Cloud-Aided Wireless Networks with Edge Caching: Fundamental Latency Trade-Offs in Fog Radio Access Networks

Size: px
Start display at page:

Download "Cloud-Aided Wireless Networks with Edge Caching: Fundamental Latency Trade-Offs in Fog Radio Access Networks"

Transcription

1 206 IEEE Intenational Symposium on Infomation Theoy Cloud-Aided Wieless Netwos with Edge Caching: Fundamental Latency Tade-Offs in Fog Radio Access Netwos Ravi Tandon Osvaldo Simeone Depatment of ECE Univesity of Aizona, Tucson, AZ CWCSPR, ECE Depatment New Jesey Institute of Technology Key F-RAN Paametes Abstact Fog Radio Access Netwo (F-RAN) is an emeging wieless netwo achitectue that leveages caching capabilities at the wieless edge nodes, as well as edge connectivity to the cloud via fonthaul lins. This pape aims at poviding a latency-centic analysis of the degees of feedom of an F-RAN by accounting fo the total content delivey delay acoss the fonthaul and wieless segments of the netwo. The main goal of the analysis is the identification of optimal caching, fonthaul and edge tansmission policies. The study is based on the intoduction of a novel pefomance metic, efeed to as the Nomalized Delivey Time (NDT), which measues the total delivey latency as compaed to an ideal intefeence-fee system. An infomation-theoetically optimal chaacteization of the tade-off between NDT, on the one hand, and fonthaul and caching esouces, on the othe, is deived fo a class of F-RANs with two edge nodes and two uses. Using these esults, the inteplay between caching and cloud connectivity is highlighted, as well as the impact of both caching and fonthaul esouces on the delivey latency. Index Tems Cloud Radio Access Netwo (C-RAN), caching, 5G, degees of feedom, latency. N : # of popula files M : # of edge nodes (ENs) : stoage capacity L : size of a File K : # of uses CF = log(p ) : fonthaul capacity M =3 Fonthaul Demands (Edge Node) EN g(p CF = lo ) Use Cloud CF = log (P ) EN2 shaed wieless C F = Use 2 channel l og ( P) EN3 Use 3 L Set of popula files N =5 Use 4 () K=4 t= t = 2 Time Fig.. Infomation-theoetic model fo F-RAN. I. I NTRODUCTION Edge pocessing and vitualization ae two of the ey emeging tends in the evolution of 5G netwos [], [2]. Edge pocessing efes to the localization of stoage and computing esouces at the netwo edge. Notably, edge nodes (ENs), such as base stations, can be equipped with local s to stoe popula content, with the aim of educing the delivey latency by limiting the need to communicate with emote content seves []. In a dual manne, vitualization allows the implementation of netwo functionalities at a centalized cloud pocesso. An impotant example is given by the Cloud Radio Access Netwo (C-RAN) achitectue, in which the ENs ae connected to a cloud pocesso by so called fonthaul lins, so as to enable, among othe pefomance gains, enhanced intefeence management capabilities thans to the joint baseband pocessing in the cloud [2], [3]. Bidging the gap between these two complementay tends, the Fog Radio Access Netwo (F-RAN) achitectue has been ecently advocated that combines the benefits of both edge and cloud pocessing (see, e.g., [4]). In this achitectue, as illustated in Fig., ENs may be endowed with caching capabilities, so as to seve local data equests of popula content /6/$ IEEE with low latency, while at the same time being contollable fom a cental cloud pocesso, in ode to seve abitay data equests with stonge intefeence management popeties and less stingent delay constaints. The design of F-RANs involves the following intetwined design questions: (a) What to?; (b) How to utilize the limited capacity available on the fonthaul lins?; and (c) How to delive the equested content on the downlin wieless channel? In this wo, we set out to obtain fundamental insights into these questions by means of an infomationtheoetic appoach. The poposed famewo aims at poviding a latency-centic analysis of the degees of feedom of an FRAN by accounting fo the total content delivey delay acoss the fonthaul and wieless segments of the netwo. Related Wo: Questions (a) and (c) wee ecently tacled fom an infomation-theoetic viewpoint by Maddah-Ali and Niesen in [5], [6], fo a -aided scenaio that allows fo edge caching but not fo cloud pocessing. Specifically, fo a scenaio with M = 3 ENs and K = 3 uses, these wos pesent an uppe bound on the invese of the numbe of achievable degees of feedom (DoF). In [7], instead, a lowe 2029

