1. Introduction ISSN: Issue 2, Volume 7, February 2008
|
|
- Lewis Ward
- 6 years ago
- Views:
Transcription
1 J. Levendovszky, A. Boárszky, B. Karlóca, A. Oláh Enery balancn by combnatoral mzaton for wreless sensor networks J. LEVENDOVSKY, A. BOJÁRSKY, B. KARLÓCAI, A. OLÁH Faculty of Informaton Technoloy Pazmany Peter Catholc Unversty Prater utca 50/a, H-083, Budapest HUNGARY http//: Abstract: - In ths paper novel protocols are developed for wreless sensor networks (WSNs) n order to ensure relable packet transmsson and maxmze lfespan at the same tme. The mal transmsson eneres are derved whch uarantee that the packets are receved by the Base Staton (BS) wth a ven relablty subect to achevn the lonest possble lfespan. These protocols can be appled n bomedcal applcatons where enery consumpton and lonevty s of crucal mportance. The mzaton has been carred out for the chan protocol (when nodes are forwardn the packets toward the BS va the nehbourn nodes) and for the shortcut type of protocols (when a packet may et to the BS by ben frst transferred n the chan up to a certan node whch then sends t drectly to the BS). The new results have been tested by extensve smulatons whch also demonstrated that the lfespan of WSN can snfcantly be ncreased by the new protocols. Keywords: Communcaton systems, Communcaton system routn, Network relablty, Protocols.. Introducton Due to the recent advances n electroncs and wreless communcaton, the development of lowcost, low-power, multfunctonal sensors have receved ncreasn attenton []. These sensors are compact n sze and besdes sensn they also have some lmted snal processn and communcaton capabltes. However, these lmtatons n sze and n enery make WSNs dfferent from other wreless and ad-hoc networks [2]. As a result, new protocols must be developed wth specal focus on enery balancn n order to ncrease the lfetme of the network whch s crucal n case applcatons, where recharn of the nodes s out of reach (e.. medcal applcatons, mltary feld observatons, lvn habtat montorn etc., for more detals see [3]). The paper addresses relable packet transmsson n WSN when packets are to be receved by the Base Staton (BS) wth a ven relablty, n terms of keepn the error probablty under a ven threshold [4]. Snce the success of every ndvdual packet transmsson depends on the dstance and the transmsson enery [5,6], the probablty of correct recepton wll dmnsh exponentally wth respect to the number hops, n the case of multhop packet transfers [7]. As a result to ncrease relablty two dfferent protocols wll be nvestated: Chan protocol when packet transfer takes place over a D chan of nodes (created some routn alorthm runnn pror to the packet transfer), and the nodes send each packet to ther nehbours on the nearsde of the BS. Shortcut protocol when the packet travels n the chan up to a certan node whch then sends t drectly the BS (shortcut). Our concern s to derve the mal transmsson eneres for each scenaro needed to acheve a ven relablty (.e. a packet s receved correctly by the BS wth a ven probablty reardless of ts source node) and yeldn the lonest possble lfespan of the network. As demonstrated n the paper ths leads to a constraned mzaton problem whch s solved by combnatoral mzaton tools. The soluton yelds the mal enery matrx G, the G element of whch ndcates what s transmsson enery node should appled to transmt the receved packet when t s ornated from node (the destnaton of the transmsson depends on the specfc protocol, e,. n the case of chan protocol node must retransmt the packet to ts nehbour, whle n the shortcut protocol node may choose to send the packet drectly to the BS). ISSN:
2 J. Levendovszky, A. Boárszky, B. Karlóca, A. Oláh 2. The model After the routn protocol (e.. PEDAP [8]) has found the path to the base staton the subsequent nodes partcpatn n the packet transfer can be rearded as a one dmensonal chan labeled by =,..., N and depcted by the F.. F. One dmensonal chan model for WSN The system s characterzed as follows: the topoloy s unquely defned by a dstance vector d = ( d,..., dn ), where d, =,..., N denotes the dstance between node and -, respectvely; the enery needed to transmt packet over α 2 d Θσ dstance d s ven as = + 0 dctated ln p by the Rayleh model, where d s the dstance, α depends on the propaaton type, p s the relablty of correct