Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks

Size: px
Start display at page:

Download "Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks"

Transcription

1 Iterferece Aware Chael Assigmet Scheme i Multichael Wireless Mesh Networks Sumyeg Kim Departmet of Computer Software Egieerig Kumoh Natioal Istitute of Techology Gum South Korea Abstract Wireless mesh etworks (WMNs) are gaiig sigificat attetio to provide wireless broadbad service. Nodes i a wireless mesh etwork ca commuicate with each other directly or through oe or more itermediate odes. Because of multi-hop trasmissios with multiple cotedig ad competig chaels, performace of wireless mesh etworks decreases. Supportig high performace is a importat challege i multi-hop mesh etworks. Nassiri et al. proposed a Molecular MAC protocol for autoomic assigmet ad use of multiple chaels to improve etwork performace. I the Molecular MAC protocol, odes are either uclei or electros i a atom. Neighborig atoms use orthogoal chaels to operate i parallel data trasmissios. Each ucleus selects a idle chael that is ot curretly beig occupied by its eighborig atoms with the assistace from electros i the same atom. However, this protocol has the followig drawback; sice a ucleus allocates a chael with help from the electros i its ow trasmissio rage, it is ot able to recogize the existece of those atoms i the iterferece rage. Therefore, allocatig the same chael to eighborig atoms results i the deterioratio of etwork performace. I order to resolve this problem, we propose a chael allocatio scheme with the iterferece issue take ito accout. Based o various simulatio results, the proposed scheme was verified that differet chaels could be allocated to those eighborig atoms i the iterferece rage. Keywords iterferece; chael assigmet; multichael; mesh etwork I. INTRODUCTION A wireless mesh etwork (WMN) is a cost-effective access etwork architecture. It is a promisig wireless techology for umerous applicatios. It is gaiig sigificat attetio as a possible way for Iteret service providers (ISPs) ad carriers i order to provide wireless broadbad service. I WMNs, odes are cosisted of mesh routers ad mesh cliets [1]. Mesh routers have miimal mobility ad form the backboe of WMNs. Whe a ode is withi the trasmissio rage of aother ode, they are cosidered as eighbors, ad there is a wireless lik betwee them. Some odes, called gateways, are coected to the wired etwork, which coects the WMNs to rest of the Iteret. The packets set by ed users travel through wireless mesh etworks over multiple hops. Ad gateway odes relay traffic to ad from the wired Iteret. The performace of multi-hop commuicatio quickly reduces as the umber of hops becomes larger due to itra-flow ad iter-flow iterfereces [2-]. This is because a wireless lik is shared amog eighborig odes. The itra-flow iterferece occurs because odes are i each other's iterferece rage alog the path of the same flow. Nodes experiece differet amout of chael cotetio as show i Fig. 1. Iter-flow iterferece occurs sice multiple flows o the same chaels betwee differet routig paths operate ad compete for the medium as show i Fig Fig. 1. Itra-flow iterferece Fig. 2. Iter-flow iterferece 3 Iter-flow iterferece betwee 3 ad With a sigle chael, odes operate o the same chael. Therefore, etwork performace decreases. Nodes ca be equipped with multiple radios ad chaels. This meas there is a uique frequecy used for each wireless hop, ad thus eables separatio of wireless isio domai ad reduces the iterferece ad cotetio. This ca sigificatly improve etwork performace without badwidth degradatio. The desig of the MAC protocol is the most likely challege i WMNs. A iterestig problem i WMNs is how to efficietly utilize multiple chaels. Several MAC protocols for hadlig multiple chaels have bee proposed i the literature [5-17]. The algorithms proposed i [5] select chaels for the mesh radios to miimize iterferece withi the mesh etwork ad betwee the mesh etwork ad co-located wireless etworks. A ew method for the iterferece estimatio is suggested. All available chaels are periodically moitored by each mesh ode ad measured iformatio of iteral chael usage ad exteral iterferece is shared with mesh odes withi This research was supported by Basic Sciece Research Program through the Natioal Research Foudatio of Korea (NRF) fuded by the Miistry of Educatio, Sciece ad Techology ( ). 75 P a g e

