Thus x 1 for all 1 m. Wth the node s dynamc socal features defned, we can use the followng smlarty metrcs derved from data mnng [8] to compare the smlarty s xy of nodes x and y. Tanmoto smlarty It measures the smlarty of x and y as: s xy = x y. The notaton x y s the product x x + y y x y of the two vectors. For example, suppose we consder three socal features: Cty, Language, P oston. If the values of the socal features of destnaton d are: N ewy ork, Englsh, Student and node x has met people from New York 7% of the tme, people that speak Englsh 93% of the tme, and students 41% of the tme n the hstory we observe, then node x has a vector of x =.7,.93,.41. If y s vector s: y =.23,.81,.5, then usng the Tanmoto metrc, s xy =.82. x Cosne smlarty It measures the smlarty of x and y as: s xy = x y (x x)(y y). Eucldean smlarty After normalzng the orgnal Eucldean smlarty to the range of [, 1] and subtract t from 1, t s now defned m as s xy = 1 (y x ) 2. m Weghted Eucldean smlarty In addton to the basc Eucldean smlarty mentoned above, we also employ the weghted Eucldean smlarty to favor the socal features that are more nfluental to the delvery of the packet. To determne the weght of a socal feature, we use the Shannon entropy [21] whch quantfes the expected value of the nformaton contaned n the feature [26]. The Shannon entropy for a gven socal feature s calculated as: w = p(f ) log 2 (f k ), where w s the Shannon entropy for feature F, vector f 1, f 2, f k contans the possble values of feature F, and p denotes the probablty mass functon of F. The weghted Eucldean smlarty normalzed to the range of m [, 1] s: s xy = 1 w (y x ) 2 m w. V. SIMULATIONS Ths secton descrbes the smulatons we conducted usng a custom smulator wrtten n Java. We frst performed smulatons to determne the values of the parameters n our algorthms and then we compared our algorthms wth the exstng ones n two versons: sngle-copy and mult-copy. In our smulatons, we used the INFOCOM 26 trace [2], whch recorded conference attenders encounter hstory usng Bluetooth small devces (Motes) for three days at the IEEE INFOCOM 26 conference n Mam. Ths data set conssts of two parts: contacts between the Mote devces that were carred by partcpants and the self-reported socal features of the partcpants, whch are collected usng a questonnare form. The sx socal features extracted from the dataset and used for the socal predctor were Afflaton, Cty, Natonalty, Language, Country, and Poston. We use delvery rato, delvery latency, and number of forwardngs as mportant metrcs to evaluate the performance of the algorthms. An effcent routng entals a hgh delvery rato and low latency wth an acceptable number of forwardngs. A. Comparson of socal smlarty metrcs To fnd the best ft for our smulated context, we compared Tanmoto, Cosne, Eucldean, and Weghted Eucldean socal smlarty metrcs by performng delegaton forwardng routng algorthm. We utlzed the frst two days of the data as the ntal hstory and performed our smulatons on the remanng one day. We generated messages from a randomly chosen