recepton, Θ s the 2 threshold, σ s the nose enery, whle 0 represents the consumpton of the electroncs durn transmttn and recevn; the functon connectn the relablty parameter p of the transmsson wth the transmsson enery s denoted by p =Ψ ( ) for short, furthermore f a packet s transmtted from node to the nehbourn node - then the correspondn transmsson power s denoted by p and the relablty of ths snle transmsson p =Ψ ; s ( ) we assume that only one node enerates a packet at a tme; the nodes operate n a tme synchronous manner where the dscrete tme (clock snal) s denoted by k = 0,,2,... ; the ntal battery power on each node s the same and denoted by C and the enery state of the nodes at the k th tme nstant s expressed by c ( k) = c ( k),..., c ( k) ; vector ( ) As a result, a WSN s fully characterzed by vectors, p, and c respectvely. N 3. Relable packet transfer wth a ven probablty In ths secton we nvestate relable packet forwardn as a constraned mzaton problem. Ths problem arses from the fact that n the case of multhop communcaton, the probablty of correct = packet recepton at the BS s P C p, and the = α 2 d Θσ assocated eneres are = + 0, ln p =,...,. As a result, a ven P C can be acheved by several choces of p -s (.e. several factorzatons) yeldn dfferent enery consumptons. Our concern s to pck the mal factorzaton whch wll yeld mnmal enery consumpton n terms of maxmzn the remann enery on the bottleneck node (the node whch has the smallest enery). We wll treat ths constraned mzaton problem n two dfferent scenaros: chan protocol (packets are transferred downward n the chan towards the BS n a nodeby-node fashon); shortcut protocol (frst the packet s traveln n the chan from node to node, then from a certan node t s drectly transmtted to the BS). In the frst case, we are concerned wth dentfyn the mal enery scenaro to yeld maxmum lonevty. In the second case, not only the mal enery vector but also the mal node ndex must be found where the shortcut to the BS wll take place. 3.. Relable packet transfer by chan protocol In ths case, we assume that every node retransmts the receved packet to ts nehbour towards the BS. For a packet enerated at node and traveln to the BS the relablty constrant s ven as = ( ) PC = Ψ = ε () In order to ensure maxmum lonevty, our obectve s to enforce a packet transfer whch maxmzes the mnmum remann enery expressed as follows: ISSN:
3 J. Levendovszky, A. Boárszky, B. Karlóca, A. Oláh :maxmn c ( k + ), (2) where c ( k ) c ( k) + = and = (,...,,0...0). Here k denotes the number of packets sent to the BS. The mzaton method to solve (2) s descrbed n Secton 5. Once the mal soluton () = (,...,,,0...0), =,..., N has been found the soluton can be downloaded to each node (n our example to node l) n the Table. Table. Routn table of chan protocol Source node ndex N N- Transmsson enery whch maxmzes the lfespan : : l+ l ( N ) l, ( N ) l, ( l ) + l, () l l, When a packet arrves at node l from source node then t can be retransmtted to from node l to node l- () wth the correspondn enery read out form l, (), the table. In ths way, G, = and the tables downloaded to the node are obtaned from the correspondn column of G Relable packet transfer by shortcut protocol In ths case, the packet emtted by node traverses down n the chan to node n a node-by-node fashon and from node t ets drectly transmtted to the BS. The enery needed to transmt the packet from node l to node l- n the chan s denoted by l, + l, whereas the enery needed to et the packet from node drectly to the BS s denoted by G. ( G) ( l) Ψ Ψ = ε, (3) l= + In order to ensure maxmum lonevty, our obectve aan s to enforce a packet transfer whch maxmzes the mnmum remann enery of partcpatn nodes, ven as: :maxmn cl ( k + ), l (4) where ( ) ( ) c k + = c k and l l l ( 0,..,0, G, +...,,0...0 ) =, where k denotes the number of packets sent to the BS. Once the mal soluton () = 0,..,0, G,...,,0...0 has been ( + ),, found the soluton can be downloaded to each node (n our example to node l). When a packet arrves at node l from a ven source node then t can be retransmtted from node l to node l- or t can be shortcut to the BS wth the correspondn eneres read out form the table. 4. Protocol mzaton In ths secton the mzaton process s descrbed to obtan the enery vectors whch maxmze the lfespan n the case of the dfferent protocols. As was seen n the prevous chapter, protocol mzaton amounts to solvn the mzaton problems n (2) and (4). The requred transmsson probablty can be calculated by the follown: p = PC, (5) therefore the follown ntalzed p r can be calculated: M : C p = P. (6) Snce (2) s defned over a dscrete set the mum s souht by stochastc search akn to the Mathas alorthm. The transmsson probablty mzaton (TPO) alorthm s descrbed n F. 2. Then the relablty constrant can be expressed as ISSN:
4 J. Levendovszky, A. Boárszky, B. Karlóca, A. Oláh F. 2 The flow daram of the TPO alorthm The steps of the TPO alorthm are ven as follows: STEP 0. STEP. STEP 2. STEP 3. we set the ntal p vector n unform manner; by matrx P mod, we modfy vector p subect to the condton that the product of the components remans the same: P = P Pmod, k and Pk = Pk Pmod, k, k, ; we calculate the transmsson enery vector m ; ( ) we evaluate the obectve functon (2) and check whether the newly obtaned soluton ( m) s better the prevously stored ; STEP 4. f yes then ( m) ets stored and we set m = 0 ; STEP 5. f not then ( m) s dscarded and STEP 6. remans unchaned whle m= m+ ; f m equals the smulaton parameter N smparam then the alorthm ends. One must note that nstead of the alorthm descrbed above, any other methods of combnatoral mzaton can be used, such as Genetc Alorthms or Smulated Annealn. However, based on the emprcal studes and smulatons we ran, we found that n the present case our alorthm convered faster to the mal soluton than other methods. 5. Numercal results In ths secton the performance of the protocols descrbed above are nvestated by extensve smulatons. 5.. Network descrpton and the propaaton model The smulatons were carred out n three dfferent scenaros all of them ncludn 0 sensors and placn them: equdstantly; random I (ther dstances were selected subect to truncated Gaussan dstrbuton); random II (ther dstances were selected subect to Posson dstrbuton); We set the follown parameters: The propaaton model s determned by the α 2 d Θσ Rayleh fadn, yeldn = + 0 ; ln p Condtonn enery needed by the electroncs 0 = 50μW ; Threshold: Θ= 0 6 ; Averae nose enery: σ = 0.; Propaaton parameter: α = 2 ; Intal enery: (0) = 00mW ; =,..., N. The lfespan was defned as the number of steps untl whch each node has the enery to transmt packets complyn wth the ven relablty parameter. As soon as, a node (the bottleneck node) oes flat (ben not able to partcpate n the relable packet transfer, because of falln short of the requred enery), then network s consdered dead Performance analyss Based on the dscusson above, one must note that the mzaton should be carred out after each packet transmsson as the remann enery c ( k) chanes wth respect to k. Snce the underlyn mzaton s tme consumn, we let the system run L steps after each mzaton cycles wthout chanes wth respect to the transmsson eneres. As a result, enery mzaton takes only every L steps, where we 2 r ISSN:
5 J. Levendovszky, A. Boárszky, B. Karlóca, A. Oláh nvestated the case of L=,3,5,7,5,20,50,00. In ths way, the computatonal overhead s reduced on the expense of achevn submal enery consumpton (the lfespan of the system s slhtly reduced). Fure 4. shows the effect of ncreased mzaton cycle on the lfespan (mzaton takes place only after each L steps). One can nfer that the larer L becomes the smaller an can be obtaned, whch s explaned by the fact that between two consecutve mzatons, the network must operates n nonmzed tme wndows. The next fure depcts the lfespan acheved by the shortcut protocol compared wth the mzed chan and non-mzed short-cut. The nvestated WSN contaned 0 nodes the locatons of whch were subect to Gaussan and the requred relablty was set 0.9 ( ε = 0.09 ). The fure exhbts the chane of enery on the bottleneck node wth respect to the number of sent packets. F. 4 The effect of ncreased mzaton cycle on the lfespan In the F. 5 the rato of mzed lfespan versus the non-mzed lfespan s depcted, as a functon of the relablty parameter and the number of nodes. We run the smulatons for dfferent relablty parameters: ε = 0.;0.09;0.08;0.05;0.0. One can see that the best an n lfespan s obtaned when ε=0. (P req = 0.9). On the other hand, the smaller the relablty parameter, the more complex the mzaton becomes. Furthermore, the an s further ncreased, when the number of nodes rows. F. 