2 iterferece rage. Duarte et al. use game theory to desig a systematic approach to utilize partially overlapped chaels i WMNs while miimizig the adverse effect of adjacet chael iterferece [6]. I [7], both cetralized ad distributed algorithms are preseted, which aim to miimize the umber of pairs of liks that are iterferig. Molecular MAC protocol was proposed to orgaize the mesh etwork accordig to the molecular aalogy [-12]. It divides the etwork ito atoms with ucleus odes operatig o fixed chaels ad electros that dyamically switch chaels betwee eighbor uclei. Electros ca be shared by umerous atoms. Whe a ucleus selects a chael, it receives help from the electros i its ow trasmissio rage. The, electros deliver the iformatio about those chaels used by their paret atoms to the ucleus. Because a atom caot be aware of the existece of other eighborig atoms if there are o electros shared amog them, the ucleus may allocate the same chael to such atoms. Although the proposed scheme aturally adopts a fudametal operatio priciple of the Molecular MAC protocol, it modifies a chael allocatio method. The proposed scheme is somewhat similar to the Molecular MAC protocol method i that a chael is selected by the assistace of electros. The, a isio probability is applied to allocate a ew chael i order to recogize ay iterferece ad avoid ay overlapped chael allocatio. The paper is orgaized as follows. We give a brief itroductio of the Molecular MAC protocol ad its chael assigmet problem i Sectio II. I Sectio III, the proposed scheme is preseted i detail. I Sectio IV, performace studies are carried out through simulatio results. Fially, we draw a coclusio i Sectio V. II. RELATED WORK This Sectio is desiged to briefly specify the Molecular MAC protocol ad the touch o certai problem relatig to the chael allocatio. A. Molecular MAC Protocol The IEEE wireless etwork fuctios well i the ifrastructure mode. I additio, it ca provide a fair badwidth to all users by slightly modifyig a chael access method. Nevertheless, the IEEE etwork may icur umerous problems o a multi-hop etwork. The Molecular MAC protocol expads the IEEE etwork i order to trasmit data packets o the multi-hop etwork effectively. Sice the IEEE access method works well o a sigle-hop etwork, the Molecular MAC protocol divides a wireless mesh etwork ito differet spatially distributed atoms. Each atom uses a chael ot used by other eighborig atoms. A atom is composed of oe ucleus ad several electros, ad a ucleus selects a chael to be used by its ow atom. Ay ode withi a atom s boudary plays a role as a electro ad belogs to a eighborig atom. A electro directly commuicates with its uclei; however, sice there is o direct lik betwee electros, a direct commuicatio amog them caot be implemeted. I additio, due to o direct lik amog ucle direct commuicatios amog them are also ot possible. Therefore, the commuicatio amog eighborig electros ca be hadled by uclei while the commuicatio amog uclei ca be executed by eighborig electros. I the Molecular MAC protocol, each ode is assiged with the role as a ucleus or a electro while each ucleus selects a chael to be used by its ow atom. Accordigly, each ode forms a shortest path-spaig tree to a gateway ode liked to a wired Iteret. After a tree is formed, the odes with a eveumbered depth ad a odd-umbered depth are assiged with the roles of a ucleus ad a electro, respectively. After such roles are assiged, each ucleus requests its ow electros for chael iformatio. Chael iformatio icludes a list of active chaels ad their activities. A list of active chaels icludes the umbers of active chaels i the correspodig electros paret atoms. A chael activity is a parameter that is desiged to idicate how may data packets are trasmitted o each chael i the active chael list, which is expressed i the umber of packets trasmitted. Requested by a ucleus, each electro makes up a list of active chaels, measures each chael s activities, ad accordigly respods to the uclei. The, a ucleus receives certai resposes from all eighborig electros ad accordigly selects a chael accordig to a subsequet rule. 1) After a list of active chaels is received from all eighborig electros, a chael is radomly chose out of those o-active chaels. 2) If every chael is curretly occupied, a chael with the least activity is selected. Oce a ucleus allocates a chael, its eighborig electros use the chael. The correspodig electros use all chaels allocated by their atoms uclei. E1 E2 Atom 1 Atom 2 N1 E3 E N2 Chael 1 Chael 2 N Nucleus E Electro Fig. 3. Basic architecture of Molecular MAC protocol Fig. 3 illustrates a fudametal structure of the Molecular MAC protocol. As show i the figure, there are 2 atoms, 2 uclei ad 6 electros. The atom 1 icludes the ucleus N1 ad the electros (E1, E2, E3 ad E), ad uses the chael 1. The atom 2 icludes the ucleus N2 ad the electros (E3, E, E5 ad E6), ad uses the chael 2. The electros E3 ad E, shared by the two atoms, use both chael 1 ad chael 2. If a eighborig atom s ucleus requests iformatio for the allocatio of a chael, the correspodig electros trasmit their chael activity iformatio. Furthermore, the electros E1/E2, E3/E ad E5/E6 also trasmit the active chael lists icludig the chael 1, the chaels 1 & 2 ad the chael 2, respectively, to the ucleus. Oce all chaels are allocated, commuicatios are processed as follows: As show i the figure, whe certai data are to be trasmitted from E1 to E6, E5 E6 76 P a g e

3 E1 trasmits the data to N1 usig the chael 1 while N1 trasmits the date back to E3 or E. The, E3 or E trasmits the data to N2 usig the chael 2 while N2 trasmits the data back to E6. The eighborig electros, E1 ad E2, do ot directly commuicate with each other but commuicate via the ucleus N1. B. Chael Assigmet Problem i the Molecular MAC Protocol There is a problem associated with a chael allocatio scheme of the Molecular MAC protocol. The active chael list ad chael activity iformatio used by a ucleus for allocatig a chael are ot sufficiet. If there are o electros shared by eighborig atoms ad if such atoms exist i the same iterferece rage, the other atom s chael iformatio caot be idetified. Therefore, a idetical chael is allocated so that etwork performace ca be deteriorated due to the iterferece. I additio, sice each electro is located out of the other electro s trasmissio rage, the umber of packets trasmitted caot be properly measured, hece makig the chael activity iformatio iaccurate. As show i the Fig. 3, because the atoms 1 ad 2 share the electros E3 ad E, oe atom ca idetify the other atom s active chael whe the uclei N1 ad N2 allocate a chael. I this way, a overlapped chael allocatio ca be avoided. That is, the ucleus N1 selects the chael 1 sice it is aware that the chael 2 is curretly occupied by the atom 2. Similarly, the ucleus N2 is aware of the curret occupatio of the chael 1 by the atom 1 ad thereby selects the chael 2. However, as show i the Fig., because there is o electro directly liked betwee the atom 1 ad the atom 2, actives chaels occupied by the atoms caot be idetified. Therefore, the uclei N1 ad N2 may allocate the same chael. I the figure, the two atoms use the chael 1. E1 Atom 1 Atom 2 E3 E5 o this iformatio, a ucleus allocates a chael. I the Molecular MAC protocol, the activity iformatio, expressed i the umber of packets trasmitted, is applied. However, the proposed scheme utilizes the isio probability iformatio. Although the utilizatio of a chael is clearly a possible alterative, it is ot used sice it differs as per a access method (basic or RTS/CTS) or size of data packets. Because a isio probability is idepedet of a access methods or size of data packets, it is more efficiet to apply the probability values. Collisio probability is used as a simple ad effective estimate of the chael cotetio level. Whe a chael is to be allocated i the Molecular MAC protocol, a ucleus receives a list of active chaels from all eighborig electros ad the radomly selects a chael out of those o-active chaels. If every chael is curretly occupied, a chael with the least activity is selected. However, the proposed scheme uses the active chael list & isio probability iformatio, idetifies all o-active chaels ad the radomly selects a chael from those o-active chaels. I additio, if every chael is curretly occupied, a chael is chose based o the isio probability iformatio. Similar to the Molecular MAC protocol, the proposed scheme first selects a o-active chael usig a list of active chaels. The, it uses the isio probability iformatio i order to idetify ay overlapped chael used by aother atom ad accordigly allocates a ew chael. I order to measure the isio probability, both a ucleus ad a electro maages the umber of packets ( ) set set ad the umber of packets ( ) ided. The ided ucleus maages these values for each electro. set( ad imply the umber of packets set ad ided( ided, respectively, for the ode i ad the ode j. I the variable (, oe represets a ucleus ad the other deotes a electro. Based o these values, a isio probability ( P ) ( j ) ca be computed as follows. E2 N1 E N2 E6 ided( P ( set( Chael 1 Chael 1 Fig.. Chael assigmet problem III. INTERFERENCE AWARE CHANNEL ASSIGNMENT (IACA) SCHEME I this paper, a ew method to resolve such issues ivolved with the allocatio of a chael i the Molecular MAC protocol is proposed. Although the proposed scheme aturally adopts a fudametal operatio priciple of the Molecular MAC protocol, it modifies a chael allocatio method. Based o the scheme proposed i this paper ad with the correspodig iterferece take ito accout, a list of active chaels is formed while their activities are measured. Based Note that P is always i the rage of [0, 1] ad ( estimatig the value is simple without ay additioal overheads or costs. If a statio does ot receive a ACK for the basic method or a CTS for the RTS/CTS method, the statio assumes the packet is ided. The statio does ot cout at all ay packets from other statios. Collisio probability has to be maitaied ad updated by each ode (ucleus ad electros i a atom). We assume isio probability is updated per each update period (UpdateTime) expressed i time. Each ode couts the umber of packets set ( set ) ad ided ( ) durig the th update period ad the calculates istataeous isio probability ( P curret ) usig (1). From this value, average 77 P a g e

