1. Introduction ISSN: Issue 2, Volume 7, February 2008

Size: px
Start display at page:

Download "1. Introduction ISSN: Issue 2, Volume 7, February 2008"

Transcription

1 J. Levendovszky, A. Boárszky, B. Karlóca, A. Oláh Enery balancn by combnatoral mzaton for wreless sensor networks J. LEVENDOVSKY, A. BOJÁRSKY, B. KARLÓCAI, A. OLÁH Faculty of Informaton Technoloy Pazmany Peter Catholc Unversty Prater utca 50/a, H-083, Budapest HUNGARY http//: Abstract: - In ths paper novel protocols are developed for wreless sensor networks (WSNs) n order to ensure relable packet transmsson and maxmze lfespan at the same tme. The mal transmsson eneres are derved whch uarantee that the packets are receved by the Base Staton (BS) wth a ven relablty subect to achevn the lonest possble lfespan. These protocols can be appled n bomedcal applcatons where enery consumpton and lonevty s of crucal mportance. The mzaton has been carred out for the chan protocol (when nodes are forwardn the packets toward the BS va the nehbourn nodes) and for the shortcut type of protocols (when a packet may et to the BS by ben frst transferred n the chan up to a certan node whch then sends t drectly to the BS). The new results have been tested by extensve smulatons whch also demonstrated that the lfespan of WSN can snfcantly be ncreased by the new protocols. Keywords: Communcaton systems, Communcaton system routn, Network relablty, Protocols.. Introducton Due to the recent advances n electroncs and wreless communcaton, the development of lowcost, low-power, multfunctonal sensors have receved ncreasn attenton []. These sensors are compact n sze and besdes sensn they also have some lmted snal processn and communcaton capabltes. However, these lmtatons n sze and n enery make WSNs dfferent from other wreless and ad-hoc networks [2]. As a result, new protocols must be developed wth specal focus on enery balancn n order to ncrease the lfetme of the network whch s crucal n case applcatons, where recharn of the nodes s out of reach (e.. medcal applcatons, mltary feld observatons, lvn habtat montorn etc., for more detals see [3]). The paper addresses relable packet transmsson n WSN when packets are to be receved by the Base Staton (BS) wth a ven relablty, n terms of keepn the error probablty under a ven threshold [4]. Snce the success of every ndvdual packet transmsson depends on the dstance and the transmsson enery [5,6], the probablty of correct recepton wll dmnsh exponentally wth respect to the number hops, n the case of multhop packet transfers [7]. As a result to ncrease relablty two dfferent protocols wll be nvestated: Chan protocol when packet transfer takes place over a D chan of nodes (created some routn alorthm runnn pror to the packet transfer), and the nodes send each packet to ther nehbours on the nearsde of the BS. Shortcut protocol when the packet travels n the chan up to a certan node whch then sends t drectly the BS (shortcut). Our concern s to derve the mal transmsson eneres for each scenaro needed to acheve a ven relablty (.e. a packet s receved correctly by the BS wth a ven probablty reardless of ts source node) and yeldn the lonest possble lfespan of the network. As demonstrated n the paper ths leads to a constraned mzaton problem whch s solved by combnatoral mzaton tools. The soluton yelds the mal enery matrx G, the G element of whch ndcates what s transmsson enery node should appled to transmt the receved packet when t s ornated from node (the destnaton of the transmsson depends on the specfc protocol, e,. n the case of chan protocol node must retransmt the packet to ts nehbour, whle n the shortcut protocol node may choose to send the packet drectly to the BS). ISSN:

2 J. Levendovszky, A. Boárszky, B. Karlóca, A. Oláh 2. The model After the routn protocol (e.. PEDAP [8]) has found the path to the base staton the subsequent nodes partcpatn n the packet transfer can be rearded as a one dmensonal chan labeled by =,..., N and depcted by the F.. F. One dmensonal chan model for WSN The system s characterzed as follows: the topoloy s unquely defned by a dstance vector d = ( d,..., dn ), where d, =,..., N denotes the dstance between node and -, respectvely; the enery needed to transmt packet over α 2 d Θσ dstance d s ven as = + 0 dctated ln p by the Rayleh model, where d s the dstance, α depends on the propaaton type, p s the relablty of correct recepton, Θ s the 2 threshold, σ s the nose enery, whle 0 represents the consumpton of the electroncs durn transmttn and recevn; the functon connectn the relablty parameter p of the transmsson wth the transmsson enery s denoted by p =Ψ ( ) for short, furthermore f a packet s transmtted from node to the nehbourn node - then the correspondn transmsson power s denoted by p and the relablty of ths snle transmsson p =Ψ ; s ( ) we assume that only one node enerates a packet at a tme; the nodes operate n a tme synchronous manner where the dscrete tme (clock snal) s denoted by k = 0,,2,... ; the ntal battery power on each node s the same and denoted by C and the enery state of the nodes at the k th tme nstant s expressed by c ( k) = c ( k),..., c ( k) ; vector ( ) As a result, a WSN s fully characterzed by vectors, p, and c respectvely. N 3. Relable packet transfer wth a ven probablty In ths secton we nvestate relable packet forwardn as a constraned mzaton problem. Ths problem arses from the fact that n the case of multhop communcaton, the probablty of correct = packet recepton at the BS s P C p, and the = α 2 d Θσ assocated eneres are = + 0, ln p =,...,. As a result, a ven P C can be acheved by several choces of p -s (.e. several factorzatons) yeldn dfferent enery consumptons. Our concern s to pck the mal factorzaton whch wll yeld mnmal enery consumpton n terms of maxmzn the remann enery on the bottleneck node (the node whch has the smallest enery). We wll treat ths constraned mzaton problem n two dfferent scenaros: chan protocol (packets are transferred downward n the chan towards the BS n a nodeby-node fashon); shortcut protocol (frst the packet s traveln n the chan from node to node, then from a certan node t s drectly transmtted to the BS). In the frst case, we are concerned wth dentfyn the mal enery scenaro to yeld maxmum lonevty. In the second case, not only the mal enery vector but also the mal node ndex must be found where the shortcut to the BS wll take place. 3.. Relable packet transfer by chan protocol In ths case, we assume that every node retransmts the receved packet to ts nehbour towards the BS. For a packet enerated at node and traveln to the BS the relablty constrant s ven as = ( ) PC = Ψ = ε () In order to ensure maxmum lonevty, our obectve s to enforce a packet transfer whch maxmzes the mnmum remann enery expressed as follows: ISSN:

3 J. Levendovszky, A. Boárszky, B. Karlóca, A. Oláh :maxmn c ( k + ), (2) where c ( k ) c ( k) + = and = (,...,,0...0). Here k denotes the number of packets sent to the BS. The mzaton method to solve (2) s descrbed n Secton 5. Once the mal soluton () = (,...,,,0...0), =,..., N has been found the soluton can be downloaded to each node (n our example to node l) n the Table. Table. Routn table of chan protocol Source node ndex N N- Transmsson enery whch maxmzes the lfespan : : l+ l ( N ) l, ( N ) l, ( l ) + l, () l l, When a packet arrves at node l from source node then t can be retransmtted to from node l to node l- () wth the correspondn enery read out form l, (), the table. In ths way, G, = and the tables downloaded to the node are obtaned from the correspondn column of G Relable packet transfer by shortcut protocol In ths case, the packet emtted by node traverses down n the chan to node n a node-by-node fashon and from node t ets drectly transmtted to the BS. The enery needed to transmt the packet from node l to node l- n the chan s denoted by l, + l, whereas the enery needed to et the packet from node drectly to the BS s denoted by G. ( G) ( l) Ψ Ψ = ε, (3) l= + In order to ensure maxmum lonevty, our obectve aan s to enforce a packet transfer whch maxmzes the mnmum remann enery of partcpatn nodes, ven as: :maxmn cl ( k + ), l (4) where ( ) ( ) c k + = c k and l l l ( 0,..,0, G, +...,,0...0 ) =, where k denotes the number of packets sent to the BS. Once the mal soluton () = 0,..,0, G,...,,0...0 has been ( + ),, found the soluton can be downloaded to each node (n our example to node l). When a packet arrves at node l from a ven source node then t can be retransmtted from node l to node l- or t can be shortcut to the BS wth the correspondn eneres read out form the table. 4. Protocol mzaton In ths secton the mzaton process s descrbed to obtan the enery vectors whch maxmze the lfespan n the case of the dfferent protocols. As was seen n the prevous chapter, protocol mzaton amounts to solvn the mzaton problems n (2) and (4). The requred transmsson probablty can be calculated by the follown: p = PC, (5) therefore the follown ntalzed p r can be calculated: M : C p = P. (6) Snce (2) s defned over a dscrete set the mum s souht by stochastc search akn to the Mathas alorthm. The transmsson probablty mzaton (TPO) alorthm s descrbed n F. 2. Then the relablty constrant can be expressed as ISSN:

4 J. Levendovszky, A. Boárszky, B. Karlóca, A. Oláh F. 2 The flow daram of the TPO alorthm The steps of the TPO alorthm are ven as follows: STEP 0. STEP. STEP 2. STEP 3. we set the ntal p vector n unform manner; by matrx P mod, we modfy vector p subect to the condton that the product of the components remans the same: P = P Pmod, k and Pk = Pk Pmod, k, k, ; we calculate the transmsson enery vector m ; ( ) we evaluate the obectve functon (2) and check whether the newly obtaned soluton ( m) s better the prevously stored ; STEP 4. f yes then ( m) ets stored and we set m = 0 ; STEP 5. f not then ( m) s dscarded and STEP 6. remans unchaned whle m= m+ ; f m equals the smulaton parameter N smparam then the alorthm ends. One must note that nstead of the alorthm descrbed above, any other methods of combnatoral mzaton can be used, such as Genetc Alorthms or Smulated Annealn. However, based on the emprcal studes and smulatons we ran, we found that n the present case our alorthm convered faster to the mal soluton than other methods. 5. Numercal results In ths secton the performance of the protocols descrbed above are nvestated by extensve smulatons. 5.. Network descrpton and the propaaton model The smulatons were carred out n three dfferent scenaros all of them ncludn 0 sensors and placn them: equdstantly; random I (ther dstances were selected subect to truncated Gaussan dstrbuton); random II (ther dstances were selected subect to Posson dstrbuton); We set the follown parameters: The propaaton model s determned by the α 2 d Θσ Rayleh fadn, yeldn = + 0 ; ln p Condtonn enery needed by the electroncs 0 = 50μW ; Threshold: Θ= 0 6 ; Averae nose enery: σ = 0.; Propaaton parameter: α = 2 ; Intal enery: (0) = 00mW ; =,..., N. The lfespan was defned as the number of steps untl whch each node has the enery to transmt packets complyn wth the ven relablty parameter. As soon as, a node (the bottleneck node) oes flat (ben not able to partcpate n the relable packet transfer, because of falln short of the requred enery), then network s consdered dead Performance analyss Based on the dscusson above, one must note that the mzaton should be carred out after each packet transmsson as the remann enery c ( k) chanes wth respect to k. Snce the underlyn mzaton s tme consumn, we let the system run L steps after each mzaton cycles wthout chanes wth respect to the transmsson eneres. As a result, enery mzaton takes only every L steps, where we 2 r ISSN:

5 J. Levendovszky, A. Boárszky, B. Karlóca, A. Oláh nvestated the case of L=,3,5,7,5,20,50,00. In ths way, the computatonal overhead s reduced on the expense of achevn submal enery consumpton (the lfespan of the system s slhtly reduced). Fure 4. shows the effect of ncreased mzaton cycle on the lfespan (mzaton takes place only after each L steps). One can nfer that the larer L becomes the smaller an can be obtaned, whch s explaned by the fact that between two consecutve mzatons, the network must operates n nonmzed tme wndows. The next fure depcts the lfespan acheved by the shortcut protocol compared wth the mzed chan and non-mzed short-cut. The nvestated WSN contaned 0 nodes the locatons of whch were subect to Gaussan and the requred relablty was set 0.9 ( ε = 0.09 ). The fure exhbts the chane of enery on the bottleneck node wth respect to the number of sent packets. F. 4 The effect of ncreased mzaton cycle on the lfespan In the F. 5 the rato of mzed lfespan versus the non-mzed lfespan s depcted, as a functon of the relablty parameter and the number of nodes. We run the smulatons for dfferent relablty parameters: ε = 0.;0.09;0.08;0.05;0.0. One can see that the best an n lfespan s obtaned when ε=0. (P req = 0.9). On the other hand, the smaller the relablty parameter, the more complex the mzaton becomes. Furthermore, the an s further ncreased, when the number of nodes rows. F. 6 Mnmum node enery as functon of packets (P req =0.9, N=0) From the fure, one can see that the shortcut protocol s able to carry much more packet n ts lfetme than the chan protocol. In the follown bar chart the enery dynamcs of the bottleneck node of the chan and shortcut protocols are compared when the nodes are dstrbuted subect to equdstant, Gaussan and Possonan manner. F. 5 Lfespan on the bottleneck node (P req = P C ) F. 7 (Gan n span n the case of development protocols n the equdstant, Gaussan and Possonan located nodes (P req =0.9, N=0) It can be seen that the shortcut protocol tends to be the most superor, especally n the case of nodes dstrbuted n a Possonan fashon. ISSN:

6 J. Levendovszky, A. Boárszky, B. Karlóca, A. Oláh 6. Conclusons In ths paper, novel enery balancn packet forwardn methods have been developed to maxmze the lfespan of WSNs and to ensure relable packet transfer at the same tme. We have mzed the transmsson eneres of the nodes n order to mnmze the enery consumpton of the bottleneck node (the node wth the lowest avalable enery) subect to satsfyn a ven the relablty constrant. Two scenaro has been studed extensvely: () the tradtonal chan protocol (nodes are passn the ncomn packet to ther nehbours closer to the BS); () the random shortcut protocol (nodes make random choces subect to an mzed probablty mass functon) whether to forward the packet to the nehbourn node or sendn t drectly to the BS). The underlyn protocol mzaton was reduced to a constraned mzaton problem whch has been solved by a stochastc search alorthm. The performance of the protocols have been analyzed and compared to each other n the case of a 0-node WSN where the nodes were dstrbuted n equdstant or random fashon subect to Gaussan and Posson dstrbuton. The relablty constrant was set 0.9. Form the performance analyss one can nfer, that the shortcut protocol provdes loner lfespan (the obtaned an s approxmately.2). The results can drectly be used n any applcaton where enery consumpton and lfespan are of concern. One prmary taret feld s related to bomedcal applcatons, where the enery consumpton of sensoral mplants must be mnmzed (n order to avod the hazard of alvanc recharn va the human body). In ths case, relable but low-enery packet transfers of measurements from the body to the montorn BS s ndeed of crucal [9]. Our future plan s to extend the mzaton to protocols where transmsson from a node s allowed to any other nodes (not only to the nehbourn node or to the BS). Snce ths type of protocols has a hue combnatoral state space further work on the mzaton alorthm s needed as well to make the alorthm faster. References: [] C.Y. Chon and S.P. Kumar.. Sensor networks: Evoluton, opportuntes, and challenes. IEEE Proceedns, Auust, 2003 pp [2] A. Goldsmth and S. Wcker. Desn challenes for enery-constraned ad hoc wreless networks. IEEE Wreless Communcatons Maazne Vol. 9 Auust, 2002., pp [3] A. Manwarn, J. Polastre, R. Szewczyk, D. Culler, and J. Anderson.. Wreless sensor networks for habtat montorn. Frst ACM Workshop on Wreless Sensor Networks and Applcatons, Geora: Atlanta, September, [4] D. Puccnell and M. Haen. Wreless Sensor Networks-Applcatons and Challenes of Ubqutous Sensn. IEEE Crcuts and Systems Maazne Vol. 5,Auust, : [5] Wend Henzelman, Anantha Chandrakasan, and Har Balakrshnan. Enery-Effcent Communcaton Protocols for Wreless Mcrosensor Networks. Proc. Hawaaan Int'l Conf. on Systems Scence January, [6] N. Pantazs, D. Kandrs: Power Control Schemes n Wreless Sensor Networks, WSEAS Transactons on Communcatons, Issue X, Vol. 4, October 2005, pp [7] J. Levendovszky, B. Hey: Optmal Statstcal Enery Balancn Protocols for Wreless Sensor Networks. WSEAS Transactons on Communcatons, Issue V, Vol. 6, May 2007, pp [8] W. Henzelman, A. Snha, A. Wan, A. Chandrakasan. Enery-scalable alorthms and protocols for wreless mcrosensor networks. Proc. Internatonal Conference on Acoustcs, Speech, and Snal Processn (ICASSP '00), June, [9] F. Rahman, N. Shabana: Wreless Sensor Network based Personal Health Montorn System, WSEAS Transactons on Communcatons, Issue V, Vol. 5, May 2006, pp Acknowledment The research reported here was supported by the Natonal Offce for Research and Technoloy n Hunary. ISSN:

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

Affine Invariant Matching of Broken Boundaries Based on Differential Evolution

Affine Invariant Matching of Broken Boundaries Based on Differential Evolution Affne Invarant Matchn of Broken Boundares Based on Dfferental Evoluton Wuchao tu P.W.M. Tsan Department of Electronc Enneern Cty Unversty of Hon Kon Hon Kon Chna Abstract - Affne nvarant matchn of a par

More information

Decomposition of Grey-Scale Morphological Structuring Elements in Hardware

Decomposition of Grey-Scale Morphological Structuring Elements in Hardware Decomposton of Grey-Scale Morpholocal Structurn Elements n Hardware I Andreads, C Fyrndes, A Gasteratos and Y Boutals Secton of Electroncs & Informaton Systems Technoloy Department of Electrcal & Computer

More information

Kent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming

Kent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming CS 4/560 Desgn and Analyss of Algorthms Kent State Unversty Dept. of Math & Computer Scence LECT-6 Dynamc Programmng 2 Dynamc Programmng Dynamc Programmng, lke the dvde-and-conquer method, solves problems

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Hierarchical clustering for gene expression data analysis