6 Mnmum node enery as functon of packets (P req =0.9, N=0) From the fure, one can see that the shortcut protocol s able to carry much more packet n ts lfetme than the chan protocol. In the follown bar chart the enery dynamcs of the bottleneck node of the chan and shortcut protocols are compared when the nodes are dstrbuted subect to equdstant, Gaussan and Possonan manner. F. 5 Lfespan on the bottleneck node (P req = P C ) F. 7 (Gan n span n the case of development protocols n the equdstant, Gaussan and Possonan located nodes (P req =0.9, N=0) It can be seen that the shortcut protocol tends to be the most superor, especally n the case of nodes dstrbuted n a Possonan fashon. ISSN:
6 J. Levendovszky, A. Boárszky, B. Karlóca, A. Oláh 6. Conclusons In ths paper, novel enery balancn packet forwardn methods have been developed to maxmze the lfespan of WSNs and to ensure relable packet transfer at the same tme. We have mzed the transmsson eneres of the nodes n order to mnmze the enery consumpton of the bottleneck node (the node wth the lowest avalable enery) subect to satsfyn a ven the relablty constrant. Two scenaro has been studed extensvely: () the tradtonal chan protocol (nodes are passn the ncomn packet to ther nehbours closer to the BS); () the random shortcut protocol (nodes make random choces subect to an mzed probablty mass functon) whether to forward the packet to the nehbourn node or sendn t drectly to the BS). The underlyn protocol mzaton was reduced to a constraned mzaton problem whch has been solved by a stochastc search alorthm. The performance of the protocols have been analyzed and compared to each other n the case of a 0-node WSN where the nodes were dstrbuted n equdstant or random fashon subect to Gaussan and Posson dstrbuton. The relablty constrant was set 0.9. Form the performance analyss one can nfer, that the shortcut protocol provdes loner lfespan (the obtaned an s approxmately.2). The results can drectly be used n any applcaton where enery consumpton and lfespan are of concern. One prmary taret feld s related to bomedcal applcatons, where the enery consumpton of sensoral mplants must be mnmzed (n order to avod the hazard of alvanc recharn va the human body). In ths case, relable but low-enery packet transfers of measurements from the body to the montorn BS s ndeed of crucal [9]. Our future plan s to extend the mzaton to protocols where transmsson from a node s allowed to any other nodes (not only to the nehbourn node or to the BS). Snce ths type of protocols has a hue combnatoral state space further work on the mzaton alorthm s needed as well to make the alorthm faster. References: [] C.Y. Chon and S.P. Kumar.. Sensor networks: Evoluton, opportuntes, and challenes. IEEE Proceedns, Auust, 2003 pp [2] A. Goldsmth and S. Wcker. Desn challenes for enery-constraned ad hoc wreless networks. IEEE Wreless Communcatons Maazne Vol. 9 Auust, 2002., pp [3] A. Manwarn, J. Polastre, R. Szewczyk, D. Culler, and J. Anderson.. Wreless sensor networks for habtat montorn. Frst ACM Workshop on Wreless Sensor Networks and Applcatons, Geora: Atlanta, September, [4] D. Puccnell and M. Haen. Wreless Sensor Networks-Applcatons and Challenes of Ubqutous Sensn. IEEE Crcuts and Systems Maazne Vol. 5,Auust, : [5] Wend Henzelman, Anantha Chandrakasan, and Har Balakrshnan. Enery-Effcent Communcaton Protocols for Wreless Mcrosensor Networks. Proc. Hawaaan Int'l Conf. on Systems Scence January, [6] N. Pantazs, D. Kandrs: Power Control Schemes n Wreless Sensor Networks, WSEAS Transactons on Communcatons, Issue X, Vol. 4, October 2005, pp [7] J. Levendovszky, B. Hey: Optmal Statstcal Enery Balancn Protocols for Wreless Sensor Networks. WSEAS Transactons on Communcatons, Issue V, Vol. 6, May 2007, pp [8] W. Henzelman, A. Snha, A. Wan, A. Chandrakasan. Enery-scalable alorthms and protocols for wreless mcrosensor networks. Proc. Internatonal Conference on Acoustcs, Speech, and Snal Processn (ICASSP '00), June, [9] F. Rahman, N. Shabana: Wreless Sensor Network based Personal Health Montorn System, WSEAS Transactons on Communcatons, Issue V, Vol. 5, May 2006, pp Acknowledment The research reported here was supported by the Natonal Offce for Research and Technoloy n Hunary. ISSN:
Network Coding as a Dynamical System
Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.