2 206 IEEE Intenational Symposium on Infomation Theoy bound is pesented that poves the optimality of the caching and tansmission schemes poposed in [5], [6] fo a given ange of values of the stoage capacity and unde the constaint that no inte-file coding is allowed. Main Contibutions: In contast to the mentioned pio eseach, in this pape, we focus on the F-RAN achitectue in Fig., which allows fo both edge caching and cloud pocessing by means of fonthaul connections. To this end, we fist pesent an infomation-theoetic model of F-RANs that succinctly captues its new design aspects and constaints. We also develop a new pefomance measue, which we efe to as the Nomalized Delivey Time (NDT). The NDT captues the wost-case latency incued ove the fonthaul and wieless access segments of the netwo fo content delivey as compaed to an ideal intefeence-fee system in the high signal-to-noise atio (SNR) egime. Fo the case of a cachingonly system, with no fonthaul lins, the NDT is elated to the invese of the DoF metic studied in [5], [6], as discussed in [7]. Unde the constaint of uncoded inte-file caching, we chaacteize the optimal tade-off between NDT and caching and fonthaul esouces fo an F-RAN with M =2ENs and K =2uses (see Fig. 3). II. INFORMATION THEORETIC MODELING OF F-RAN As illustated in Fig., we conside an F-RAN achitectue with M edge nodes (ENs), which can seve a set of K uses ove a shaed wieless channel. Note that, in Sec. IV, we will specialize the set-up fo ou main esults to the case M = K = 2, but we pesent hee the model in its full geneality in ode to highlight moe geneal eseach questions and open poblems. We assume the pesence of a libay of N files, which epesent the content that may be equested by the uses, whee each file is of size L bits. Time is oganized into tansmission intevals, as shown in Fig. and Fig. 2 and futhe discussed below. The system model, notation and main assumptions ae summaized as follows. The libay of N contents, o files, that may be equested is denoted by F = {F,F 2,,F N }, whee each file is of size L bits. This libay is assumed to be constant acoss many tansmission intevals. At each tansmission inteval t, uses issue a vecto of equests D(t) =(D (t),,d K (t)), whee D (t) 2{,,N} indicates that file F D (t) is equested by use at time t. We mae no assumption on the natue of the time-vaiability of the demands made by the uses. Each EN has a which can stoe bits, whee 2 [0, ] epesents the factional size. The cloud has access to all N files, and each EN is connected to the cloud via a fonthaul lin. The fonthaul capacity is given by C F bits pe symbol fo each EN, whee a symbol efes to a channel use of the downlin wieless channel. The capacity C F is assumed to be fixed, eflecting conventional scenaios in which fonthaul lins coespond to dedicated wied connections (see, e.g., [2], [3]). The collective time-vaying wieless channel state infomation (CSI) at tansmission inteval t is defined as H(t) = {{H m, (t)} K = }M m=, whee H m, (t) denotes the channel coefficients that chaacteize the popagation between the mth EN and the th use. The channel coefficients ae assumed to be dawn in an independent identically distibuted (i.i.d.) manne fom a continuous distibution (as in [5], [6]). Next, we define the caching-fonthaul-tansmission policy. We focus on the case in which, in each tansmission inteval t, the ENs and cloud ae awae of the channel ealization H(t), as well as of the uses demand vecto D(t), but not of any futue channel ealizations and demands H(t 0 ) and D(t 0 ) with t 0 >t. As detailed below, the caching-fonthaul-tansmission policy decides each ENs composition, which is ept fixed fo many tansmission intevals, as well as the duation and content of the tansmissions acoss fonthaul and wieless segments fo each tansmission inteval, as shown in Fig. 2. Definition. (Caching-Fonthaul-Tansmission Policy) A caching-fonthaul-tansmission policy = ( C, F, E ) is chaacteized by the following thee encoding functions. a) Caching policy C : The caching policy is defined by a function F!{S,S 2,,S M }, which maps the set F of files into the content S m of the mth EN fo m =,,M, which in tun cannot exceed bits. Fo the scope of this pape, we focus on the pactically elevant class of caching policies that do not allow fo inte-file coding but do include abitay inta-file coding. Within this class, the content S m of the mth EN can be patitioned into N independent sub-s, i.e., S m =(S mf,s mf2,,s mfn ), whee S mfn can be any abitay function of file F n, fo n =,,N. We emphasize that the caching policy is fixed fo many tansmission intevals and is only a function of the libay F of files. b) Fonthaul policy F : The fonthaul policy is defined by a function {F,D,H}! {T F,U T F,U T F 2,,U T F M }, which maps the set of files F, instantaneous demands and channels to the duation T F of the fonthaul tansmission (see Fig. 2) and to the message U T F m, of duation T F, sent on the mth lin. In eeping with the definition of the fonthaul capacity C F, all time intevals, including T F, ae nomalized to the symbol tansmission time on the downlin wieless channel. Accodingly, the fonthaul message cannot exceed T F C F bits. We emphasize that the fonthaul policy, as well as the tansmission policy discussed below, adapts to the instantaneous demands and to the CSI in each tansmission inteval, unlie the caching policy. c) Edge tansmission policy E : The edge tansmission policy, o tansmission policy fo shot, is defined by the collection of functions E =( E0, E, E2,, EM ), which chaacteize the tansmission on the wieless downlin channel as a function of the cuent demands and CSI and of the fonthaul messages. Specifically, the function E0 : {F,D,H,U T F,,U T F M }! T E selects the tansmission duation, in numbe of symbols, on the downlin wieless channel fo all the ENs (see Fig. 2). Instead, the M local tansmission functions Em : {S m,d,h,t E,U T F m }!X T E m, one fo each EN, detemine the codewod X T E m, of duation symbols, sent on the wieless channel by the mth EN, T E 2030