6 Delvery rato Tanmoto Cosne.1 Eucldean Weghted Eucldean Tme (Seconds) Tanmoto 5 Cosne Eucldean Weghted Eucldean Tme (Seconds) Tanmoto Cosne.5 Eucldean Weghted Eucldean Tme (Seconds) (c) Fg. 3. Comparson of Tanmoto, Cosne, Eucldean, and Weghted Eucldean socal smlarty metrcs source to a randomly chosen destnaton every two seconds n the frst 24 hours of the smulaton. We then averaged fve separate smulatons for each smlarty metrc wth dentcal setups to mtgate the effect of any outlers n the performance. We set tme-to-lve of all of the packets to 9, meanng that a gven packet can be transferred at most nne tmes so that the delvery rato wll not always be 1% durng the whole tme frame of the trace. Results n Fg. 3 show that all of the metrcs performed smlarly n delvery rato, latency, and forwardngs. We therefore decded to use the Eucldean metrc snce t dd not requre the calculaton of addtonal weghtng values and performed slghtly better than Tanmoto and Cosne n latency. B. Determne α and β values To gve reasonable weghts for the hstory and socal predctors n our algorthms, we need to fnd out the values for α and β dependng on the trace we use. We tred < α, β > par to be: <, 1 >, <.25,.75 >, <.5,.5 >, <.75,.25 >, and < 1, > n and algorthms. The results of both algorthms showed that < α =.75, β =.25 > has the hghest delvery rato, comparatvely lower latency, and lower number of forwardngs. Therefore, we set α to.75 and β to.25 for our trace. The performance of usng dfferent α and β values s shown n Fg. 4. C. Determne the number of copes n mult-copy schemes We mplemented and n two versons: sngle-copy and mult-copy schemes. In the sngle-copy verson, only one copy of the message exsts n the network durng delvery. That s, each tme a message holder forwards the message to the next forwarder, t does not keep a copy for tself. In the mult-copy verson, we adopt the dea of bnary Spray-and-Focus [23] n DTN as the authors showed that bnary Spray mnmzes the tme to spray the message to newly encountered nodes and Focus can actvely delver the message to the destnaton. In the mult-copy verson of our algorthms, the source of a message ntally starts wth C(C 1) copes. Then routng s carred out n the Spray and Focus phases. In the Spray phase, any node wth c > 1 copes wll forward half ( c/2 ) of the copes to the encountered node wth no copy. Then n the Focus phase, f the destnaton s not found n the Spray phase, each message holder forwards the copy to the best encountered node selected by or. To determne the value for C, we tred multcopy versons of and wth C settng to 4, 8, 31, and 64. The smulaton results usng dfferent C values of both algorthms are consstent. As shown by the mult-copy verson of n Fg. 5, wth the ncrease of the number of copes, the delvery rato mproves, but the latency and forwardngs also ncrease. To reduce the cost, we therefore decded to set C to 4. D. Comparson wth exstng algorthms To evaluate the performance of our algorthms consderng both hstory and socal predctors, smulatons were conducted to compare them wth the exstng socal-analyss-based and socal-profle-based algorthms, and pure hstory-based and pure dynamc-socal-feature-based algorthms. The and algorthms were ncluded as benchmarks. The followng s the lst of algorthms we compare. To ft the legend n each fgure later, we create a short name for each algorthm. 1) The algorthm () [25]: Every message s spread epdemcally throughout the network untl t reaches ts destnaton. 2) The algorthm () [12]: The source holds the message untl t meets the destnaton. 3) The Socal-profle-based algorthm () [26]: It takes the dea from [26] where routng s guded by resolvng socal feature dfferences between source and destnaton usng socal features n user profles. 4) The Socal-analyss-based algorthm () [5]: Ths algorthm takes the dea from [5] where routng decsons are made usng socal analyss methods on the socal network graphs reflectng past node encounters. 5) The -based algorthm () [4]: It just consders the hstory predctor usng lnear regresson. 6) The Dynamc-socal-feature-based algorthm () [19]: It just consders the socal predctor usng dynamc socal features. 7) The algorthm (): Both the hstory and socal predctors are consdered wth weghts. 8) The algorthm ( ): Both the hstory and socal predctors are consdered wth the enhanced socal predctor. In the algorthms that nvolve socal features, namely,, and, the actual number of Motes used