More informationAffine Invariant Matching of Broken Boundaries Based on Differential Evolution
Affne Invarant Matchn of Broken Boundares Based on Dfferental Evoluton Wuchao tu P.W.M. Tsan Department of Electronc Enneern Cty Unversty of Hon Kon Hon Kon Chna Abstract - Affne nvarant matchn of a par
More informationDecomposition of Grey-Scale Morphological Structuring Elements in Hardware
Decomposton of Grey-Scale Morpholocal Structurn Elements n Hardware I Andreads, C Fyrndes, A Gasteratos and Y Boutals Secton of Electroncs & Informaton Systems Technoloy Department of Electrcal & Computer
More informationKent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming
CS 4/560 Desgn and Analyss of Algorthms Kent State Unversty Dept. of Math & Computer Scence LECT-6 Dynamc Programmng 2 Dynamc Programmng Dynamc Programmng, lke the dvde-and-conquer method, solves problems
More informationDEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS
DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261
More informationPositive Semi-definite Programming Localization in Wireless Sensor Networks
Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer
More informationHierarchical clustering for gene expression data analysis
Herarchcal clusterng for gene expresson data analyss Gorgo Valentn e-mal: valentn@ds.unm.t Clusterng of Mcroarray Data. Clusterng of gene expresson profles (rows) => dscovery of co-regulated and functonally
More informationA Non-Monetary Protocol for Peer-to-Peer Content Distribution in Wireless Broadcast Networks with Network Coding
A Non-Monetary Protocol for Peer-to-Peer Content Dstrbuton n Wreless Broadcast Networks wth Network Codn I-Hon Hou, Yao Lu, and Alex Sprntson CESG and Department of ECE Texas A&M Unversty Collee Staton,
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationUtility Constrained Energy Minimization In Aloha Networks
Utlty Constraned Energy nmzaton In Aloha Networks Amrmahd Khodaan, Babak H. Khalaj, ohammad S. Taleb Electrcal Engneerng Department Sharf Unversty of Technology Tehran, Iran khodaan@ee.shrf.edu, khalaj@sharf.edu,
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationLong Lifetime Routing in Unreliable Wireless Sensor Networks
211 Internatonal Conference on Networkng, Sensng and Control Delft, the Netherlands, 11-13 Aprl 211 Long Lfetme Routng n Unrelable Wreless Sensor Networks Hamed Yousef, Mohammad Hossen Yeganeh, Al Movaghar
More informationRouting in Degree-constrained FSO Mesh Networks
Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng
More informationA New Token Allocation Algorithm for TCP Traffic in Diffserv Network
A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,
More informationHermite Splines in Lie Groups as Products of Geodesics
Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the
More informationDESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT
DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationA Robust Method for Estimating the Fundamental Matrix
Proc. VIIth Dgtal Image Computng: Technques and Applcatons, Sun C., Talbot H., Ourseln S. and Adraansen T. (Eds.), 0- Dec. 003, Sydney A Robust Method for Estmatng the Fundamental Matrx C.L. Feng and Y.S.
More informationEfficient Content Distribution in Wireless P2P Networks
Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,
More informationPrivate Information Retrieval (PIR)
2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market
More informationConstructing Minimum Connected Dominating Set: Algorithmic approach
Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected
More informationExtending Network Life by Using Mobile Actors in Cluster-based Wireless Sensor and Actor Networks
Extendng Networ Lfe by Usng Moble Actors n Cluster-based Wreless Sensor and Actor Networs Nauman Aslam, Wllam Phllps, Wllam Robertson and S. Svaumar Department of Engneerng Mathematcs & Internetworng Dalhouse
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More information3. CR parameters and Multi-Objective Fitness Function
3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft
More informationAn Ant-based approach to Power-Efficient Algorithm for Wireless Sensor Networks
An Ant-based approach to Power-Effcent Algorthm for Wreless Sensor Networs Yaofeng Wen, Yuquan Chen, and Dahong Qan, Senor Member, IEEE Abstract We present an adaptve approach for mprovng the performance
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationAnalysis of Continuous Beams in General
Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,
More informationDistributed Middlebox Placement Based on Potential Game
Int. J. Communcatons, Network and System Scences, 2017, 10, 264-273 http://www.scrp.org/ournal/cns ISSN Onlne: 1913-3723 ISSN Prnt: 1913-3715 Dstrbuted Mddlebox Placement Based on Potental Game Yongwen
More informationS1 Note. Basis functions.
