Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints

Size: px
Start display at page:

Download "Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints"

Transcription

1 Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok Tommaso Melodia Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok Abstact UndeWate Acoustic Senso Netwoks (UW-ASNs) ae expeiencing a apid gowth, due to thei high elevance to commecial and militay applications such as oceanogaphic data collection, pollution monitoing, offshoe exploation, disaste pevention, and tactical suveillance. Howeve, the design of efficient communication potocols fo undewate senso netwoks is still an open eseach poblem because of the unique chaacteistics of the undewate acoustic communication channel such as limited bandwidth, high and vaiable popagation delays, and significant multipath and scatteing. In this pape, we intoduce a tie-based distibuted outing algoithm. The objective of the poposed algoithm is to educe the enegy consumption though adequate selection of the next hop subject to equiements on the end-to-end packet eo ate and delay. The potocol is based on lightweight message exchange, and the pefomance tagets ae achieved though the coopeation of tansmitte and available next hops. Index Tems Undewate acoustic senso netwoks, Routing algoithm, Coss-laye design. I. INTRODUCTION In ecent yeas, UndeWate Acoustic Senso Netwoks [1] (UW-ASNs) have expeienced a apid gowth, due to thei high elevance to commecial and militay applications such as oceanogaphic data collection, pollution monitoing, offshoe exploation, disaste pevention, and tactical suveillance. Howeve, cuently available undewate acoustic technology suppots only low-data-ate and delay-toleant applications. State-of-the-at typical expeimental point-to-point acoustic modems use signaling schemes that can achieve data ates lowe than 20 kbit/s with a link distance of 1km, while commecially available modems povide even lowe data ate wavefoms [2][3]. In addition, the ecent availability of inexpensive hadwae such as CMOS cameas and micophones able to ubiquitously captue multimedia content fom the envionment is enabling so-called Wieless Multimedia Senso Netwoks [4], i.e., wieless systems designed to etieve video and audio steams, still images, and scala senso data fom the envionment. Similaly, multimedia undewate senso netwoks would enable new applications fo undewate multimedia suveillance, undesea exploations, video-assisted navigation and envionmental monitoing. Howeve, these applications equie moe flexible potocol design to accommodate heteogeneous taffic demands in tems of bandwidth, end-to-end packet eo ate and delay. To suppot such taffic demands, in this pape we popose a new coss-laye outing potocol to flexibly educe the enegy consumption by selecting enegy-efficient next hops subject to taget packet eo ate and delay bounds unde the unique challenges posed by the undewate envionment. The dawbacks of existing teestial outing solutions fo undewate netwoks [1] ae well-undestood. Theefoe, in this aticle, we popose a tie-based outing potocol, whee the netwok topology is patitioned into ties, and each individual node, in detemining a next hop towads a suface sink, is limited to selecting nodes that belong to its uppe tie. In geneal, a tieed topology educes the complexity of outing potocols, since, much like geogaphical outing, it povides each node with a set of coodinates that indicate a diection towads the sink (physical coodinates in geogaphical outing, vitual coodinates in ou poposed scheme). In addition to that, the vitual position can be used to estimate the end-to-end delay. To counte the effect of the caie sensing delay caused by the high popagation delay, a Medium Access Contol (MAC) potocol integated with ou poposed outing potocol is also intoduced. The poposed low-complexity solution can be used to enable undewate monitoing applications with delay and eliability equiements. The emainde of this pape is oganized as follows. In Section II, we intoduce the communication achitectue fo undewate senso netwoks and the undewate popagation model. In Section III, we descibe how to constuct a tieed topology and a Medium Access Contol (MAC) potocol to be integated with ou poposed outing potocol. In Section IV, we intoduce the poposed outing potocol. In Section V, we assess the pefomance of the poposed solutions though simulation expeiments. Finally, in Section VI, we daw the main conclusions. II. PRELIMINARIES In this section, we fist intoduce the communication achitectue of thee-dimensional undewate senso netwoks. Then, we biefly descibe the unique chaacteistics of undewate acoustic popagation.