7 8 6 8 Delvery rato (%) α=, β=1 5 α=.25, β=.75 α=.5, β=.5 45 α=.75, β=.25 4 α=1, β= α=, β=1 α=.25, β=.75 α=.5, β=.5 α=.75, β=.25 α=1, β= α=, β=1 2 α=.25, β=.75 α=.5, β=.5 1 α=.75, β=.25 α=1, β= (c) Fg. 4. The performance of sngle-copy usng dfferent α and β values Delvery rato (%) Copes=4 6 Copes=8 Copes=31 Copes= Copes=4 2 Copes=8 Copes=31 Copes= Copes=4 Copes=8 5 Copes=31 Copes=62 (c) Fg. 5. The performance of mult-copy usng dfferent number of copes was 62 n the trace after excludng 17 Motes that have no or partal socal features. We defne 1 tme nterval () as 1/1 of the whole trace tme length. Then 1 s s the tme length of the whole trace. In the and algorthms, we set α and β to.75 and.25, respectvely accordng to our smulaton results above. In the algorthm, the sze of L u s decded by h uz. We only select those nodes whose h uz >. The total number of these nodes does not exceed 1 n ths trace. For the mult-copy versons, we set C to 4 from the above dscusson. All of the comparng algorthms have a mult-copy verson usng bnary Spray-and-Focus. But and are a lttle dfferent n mplementaton. In, after the message s bnarysprayed to newly encountered nodes, the message holders stll delver the message epdemcally to the destnaton wthout beng constraned by the number of copes n the network. And n, the source holds the ntal copes of the message untl t meets the destnaton. We generated 5 packets between randomly chosen source-destnaton pars and appled them to all of the algorthms. The three performance metrcs, namely delvery rato, latency, and number of forwardngs, were calculated and averaged. The smulaton results of all of the algorthms n both snglecopy and mult-copy versons are consstent as shown n Fgs. 6 and 7. As expected, has the hghest delvery rato and lowest delvery latency but hghest number of forwardngs. has the lowest number of forwardngs but lowest delvery rato and hghest delvery latency. The pure hstory-based algorthm and pure dynamc-socal-feature-based algorthm outperform and n delvery rato and latency at the cost of the slght ncrease n forwardngs. That means, n our applcaton scenaro, the statc socal features n user profles and the lnks n the socal network graphs are less capable of capturng conference attenders actvtes to make good predctons. The tme-related predctors are better. The slght ncrease n the number of forwardngs shows that and are more actvely forwardng messages than and. Furthermore, our hybrd algorthms and are better n delvery rato and latency than the pure ones wth a slght ncrease n the number of forwardngs. Ths shows that the combnaton of the two tme-related predctors works better. From the ncrease n forwardngs, we can agan conclude that and are more actve n message delvery. Comparng wth, performs better n delvery rato and latency wth a few more forwardngs. Ths testfes our dea that consderng a node s socal crcle can facltate routng. VI. CONCLUSION In ths paper, we proposed novel hybrd routng algorthms for IMSNs where node connectons are tme-dependent and short-term by consderng two tme-related factors: node contact hstory and dynamc socal features to capture node moblty n IMSNs. We frst put forward a hybrd algorthm that makes a weghted combnaton of the hstory and the socal predctors based on these two factors. And then we upgraded t to by ntroducng a novel concept called socal crcle n the socal predctor to mprove message delvery. Smulatons were conducted to compare our algorthms wth the exstng socal-analyss-based and socalprofle-based algorthms, and wth the algorthms that only