4 a) Atom 1 is ot withi the iterferece rage of Atom 2 b) Some electros i Atom 1 is withi the iterferece rage of Atom 2 c) Nucleus ad some electros i Atom 1 is withi the iterferece rage d) Nucleus ad all electros i Atom 1 is withi the iterferece rage of Atom 2 Fig. 5. Four cases accordig to the iterferece rage of atom isio probability ( P ) is approximated by exploitig a movig averagig widow: P P (1 ) P 1 curret 1 where P is the average isio probability at the ed of the (-1)th period ad is a smoothig factor. A electro calculates a isio probability ad periodically trasmits it to a ucleus. As illustrated i the four cases of Fig. 5, the ucleus uses the isio probability ad allocates a ew chael i order to avoid a overlapped chael allocatio. Firstly, if the atom 1 is ot covered by the iterferece rage of the atom 2, the atom 1 is ot affected by the atom 2; therefore, the performace of the atom 1 is ot deteriorated, ad it is okay to cotiue to utilize the curret active chael. That is, there is o eed to cosider a isio probability. Secodly, if part of the electros icluded i the atom 1 is covered by the iterferece rage of the atom 2, a isio probability measured by the electros is greater tha that measured by the ucleus. Hece, if the two isio probabilities differ by more tha a threshold value, it implies that the curret active chael is also occupied by other eighborig atoms; therefore, a ew chael is allocated. However, if the differece is egligible, the effect of the iterferece is miimal, therefore makig the utilizatio of the curret chael feasible. Thirdly, if a ucleus ad some electros of the atom 1 are covered by the iterferece rage of the atom 2, a isio probability measured by the ucleus is similar to that measured by the electros. Therefore, similar to the secod case, a ew chael caot be allocated. However, this issue ca be cleared by usig a electro of the atom 1 ot covered by the iterferece rage of the atom 2 ad factorig i a isio probability measured by the electro. A isio probability measured by the oiterfered electro is less tha that measured by the ucleus. That is, if there is ay differece betwee the two isio probabilities, it implies that oe atom is affected by aother atom s iterferece; therefore, a ew chael is allocated. For the secod ad the third cases, if the isio probability measured by the ucleus differs from that measured by the electro by more tha a threshold value, a ew chael is allocated. That is, a ew chael ca be allocated if the followig formula is satisfied. I the variable (, oe represets a ucleus ad the other deotes a electro. P P ( ( j, i) where, is a threshold value for chagig chael. 7 P a g e

5 Collisio Probability (IJACSA) Iteratioal Joural of Advaced Computer Sciece ad Applicatios, Fially, if a ucleus ad all electros of the atom 1 are covered by the iterferece rage of the atom 2, those isio probabilities measured by the ucleus ad the electros is similar; therefore, a ew chael caot be allocated because the (3) caot be satisfied. Still, the etwork performace is deteriorated due to the impact by the atom 2. I this case, the ucleus factors i a total isio probability ( P _ ). P total j total _ j ided( set( where, i represets a ucleus while j deotes a electro. I order to show the effect of the umber of odes o isio probability, we simulated a IEEE 02.11a etwork with trasmissio rates of 5 Mbps for data packets ad of 6 Mbps for cotrol packets such as RTS, CTS ad ACK, respectively. We assume that each ode always has packets to trasmit, ad all packets are of the same size. This eviromet is extreme case. I Fig., isio probability for the IEEE DCF gets higher as the umber of statios becomes larger. This is from the fact that all odes always try to access the chael ad make isios with oe aother Number of Statios Fig. 6. Collisio probability accordig to the umber of odes Fig. 6 shows such isio probabilities resulted from the worst-case sceario. That is, ay ormal eviromet other tha that of Fig. 6 geerates better results. Therefore, a specific value based o such results provides a upper boud for a isio probability. A ucleus determies whether to allocate a ew chael usig this value. For such determiatio, the ucleus maages the correspodig isio probabilities o a table-form basis. The ucleus is well aware of the umber of electros icluded i its ow atom. The, the ucleus compares the total isio probability computed i () with the value resulted from Fig. 6 ad the determies whether to allocate a ew chael. If the total isio probability is greater tha that i the isio probability table by more tha a threshold value, a ew chael is allocated. P total_ P, where, P, is the isio probability for electros i the table ad is a threshold value for chagig chael. If there is ay o-active chael, a ucleus selects a chael based o the procedures metioed above. However, if every chael is curretly occupied, the ucleus selects a chael with the lowest isio probability. IV. SIMULATION RESULTS I this sectio, we discuss the simulatio results of the proposed IACA scheme. To study the performace of the IACA scheme, we have implemeted it. We compare them to the results of the Molecular MAC protocol. We simulated a IEEE 02.11a etwork with trasmissio rates of 5 Mbps for data packets ad of 6 Mbps for cotrol packets such as RTS, CTS ad ACK, respectively. Nodes use a etwork iterface with the trasmissio rage of 10 uits ad the iterferece rage of 22 uits. The spaig tree costructio proceeds as follows. First, the etwork elects a gateway ode, which is coected to the wired Iteret. The, the other odes costruct a spaig tree rooted at the gateway ode. We place the gateway ode o the top-left corer ad radomly the other odes i a simulatio topology. Mai performace metrics of iterest are the umber of atoms, the umber of assiged chaels ad the umber of eighborig atoms. The umber of atoms idicates the umber of total atoms produced i a spaig tree of the simulatio topology. I additio, the umber of assiged chaels is the umber of such chaels allocated to uclei i the simulatio topology. That is, it is the miimum umber of chaels required to serve every ode i the simulatio topology. The umber of eighborig atoms represets the umber of those eighborig atoms whe a atom s ucleus selects a chael. Because each atom occupies oe chael, the umber of eighborig atoms meas the umber of active chaels i other eighborig atoms. All simulatio results are averaged over te simulatios. Table I shows the simulatio results (umber of eighborig atoms, umber of assiged chaels) whe there are 50 odes. For the Molecular MAC protocol, sice each ucleus factors i 3 eighborig atoms o average ad accordigly allocates a chael, approximately.1 chaels are required to serve every ode i the simulatio topology. However, because the proposed IACA scheme takes.1 eighborig atoms ito accout, roughly.7 chaels are eeded. The Molecular MAC protocol idetifies the umber of eighborig atoms with help from those electros i the trasmissio rage of a ucleus ad accordigly allocates a chael. However, the proposed scheme expads the scope up to the iterferece rage; therefore, it ca idetify more eighborig atoms ad accordigly allocate a chael. Because the proposed scheme cosiders 2.7-times more eighborig atoms tha the Molecular MAC protocol ad accordigly allocate a chael, about 2.1-times more chaels ca be allocated. Furthermore, i the Molecular MAC protocol, some 79 P a g e