2 Fig. 1. The Achitectue fo 3D Undewate Senso Netwoks. A. Netwok Achitectue In thee-dimensional undewate senso netwoks, nodes ae deployed at diffeent depths to obseve a given phenomenon and epot to suface stations, as shown in Fig. 1. Each senso is anchoed to the bottom of the ocean and equipped with a floating buoy. The depth of each senso can be egulated by adjusting the length of the wie that connects the senso to the ancho. Undewate sensos ae able to elay infomation to the suface station via multi-hop paths. Existing deployment stategies fo undewate senso netwoks, as discussed in [5], guaantee that the netwok topology be always connected. Theefoe, we assume that at least one path fom evey senso to the suface station always exists, and that highe senso density inceases the numbe of possible paths. Moeove, one o moe suface stations ae deployed on the suface of the ocean. Each suface station is equipped with an acoustic tansceive, and it may be able to handle multiple paallel communications with the undewate sensos and suface stations. B. Undewate Popagation Model Undewate acoustic popagation [6] is substantially diffeent fom its RF countepat [7]. Specifically, undewate acoustic communications ae mainly influenced by tansmission loss, multipath, Dopple spead, and high popagation delay. The tansmission loss T L(d, f) [db] that a naowband acoustic signal at fequency f [khz] expeiences along a distance d [m] can be descibed by the Uick model [6]: T L(d, f) = χ Log(d) + α(f) d + A. (1) In (1), the fist tem accounts fo geometic speading. The second tem accounts fo medium absoption, whee α(f) [db/m] epesents an absoption coefficient. The last tem, expessed by the quantity A [db], is the so-called tansmission anomaly. Moe details can be found in [8]. III. TOPOLOGY CONTROL AND MAC PROTOCOL As discussed above, since in undewate communications the tansmission loss inceases moe than linealy with distance, elay tansmission should be consideed. Theefoe, a Fig. 2. The channel capacity with diffeent tansmitte-eceive distance when the caie fequency is 10 khz, the caie bandwidth is 5 khz and the tansmit powe is 10 W. well-designed topology contol stategy can potentially educe the end-to-end powe consumption [9]. Fo this eason, we popose to patition the topology into ties, and each individual node, in detemining a next hop towads a suface sink, is limited to selecting nodes that belong to its uppe tie. In geneal, a tieed topology educes the complexity of implementing a outing potocol, since it povides each node with a set of coodinates that indicate a diection towads the sink (physical coodinates in geogaphical outing, vitual coodinates in ou poposed scheme). In addition to that, the vitual position can be used to estimate the end-to-end delay. Accoding to the tie whee the node is located, a node can calculate the numbe of hops sepaating it fom the destination. We theefoe heeby descibe a pocedue to be used at the suface station to constuct a tieed topology, i.e., to select the adius of each tie. Based on the channel capacity expession between the tansmitte and eceive, we intoduce a pocedue to patition nodes into diffeent ties stating fom the suface station. In the outing pocedue, a node is then limited to selecting nodes that belong to its uppe tie to educe the powe consumption and guaantee the taget end-to-end delay bounds. Then, a new MAC potocol integated with ou poposed outing potocol is intoduced. The inteaction between the MAC and outing potocols takes advantage of the tieed topology. A. Topology Constuction The channel capacity can be expessed as C(d) = f log 2 (1 + P T L 1 (d,f) N 0 ) [kbit/s], (2) whee f [khz] is the caie bandwidth, P [W] is the tansmit powe, and N 0 [W] is the aveage ambient noise [10]. Figue 2 shows the channel capacity fo a typical acoustic link with