3 206 IEEE Intenational Symposium on Infomation Theoy unde an aveage powe constaint given by the paamete P. Fig. 2. Illustation of tansmission intevals and of the definition of latency. Upon the tansmission by the ENs at a tansmission inteval t, the th use eceives the signal Y T E = NX m= H m, X T E m + N T E, () on each channel use of the wieless downlin channel, whee H m, is the channel coefficient between the th use and the mth EN; N T E denotes the additive noise at the th use, which is assumed to be complex Gaussian with unitay powe, i.i.d. ove time and uses and also independent of the channel coefficients. Each use maps its eceived signal Y T E to an estimate ˆF D of the demanded file (i.e., F D ), incuing a pobability of eo P( ˆF D 6= F D ). The pobability of eo of the policy is then defined fo the wost-case equest vecto as P e = max D max P( ˆF D 6= F D ). (2) 2{,,K} A policy is said to be feasible if, fo almost all ealizations H of the channel, i.e., with pobability, we have P e! 0 when L!. III. LATENCY-CENTRIC DOF ANALYSIS: NORMALIZED DELIVERY TIME (NDT) We now define the poposed delivey metic by fist intoducing the notion of delivey time pe bit. Definition 2. (Delivey time pe bit) Fo a given factional size, fonthaul capacity C F, and an EN powe constaint P, conside a sequence of feasible policies indexed by the file size L. Denote as T F and T E the duations of the fonthaul tansmission and edge tansmission as in Definition fo a file size L. The aveage achievable delivey time pe bit fo a given sequence of feasible policies is then defined as (, C F,P) = max D lim L! L (T F + T E ) (3) The delivey time pe bit (3) captues the latency within each tansmission inteval, which is depicted in Fig. 2, as evaluated fo the wost-case uses equests and on aveage ove the channel distibution. It is noted that, in ode to obtain vanishing pobabilities of eo, as equied by Definition 2, the latencies T F and T E need to scale with L, and it is this scaling that is measued by (3). We also obseve that the definition of delivey time pe bit in (3) is ain to the completion time studied in [8], [9] fo standad channel models, such as boadcast and multiple access. The optimal latency pefomance is in pinciple obtained by minimizing the delivey time pe bit (3) ove all possible policies. This optimization is geneally pohibitive and it is also dependent on all paametes (, C F,P). With the aim of obtaining analytical insights, we next popose a novel tactable metic that etains the ey dependence of latency on size and fonthaul capacity while adopting a high-snr appoximation in the vein of the by now standad DoF analysis of intefeence netwos [0]. To this end, we let the fonthaul capacity scale with the SNR paamete P as C F = log(p ), whee is a paamete that measues the multiplexing gain of the fonthaul lins. Definition 3. (NDT) Fo any achievable (, C F,P), with C F = log(p ), the nomalized delivey time (NDT) (, ) = lim P! (, log(p ),P) / log(p ) is said to be achievable. Fo a given pai (, ) the minimum NDT is defined as (4) (, ) =inf{ (, ) : (, ) is achievable}. (5) In (5), the delivey time pe bit (3) is nomalized by the tem / log(p ), which measues fo the delivey time pe bit, at high SNR, of a baseline system with no intefeence and unlimited caching, in which each use can be seved by a dedicated EN that has all files. As such, an NDT of indicates that the wost-case time equied to seve any possible equest is times lage than the time that would be needed by the baseline system. Based on the definitions above, ou goal is to chaacteize the novel metic NDT, (, ) that captues the inteplay between the nomalized stoage and the fonthaul multiplexing gain. We note that the minimum NDT (5) geneally depends on the numbe N of files, although we do not mae this dependence explicit to simplify the notation. We close this section with a ey popety of NDT that lends futhe evidence to its suitability as a pefomance metic fo the analysis of F-RANs. Rema (Time Shaing between Policies and Convexity of Minimum NDT). Conside two (sequences of) policies and 2, equiing caching and fonthaul esouces (,) and ( 2,) and achieving NDTs (,) and ( 2,), espectively. An F-RAN is now given with caching and fonthaul esouces chaacteized as (, ) = ( +( ) 2,) fo some paamete 2 [0, ]. On this F-RAN, one could then opeate with policy on a faction of the stoage, fonthaul capacity and spectal esouces (i.e., time o fequency), and with policy 2 on the emaining pats. It can be eadily shown, based on additivity aguments, that this file splitting and -shaing stategy achieves an NDT equal to the convex combination (,)+( ) ( 2,), which is lowe bounded by (, ). The above agument demonstates that the NDT pefomance measue (, ) is convex in fo any value of. We note that a simila obsevation was made in [5], [6] fo a system with caching only (i.e., =0). 203