6 Number of Atoms Number of Assiged Chaels Number of Neighborig Atoms (IJACSA) Iteratioal Joural of Advaced Computer Sciece ad Applicatios, eighborig atoms still allocates the same chael, hece deterioratig the performace of a etwork. O the other had, the proposed scheme prevets the allocatio of the same chael by those eighborig atoms i the iterferece rage ad thereby ehaces etwork performace. TABLE I. SIMULATION RESULTS FOR 50 NODES Number of eighborig atoms Number of assiged chaels Molecular MAC protocol IACA scheme.1.7 Figs. 7, ad 9 show how etwork performace is chaged as the umber of odes icreases. I particular, Fig. 7 idicates how the umber of those atoms produced i the simulatio topology liearly icreases i proportio to the umber of odes. If the umber of odes equals to 30, about 27% of total odes become uclei. As the umber of odes icrease, such percetage declies. For example, if the umber of odes is 70, approximate 1% of total odes become uclei. Fig. depicts the umber of those eighborig atoms to be cosidered whe each ucleus allocates a chael. I the Molecular MAC protocol, because the iformatio about eighborig atoms is ected from those electros i the trasmissio rage of a ucleus, the correspodig result value is quite low. O the other had, the proposed scheme further cosiders the iterferece rage ad accordigly ects the iformatio about eighborig atoms; therefore, the correspodig result value is relatively higher. As the umber of odes icreases, the umber of eighborig atoms for each ucleus accordigly icreases. Fig. 9 shows the umber of those chaels allocated to serve every ode i the simulatio topology. This result is similar to that of Fig.. As the umber of eighborig atoms icreases, the umber of chaels allocated accordigly icreases sice other chaels are allocated to avoid ay overlappig. Compared to the Molecular MAC protocol, the IACA scheme requires 1.9-times more ad 2.1-times more chaels if the umber of odes is 30 ad 70, respectively. Based o such results, a idetical chael is ot allocated to eighborig atoms, therefore ehacig the performace of a etwork Number of Nodes Fig. 7. Number of atoms accordig to the umber of odes Molecular MAC IACA Number of Nodes Fig.. Number of eighborig atoms accordig to the umber of odes Molecular MAC IACA Number of Nodes Fig. 9. Number of assiged chaels accordig to the umber of odes V. CONCLUSION A wireless mesh etwork is a promisig wireless techology for umerous applicatios. I mesh etworks with a sigle chael, the fuctioalities of odes are performed o the same chael. Therefore, etwork performace decreases. I order to icrease the performace, several MAC protocols have bee proposed based o multiple chaels. Molecular MAC protocol was proposed by adoptig a molecular aalogy. I this protocol, a ucleus assigs a chael for its atom with the assistace from electros i the same atom. It is ot able to recogize the existece of those atoms i the iterferece rage. Therefore, allocatig the same chael to eighborig atoms results i the deterioratio of etwork performace. I order to resolve this problem, we propose a ovel distributed iterferece aware chael assigmet scheme. The proposed scheme is somewhat similar to the Molecular MAC protocol method i that a chael is selected by the assistace of electros. The, a isio probability is applied to allocate a ew chael i order to recogize ay iterferece ad avoid ay overlapped chael allocatio. Simulatio results show that the proposed scheme was verified that differet chaels could be allocated to those eighborig atoms i the iterferece rage. 0 P a g e