3 Fig. 3. Ceating ties fom the sink. vaying tansmitte-eceive distance. The caie fequency f is set to 10 khz, f is 5 khz and P is 10 W. The channel capacity deceases with a highe tansmitteeceive distance and thus we can detemine the tansmission ange (which detemines the ange of each tie ), which we efe to as d max, fo a taget channel capacity. Fo example, in Fig. 2, when the tansmitte-eceive distance is 1000 m, the channel capacity is kbit/s. Theefoe, if the equied channel capacity is kbit/s, the tansmitte-eceive distance cannot exceed 1000 m. In pactice, the achievable data ate will be lowe than the channel capacity because of the effect of intefeence. Based on the taget channel capacity, we can detemine the value of d max and accodingly patition nodes into ties. The nodes in the ange of the sink with adius d max constitute the fist tie. Nodes in the ange of at least 2 fist tie nodes with adius d max constitute the second tie, and so on. Note that this pocedue guaantees the existence of at least two paths between the souce and the destination, which guaantees a backup outing path in case of failues. We could incease 2 to moe if necessay. The tie stuctue is illustated in Fig. 3. With a tieed topology, the numbe of hops h between a souce and destination depends only on what tie the souce is located at. B. Medium Access Contol Potocol To take advantage of the tieed topology, we popose a new Medium Access Contol (MAC) potocol integated with ou poposed outing potocol as shown in Fig. 4. The tansmitte at tie h tansmits a Request to Send (RTS) packet, which includes the tie of the tansmitte, to indicate that it has packets to send. Only idle nodes at tie h 1 will espond with a Clea to Send (CTS) packet, which includes the intefeence measued at the node and the aveage packet queueing delay. Since the popagation delay is high in undewate, we do not use caie sensing and all idle h 1 tie nodes send a CTS immediately afte eceiving the RTS. Consequently, the tansmitte will choose the node with minimum equied tansmit powe as its next hop among those that satisfy the equiements on the end-to-end packet eo ate and delay. The tansmitte will announce the selected next hop by sending an Intent to Send (ITS) packet. Afte tansmitting the ITS, the tansmitte tansmits the packet immediately. We conside a CDMA envionment [11], whee RTS, CTS and ITS ae tansmitted using a common speading code which is known Fig. 4. The MAC potocol used to excute the poposed outing potocol. by all nodes. The data packet is tansmitted using a tansmitteassigned speading code, whee the paametes that will be used by the tansmitte to geneate the assigned speading code fo the data packet ae included in the ITS. A CTS may collide with anothe CTS. Howeve, the pobability of collision is small as illustated in Fig. 4. In the figue, the distance between Node T 1 and Node R 1 is d, and the distance between Node T 1 and Node R 2 is d + d. Node T 1 will stat eceiving CT S 1 at 2 d, and finish eceiving CT S 1 + T CT S. If Node T 1 stats eceiving CT S 2 at 2 (d+ d) at 2 d, a collision would happen when 2 (d+ d) < 2 d + T CT S, i.e., d < T CT S 2. If T CT S is 1 ms and the sound velocity is 1500 m/s, a collision happens only when d is smalle than 0.75 m. In fact, d max in ou simulation is 500 m, which is much lage than 0.75 m. Theefoe, the collision pobability fo CTS packets is vey small. The analysis above povides the ationale fo not using a caie sense mechanism in undewate and in geneal on popagation media affected by high popagation delay. An RTS may also collide with an RTS fom anothe tansmitte. Howeve, if the RTS collides at R 1 in Fig. 4, the pobability that it also collides with the RTS at R 2 is vey small. Afte R 2 eceives the RTS, it will espond with a CTS. Theefoe, T 1 can choose R 2 as its next hop, and the communication would not be inteupted. IV. ROUTING PROTOCOL In this section, we intoduce ou end-to-end delay guaanteed distibuted outing algoithm. In the poblem fomulation, a node i at tie h needs to tansmit a packet m to a idle node j at tie h 1. Pi max is the maximum tansmit powe dictated by hadwae constaints at node i. The intefeence at