Hierarchical clustering for gene expression data analysis Herarchcal clusterng for gene expresson data analyss Gorgo Valentn e-mal: valentn@ds.unm.t Clusterng of Mcroarray Data. Clusterng of gene expresson profles (rows) => dscovery of co-regulated and functonally

More information

A Non-Monetary Protocol for Peer-to-Peer Content Distribution in Wireless Broadcast Networks with Network Coding

A Non-Monetary Protocol for Peer-to-Peer Content Distribution in Wireless Broadcast Networks with Network Coding A Non-Monetary Protocol for Peer-to-Peer Content Dstrbuton n Wreless Broadcast Networks wth Network Codn I-Hon Hou, Yao Lu, and Alex Sprntson CESG and Department of ECE Texas A&M Unversty Collee Staton,

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Utility Constrained Energy Minimization In Aloha Networks

Utility Constrained Energy Minimization In Aloha Networks Utlty Constraned Energy nmzaton In Aloha Networks Amrmahd Khodaan, Babak H. Khalaj, ohammad S. Taleb Electrcal Engneerng Department Sharf Unversty of Technology Tehran, Iran khodaan@ee.shrf.edu, khalaj@sharf.edu,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Long Lifetime Routing in Unreliable Wireless Sensor Networks

Long Lifetime Routing in Unreliable Wireless Sensor Networks 211 Internatonal Conference on Networkng, Sensng and Control Delft, the Netherlands, 11-13 Aprl 211 Long Lfetme Routng n Unrelable Wreless Sensor Networks Hamed Yousef, Mohammad Hossen Yeganeh, Al Movaghar

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

A Robust Method for Estimating the Fundamental Matrix

A Robust Method for Estimating the Fundamental Matrix Proc. VIIth Dgtal Image Computng: Technques and Applcatons, Sun C., Talbot H., Ourseln S. and Adraansen T. (Eds.), 0- Dec. 003, Sydney A Robust Method for Estmatng the Fundamental Matrx C.L. Feng and Y.S.

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Extending Network Life by Using Mobile Actors in Cluster-based Wireless Sensor and Actor Networks

Extending Network Life by Using Mobile Actors in Cluster-based Wireless Sensor and Actor Networks Extendng Networ Lfe by Usng Moble Actors n Cluster-based Wreless Sensor and Actor Networs Nauman Aslam, Wllam Phllps, Wllam Robertson and S. Svaumar Department of Engneerng Mathematcs & Internetworng Dalhouse

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

An Ant-based approach to Power-Efficient Algorithm for Wireless Sensor Networks

An Ant-based approach to Power-Efficient Algorithm for Wireless Sensor Networks An Ant-based approach to Power-Effcent Algorthm for Wreless Sensor Networs Yaofeng Wen, Yuquan Chen, and Dahong Qan, Senor Member, IEEE Abstract We present an adaptve approach for mprovng the performance

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

Distributed Middlebox Placement Based on Potential Game

Distributed Middlebox Placement Based on Potential Game Int. J. Communcatons, Network and System Scences, 2017, 10, 264-273 http://www.scrp.org/ournal/cns ISSN Onlne: 1913-3723 ISSN Prnt: 1913-3715 Dstrbuted Mddlebox Placement Based on Potental Game Yongwen

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks Communcatons and Network, 2016, 8, 45-55 Publshed Onlne February 2016 n ScRes. http://www.scrp.org/journal/cn http://dx.do.org/10.4236/cn.2016.81006 Performance Comparson of a QoS Aware Routng Protocol

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Maximizing the profit per unit of time for the TSP with convex resource-dependent travelling times

Maximizing the profit per unit of time for the TSP with convex resource-dependent travelling times Journal of the Operatonal esearch Socety (2017) 68, 1177 1182 ª 2016 The Operatonal esearch Socety. All rhts reserved. 0160-5682/17 www.palrave.com/ournals Maxmzn the proft per unt of tme for the TSP wth

More information

IJCTA Nov-Dec 2016 Available

IJCTA Nov-Dec 2016 Available Dr K Santh et al, Internatonal Journal of Computer Technology & Applcatons,Vol 7(6),773-779 Optmzed Route Technque for DSR Routng Protocol n MANET Dr.K.Santh, Assocate Professor, Dept. of Computer Scence,

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol 2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen

More information

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble

More information

A Low Energy Algorithm of Wireless Sensor Networks Based on Fractal Dimension

A Low Energy Algorithm of Wireless Sensor Networks Based on Fractal Dimension Sensors & Transducers 2014 by IFSA Publshng, S. L. http://www.sensorsportal.com A Low Energy Algorthm of Wreless Sensor Networks ased on Fractal Dmenson Tng Dong, Chunxao Fan, Zhgang Wen School of Electronc