4 206 IEEE Intenational Symposium on Infomation Theoy NDT This obsevation motivated the authos of [5], [6] to study the invese of the DoF metic, instead of the DoF itself, as the pefomance citeion of inteest, since the DoF is shown not to have the same convexity popeties (see [7, Rema 2]). Rema 2 (Pipelined NDT) We note hee that the NDT in Definition 3 is based on the assumption of seial opeation of the fonthaul and edge segments. This definition can be extended to delivey stategies in which fonthaul and wieless channels ae opeated in a pipelined (paallel) manne, so that fonthaul and wieless tansmissions can tae place at the same time. This vaiation, along with moe geneal esults on NDT chaacteization, can be found in []. CF = log(p ) fonthaul capacity (, ) + cloud + (a) 3 2 NDT 0 A. Achievability of Minimum NDT Hee we descibe the specific policies that achieve the NDT tade-off cuve in Fig. 3. Without loss of geneality, we focus on the cone points in both low-fonthaul and high-fonthaul capacity egimes. This is because all the emaining points on the tade-off cuve can be achieved by time- and memoyshaing between the policies coesponding to the cone points as pe Rema. Achieving (, ) = fo = : With =, each EN can all files. This enables full coopeation between the ENs, since each EN can the entie libay. Thus, the set of ENs foms a vitual multiple-input single-output (MISO) boadcast channel, and zeo-focing beamfoming yields paallel intefeence-fee channels to the two uses. Theefoe, the latency equals the time needed by the mentioned efeence intefeence-fee channel with full caching, esulting in the achievable NDT =. Achieving (, ) = 3/2 fo = /2: With = /2, each EN can only at most half of each file. The caching policy is to split each file Fi into two equal sized sub-files, i.e., Fi = (Fi, Fi2 ) fo i =,..., N. EN stoes the fist cloud + In this section, we pesent the optimum NDT as intoduced in Definition 3 fo the special case of M = 2 and K = 2. As illustated in Fig. 3, the NDT tade-off analysis in Theoem identifies two distinct egimes in tems of the fonthaul capacity, namely a low-fonthaul capacity egime with and a high-fonthaul capacity egime with >. In the latte case, the use of both fonthaul and caching esouces is necessay in ode to obtain the optimal NDT pefomance, while, in the fome, if the capacity is sufficiently lage, namely if /2, it is sufficient to leveage the caching esouces to achieve the optimal pefomance. We next discuss the caching-fonthaul-tansmission policies that achieve the NDT tade-off in Theoem. Fo a setch of the convese, we efe to Appendix A (see [] fo a detailed poof). 2 Factional Cache Size (, ) + IV. O PTIMUM NDT T RADE -O FF FOR M = K = 2 Theoem. The optimal NDT tade-off fo the M = 2-EN, K = 2-use F-RAN with numbe of files N 2 is given as ( max + + 2, 2 fo 0 (6) (, ) = + fo >. > (b) 0 Factional Cache Size Fig. 3. Optimal NDT tade-off fo the M = 2-EN, K = 2-use F-RAN as a function of (factional size pe EN) and fo fonthaul capacity CF = log(p ). The tade-off has distinct egimes of opeations: (a) lowfonthaul capacity egime, with ; (b) high-fonthaul capacity egime, with >. sub-file, Fi, i =,..., N, and EN2 stoes the second subfile Fi2, fo all files i =,..., N. Fo any equest of distinct files, say Fi by use, and Fj by use 2, the tansmission poblem on the wieless channel is then equivalent to an Xnetwo with fou vitual messages, namely Fi, Fj available at EN, and Fi2, Fj2 available at EN2. Thus, we can use the intefeence alignment scheme poposed in [2], which achieves an equal ate of 2/3 log(p ) towads each of the two uses, ignoing o(log(p )) tems. The delivey time is, neglecting o(log(p )) tems, given by the edge tansmission time TE = 3L/2 log(p ), and the delivey time pe bit in Definition 2 is then appoximately = 3/(2 log(p )), yielding an achievable NDT of = 3/2. Inteestingly, as shown in Theoem, in the low-fonthaul egime when, if /2, the usage of the fonthaul esouce cannot futhe educe the NDT and this scheme achieves the minimum NDT. Achieving (, ) = + / fo = 0: The case = 0 coesponds to the setting in which the ENs have no caching capability. A finite NDT can hence only be achieved by using the fonthaul esouces. The fonthaul lins can be utilized in two distinct ways, efeed to hee as had- and soft-tansfe modes. With the had-tansfe mode, the cloud can diectly tansmit both equested files to each EN, and then the ENs can use the same fully coopeative zeo-focing appoach adopted above fo =. Since the fonthaul lins have capacities CF = log(p ) each, the fonthaul delivey time is TF = 2L/( log(p )), while the edge tansmission time, following the same aguments as fo the fist cone point, is appoximately TE = L/ log(p ). This yields an appoximate total delivey time pe bit of = ( + 2/)/(log(P )), and hence the achievable NDT = +2/. Howeve, had tansfe 2032