S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type
More informationAdaptive Energy and Location Aware Routing in Wireless Sensor Network
Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}
More informationPerformance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks
Communcatons and Network, 2016, 8, 45-55 Publshed Onlne February 2016 n ScRes. http://www.scrp.org/journal/cn http://dx.do.org/10.4236/cn.2016.81006 Performance Comparson of a QoS Aware Routng Protocol
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationMaximizing the profit per unit of time for the TSP with convex resource-dependent travelling times
Journal of the Operatonal esearch Socety (2017) 68, 1177 1182 ª 2016 The Operatonal esearch Socety. All rhts reserved. 0160-5682/17 www.palrave.com/ournals Maxmzn the proft per unt of tme for the TSP wth
More informationIJCTA Nov-Dec 2016 Available
Dr K Santh et al, Internatonal Journal of Computer Technology & Applcatons,Vol 7(6),773-779 Optmzed Route Technque for DSR Routng Protocol n MANET Dr.K.Santh, Assocate Professor, Dept. of Computer Scence,
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationUsing Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol
2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen
More informationOutline. Type of Machine Learning. Examples of Application. Unsupervised Learning
Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationMobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks
MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble
More informationA Low Energy Algorithm of Wireless Sensor Networks Based on Fractal Dimension
Sensors & Transducers 2014 by IFSA Publshng, S. L. http://www.sensorsportal.com A Low Energy Algorthm of Wreless Sensor Networks ased on Fractal Dmenson Tng Dong, Chunxao Fan, Zhgang Wen School of Electronc
More informationA Finite Queue Model Analysis of PMRC-based Wireless Sensor Networks
A Fnte Queue Model Analyss of PMRC-based Wreless Sensor Networks Qaoqn L, Me Yang, Hongyan Wang, Yngtao Jang, Jazh Zeng College of Computer Scence and Technology, Unversty of Electronc Scence and Technology,
More informationA Decentralized Lifetime Maximization Algorithm for Distributed Applications in Wireless Sensor Networks
A Decentralzed Lfetme Maxmzaton Algorthm for Dstrbuted Applcatons n Wreless Sensor Networks Vrgna Pllon, Mauro Franceschell, Lug Atzor, Alessandro Gua Dept. of Electrcal and Electronc Engneerng, Unversty
More informationAn Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed
More informationA Task Scheduling Algorithm Based on PSO for Grid Computing
Internatonal Journal of Computatonal Intellence esearch. ISSN 973-1873 Vol.4, No.1 (28, pp. 37 43 esearch Inda Publcatons http://www.jcr.nfo A Tas Scheduln Alorthm Based on PSO for Grd Computn Le Zhan
More informationProper Choice of Data Used for the Estimation of Datum Transformation Parameters
Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and
More informationEnd-to-end Power Optimization in Non-Homogenous Relay Environment for Wireless Body Area Networks (WBANs)
End-to-end Power Optmzaton n Non-Homogenous Relay Envronment for Wreless Body Area Networks (WBANs) Dan Lu 12, Yshuang Geng 2 and and Kaveh Pahlavan 2 1 College of Informaton Engneerng, Dalan Ocean Unversty
More informationThe Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique
//00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy
More informationAdaptive Hybrid Mobile Agent Protocol for Wireless Multihop Internet Access
Journal of Computer Scence 2 (9): 676-682, 2006 ISSN 1549-3636 2006 Scence Publcatons Adaptve Hybrd Moble Aent Protocol for Wreless Multhop Internet Access 1 A. Velmuruan and 2 R. Raaram 1 Department of
More informationAPPLICATION OF A COMPUTATIONALLY EFFICIENT GEOSTATISTICAL APPROACH TO CHARACTERIZING VARIABLY SPACED WATER-TABLE DATA
RFr"W/FZD JAN 2 4 1995 OST control # 1385 John J Q U ~ M Argonne Natonal Laboratory Argonne, L 60439 Tel: 708-252-5357, Fax: 708-252-3 611 APPLCATON OF A COMPUTATONALLY EFFCENT GEOSTATSTCAL APPROACH TO
More informationCS 268: Lecture 8 Router Support for Congestion Control
CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router
More informationDECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks
da Rocha Henrques et al. EURASIP Journal on Wreless Communcatons and Networkng (2016) 2016:163 DOI 10.1186/s13638-016-0662-9 RESEARCH Open Access DECA: dstrbuted energy conservaton algorthm for process
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationClustering Based Adaptive Power Control for Interference Mitigation in Two-Tier Femtocell Networks
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 8, NO. 4, Apr. 2014 1424 Copyrght c 2014 KSII Clusterng Based Adaptve Power Control for Interference Mtgaton n Two-Ter Femtocell Networks Hong