More information

A Finite Queue Model Analysis of PMRC-based Wireless Sensor Networks

A Finite Queue Model Analysis of PMRC-based Wireless Sensor Networks A Fnte Queue Model Analyss of PMRC-based Wreless Sensor Networks Qaoqn L, Me Yang, Hongyan Wang, Yngtao Jang, Jazh Zeng College of Computer Scence and Technology, Unversty of Electronc Scence and Technology,

More information

A Decentralized Lifetime Maximization Algorithm for Distributed Applications in Wireless Sensor Networks

A Decentralized Lifetime Maximization Algorithm for Distributed Applications in Wireless Sensor Networks A Decentralzed Lfetme Maxmzaton Algorthm for Dstrbuted Applcatons n Wreless Sensor Networks Vrgna Pllon, Mauro Franceschell, Lug Atzor, Alessandro Gua Dept. of Electrcal and Electronc Engneerng, Unversty

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

A Task Scheduling Algorithm Based on PSO for Grid Computing

A Task Scheduling Algorithm Based on PSO for Grid Computing Internatonal Journal of Computatonal Intellence esearch. ISSN 973-1873 Vol.4, No.1 (28, pp. 37 43 esearch Inda Publcatons http://www.jcr.nfo A Tas Scheduln Alorthm Based on PSO for Grd Computn Le Zhan

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information

End-to-end Power Optimization in Non-Homogenous Relay Environment for Wireless Body Area Networks (WBANs)

End-to-end Power Optimization in Non-Homogenous Relay Environment for Wireless Body Area Networks (WBANs) End-to-end Power Optmzaton n Non-Homogenous Relay Envronment for Wreless Body Area Networks (WBANs) Dan Lu 12, Yshuang Geng 2 and and Kaveh Pahlavan 2 1 College of Informaton Engneerng, Dalan Ocean Unversty

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Adaptive Hybrid Mobile Agent Protocol for Wireless Multihop Internet Access

Adaptive Hybrid Mobile Agent Protocol for Wireless Multihop Internet Access Journal of Computer Scence 2 (9): 676-682, 2006 ISSN 1549-3636 2006 Scence Publcatons Adaptve Hybrd Moble Aent Protocol for Wreless Multhop Internet Access 1 A. Velmuruan and 2 R. Raaram 1 Department of

More information

APPLICATION OF A COMPUTATIONALLY EFFICIENT GEOSTATISTICAL APPROACH TO CHARACTERIZING VARIABLY SPACED WATER-TABLE DATA

APPLICATION OF A COMPUTATIONALLY EFFICIENT GEOSTATISTICAL APPROACH TO CHARACTERIZING VARIABLY SPACED WATER-TABLE DATA RFr"W/FZD JAN 2 4 1995 OST control # 1385 John J Q U ~ M Argonne Natonal Laboratory Argonne, L 60439 Tel: 708-252-5357, Fax: 708-252-3 611 APPLCATON OF A COMPUTATONALLY EFFCENT GEOSTATSTCAL APPROACH TO

More information

CS 268: Lecture 8 Router Support for Congestion Control

CS 268: Lecture 8 Router Support for Congestion Control CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router

More information

DECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks

DECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks da Rocha Henrques et al. EURASIP Journal on Wreless Communcatons and Networkng (2016) 2016:163 DOI 10.1186/s13638-016-0662-9 RESEARCH Open Access DECA: dstrbuted energy conservaton algorthm for process

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Clustering Based Adaptive Power Control for Interference Mitigation in Two-Tier Femtocell Networks

Clustering Based Adaptive Power Control for Interference Mitigation in Two-Tier Femtocell Networks KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 8, NO. 4, Apr. 2014 1424 Copyrght c 2014 KSII Clusterng Based Adaptve Power Control for Interference Mtgaton n Two-Ter Femtocell Networks Hong

More information

A Saturation Binary Neural Network for Crossbar Switching Problem

A Saturation Binary Neural Network for Crossbar Switching Problem A Saturaton Bnary Neural Network for Crossbar Swtchng Problem Cu Zhang 1, L-Qng Zhao 2, and Rong-Long Wang 2 1 Department of Autocontrol, Laonng Insttute of Scence and Technology, Benx, Chna bxlkyzhangcu@163.com

More information

Study on Properties of Traffic Flow on Bus Transport Networks

Study on Properties of Traffic Flow on Bus Transport Networks Study on Propertes of Traffc Flow on Bus Transport Networks XU-HUA YANG, JIU-QIANG ZHAO, GUANG CHEN, AND YOU-YU DONG College of Computer Scence and Technology Zhejang Unversty of Technology Hangzhou, 310023,