5 206 IEEE Intenational Symposium on Infomation Theoy tuns out to be suboptimal in this scenaio. The optimal NDT is in fact achieved though a soft-tansfe mode appoach typical of C-RAN (see, e.g., [3]): the cloud implements zeo-focing beamfoming and quantizes the esulting baseband signals [3]. Using a esolution of log(p ) bits pe downlin baseband sample, it can be shown that the effective SNR in the downlin scales popotionally to the powe P (see [3, Eq. (5)]). As a esult, this scheme entails a fonthaul latency T F that equals the edge latency T E of the zeo-focing beamfoming scheme, namely T E = L/(log(P )), multiplied by the time needed to cay each baseband sample on the fonthaul lin, namely log(p )/( log(p )), yielding the NDT =+/ (we efe the eade to [] fo details). V. CONCLUSIONS In this pape, we pesented an infomation-theoetic analysis of Fog Radio Access Netwos (F-RANs), an emeging wieless achitectue that encompasses both edge caching and cloud pocessing. The study aims at poviding a latency-centic undestanding of the degees of feedom, in the high-snr egime, of F-RAN netwos by accounting fo the available limited esouces in tems of fonthaul capacity, stoage sizes, as well as powe and bandwidth on the wieless channel. We detailed a geneal model and a novel pefomance metic, efeed to as Nomalized Delivey Time (NDT), which captues the wost-case delivey latency with espect to an ideal intefeence-fee system. Fo the special case of M =2edge nodes and K =2uses, we fully chaacteized the tade-off between the NDT and the fonthaul and caching esouces of the system. This esult eveals optimal caching-fonthaultansmission policies as a function of the system esouces. Ongoing wo focuses on extending the NDT tade-off to the moe geneal setting intoduced hee. REFERENCES [] E. Bastug, M. Bennis, and M. Debbah, Living on the edge: The ole of poactive caching in 5G wieless netwos, IEEE Communications Magazine, vol. 52, no. 8, pp , Aug [2] A. Checo, H. L. Chistiansen, Y. Yan, L. Scolai, G. Kadaas, M. S. Bege, and L. Dittmann, Cloud RAN fo mobile netwos: a technology oveview, IEEE Communications Suveys & Tutoials, vol. 7, no., pp , Fist Quate 204. [3] O. Simeone, A. Maede, M. Peng, O. Sahin, and W. Yu, Cloud Radio Access Netwo: Vitualizing Wieless Access fo Dense Heteogeneous Systems, AXiv e-pints, Dec [Online]. Available: [4] M. Peng, S. Yan, K. Zhang, and C. Wang, Fog Computing based Radio Access Netwos: Issues and Challenges, AXiv e-pints, Jun [Online]. Available: [5] M. A. Maddah-Ali and U. Niesen, Cache-aided intefeence channels, in Poc. IEEE Intenational Symposium on Infomation Theoy (ISIT), Hong Kong, June 205, pp [6] M. A. Maddah-Ali and U. Niesen, Cache-aided intefeence channels, AXiv e-pints, Oct [Online]. Available: [7] A. Sengupta, R. Tandon, and O. Simeone, Cache Aided Wieless Netwos: Tadeoffs between Stoage and Latency, AXiv e-pints, Dec [Online]. Available: [8] Y. Liu and E. Eip, Completion time in multi-access channel: An infomation theoetic pespective, in Poc. IEEE Infomation Theoy Woshop, Paaty, Bazil, 20, pp [9], Completion time in boadcast channel and intefeence channel, in Poc. 49th Annual Alleton Confeence on Communication, Contol and Computing, Monticello, IL, 20, pp [0] S. A. Jafa, Intefeence alignment a new loo at signal dimensions in a communication netwo, Foundations and Tends in Communications and Infomation Theoy, vol. 7, no., pp. 34, 200. [Online]. Available: [] A. Sengupta, R. Tandon, and O. Simeone, Cloud and -aided wieless netwos: Fundamental latency tadeoffs, CoRR, vol. abs/ , 206. [Online]. Available: [2] M. A. Maddah-Ali, A. S. Motahai, and A. K. Khandani, Communication ove MIMO X channels: Intefeence alignment, decomposition, and pefomance analysis, IEEE Tansactions on Infomation Theoy, vol. 54, no. 8, pp , Aug [3] O. Simeone, O. Someh, H. V. Poo, and S. Shamai, Downlin multicell pocessing with limited-bachaul capacity, EURASIP Jounal on Advances in Signal Pocessing, vol. 2009, p. 3, Feb VI. APPENDIX A: LOWER BOUNDS ON NDT (CONVERSE) In this Appendix, we pesent the main idea behind the convese which povides a matching lowe bound on the achievable NDT, and leads to the optimal NDT tade-off in Theoem. The convese is based on the idea of consideing subsets of infomation esouces acoss the caching, fonthaul and wieless segments of the F-RAN, with the popety that the infomation in each subset is sufficient to decode one o moe of the equested files fo any sequence of feasible policies in the high-snr egime. In paticula, the fist subset encompasses caching, fonthaul and wieless esouces and yields a lowe bound on a linea combination of (T E,T F ) as a function of and. The second subset concens the caching and fonthaul esouces of F-RAN, yielding a lowe bound on T F as a function of and. The thid subset petains only to the wieless segment of F-RAN and yields a lowe bound on T E. As shown in [], we aive at the following inequalities coesponding to the thee mentioned infomation subsets: Inequality : (T E + T F ) log(p )+(T E + T F ) P (2 )L L L ; (7) Inequality 2: Inequality 3: T F log(p ) ( 2)L L L ; (8) T E log(p ) L L L. (9) Hee, L is a function that vanishes fo L!, and P is a function such that P / log(p )! 0 as P!(i.e., P is any o(log(p )) function). Recognizing that the NDT is defined by (T (, ) =lim P! lim E +T F )log(p) L! L, the inequalities in (7), (8), and (9) ae used to fist obtain lowe bounds on (T F + T E ) log(p )/L fo vaious fonthaul and size egimes. Taing the limits L!and then P!ove these bounds leads to the lowe bound on NDT pesented in Theoem (see [] fo full details). 2033

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

Dynamic Topology Control to Reduce Interference in MANETs

Dynamic Topology Control to Reduce Interference in MANETs Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

Diversity-Multiplexing-Delay Tradeoffs in MIMO Multihop Networks with ARQ

Diversity-Multiplexing-Delay Tradeoffs in MIMO Multihop Networks with ARQ ISIT, Austin, Texas, U.S.A., June - 8, Divesity-Multiplexing-Delay Tadeoffs in MIMO Multihop Netwos with ARQ Yao Xie, Andea Goldsmith Depatment of Electical Engineeing, Stanfod Univesity, Stanfod, CA.