7 REFERENCES [1] I.F. Akyildiza, X. Wag, ad W. Wag, Wireless mesh etworks: a survey, Elsevier Computer Networks, vol. 7, o., pp. 5-7, [2] A. Iyer ad C. Roseberg, Uderstadig the key performace issues with MAC protocols for multi-hop wireless etworks, Wireless Commuicatios ad Mobile Computig, vol. 6, o. 6, pp , [3] H. Zha X. Che, ad Y. Fag, Alleviatig itra-flow ad iter-flow cotetios for reliable service i mobile ad hoc etworks, i Proceedigs of IEEE MILCOM, vol. 3, pp , Nov [] M. Karaliopoulos, T. Spyropoulos, ad B. Platter, Iterferece-aware routig i wireless multihop etworks, IEEE Trasactios o Mobile Computig, vol. 10, o. 5, pp , May [5] Y. Kim, D. Jug, Y. Kim, S. Cho ad J. Ma, Efficiet iterfereceaware chael allocatio i multi-radio wireless mesh setworks, i Proceedigs of Iteratioal Coferece o Advaced Commuicatio Techology (ICACT 2012), pp , [6] P.B.F. Duarte, Z.M. Fadlullah, A.V. Vasilakos, ad N. Kato, O the partially overlapped chael assigmet o wireless mesh etwork backboe: a game theoretic approach, IEEE Joural o Selected Areas i Commuicatios, vol. 30, o. 1, pp , Ja [7] A. Subramaia, H. Gupta, S. R. Das, ad J. Cao, Miimum iterferece chael assigmet i multi-radio wireless mesh etworks, IEEE Trasactios o Mobile Computig, vol. 7, o. 12, pp , Dec [] F. Theoleyre, B. Darties, ad A. Duda, Assigmet of roles ad chaels for a multichael MAC i wireless mesh etworks, i Proceedigs of 1th Iteratioal Coferece o Computer Commuicatios ad Networks (ICCCN 2009), pp. 1-6, Aug [9] B. Darties, F. Theoleyre, ad A. Duda, A Divide-ad-coquer scheme for assigig roles i multi-chael wireless mesh etworks, i Proceedigs of IEEE 3th Coferece o Local Computer Networks (LCN 2009), pp , Zurich, Switzerlad, Oct [10] D. Abdelal F. Theoleyre, A. Bachir, ad A. Duda, Neighbor discovery with activity moitorig i multichael wireless mesh etworks, i Proceedigs of IEEE Wireless Commuicatios ad Networkig Coferece (WCNC 2010), pp. 1-6, Apr [11] M. Nassir F. Theoleyre, M. Heusse, ad A. Duda, Molecular architecture for autoomic wireless mesh etworks, I Proceedigs of the ACM studet workshop - CoNEXT 2007, Dec [12] F. Theoleyre, M. Heusse, ad A. Duda, Molecular MAC for multichael wireless mesh etworks, i Proceedigs of IEEE 6th Iteratioal Coferece o Mobile Adhoc ad Sesor Systems (MASS 2009), pp , Oct [13] S. Pollak, V. Wieser, ad A. Tkac, A chael assigmet algorithm for wireless mesh etworks with iterferece miimizatio, i Proceedigs of Wireless ad Mobile Networkig Coferece (WMNC 2012), pp , [1] K.N. Ramachadra, E.M. Beldig, K.C. Almeroth, ad M.M. Buddhikot, Iterferece-aware chael assigmet i multi-radio wireless mesh etworks, i Proceedigs of IEEE INFOCOM, pp. 1-12, Apr [15] K. Xig, X. Cheg, L. Ma, ad Q. Liag, Superimposed code based chael assigmet i multi-radio multi-chael wireless mesh etworks, i Proceedigs of ACM MobiCom, pp , [16] H. Skall S. Ghosh, S. Das, L. Lezi ad M. Cot Chael assigmet strategies for multiradio wireless mesh etworks: issues ad solutios, IEEE Commuicatios Magazie, vol. 5, o. 11, pp. 6-95, Nov [17] S. Avalloe, G. Stas ad A. Kassler, A Traffic-aware chael ad rate re-assigmet algorithm for wireless mesh etworks, IEEE Trasactios o Mobile Computig, i press, P a g e

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,

More information

Properties and Embeddings of Interconnection Networks Based on the Hexcube

Properties and Embeddings of Interconnection Networks Based on the Hexcube JOURNAL OF INFORMATION PROPERTIES SCIENCE AND AND ENGINEERING EMBEDDINGS OF 16, THE 81-95 HEXCUBE (2000) 81 Short Paper Properties ad Embeddigs of Itercoectio Networks Based o the Hexcube JUNG-SING JWO,

More information

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 9, 85-0 (2003) Evaluatio of Distributed ad Replicated HLR for Locatio Maagemet i PCS Network Departmet of Computer Sciece ad Iformatio Egieerig Natioal Chiao

More information

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

MAC Throughput Improvement Using Adaptive Contention Window

MAC Throughput Improvement Using Adaptive Contention Window Joural of Computer ad Commuicatios, 2015, 3, 1 14 Published Olie Jauary 2015 i SciRes. http://www.scirp.org/joural/jcc http://dx.doi.org/10.4236/jcc.2015.31001 MAC Throughput Improvemet Usig Adaptive Cotetio

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved.

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved. Itroductio to Wireless & Mobile Systems Chapter 6 Multiple Radio Access 1 Outlie Itroductio Multiple Radio Access Protocols Cotetio-based Protocols Pure ALOHA Slotted ALOHA CSMA (Carrier Sese Multiple

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

Energy Efficinet Cluster Head Selection and Data Convening in Wireless Sensor Networks

Energy Efficinet Cluster Head Selection and Data Convening in Wireless Sensor Networks Idia Joural of Sciece ad Techology, Vol 9(15), DOI: 1.17485/ijst/216/v9i15/77749, April 216 ISSN (Prit) : 974-6846 ISSN (Olie) : 974-5645 Eergy Efficiet Cluster Head Selectio ad Data Coveig i Wireless

More information

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings Operatig Systems: Iterals ad Desig Priciples Chapter 4 Threads Nith Editio By William Stalligs Processes ad Threads Resource Owership Process icludes a virtual address space to hold the process image The

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea

S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea S. Mehta ad K.S. Kwak UWB Wireless Commuicatios Research Ceter, Iha Uiversity Icheo, 402-75, Korea suryaad.m@gmail.com ABSTRACT I this paper, we propose a hybrid medium access cotrol protocol (H-MAC) for

More information

Introduction to OSPF. ISP Training Workshops

Introduction to OSPF. ISP Training Workshops Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged

More information

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c Iteratioal Coferece o Computatioal Sciece ad Egieerig (ICCSE 015) Harris Corer Detectio Algorithm at Sub-pixel Level ad Its Applicatio Yuafeg Ha a, Peijiag Che b * ad Tia Meg c School of Automobile, Liyi

More information

History Based Probabilistic Backoff Algorithm

History Based Probabilistic Backoff Algorithm America Joural of Egieerig ad Applied Scieces, 2012, 5 (3), 230-236 ISSN: 1941-7020 2014 Rajagopala ad Mala, This ope access article is distributed uder a Creative Commos Attributio (CC-BY) 3.0 licese

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard 1 A wireless keyboard is supplied with your computer. The wireless keyboard uses a stadard key arragemet with additioal keys that perform specific fuctios. Usig the Wireless Keyboard Two AA alkalie batteries

More information

Statistical Performance Analysis Routing Algorithms for Wimax - Wi-Fi Integrated Heterogeneous Network

Statistical Performance Analysis Routing Algorithms for Wimax - Wi-Fi Integrated Heterogeneous Network Vol.3, Issue.2, March-April. 2013 pp-1032-1037 ISSN: 2249-6645 Statistical Performace Aalysis Routig Algorithms for Wimax - Wi-Fi Itegrated Heterogeeous Network Poulomi Das, 1 Aridam Baerjee, 2 Prof. Siladitya