More information

Improving Load Balancing mechanisms in Wireless Packet Networks 1

Improving Load Balancing mechanisms in Wireless Packet Networks 1 Improvng Load Balancng mechansms n Wreless Packet etworks 1 Guseppe Banch, Ilena Tnnrello Dept. Electrcal Engneerng, Unversty of Palermo Vale Delle Scenze, Parco D'Orleans, 90128 Palermo, Italy Abstract

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor

More information

MULTIHOP wireless networks are a paradigm in wireless

MULTIHOP wireless networks are a paradigm in wireless 400 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 17, NO. 1, JANUARY 2018 Toward Optmal Dstrbuted Node Schedulng n a Multhop Wreless Network Through Local Votng Dmtros J. Vergados, Member, IEEE, Natala

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks A Load-balancng and Energy-aware Clusterng Algorthm n Wreless Ad-hoc Networks Wang Jn, Shu Le, Jnsung Cho, Young-Koo Lee, Sungyoung Lee, Yonl Zhong Department of Computer Engneerng Kyung Hee Unversty,

More information

Integrated Congestion-Control Mechanism in Optical Burst Switching Networks

Integrated Congestion-Control Mechanism in Optical Burst Switching Networks Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subect matter experts for publcaton n the IEEE GLOBECOM 2005 proceedngs Integrated Congeston-Control Mechansm n Optcal Burst

More information

Backpropagation: In Search of Performance Parameters

Backpropagation: In Search of Performance Parameters Bacpropagaton: In Search of Performance Parameters ANIL KUMAR ENUMULAPALLY, LINGGUO BU, and KHOSROW KAIKHAH, Ph.D. Computer Scence Department Texas State Unversty-San Marcos San Marcos, TX-78666 USA ae049@txstate.edu,

More information

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

WIRELESS communication technology has gained widespread

WIRELESS communication technology has gained widespread 616 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 4, NO. 6, NOVEMBER/DECEMBER 2005 Dstrbuted Far Schedulng n a Wreless LAN Ntn Vadya, Senor Member, IEEE, Anurag Dugar, Seema Gupta, and Paramvr Bahl, Senor

More information

On Maximizing the Lifetime of Delay-Sensitive Wireless Sensor Networks with Anycast

On Maximizing the Lifetime of Delay-Sensitive Wireless Sensor Networks with Anycast On Maxmzng the Lfetme of Delay-Senstve Wreless Sensor Networks wth Anycast Joohwan Km, Xaojun Ln, Ness B. Shroff, and Prasun Snha School of Electrcal and Computer Engneerng, Purdue Unversty Departments

More information

An approach to data Aggregation in wireless sensor network using Voronoi fuzzy clustering algorithm

An approach to data Aggregation in wireless sensor network using Voronoi fuzzy clustering algorithm Journal of Scentfc & Industral Research ol. 72, May 2013, pp. 287-293 An approach to data Aggregaton n wreless sensor network usng orono fuzzy clusterng algorthm S.Nthyakalyan 1* and S.Suresh Kumar 2 *1

More information

Unsupervised Learning and Clustering

Unsupervised Learning and Clustering Unsupervsed Learnng and Clusterng Why consder unlabeled samples?. Collectng and labelng large set of samples s costly Gettng recorded speech s free, labelng s tme consumng 2. Classfer could be desgned

More information

Buffer-aided link selection with network coding in multihop networks

Buffer-aided link selection with network coding in multihop networks Loughborough Unversty Insttutonal Repostory Buffer-aded lnk selecton wth network codng n multhop networks Ths tem was submtted to Loughborough Unversty's Insttutonal Repostory by the/an author. Ctaton:

More information

Unsupervised Learning

Unsupervised Learning Pattern Recognton Lecture 8 Outlne Introducton Unsupervsed Learnng Parametrc VS Non-Parametrc Approach Mxture of Denstes Maxmum-Lkelhood Estmates Clusterng Prof. Danel Yeung School of Computer Scence and

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

Mobile Adaptive Distributed Clustering Algorithm for Wireless Sensor Networks

Mobile Adaptive Distributed Clustering Algorithm for Wireless Sensor Networks Internatonal Journal of Computer Applcatons (975 8887) Volume No.7, Aprl Moble Adaptve Dstrbuted Clusterng Algorthm for Wreless Sensor Networks S.V.Mansekaran Department of Informaton Technology Anna Unversty