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad

More information

On using circuit-switched networks for file transfers

On using circuit-switched networks for file transfers On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1 Impovement of Fist-ode Takagi-Sugeno Models Using Local Unifom B-splines Felipe Fenández, Julio Gutiéez, Gacián Tiviño and Juan Calos Cespo Dep. Tecnología Fotónica, Facultad de Infomática Univesidad Politécnica

More information

EE 6900: Interconnection Networks for HPC Systems Fall 2016

EE 6900: Interconnection Networks for HPC Systems Fall 2016 EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection

More information

CLOUD based storage systems are emerging to gain significant

CLOUD based storage systems are emerging to gain significant IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 5, NO. 2, APRIL-JUNE 2017 221 On the Latency and Enegy Efficiency of Distibuted Stoage Systems Akshay Kuma, Student Membe, IEEE, Ravi Tandon, Membe, IEEE, and

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

Erasure-Coding Based Routing for Opportunistic Networks

Erasure-Coding Based Routing for Opportunistic Networks Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant

More information

FACE VECTORS OF FLAG COMPLEXES

FACE VECTORS OF FLAG COMPLEXES FACE VECTORS OF FLAG COMPLEXES ANDY FROHMADER Abstact. A conjectue of Kalai and Eckhoff that the face vecto of an abitay flag complex is also the face vecto of some paticula balanced complex is veified.

More information

Bo Gu and Xiaoyan Hong*

Bo Gu and Xiaoyan Hong* Int. J. Ad Hoc and Ubiquitous Computing, Vol. 11, Nos. /3, 1 169 Tansition phase of connectivity fo wieless netwoks with gowing pocess Bo Gu and Xiaoyan Hong* Depatment of Compute Science, Univesity of

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

Coded Distributed Computing

Coded Distributed Computing Coded Distibuted Computing Salman Avestimeh USC joint wok with Songze Li (USC), Qian Yu (USC), and Mohammad Maddah-Ali (Bell-Labs) Asiloma Confeence Nov. 2016 Infastuctues fo (Big) Data Analytics How to

More information

5 4 THE BERNOULLI EQUATION

5 4 THE BERNOULLI EQUATION 185 CHATER 5 the suounding ai). The fictional wok tem w fiction is often expessed as e loss to epesent the loss (convesion) of mechanical into themal. Fo the idealied case of fictionless motion, the last

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing IEEE TRANSACTIONS ON COMPUTERS, VOL. 50, NO. 9, SEPTEMBER 200 949 Dynamic Multiple Paity (DMP) Disk Aay fo Seial Tansaction Pocessing K.H. Yeung, Membe, IEEE, and T.S. Yum, Senio Membe, IEEE AbstactÐThe

More information

Heterogeneous V2V Communications in Multi-Link and Multi-RAT Vehicular Networks

Heterogeneous V2V Communications in Multi-Link and Multi-RAT Vehicular Networks 1 Heteogeneous V2V Communications in Multi-Link and Multi-RAT Vehicula Netwoks Miguel Sepulce and Javie Gozalvez Abstact Connected and automated vehicles will enable advanced taffic safety and efficiency

More information

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks Numbe of Paths and Neighbous Effect on Multipath Routing in Mobile Ad Hoc Netwoks Oday Jeew School of Infomation Systems and Accounting Univesity of Canbea Canbea ACT 2617, Austalia oday.jeew@canbea.edu.au

More information

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New

More information

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen Accuate Diffaction Efficiency Contol fo Multiplexed Volume Hologaphic Gatings Xuliang Han, Gichel Kim, and Ray T. Chen Micoelectonic Reseach Cente Depatment of Electical and Compute Engineeing Univesity

More information

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,

More information

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity

More information

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

High performance CUDA based CNN image processor

High performance CUDA based CNN image processor High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu

More information

OPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO

OPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO OPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO Zeeshan A. Shaikh 1 and T.Y. Badguja 2 1,2 Depatment of Mechanical Engineeing, Late G. N. Sapkal

More information

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced

More information

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes On the Convesion between Binay Code and BinayReflected Gay Code on Boolean Cubes The Havad community has made this aticle openly available. Please shae how this access benefits you. You stoy mattes Citation

More information

Concomitants of Upper Record Statistics for Bivariate Pseudo Weibull Distribution

Concomitants of Upper Record Statistics for Bivariate Pseudo Weibull Distribution Available at http://pvamuedu/aam Appl Appl Math ISSN: 93-9466 Vol 5, Issue (Decembe ), pp 8 9 (Peviously, Vol 5, Issue, pp 379 388) Applications and Applied Mathematics: An Intenational Jounal (AAM) Concomitants