More information

A New per-class Flow Fixed Proportional Differentiated Service for Multi-service Wireless LAN*

A New per-class Flow Fixed Proportional Differentiated Service for Multi-service Wireless LAN* A New per-class Flow Fixed Proportioal Differetiated Service for Multi-service Wireless LAN* Meg Chag Che, Li-Pig Tug 2, Yeali S. Su 3, ad Wei-Kua Shih 2 Istitute of Iformatio Sciece, Academia Siica, Taipei,

More information

DISTRIBUTED ALGORITHM FOR MULTI-AGENT ENVIRONMENT

DISTRIBUTED ALGORITHM FOR MULTI-AGENT ENVIRONMENT Iteratioal Joural of Iformatio Techology ad Kowledge Maagemet July-December 20, Volume 4, No. 2, pp. 59-525 DISTRIBUTED ALGORITHM FOR MULTI-AGENT ENVIRONMENT Maish Arora & M. Syamala Devi 2 Traditioal

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

Lecture 10 Collision resolution. Collision resolution

Lecture 10 Collision resolution. Collision resolution Lecture 10 Collisio resolutio Collisio resolutio May applicatios ivolve a iquiry over a shared chael, which ca be ivoked for: discovery of eighborig devices i ad hoc etworks, coutig the umber of RFID tags

More information

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk Chapter Objectives Lear how resiliecy strategies reduce risk Discover automatio strategies to reduce risk Chapter #16: Architecture ad Desig Resiliecy ad Automatio Strategies 2 Automatio/Scriptig Resiliet

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y

More information

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB) F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only Edited: Yeh-Liag Hsu (998--; recommeded: Yeh-Liag Hsu (--9; last updated: Yeh-Liag Hsu (9--7. Note: This is the course material for ME55 Geometric modelig ad computer graphics, Yua Ze Uiversity. art of

More information

Security and Communication. Ultimate. Because Intercom doesn t stop at the hardware level. Software Intercom Server for virtualised IT platforms

Security and Communication. Ultimate. Because Intercom doesn t stop at the hardware level. Software Intercom Server for virtualised IT platforms Because Itercom does t stop at the hardware level by Commed Software Itercom Server for virtualised IT platforms Ready for VMware Ready for Hyper-V VoIP Ultimate availability Itercom Server as a app The

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

Relay Placement Based on Divide-and-Conquer

Relay Placement Based on Divide-and-Conquer Relay Placemet Based o Divide-ad-Coquer Ravabakhsh Akhlaghiia, Azadeh Kaviafar, ad Mohamad Javad Rostami, Member, IACSIT Abstract I this paper, we defie a relay placemet problem to cover a large umber

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged

More information

Term Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager.

Term Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager. CS2310 Fial Project Loghao Li Term Project Report Itroductio I this project, I worked o expadig exercise 4. What I focused o is makig the real gesture recogizig sesor ad desig proper gestures ad recogizig

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Graphs. Minimum Spanning Trees. Slides by Rose Hoberman (CMU)

Graphs. Minimum Spanning Trees. Slides by Rose Hoberman (CMU) Graphs Miimum Spaig Trees Slides by Rose Hoberma (CMU) Problem: Layig Telephoe Wire Cetral office 2 Wirig: Naïve Approach Cetral office Expesive! 3 Wirig: Better Approach Cetral office Miimize the total

More information

Architectural styles for software systems The client-server style

Architectural styles for software systems The client-server style Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

Realistic Storage of Pending Requests in Content-Centric Network Routers

Realistic Storage of Pending Requests in Content-Centric Network Routers Realistic Storage of Pedig Requests i Cotet-Cetric Network Routers Wei You, Bertrad Mathieu, Patrick Truog, Jea-Fraçois Peltier Orage Labs Laio, Frace {wei.you, bertrad2.mathieu, patrick.truog, jeafracois.peltier}@orage.com

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

Research Article Optimal Configuration of Virtual Links for Avionics Network Systems

Research Article Optimal Configuration of Virtual Links for Avionics Network Systems Iteratioal Joural of Aerospace Egieerig Volume 205, Article ID 329820, 9 pages http://dx.doi.org/0.55/205/329820 Research Article Optimal Cofiguratio of Virtual Liks for Avioics Network Systems Dogha A,

More information

SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS. Tamil Nadu, INDIA

SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS. Tamil Nadu, INDIA ARTICLE SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS A Sethil Kumar 1, E Logashamugam 2 * 1 Research Scholar, Dept. of Electroics ad Commuicatio Egieerig, St. Peter

More information

Partition in mobile adhoc network with mobility-a new approach for effective use of fast IP address autoconfiguration

Partition in mobile adhoc network with mobility-a new approach for effective use of fast IP address autoconfiguration Mukesh Chad et al. / Iteratioal Joural of Egieerig ad Techology (IJET) Partitio i mobile adhoc etwork with mobility-a ew approach for effective use of fast IP address autocofiguratio Mukesh Chad *, HL

More information

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process Vol.133 (Iformatio Techology ad Computer Sciece 016), pp.85-89 http://dx.doi.org/10.1457/astl.016. Euclidea Distace Based Feature Selectio for Fault Detectio Predictio Model i Semicoductor Maufacturig

More information

Identification of the Swiss Z24 Highway Bridge by Frequency Domain Decomposition Brincker, Rune; Andersen, P.