8 Delvery rato (%) (c) Fg. 6. The performance of the algorthms mplemented n sngle-copy scheme Delvery rato (%) (c) Fg. 7. The performance of the algorthms mplemented n mult-copy scheme consder one factor. Smulaton results showed that our proposed algorthms outperformed the others n delvery rato and latency wth a slght ncrease n the number of forwardngs. The results also confrmed that the dea of socal crcle can facltate routng n our algorthms. In our future work, we wll test our algorthms usng more traces wth socal features as they become avalable and fnd better predctors to mprove routng n IMSNs. VII. ACKNOWLEDGEMENT Ths paper s supported n part by NSF CNS grant REFERENCES [1] Facebook. [2] Lnkedn. [3] X. Chen and A.L. Murphy. Enablng dsconnected transtve communcaton n moble ad hoc networks. In Workshop on Prncples of Moble Computng, pages 21 23, 21. [4] X. Chen, J. Shen, and J. Wu. Improvng routng protocol performance n delay tolerant networks usng extended nformaton. Journal of Systems and Software, 83(8), August 21. [5] E. Daly and M. Haahr. Socal network analyss for routng n dsconnected delay-tolerant manets. In ACM MobHoc, 27. [6] H. Dubos-Ferrere, M. Grossglauser, and M. Vetterl. Age matters: effcent route dscovery n moble ad hoc networks. In ACM MobHoc, 23. [7] V. Erramll, M. Crovella, A. Chantreau, and C. Dot. Delegaton forwardng. In Proceedngs of the 9th ACM nternatonal symposum on Moble ad hoc networkng and computng, pages , 28. [8] J. W. Han, M. Kamber, and J. Pe. Data Mnng: concepts and technques. Morgan Kaufmann, MA, USA, 212. [9] T. Hossmann, T. Spyropoulos, and F. Legendre. From contacts to graphs: Ptfalls n usng complex network analyss for dtn routng. In IEEE Int. Workshop on Network Scence For Communcaton Networks, 29. [1] P. Hu, J. Crowcroft, and E. Yonek. Bubble rap: socal-basedforwardng n delay tolerant networks. In MobHoc, 28. [11] D. B. Johnson and D. A. Maltz. Dynamc source routng n ad hoc wreless networks. Moble Computng, pages , [12] E. P. Jones and P. A. Ward. Routng strateges for delay-tolerant networks. SIGCOMM, 24. [13] Y.-B. Ko and N. H. Vadya. Locaton-aded routng (lar) n moble ad hoc networks. Wreless Networks, 6(4):37 321, July 2. [14] A. Me, G. Morabto, P. Sant, and J. Stefa. Socal-aware stateless forwardng n pocket swtched networks. In IEEE INFOCOM, 211. [15] M. Motan, V. Srnvasan, and P. Nuggehall. Peoplenet: engneerng a wreless vrtual socal network. In MobCom, pages , 25. [16] C. E. Perkns and P. Bhagwat. Hghly dynamc destnaton-sequenced dstance-vector routng (DSDV) for moble computers. In SIGCOMM, [17] C. E. Perkns, E. M. Royer, and S. R. Das. Ad hoc on-demand dstance vector (AODV) routng, IETF Internet draft, draft-etf-manetaodv-11.txt, June 22. [18] A. Petlanen and C. Dot. Dssemnaton n opportunstc socal networks: the role of temporal communtes. In ACM MobHoc, 212. [19] D. Rothfus, C. Dunnng, and X. Chen. Socal-smlarty-based routng algorthm n delay tolerant networks. In IEEE ICC, 213. [2] J. Scott, R. Gass, J. Crowcroft, P. Hu, C. Dot, and A. Chantreau. Crawdad trace cambrdge/haggle/mote/nfocom26 (v ), 29. [21] C. Shannon, N. Petgara, and S. Seshasa. A mathematcal theory of communcaton. Bell System Techncal Journal, 27(1): , [22] T. Spyropoulos, K. Psouns, and C. S. Raghavendra. Snglecopy routng n ntermttently connected moble networks. In IEEE SECON, 24. [23] T. Spyropoulos, K. Psouns, and C. S. Raghavendra. Spray and focus: Effcent moblty-asssted routng for heterogeneous and correlated moblty. In IEEE PERCOMW, 27. [24] V. Srnvasan, M. Motan, and W. Oo. and mplcatons of student contact patterns derved from campus schedules. In MobCom, pages 86 97, 26. [25] A. Vahdat and D. Becker. Epdemc routng for partally connected ad hoc networks. Techncal report, Dept. of Comp. Sc., Duke Unv., 2. [26] J. Wu and Y. Wang. Socal feature-based mult-path routng n delay tolerant networks. In IEEE INFOCOM, 212. [27] S. Yang and J. Wu. Adaptve backbone-based routng n delay tolerant networks. In IEEE MASS, October 213.

Significance of Eigenvector Centrality for Routing in a Delay Tolerant Network

Significance of Eigenvector Centrality for Routing in a Delay Tolerant Network Journal of Computatons & Modellng, vol.1, no.1, 2011, 91-100 ISSN: 1792-7625 (prnt), 1792-8850 (onlne) Internatonal Scentfc Press, 2011 Sgnfcance of Egenvector Centralty for Routng n a Delay Tolerant Network

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Social-Similarity-based Multicast Algorithm in Impromptu Mobile Social Networks

Social-Similarity-based Multicast Algorithm in Impromptu Mobile Social Networks Social-Similarity-based Multicast Algorithm in Impromptu Mobile Social Networks Yuan Xu, Xiao Chen Department of Computer Science, Texas State University, San Marcos, TX, USA Email: y x3@txstate.edu, xc@txstate.edu

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Maximizing Timely Content Advertising in DTNs

Maximizing Timely Content Advertising in DTNs Maxmzng Tmely Content Advertsng n DTs Wexong Rao, Ka Zhao, Yan Zhang, Pan Hu and Sasu Tarkoma Department of Computer Scence Smula Research Laboratory Deutsche Telekom Laboratores Unversty of Helsnk, Fnland