4 node j, I j, and the aveage queueing delay at node j, Q j, ae included in the CTSs fom j. Moeove, E elec is the distanceindependent enegy to tansmit one bit, whee we assume that the enegy pe bit needed by tansmitte electonics and by eceive electonics is the same. The tansmit powe and the chip ate ae P ij [W] and [chip/s], espectively. Theefoe, the enegy to tansmit one bit fom node i to node j is 2 E elec + P ij c /, whee c [chip/bit] is the speading code length. The poposed algoithm allows each node to distibutively select the optimal next hop and the optimal tansmit powe, with the objective of minimizing the enegy consumption. Thee constains ae included in the poposed algoithm to meet the delay-sensitive application equiements: 1) The tansmit powe should not exceed the maximum tansmit powe. Theefoe, P ij Pi max ; 2) The end-to-end packet eo ate should be lowe than an application-dependent theshold P ERe2e max. BER ij, which epesents the bit eo ate on link (i, j), is a function of the tansmission powe and the intefeence at node j, Φ(P ij, I j ). The packet eo ate on link (i, j), P ER ij = 1 (1 BER L D ij ), whee L D [bit] is the packet size. Since the numbe of hops between node i and the destination is h, the end-to-end packet eo ate is 1 (1 P ER ij ) h and it should be lowe than P ERe2e max. Thus, 1 (1 P ER ij ) h P ERe2e max. Note that coupted packets would be dopped. Theefoe, the packet must be coectly fowaded fom the souce to node i. If the numbe of hops between the souce and node i is h, 1 1 h (1 P ER ij ) h should be lowe than P ERe2e max ; 3) The end-to-end packet delay should be lowe than an application-dependent theshold T max. We calculate T MAC = T RT S + 2 dmax + T CT S + T IT S as the delay time between the beginning of RTS and the end of ITS, as shown in Fig. 4. Since node i does not have infomation about the uppe tie nodes of node j, we deive the wost-case delay fom node j to the destination as T wost = (h 1) (Q j +T MAC + L D c + dmax ). (3) The distance between node j and the selected tie h 2 node is d max, and we assume that uppe tie nodes have the same queueing delay Q j. Theefoe, the numbe of hops between node j and destination is h 1, and the wost delay time would be (h 1) (Q j + T MAC + L D c + dmax ). To guaantee that the end-to-end packet delay will not exceed the application-dependent delay bound, T IT S + L D c + d ij + T wost T max (t m i,now t m 0 ), (4) whee t m i,now and tm 0 ae the aival time of packet m at node i and the time packet m was geneated, espectively. The poposed algoithm does not etansmit coupted packets at the link laye. Besides, it time-stamps packets when they ae geneated by a souce so that they can be discaded when they expie. Finally, note that the space of solutions to the above poblem is fo all pactical puposes vey limited and the poblem can be solved by enumeation - no specialized solve is needed. P: End-to-end Delay Guaanteed Routing T IT S + L D c Given: Find: Minimize: Subject to: i, j, h, Pi max, I j, Q j j, Pij E ij = 2 E elec + Pij c P ij P max i ; (5) 1 (1 P ER ij ) h P ER max e2e ; (6) + d ij + T wost T max (t m i,now t m 0 ). (7) V. PERFORMANCE EVALUATION We have developed a discete-event object-oiented packetlevel simulato to assess the pefomance of the poposed coss-laye potocol. The physical-laye undewate acoustic link module models the undewate acoustic signal popagation channel with path loss, multipath, and undewate delays. The undewate acoustic link module geneates bit eo ate cuves in tems of input paametes such as the link distance, the numbes of tansmit/eceive elements, total tansmit powe and acoustic noise level. We consideed a CDMA envionment, with fixed length speading code length 7. The othe simulation paametes ae the same as descibed in [12]. We evaluate the pefomance of ou poposed outing potocol in a thee-dimensional shallow wate envionment. In addition, we compae it with the Geedy Routing Scheme (GRS) [13]. The GRS is based on geogaphical distance. We set the knowledge ange [9] of GRS the same as the tie adius d max of ou poposed algoithm, and set d max to 500 m. The caie sense multiple access with collision avoidance potocol (CSMA/CA) with RTS/CTS exchange is used with GRS. Note that ou integated MAC potocol does not employ caie sense, and thee is no collision avoidance mechanism. It educes the end-to-end delay caused by the high caie sensing delay in undewate since the slot time in the backoff mechanism is set to 0.18 s and the contention windows CW min and CW max ae set to 32 and 1024 [11]. Note that all figues ae obtained by aveaging ove multiple topologies and epot 95% confidence intevals. We set the chip ate to 100 kcps, the speading code length c to 7, the maximum tansmission powe P max to 10 W, the data packet size to 250 Bytes, RTS, CTS, and ITS size to 10 Bytes. We do not conside o account fo a physical-laye peamble in this pape. Still, we believe that the compaison among competing potocols is fai since all would equally need a peamble. In addition, we conside an initial node enegy of 1000 J, a packet inte-aival time of 5 s, a maximum numbe of etansmissions