Identification of the Swiss Z24 Highway Bridge by Frequency Domain Decomposition Brincker, Rune; Andersen, P. Aalborg Uiversitet Idetificatio of the Swiss Z24 Highway Bridge by Frequecy Domai Decompositio Bricker, Rue; Aderse, P. Published i: Proceedigs of IMAC 2 Publicatio date: 22 Documet Versio Publisher's

More information

Mobile terminal 3D image reconstruction program development based on Android Lin Qinhua

Mobile terminal 3D image reconstruction program development based on Android Lin Qinhua Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 05) Mobile termial 3D image recostructio program developmet based o Adroid Li Qihua Sichua Iformatio Techology College

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

Low Complexity H.265/HEVC Coding Unit Size Decision for a Videoconferencing System

Low Complexity H.265/HEVC Coding Unit Size Decision for a Videoconferencing System BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 6 Special Issue o Logistics, Iformatics ad Service Sciece Sofia 2015 Prit ISSN: 1311-9702; Olie ISSN: 1314-4081 DOI:

More information

On Nonblocking Folded-Clos Networks in Computer Communication Environments

On Nonblocking Folded-Clos Networks in Computer Communication Environments O Noblockig Folded-Clos Networks i Computer Commuicatio Eviromets Xi Yua Departmet of Computer Sciece, Florida State Uiversity, Tallahassee, FL 3306 xyua@cs.fsu.edu Abstract Folded-Clos etworks, also referred

More information

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology

More information

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules

More information

An Algorithm to Solve Fuzzy Trapezoidal Transshipment Problem

An Algorithm to Solve Fuzzy Trapezoidal Transshipment Problem Iteratioal Joural of Systems Sciece ad Applied Mathematics 206; (4): 58-62 http://www.sciecepublishiggroup.com/j/ssam doi: 0.648/j.ssam.206004.4 A Algorithm to Solve Fuzzy Trapezoidal Trasshipmet Problem

More information

THIN LAYER ORIENTED MAGNETOSTATIC CALCULATION MODULE FOR ELMER FEM, BASED ON THE METHOD OF THE MOMENTS. Roman Szewczyk

THIN LAYER ORIENTED MAGNETOSTATIC CALCULATION MODULE FOR ELMER FEM, BASED ON THE METHOD OF THE MOMENTS. Roman Szewczyk THIN LAYER ORIENTED MAGNETOSTATIC CALCULATION MODULE FOR ELMER FEM, BASED ON THE METHOD OF THE MOMENTS Roma Szewczyk Istitute of Metrology ad Biomedical Egieerig, Warsaw Uiversity of Techology E-mail:

More information

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme Improvig Iformatio Retrieval System Security via a Optimal Maximal Codig Scheme Dogyag Log Departmet of Computer Sciece, City Uiversity of Hog Kog, 8 Tat Chee Aveue Kowloo, Hog Kog SAR, PRC dylog@cs.cityu.edu.hk

More information

Operating System Concepts. Operating System Concepts

Operating System Concepts. Operating System Concepts Chapter 4: Mass-Storage Systems Logical Disk Structure Logical Disk Structure Disk Schedulig Disk Maagemet RAID Structure Disk drives are addressed as large -dimesioal arrays of logical blocks, where the

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

Relationship between augmented eccentric connectivity index and some other graph invariants

Relationship between augmented eccentric connectivity index and some other graph invariants Iteratioal Joural of Advaced Mathematical Scieces, () (03) 6-3 Sciece Publishig Corporatio wwwsciecepubcocom/idexphp/ijams Relatioship betwee augmeted eccetric coectivity idex ad some other graph ivariats

More information

n Explore virtualization concepts n Become familiar with cloud concepts

n Explore virtualization concepts n Become familiar with cloud concepts Chapter Objectives Explore virtualizatio cocepts Become familiar with cloud cocepts Chapter #15: Architecture ad Desig 2 Hypervisor Virtualizatio ad cloud services are becomig commo eterprise tools to

More information

BGP Attributes and Path Selection. ISP Training Workshops

BGP Attributes and Path Selection. ISP Training Workshops BGP Attributes ad Path Selectio ISP Traiig Workshops 1 BGP Attributes The tools available for the job 2 What Is a Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes the characteristics

More information

DESIGN AND ANALYSIS OF LDPC DECODERS FOR SOFTWARE DEFINED RADIO

DESIGN AND ANALYSIS OF LDPC DECODERS FOR SOFTWARE DEFINED RADIO DESIGN AND ANALYSIS OF LDPC DECODERS FOR SOFTWARE DEFINED RADIO Sagwo Seo, Trevor Mudge Advaced Computer Architecture Laboratory Uiversity of Michiga at A Arbor {swseo, tm}@umich.edu Yumig Zhu, Chaitali

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

On (K t e)-saturated Graphs

On (K t e)-saturated Graphs Noame mauscript No. (will be iserted by the editor O (K t e-saturated Graphs Jessica Fuller Roald J. Gould the date of receipt ad acceptace should be iserted later Abstract Give a graph H, we say a graph

More information

Quorum Based Data Replication in Grid Environment

Quorum Based Data Replication in Grid Environment Quorum Based Data Replicatio i Grid Eviromet Rohaya Latip, Hamidah Ibrahim, Mohamed Othma, Md Nasir Sulaima, ad Azizol Abdullah Faculty of Computer Sciece ad Iformatio Techology, Uiversiti Putra Malaysia

More information

Solving Fuzzy Assignment Problem Using Fourier Elimination Method

Solving Fuzzy Assignment Problem Using Fourier Elimination Method Global Joural of Pure ad Applied Mathematics. ISSN 0973-768 Volume 3, Number 2 (207), pp. 453-462 Research Idia Publicatios http://www.ripublicatio.com Solvig Fuzzy Assigmet Problem Usig Fourier Elimiatio

More information

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach Performace Aalysis of Multiclass FIFO: Motivatio, Difficulty ad a Network alculus Approach Yumig Jiag Norwegia Uiversity of Sciece ad Techology (NTNU) 1 19 March 2014, 2d Workshop o Network alculus, Bamberg,

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

Lecture 18. Optimization in n dimensions

Lecture 18. Optimization in n dimensions Lecture 8 Optimizatio i dimesios Itroductio We ow cosider the problem of miimizig a sigle scalar fuctio of variables, f x, where x=[ x, x,, x ]T. The D case ca be visualized as fidig the lowest poit of

More information

1 Enterprise Modeler

1 Enterprise Modeler 1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio

More information

APPLICATION NOTE. Automated Gain Flattening. 1. Experimental Setup. Scope and Overview

APPLICATION NOTE. Automated Gain Flattening. 1. Experimental Setup. Scope and Overview APPLICATION NOTE Automated Gai Flatteig Scope ad Overview A flat optical power spectrum is essetial for optical telecommuicatio sigals. This stems from a eed to balace the chael powers across large distaces.