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications 14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Routing in Delay Tolerant Networks Comprising Heterogeneous Node Populations

Routing in Delay Tolerant Networks Comprising Heterogeneous Node Populations Routng n Delay Tolerant Networks Comprsng Heterogeneous Node Populatons Thrasyvoulos Spyropoulos, Member, IEEE, Therry Turlett, Member, IEEE, and Kata Obraczka, Member, IEEE Abstract Communcaton networks

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton

More information

Unsupervised Learning

Unsupervised Learning Pattern Recognton Lecture 8 Outlne Introducton Unsupervsed Learnng Parametrc VS Non-Parametrc Approach Mxture of Denstes Maxmum-Lkelhood Estmates Clusterng Prof. Danel Yeung School of Computer Scence and

More information

CS 534: Computer Vision Model Fitting

CS 534: Computer Vision Model Fitting CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES

VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES UbCC 2011, Volume 6, 5002981-x manuscrpts OPEN ACCES UbCC Journal ISSN 1992-8424 www.ubcc.org VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES

More information

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks 12 IEEE Wreless Communcatons and Networkng Conference: Moble and Wreless Networks Onlne Polces for Opportunstc Vrtual MISO Routng n Wreless Ad Hoc Networks Crstano Tapparello, Stefano Tomasn and Mchele

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks A Load-balancng and Energy-aware Clusterng Algorthm n Wreless Ad-hoc Networks Wang Jn, Shu Le, Jnsung Cho, Young-Koo Lee, Sungyoung Lee, Yonl Zhong Department of Computer Engneerng Kyung Hee Unversty,

More information

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks 2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

Learning-Based Top-N Selection Query Evaluation over Relational Databases

Learning-Based Top-N Selection Query Evaluation over Relational Databases Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **

More information

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol 2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen

More information

Research Article Information Transmission Probability and Cache Management Method in Opportunistic Networks

Research Article Information Transmission Probability and Cache Management Method in Opportunistic Networks Wreless Communcatons and Moble Computng Volume 2018, Artcle ID 1571974, 9 pages https://do.org/10.1155/2018/1571974 Research Artcle Informaton Transmsson Probablty and Cache Management Method n Opportunstc

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor

More information

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks Ad Hoc Networks 11 (213) 1136 1149 Contents lsts avalable at ScVerse ScenceDrect Ad Hoc Networks journal homepage: www.elsever.com/locate/adhoc Generc predcton asssted sngle-copy routng n underwater delay

More information

y and the total sum of

y and the total sum of Lnear regresson Testng for non-lnearty In analytcal chemstry, lnear regresson s commonly used n the constructon of calbraton functons requred for analytcal technques such as gas chromatography, atomc absorpton

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

The Hybrid Mobile Wireless Sensor Networks for Data Gathering

The Hybrid Mobile Wireless Sensor Networks for Data Gathering The Hybrd Moble Wreless Sensor Networks for Data Gatherng Bao Ren Bejng Unv. of Posts & Telecommuncatons, Bejng 876, Chna +86--62287 renb@bupt.edu.cn Jan Ma Noka Research Center, Bejng 3, Chna +86--65392828-2883

More information

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics A Hybrd Genetc Algorthm for Routng Optmzaton n IP Networks Utlzng Bandwdth and Delay Metrcs Anton Redl Insttute of Communcaton Networks, Munch Unversty of Technology, Arcsstr. 21, 80290 Munch, Germany

More information

Message Cab (MCab): Partition Restoration in MANETs Using Flexible Helping Hosts

Message Cab (MCab): Partition Restoration in MANETs Using Flexible Helping Hosts Wreless Sensor Network, 2010, 2, 891-904 do:10.4236/wsn.2010.212107 Publshed Onlne December 2010 (http://www.scrp.org/journal/wsn) Message Cab (MCab): Partton Restoraton n MANEs Usng Flexble Helpng Hosts

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Cellular Traffic Offloading through Opportunistic Communications Based on Human Mobility