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks Mddle-East Journal of Scentfc Research 2 (): 566-574, 202 ISSN 990-9233 IDOSI Publcatons, 202 DOI: 0.5829/dos.mejsr.202.2..43 Performance Improvement of Drect Dffuson Algorthm n Sensor Networks Akbar Bemana

More information

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks Moblty Based Routng Protocol wth MAC Collson Improvement n Vehcular Ad Hoc Networks Zhhao Dng, Pny Ren, Qnghe Du Shaanx Smart Networks and Ubqutous Access Rearch Center School of Electronc and Informaton

More information

Biostatistics 615/815

Biostatistics 615/815 The E-M Algorthm Bostatstcs 615/815 Lecture 17 Last Lecture: The Smplex Method General method for optmzaton Makes few assumptons about functon Crawls towards mnmum Some recommendatons Multple startng ponts

More information

Distributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks

Distributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks Dstrbuted Topology Control for Power Effcent Operaton n Multhop Wreless Ad Hoc Networks Roger Wattenhofer L L Paramvr Bahl Y-Mn Wang Mcrosoft Research CS Dept. Cornell Unversty Mcrosoft Research Mcrosoft

More information

LocalTree: An Efficient Algorithm for Mobile Peer-to-Peer Live Streaming

LocalTree: An Efficient Algorithm for Mobile Peer-to-Peer Live Streaming LocalTree: An Effcent Algorthm for Moble Peer-to-Peer Lve Streamng Bo Zhang S.-H. Gary Chan Department of Comp. Sc. & Eng. The Hong Kong Un. of Sc. & Tech. Clear Water Bay, Hong Kong Emal: {zhangbo, gchan}@cse.ust.hk

More information

K-means and Hierarchical Clustering

K-means and Hierarchical Clustering Note to other teachers and users of these sldes. Andrew would be delghted f you found ths source materal useful n gvng your own lectures. Feel free to use these sldes verbatm, or to modfy them to ft your

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

SHAPE OPTIMIZATION OF STRUCTURES BY MODIFIED HARMONY SEARCH

SHAPE OPTIMIZATION OF STRUCTURES BY MODIFIED HARMONY SEARCH INTERNATIONAL JOURNAL OF OPTIMIZATION IN CIVIL ENGINEERING Int. J. Optm. Cvl Eng., 2011; 3:485-494 SHAPE OPTIMIZATION OF STRUCTURES BY MODIFIED HARMONY SEARCH S. Gholzadeh *,, A. Barzegar and Ch. Gheyratmand

More information

AD hoc wireless networks consist of wireless nodes that

AD hoc wireless networks consist of wireless nodes that IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006 1 Topology Control n Ad Hoc Wreless Networks Usng Cooperatve Communcaton Mhaela Carde, Member, IEEE, JeWu,Senor Member, IEEE, and Shuhu Yang

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Empirical Distributions of Parameter Estimates. in Binary Logistic Regression Using Bootstrap

Empirical Distributions of Parameter Estimates. in Binary Logistic Regression Using Bootstrap Int. Journal of Math. Analyss, Vol. 8, 4, no. 5, 7-7 HIKARI Ltd, www.m-hkar.com http://dx.do.org/.988/jma.4.494 Emprcal Dstrbutons of Parameter Estmates n Bnary Logstc Regresson Usng Bootstrap Anwar Ftranto*

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

MOBILE Cloud Computing (MCC) extends the capabilities

MOBILE Cloud Computing (MCC) extends the capabilities 1 Resource Sharng of a Computng Access Pont for Mult-user Moble Cloud Offloadng wth Delay Constrants Meng-Hs Chen, Student Member, IEEE, Mn Dong, Senor Member, IEEE, Ben Lang, Fellow, IEEE arxv:1712.00030v2

More information

Distortion-Memory Tradeoffs in Cache-Aided Wireless Video Delivery

Distortion-Memory Tradeoffs in Cache-Aided Wireless Video Delivery Dstorton-Memory Tradeoffs n Cache-Aded Wreless Vdeo Delvery P. Hassanzadeh, E. Erkp, J. Llorca, A. Tulno arxv:1511.03932v1 [cs.it] 12 Nov 2015 Abstract Moble network operators are consderng cachng as one

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Applied Mathematics. Elixir Appl. Math. 84 (2015)

Applied Mathematics. Elixir Appl. Math. 84 (2015) 3341 V.Vnoba and S.M.Chthra/ Elxr Appl. Math. 84 (015) 3341-3349 Avalable onlne at www.elxrpublshers.com (Elxr Internatonal Journal) Appled Mathematcs Elxr Appl. Math. 84 (015) 3341-3349 Bayesan Inference

More information

Internet Traffic Managers

Internet Traffic Managers Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information