5 Fig. 5. Aveage Used Enegy pe Successfully Received Packet vs. Numbe of Relay Nodes. Fig. 6. Aveage End-to-end Delay pe Successfully Received Packet vs. Numbe of Relay Nodes. equal to 4, an end-to-end packet eo ate theshold of 0.05, an end-to-end packet delay theshold of 8 s, and a queue size of 10 kbytes. All nodes ae andomly deployed in a 3D shallow wate scenaio with volume of 1.5x1.5x1 km 3. The numbe of souce nodes is 50. Taffic packets ae tansmitted to any of the 4 suface stations. In Fig. 5, ou poposed outing algoithm is shown to consideably educe the enegy consumption by selecting suitable tansmit powe compaed with GRS. Moeove, when the numbe of elay nodes inceases, the numbe of uppe tie nodes inceases. Theefoe, afte the tansmitte tansmits an RTS, moe idle uppe tie nodes will espond with CTSs and consume moe enegy. Howeve, the enegy consumption Fig. 7. Aveage Packet Dopping Pobability vs. Numbe of Relay Nodes. only inceases when the numbe of elay nodes is lage. Fig. 6 shows the aveage delay of successfully eceived packets. GRS does not select a backup outing path. Thus, if the next hop is busy, the tansmitte must wait and tansmit an RTS again. This also inceases the packet dopping pobability, as shown in Fig. 7. Fo example, when the numbe of elay nodes is 100, some souce nodes may select the same elay node as thei next hop. The packet delay time and the numbe of etansmissions incease. Ou poposed outing potocol will select an optimal next hop fom the idle uppe tie nodes. Theefoe, GRS has highe end-to-end delay time and packet dopping pobability compaed with ou poposed algoithm. VI. CONCLUSIONS We poposed, discussed and analyzed a outing potocol fo undewate acoustic senso netwoks. Ou poposed outing potocol adequately selects the next hop among idle uppe tie nodes. The end-to-end delay is educed by avoiding the high popagation delay caused by etansmissions. Moeove, in a coss-laye fashion, ou poposed algoithm selects optimal tansmit powe though the coopeation of tansmitte and eceive to achieve the desied level of eliability and data ate accoding to application needs and channel condition. Ou poposed outing potocol was shown to consistently outpefom GRS in tems of enegy consumption, aveage endto-end delay and packet dopping pobability. ACKNOWLEDGMENT This wok was suppoted by the National Science Foundation unde gant CNS REFERENCES [1] I. F. Akyildiz, D. Pompili, and T. Melodia, Undewate Acoustic Senso Netwoks: Reseach Challenges, Ad Hoc Netwoks (Elsevie), vol. 3, no. 3, pp , May [2] G. Palou and M. Stojanovic, Undewate Acoustic MIMO OFDM: An Expeimental Analysis, in Poc. IEEE Oceans 09 Confeence, Biloxi, MS, USA, Octobe 2009.