More informationA Saturation Binary Neural Network for Crossbar Switching Problem
A Saturaton Bnary Neural Network for Crossbar Swtchng Problem Cu Zhang 1, L-Qng Zhao 2, and Rong-Long Wang 2 1 Department of Autocontrol, Laonng Insttute of Scence and Technology, Benx, Chna bxlkyzhangcu@163.com
More informationStudy on Properties of Traffic Flow on Bus Transport Networks
Study on Propertes of Traffc Flow on Bus Transport Networks XU-HUA YANG, JIU-QIANG ZHAO, GUANG CHEN, AND YOU-YU DONG College of Computer Scence and Technology Zhejang Unversty of Technology Hangzhou, 310023,
More informationImproving Load Balancing mechanisms in Wireless Packet Networks 1
Improvng Load Balancng mechansms n Wreless Packet etworks 1 Guseppe Banch, Ilena Tnnrello Dept. Electrcal Engneerng, Unversty of Palermo Vale Delle Scenze, Parco D'Orleans, 90128 Palermo, Italy Abstract
More informationReal-Time Guarantees. Traffic Characteristics. Flow Control
Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationOPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET
OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor
More informationMULTIHOP wireless networks are a paradigm in wireless
400 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 17, NO. 1, JANUARY 2018 Toward Optmal Dstrbuted Node Schedulng n a Multhop Wreless Network Through Local Votng Dmtros J. Vergados, Member, IEEE, Natala
More informationAn Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices
Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal
More informationA Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks
A Load-balancng and Energy-aware Clusterng Algorthm n Wreless Ad-hoc Networks Wang Jn, Shu Le, Jnsung Cho, Young-Koo Lee, Sungyoung Lee, Yonl Zhong Department of Computer Engneerng Kyung Hee Unversty,
More informationIntegrated Congestion-Control Mechanism in Optical Burst Switching Networks
Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subect matter experts for publcaton n the IEEE GLOBECOM 2005 proceedngs Integrated Congeston-Control Mechansm n Optcal Burst
More informationBackpropagation: In Search of Performance Parameters
Bacpropagaton: In Search of Performance Parameters ANIL KUMAR ENUMULAPALLY, LINGGUO BU, and KHOSROW KAIKHAH, Ph.D. Computer Scence Department Texas State Unversty-San Marcos San Marcos, TX-78666 USA ae049@txstate.edu,
More informationLobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide
Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.
More informationCourse Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms
Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques
More informationClassifier Selection Based on Data Complexity Measures *
Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.
More informationWIRELESS communication technology has gained widespread
616 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 4, NO. 6, NOVEMBER/DECEMBER 2005 Dstrbuted Far Schedulng n a Wreless LAN Ntn Vadya, Senor Member, IEEE, Anurag Dugar, Seema Gupta, and Paramvr Bahl, Senor
More informationOn Maximizing the Lifetime of Delay-Sensitive Wireless Sensor Networks with Anycast
On Maxmzng the Lfetme of Delay-Senstve Wreless Sensor Networks wth Anycast Joohwan Km, Xaojun Ln, Ness B. Shroff, and Prasun Snha School of Electrcal and Computer Engneerng, Purdue Unversty Departments
More informationAn approach to data Aggregation in wireless sensor network using Voronoi fuzzy clustering algorithm
Journal of Scentfc & Industral Research ol. 72, May 2013, pp. 287-293 An approach to data Aggregaton n wreless sensor network usng orono fuzzy clusterng algorthm S.Nthyakalyan 1* and S.Suresh Kumar 2 *1
More informationUnsupervised Learning and Clustering
Unsupervsed Learnng and Clusterng Why consder unlabeled samples?. Collectng and labelng large set of samples s costly Gettng recorded speech s free, labelng s tme consumng 2. Classfer could be desgned
More informationBuffer-aided link selection with network coding in multihop networks
Loughborough Unversty Insttutonal Repostory Buffer-aded lnk selecton wth network codng n multhop networks Ths tem was submtted to Loughborough Unversty's Insttutonal Repostory by the/an author. Ctaton:
More informationUnsupervised Learning
Pattern Recognton Lecture 8 Outlne Introducton Unsupervsed Learnng Parametrc VS Non-Parametrc Approach Mxture of Denstes Maxmum-Lkelhood Estmates Clusterng Prof. Danel Yeung School of Computer Scence and
More informationAn Entropy-Based Approach to Integrated Information Needs Assessment
Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology
More informationMobile Adaptive Distributed Clustering Algorithm for Wireless Sensor Networks
Internatonal Journal of Computer Applcatons (975 8887) Volume No.7, Aprl Moble Adaptve Dstrbuted Clusterng Algorthm for Wreless Sensor Networks S.V.Mansekaran Department of Informaton Technology Anna Unversty