More information

Separability and Topology Control of Quasi Unit Disk Graphs

Separability and Topology Control of Quasi Unit Disk Graphs Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,

More information

On the throughput-cost tradeoff of multi-tiered optical network architectures

On the throughput-cost tradeoff of multi-tiered optical network architectures 1 On the thoughput-cost tadeoff of multi-tieed optical netwok achitectues Guy Weichenbeg, Vincent W. S. Chan, and Muiel Médad Laboatoy fo Infomation and Decision Systems Massachusetts Institute of Technology

More information

Lecture # 04. Image Enhancement in Spatial Domain

Lecture # 04. Image Enhancement in Spatial Domain Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency

More information

A ROI Focusing Mechanism for Digital Cameras

A ROI Focusing Mechanism for Digital Cameras A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

On Error Estimation in Runge-Kutta Methods

On Error Estimation in Runge-Kutta Methods Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment

More information

Topic -3 Image Enhancement

Topic -3 Image Enhancement Topic -3 Image Enhancement (Pat 1) DIP: Details Digital Image Pocessing Digital Image Chaacteistics Spatial Spectal Gay-level Histogam DFT DCT Pe-Pocessing Enhancement Restoation Point Pocessing Masking

More information

Any modern computer system will incorporate (at least) two levels of storage:

Any modern computer system will incorporate (at least) two levels of storage: 1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe

More information

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),

More information

An Extension to the Local Binary Patterns for Image Retrieval

An Extension to the Local Binary Patterns for Image Retrieval , pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science

More information

Signal integrity analysis and physically based circuit extraction of a mounted

Signal integrity analysis and physically based circuit extraction of a mounted emc design & softwae Signal integity analysis and physically based cicuit extaction of a mounted SMA connecto A poposed geneal appoach is given fo the definition of an equivalent cicuit with SMAs mounted

More information

Experimental and numerical simulation of the flow over a spillway

Experimental and numerical simulation of the flow over a spillway Euopean Wate 57: 253-260, 2017. 2017 E.W. Publications Expeimental and numeical simulation of the flow ove a spillway A. Seafeim *, L. Avgeis, V. Hissanthou and K. Bellos Depatment of Civil Engineeing,

More information

Improved Utility-based Congestion Control for Delay-Constrained Communication

Improved Utility-based Congestion Control for Delay-Constrained Communication Impoved Utility-based Congestion Contol fo Delay-Constained Communication Stefano D Aonco, Laua Toni, Segio Mena, Xiaoqing Zhu, and Pascal Fossad axiv:5.2799v3 [cs.ni] 2 Jan 27 Abstact Due to the pesence

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

ART GALLERIES WITH INTERIOR WALLS. March 1998

ART GALLERIES WITH INTERIOR WALLS. March 1998 ART GALLERIES WITH INTERIOR WALLS Andé Kündgen Mach 1998 Abstact. Conside an at galley fomed by a polygon on n vetices with m pais of vetices joined by inteio diagonals, the inteio walls. Each inteio wall

More information

FINITE ELEMENT MODEL UPDATING OF AN EXPERIMENTAL VEHICLE MODEL USING MEASURED MODAL CHARACTERISTICS

FINITE ELEMENT MODEL UPDATING OF AN EXPERIMENTAL VEHICLE MODEL USING MEASURED MODAL CHARACTERISTICS COMPDYN 009 ECCOMAS Thematic Confeence on Computational Methods in Stuctual Dynamics and Eathquake Engineeing M. Papadakakis, N.D. Lagaos, M. Fagiadakis (eds.) Rhodes, Geece, 4 June 009 FINITE ELEMENT

More information

Comparisons of Transient Analytical Methods for Determining Hydraulic Conductivity Using Disc Permeameters

Comparisons of Transient Analytical Methods for Determining Hydraulic Conductivity Using Disc Permeameters Compaisons of Tansient Analytical Methods fo Detemining Hydaulic Conductivity Using Disc Pemeametes 1,,3 Cook, F.J. 1 CSRO Land and Wate, ndoooopilly, Queensland The Univesity of Queensland, St Lucia,

More information

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery Poceedings of the 4th WSEAS Intenational Confeence on luid Mechanics and Aeodynamics, Elounda, Geece, August 1-3, 006 (pp337-34) Consevation Law of Centifugal oce and Mechanism of Enegy Tansfe Caused in

More information

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs Fault-Toleant Routing Schemes in RDT(,,)/α-Based Inteconnection Netwok fo Netwoks-on-Chip Designs Mei Yang, Tao Li, Yingtao Jiang, and Yulu Yang Dept. of Electical & Compute Engineeing Univesity of Nevada,

More information

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok 14260 Email:

More information

Analysis of Wired Short Cuts in Wireless Sensor Networks

Analysis of Wired Short Cuts in Wireless Sensor Networks Analysis of Wied Shot Cuts in Wieless Senso Netwos ohan Chitaduga Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles 90089, USA Email: chitadu@usc.edu Ahmed Helmy Depatment

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

Positioning of a robot based on binocular vision for hand / foot fusion Long Han

Positioning of a robot based on binocular vision for hand / foot fusion Long Han 2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,

More information

A Mathematical Implementation of a Global Human Walking Model with Real-Time Kinematic Personification by Boulic, Thalmann and Thalmann.