Cellular Traffic Offloading through Opportunistic Communications Based on Human Mobility KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 9, NO. 3, Mar. 2015 872 Copyrght c 2015 KSII Cellular Traffc Offloadng through Opportunstc Communcatons Based on Human Moblty Zhgang L 1, Yan

More information

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

DECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks

DECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks da Rocha Henrques et al. EURASIP Journal on Wreless Communcatons and Networkng (2016) 2016:163 DOI 10.1186/s13638-016-0662-9 RESEARCH Open Access DECA: dstrbuted energy conservaton algorthm for process

More information

Cost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network

Cost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network Cost-Effectve Lfetme Predcton Based Routng Protocol for Wreless Network ABU MD. ZAFOR ALAM, MUHAMMAD ARIFUR RAHMAN, MOHAMMED ABUL HASAN 2,M. LUTFAR RAHMAN Faculty of Scence and IT, Daffodl Internatonal

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

IJCTA Nov-Dec 2016 Available

IJCTA Nov-Dec 2016 Available Dr K Santh et al, Internatonal Journal of Computer Technology & Applcatons,Vol 7(6),773-779 Optmzed Route Technque for DSR Routng Protocol n MANET Dr.K.Santh, Assocate Professor, Dept. of Computer Scence,

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Cost-Effective Lifetime Prediction Based Routing Protocol for Mobile Ad Hoc Network

Cost-Effective Lifetime Prediction Based Routing Protocol for Mobile Ad Hoc Network Cost-Effectve Lfetme Predcton Based Routng Protocol for Moble Ad Hoc Network ABU MD. ZAFOR ALAM, MUHAMMAD ARIFUR RAHMAN, M. LUTFAR RAHMAN 1 Faculty of Scence and Informaton Technology, Daffodl Internatonal

More information

Relative Link Quality Assessment and Hybrid Routing Scheme for Wireless Mesh Networks

Relative Link Quality Assessment and Hybrid Routing Scheme for Wireless Mesh Networks Relatve Lnk Qualty Assessment and Hybrd Routng Scheme for Wreless Mesh Networks ChaoY Ban, Xn Jn, Chao Lu, XaoMng L, YAN We Insttute of Networkng Computng and Informaton System Pekng Unversty, P.R.Chna

More information

Survey of buffer management policies for delay tolerant networks

Survey of buffer management policies for delay tolerant networks Survey of buffer management polces for delay tolerant networks Sweta Jan 1, Meenu Chawla 1 Department of CSE and IT, Maulana Azad Natonal Insttute of Technology, Bhopal, Inda E-mal: chawlam@mant.ac.n Publshed

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks Moblty Based Routng Protocol wth MAC Collson Improvement n Vehcular Ad Hoc Networks Zhhao Dng, Pny Ren, Qnghe Du Shaanx Smart Networks and Ubqutous Access Rearch Center School of Electronc and Informaton

More information

USING GRAPHING SKILLS

USING GRAPHING SKILLS Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp

More information

Bayesian Model for Mobility Prediction to Support Routing in Mobile Ad-Hoc Networks

Bayesian Model for Mobility Prediction to Support Routing in Mobile Ad-Hoc Networks Bayesan Model for Moblty Predcton to Support Routng n Moble Ad-Hoc Networks Tran The Son, Hoa Le Mnh, Graham Sexton, Nauman Aslam, Zabh Ghassemlooy Northumbra Communcatons Research Laboratory (NCRLab Faculty

More information

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems S. J and D. Shn: An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems 2355 An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems Seunggu J and Dongkun Shn, Member,

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

A Clustering Algorithm for Chinese Adjectives and Nouns 1

A Clustering Algorithm for Chinese Adjectives and Nouns 1 Clusterng lgorthm for Chnese dectves and ouns Yang Wen, Chunfa Yuan, Changnng Huang 2 State Key aboratory of Intellgent Technology and System Deptartment of Computer Scence & Technology, Tsnghua Unversty,

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors Optmal Fault-Tolerant Routng n Hypercubes Usng Extended Safety Vectors Je Wu Department of Computer Scence and Engneerng Florda Atlantc Unversty Boca Raton, FL 3343 Feng Gao, Zhongcheng L, and Ynghua Mn

More information