More informationOverview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION
Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup
More informationDelay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks
Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network
More informationPerformance Improvement of Direct Diffusion Algorithm in Sensor Networks
Mddle-East Journal of Scentfc Research 2 (): 566-574, 202 ISSN 990-9233 IDOSI Publcatons, 202 DOI: 0.5829/dos.mejsr.202.2..43 Performance Improvement of Drect Dffuson Algorthm n Sensor Networks Akbar Bemana
More informationMobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks
Moblty Based Routng Protocol wth MAC Collson Improvement n Vehcular Ad Hoc Networks Zhhao Dng, Pny Ren, Qnghe Du Shaanx Smart Networks and Ubqutous Access Rearch Center School of Electronc and Informaton
More informationBiostatistics 615/815
The E-M Algorthm Bostatstcs 615/815 Lecture 17 Last Lecture: The Smplex Method General method for optmzaton Makes few assumptons about functon Crawls towards mnmum Some recommendatons Multple startng ponts
More informationDistributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks
Dstrbuted Topology Control for Power Effcent Operaton n Multhop Wreless Ad Hoc Networks Roger Wattenhofer L L Paramvr Bahl Y-Mn Wang Mcrosoft Research CS Dept. Cornell Unversty Mcrosoft Research Mcrosoft
More informationLocalTree: An Efficient Algorithm for Mobile Peer-to-Peer Live Streaming
LocalTree: An Effcent Algorthm for Moble Peer-to-Peer Lve Streamng Bo Zhang S.-H. Gary Chan Department of Comp. Sc. & Eng. The Hong Kong Un. of Sc. & Tech. Clear Water Bay, Hong Kong Emal: {zhangbo, gchan}@cse.ust.hk
More informationK-means and Hierarchical Clustering
Note to other teachers and users of these sldes. Andrew would be delghted f you found ths source materal useful n gvng your own lectures. Feel free to use these sldes verbatm, or to modfy them to ft your
More informationARTICLE IN PRESS. Signal Processing: Image Communication
Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton
More informationVirtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory
Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process
More informationSHAPE OPTIMIZATION OF STRUCTURES BY MODIFIED HARMONY SEARCH
INTERNATIONAL JOURNAL OF OPTIMIZATION IN CIVIL ENGINEERING Int. J. Optm. Cvl Eng., 2011; 3:485-494 SHAPE OPTIMIZATION OF STRUCTURES BY MODIFIED HARMONY SEARCH S. Gholzadeh *,, A. Barzegar and Ch. Gheyratmand
More informationAD hoc wireless networks consist of wireless nodes that
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006 1 Topology Control n Ad Hoc Wreless Networks Usng Cooperatve Communcaton Mhaela Carde, Member, IEEE, JeWu,Senor Member, IEEE, and Shuhu Yang
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationA MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS
Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung
More informationEmpirical Distributions of Parameter Estimates. in Binary Logistic Regression Using Bootstrap
Int. Journal of Math. Analyss, Vol. 8, 4, no. 5, 7-7 HIKARI Ltd, www.m-hkar.com http://dx.do.org/.988/jma.4.494 Emprcal Dstrbutons of Parameter Estmates n Bnary Logstc Regresson Usng Bootstrap Anwar Ftranto*
More informationAnalysis of Collaborative Distributed Admission Control in x Networks
1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,
More informationDetermining the Optimal Bandwidth Based on Multi-criterion Fusion
Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn
More informationMOBILE Cloud Computing (MCC) extends the capabilities
1 Resource Sharng of a Computng Access Pont for Mult-user Moble Cloud Offloadng wth Delay Constrants Meng-Hs Chen, Student Member, IEEE, Mn Dong, Senor Member, IEEE, Ben Lang, Fellow, IEEE arxv:1712.00030v2
More informationDistortion-Memory Tradeoffs in Cache-Aided Wireless Video Delivery
Dstorton-Memory Tradeoffs n Cache-Aded Wreless Vdeo Delvery P. Hassanzadeh, E. Erkp, J. Llorca, A. Tulno arxv:1511.03932v1 [cs.it] 12 Nov 2015 Abstract Moble network operators are consderng cachng as one
More informationVideo Proxy System for a Large-scale VOD System (DINA)
Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,
More informationApplied Mathematics. Elixir Appl. Math. 84 (2015)
3341 V.Vnoba and S.M.Chthra/ Elxr Appl. Math. 84 (015) 3341-3349 Avalable onlne at www.elxrpublshers.com (Elxr Internatonal Journal) Appled Mathematcs Elxr Appl. Math. 84 (015) 3341-3349 Bayesan Inference
More informationInternet Traffic Managers
Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John
More informationTsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance
Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for
More information