More information

EFFICIENT MULTIPLE SEARCH TREE STRUCTURE

EFFICIENT MULTIPLE SEARCH TREE STRUCTURE EFFICIENT MULTIPLE SEARCH TREE STRUCTURE Mohammad Reza Ghaeii 1 ad Mohammad Reza Mirzababaei 1 Departmet of Computer Egieerig ad Iformatio Techology, Amirkabir Uiversity of Techology, Tehra, Ira mr.ghaeii@aut.ac.ir

More information

Dynamic Programming and Curve Fitting Based Road Boundary Detection

Dynamic Programming and Curve Fitting Based Road Boundary Detection Dyamic Programmig ad Curve Fittig Based Road Boudary Detectio SHYAM PRASAD ADHIKARI, HYONGSUK KIM, Divisio of Electroics ad Iformatio Egieerig Chobuk Natioal Uiversity 664-4 Ga Deokji-Dog Jeoju-City Jeobuk

More information

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured

More information

Transitioning to BGP

Transitioning to BGP Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April

More information

AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS

AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Melisa Hajyvahabzadeh

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

Application Mapping for Express Channel-Based Networks-on-Chip

Application Mapping for Express Channel-Based Networks-on-Chip Applicatio Mappig for Express Chael-Based Networks-o-Chip Di Zhu, Lizhog Che, Siyu Yue, ad Massoud Pedram Uiversity of Souther Califoria Los Ageles, Califoria, USA 9009 {dizhu, lizhogc, siyuyue, pedram}@usc.edu

More information

Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links

Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links Secure Software Upload i a Itelliget Vehicle via Wireless Commuicatio Liks Syed Masud Mahmud, Member, IEEE, Shobhit Shaker, Studet Member, IEEE Iria Hossai, Studet Member, IEEE Abstract The demad for drive-by-wire,

More information

IPv6 Autoconfiguration in Large Scale Mobile Ad-Hoc Networks

IPv6 Autoconfiguration in Large Scale Mobile Ad-Hoc Networks IPv6 Autocofiguratio i Large Scale Mobile Ad-Hoc Networks Kilia Weiger, Martia Zitterbart Istitute of Telematics Uiversity of Karlsruhe, 768 Karlsruhe, Germay Ph:++9 7 608-{65/600}, Email: {weiger,zit}@tm.uka.de

More information

Global Optimization of File Availability Through Replication for Efficient File Sharing in MANETs

Global Optimization of File Availability Through Replication for Efficient File Sharing in MANETs Global Optimizatio of File Availability Through Replicatio for Efficiet File Sharig i MANETs Kag Che ad Haiyig She Departmet of Electrical ad Computer Egieerig Clemso Uiversity Clemso, South Carolia 29631

More information

Markov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size

Markov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size Markov Chai Model of HomePlug CSMA MAC for Determiig Optimal Fixed Cotetio Widow Size Eva Krimiger * ad Haiph Latchma Dept. of Electrical ad Computer Egieerig, Uiversity of Florida, Gaiesville, FL, USA

More information

Parallel Polygon Approximation Algorithm Targeted at Reconfigurable Multi-Ring Hardware

Parallel Polygon Approximation Algorithm Targeted at Reconfigurable Multi-Ring Hardware Parallel Polygo Approximatio Algorithm Targeted at Recofigurable Multi-Rig Hardware M. Arif Wai* ad Hamid R. Arabia** *Califoria State Uiversity Bakersfield, Califoria, USA **Uiversity of Georgia, Georgia,

More information

Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation

Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation Malicious Node Detectio i Wireless Sesor Networks usig Weighted Trust Evaluatio Idris M. Atakli, Hogbig Hu, Yu Che* SUNY Bighamto, Bighamto, NY 1392, USA {iatakli1, hhu1, yche}@bighamto.edu Wei-Shi Ku

More information

A Hierarchical Load Balanced Fault tolerant Grid Scheduling Algorithm with User Satisfaction

A Hierarchical Load Balanced Fault tolerant Grid Scheduling Algorithm with User Satisfaction A Hierarchical Load Balaced Fault tolerat Grid Schedulig Algorithm with User Satisfactio 1 KEERTHIKA P, 2 SURESH P Assistat Professor (Seior Grade), Departmet o Computer Sciece ad Egieerig Assistat Professor

More information

A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN

A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN Iteratioal Joural of Digital Cotet Techology ad its Applicatios Vol. 2 No 1, March 2008 A Key Distributio method for Reducig Storage ad Supportig High Level Security i the Large-scale WSN Yoo-Su Jeog *1,

More information

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 10 Defiig Classes Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 10.1 Structures 10.2 Classes 10.3 Abstract Data Types 10.4 Itroductio to Iheritace Copyright 2015 Pearso Educatio,

More information

Social-P2P: An Online Social Network Based P2P File Sharing System

Social-P2P: An Online Social Network Based P2P File Sharing System 1.119/TPDS.214.23592, IEEE Trasactios o Parallel ad Distributed Systems 1 : A Olie Social Network Based P2P File Sharig System Haiyig She*, Seior Member, IEEE, Ze Li, Studet Member, IEEE, Kag Che Abstract

More information

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1 Adaptive Graph Partitioig Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, ad W. J. Dewar 1 1 School of Electrical Egieerig Uiversity of New South Wales, Australia 2 Divisio of Radiophysics

More information

INTER-CELL LOAD BALANCING TECHNIQUE FOR MULTI-CLASS TRAFFIC IN MIMO-LTE-A NETWORKS

INTER-CELL LOAD BALANCING TECHNIQUE FOR MULTI-CLASS TRAFFIC IN MIMO-LTE-A NETWORKS NTER-CELL LOAD BALANCNG TECHNQUE FOR MULT-CLASS TRAFFC N MMO-LTE-A NETWORKS 1 T.PADMAPRYA, 2 V. SAMNADAN 1 Research Scholar, Podicherry Egieerig College 2 Professor, Departmet of ECE, Podicherry Egieerig

More information

An Adaptive Process Allocation Scheme in Grid Environment

An Adaptive Process Allocation Scheme in Grid Environment A Adaptive Process Allocatio Scheme i Grid Eviromet Tibor Gyires School of Iformatio Techology Illiois State Uiversity Normal, Illiois 6790 USA ABSTRACT The Grid is a itercoected set of distributed compute

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Multi-Threading. Hyper-, Multi-, and Simultaneous Thread Execution

Multi-Threading. Hyper-, Multi-, and Simultaneous Thread Execution Multi-Threadig Hyper-, Multi-, ad Simultaeous Thread Executio 1 Performace To Date Icreasig processor performace Pipeliig. Brach predictio. Super-scalar executio. Out-of-order executio. Caches. Hyper-Threadig

More information