A Mathematical Implementation of a Global Human Walking Model with Real-Time Kinematic Personification by Boulic, Thalmann and Thalmann. A Mathematical Implementation of a Global Human Walking Model with Real-Time Kinematic Pesonification by Boulic, Thalmann and Thalmann. Mashall Badley National Cente fo Physical Acoustics Univesity of

More information

Gravitational Shift for Beginners

Gravitational Shift for Beginners Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational

More information

Delay-Optimized File Retrieval under LT-Based Cloud Storage

Delay-Optimized File Retrieval under LT-Based Cloud Storage infomation: DOI 10.1109/TCC.015.404, IEEE Tansactions on Cloud Computing IEEE TRANSACTIONS ON CLOUD COMPUTING 1 Delay-Optimized File Retieval unde LT-Based Cloud Stoage Haifeng Lu,Chuan Heng Foh, Senio

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

Optimal Peer Selection for P2P Downloading and Streaming

Optimal Peer Selection for P2P Downloading and Streaming Univesity of Massachusetts Amhest ScholaWoks@UMass Amhest Compute Science Depatment Faculty Publication Seies Compute Science 2005 Optimal Pee Selection fo P2P Downloading and Steaming Micah Adle Univesity

More information

Adaptation of Motion Capture Data of Human Arms to a Humanoid Robot Using Optimization

Adaptation of Motion Capture Data of Human Arms to a Humanoid Robot Using Optimization ICCAS25 June 2-5, KINTEX, Gyeonggi-Do, Koea Adaptation of Motion Captue Data of Human Ams to a Humanoid Robot Using Optimization ChangHwan Kim and Doik Kim Intelligent Robotics Reseach Cente, Koea Institute

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

The Dual Round Robin Matching Switch with Exhaustive Service

The Dual Round Robin Matching Switch with Exhaustive Service The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line

More information

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number.

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number. Illustative G-C Simila cicles Alignments to Content Standads: G-C.A. Task (a, b) x y Fo this poblem, is a point in the - coodinate plane and is a positive numbe. a. Using a tanslation and a dilation, show

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

Multi-Objective Analysis of Ridesharing in Automated Mobility-on-Demand

Multi-Objective Analysis of Ridesharing in Automated Mobility-on-Demand Robotics: Science and Systems 018 Pittsbugh, PA, USA, June 6-30, 018 Multi-Objective Analysis of Rideshaing in Automated Mobility-on-Demand Michal Čáp and Javie Alonso-Moa Dept. of Cognitive Robotics,

More information

New Algorithms for Daylight Harvesting in a Private Office

New Algorithms for Daylight Harvesting in a Private Office 18th Intenational Confeence on Infomation Fusion Washington, DC - July 6-9, 2015 New Algoithms fo Daylight Havesting in a Pivate Office Rohit Kuma Lighting Solutions and Sevices Philips Reseach Noth Ameica

More information

Extract Object Boundaries in Noisy Images using Level Set. Final Report

Extract Object Boundaries in Noisy Images using Level Set. Final Report Extact Object Boundaies in Noisy Images using Level Set by: Quming Zhou Final Repot Submitted to Pofesso Bian Evans EE381K Multidimensional Digital Signal Pocessing May 10, 003 Abstact Finding object contous

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1)

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1) 1 Multi Path PERT Ankit Singh and A. L. Naasimha Reddy Electical and Compute Engineeing Depatment, Texas A&M Univesity; email: eddy@ece.tamu.edu. Abstact This pape pesents a new multipath delay based algoithm,

More information

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

A Stable Traffic Engineering Technique for Performance Enhancement of the Non-TCP Elastic Flows *

A Stable Traffic Engineering Technique for Performance Enhancement of the Non-TCP Elastic Flows * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 30, 1115-1129 (2014) A Stable Taffic Engineeing Technique fo Pefomance Enhancement of the Non-TCP Elastic Flows * Ian Telecom Reseach Cente (ITRC) Tehan,

More information

Methods for history matching under geological constraints Jef Caers Stanford University, Petroleum Engineering, Stanford CA , USA

Methods for history matching under geological constraints Jef Caers Stanford University, Petroleum Engineering, Stanford CA , USA Methods fo histoy matching unde geological constaints Jef Caes Stanfod Univesity, Petoleum Engineeing, Stanfod CA 9435-222, USA Abstact Two geostatistical methods fo histoy matching ae pesented. Both ely

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

Fifth Wheel Modelling and Testing

Fifth Wheel Modelling and Testing Fifth heel Modelling and Testing en Masoy Mechanical Engineeing Depatment Floida Atlantic Univesity Boca aton, FL 4 Lois Malaptias IFMA Institut Fancais De Mechanique Advancee ampus De lemont Feand Les

More information

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors We ae IntechOpen, the wold s leading publishe of Open Access boos Built by scientists, fo scientists 4, 116, 12 Open access boos available Intenational authos and editos Downloads Ou authos ae among the

More information

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2 Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used

More information