6 [3] Z. Peng, J. Cui, B. Wang, K. Ball, and L. Feitag, An Undewate Netwok Testbed: Design, Implementation and Measuement, in Poc. of the 2nd ACM Intenational Wokshop on UndeWate Netwoks (WUWNet), Monteal, Quebec, Canada, Septembe 2007, pp [4] I. F. Akyildiz, T. Melodia, and K. R. Chowdhuy, A Suvey on Wieless Multimedia Senso Netwoks, Compute Netwoks (Elsevie), vol. 51, no. 4, pp , Ma [5] D. Pompili, T. Melodia, and I. F. Akyildiz, Thee-dimensional and Two-dimensional Deployment Analysis fo Undewate Acoustic Senso Netwoks, Ad Hoc Netwoks, vol. 7, no. 4, pp , June [6] R. J. Uick, Pinciples of Undewate Sound. McGaw-Hill, [7] V. Taokh, N. Seshadi, and A. R. Caldebank, Space-Time Codes fo High Data Rate Wieless Communication: Pefomance Citeion and Code Constuction, IEEE Tans. Infom. Theoy, vol. 44, no. 2, pp , [8] F. Fishe and V. Simmons, Sound Absoption in Sea Wate, Jounal of Acoustical Society of Ameica, vol. 62, no. 3, pp , Sep [9] T. Melodia, D. Pompili, and I. F. Akyildiz, On the intedependence of Distibuted Topology Contol and Geogaphical Routing in Ad Hoc and Senso Netwoks, Jounal of Selected Aeas in Communications, vol. 23, no. 3, pp , Ma [10] M. Stojanovic, On the Relationship Between Capacity and Distance in an Undewate Acoustic Communication Channel, in Poc. of the 1st ACM Intenational Wokshop on Undewate Netwoks (WUWNet), Los Angeles, CA, USA, Septembe 2006, pp [11] D. Pompili, T. Melodia, and I. F. Akyildiz, A CDMA-based Medium Access Contol Potocol fo Undewate Acoustic Senso Netwoks, IEEE Tansactions on Wieless Communications, vol. 8, no. 4, pp , Apil [12] L. Kuo and T. Melodia, Medium Access Contol fo Undewate Acoustic Senso Netwoks with MIMO links, in Poc. of ACM Intl. Conf. on Modeling, Analysis and Simulation of Wieless and Mobile Systems (MSWiM), Teneife, Canay Islands, Spain, Octobe 2009, pp [13] G. Finn, Routing and Addessing Poblems in Lage Metopolitan-Scale Intenetwoks, ISI es. ep ISU/RR , Tech. Rep., Ma

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity

More information

Dynamic Topology Control to Reduce Interference in MANETs

Dynamic Topology Control to Reduce Interference in MANETs Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity

More information

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks Numbe of Paths and Neighbous Effect on Multipath Routing in Mobile Ad Hoc Netwoks Oday Jeew School of Infomation Systems and Accounting Univesity of Canbea Canbea ACT 2617, Austalia oday.jeew@canbea.edu.au

More information

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

i-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA

i-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA i-pcgrid Wokshop 2016 Apil 1 st 2016 San Fancisco, CA Liang Min* Eddy Banks, Bian Kelley, Met Kokali, Yining Qin, Steve Smith, Philip Top, and Caol Woodwad *min2@llnl.gov, 925-422-1187 LDRD 13-ERD-043

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

Interference-Aware Multicast for Wireless Multihop Networks

Interference-Aware Multicast for Wireless Multihop Networks Intefeence-Awae Multicast fo Wieless Multihop Netwoks Daniel Letpatchya School of Electical and Compute Engineeing Geogia Institute of Technology Atlanta, Geogia 30332 0250 Douglas M. Blough School of

More information

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300

More information

How to outperform IEEE802.11: Interference Aware (IA) MAC

How to outperform IEEE802.11: Interference Aware (IA) MAC How to outpefom IEEE802.11: Intefeence Awae (IA) MAC Daniela Maniezzo, Piepaolo egamo, Matteo Cesana, Maio Gela CS Dept. - Univesity of Califonia Los Angeles - UCLA, Califonia, USA Engineeing Dept., Feaa

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver 1 RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Dive Amit Jain Daji Qiao Kang G. Shin The Univesity of Michigan Ann Abo, MI 4819, USA {amitj,dqiao,kgshin@eecs.umich.edu Abstact The cuent

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New

More information

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

Analysis of Wired Short Cuts in Wireless Sensor Networks

Analysis of Wired Short Cuts in Wireless Sensor Networks Analysis of Wied Shot Cuts in Wieless Senso Netwos ohan Chitaduga Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles 90089, USA Email: chitadu@usc.edu Ahmed Helmy Depatment

More information

Characterizing Data Deliverability of Greedy Routing in Wireless Sensor Networks

Characterizing Data Deliverability of Greedy Routing in Wireless Sensor Networks Chaacteizing Data Deliveability of Geedy Routing in Wieless Senso Netwoks Jinwei Liu, Lei Yu, Haiying Shen, Yangyang He and Jason Hallstom Depatment of Electical and Compute Engineeing, Clemson Univesity,

More information

Positioning of a robot based on binocular vision for hand / foot fusion Long Han

Positioning of a robot based on binocular vision for hand / foot fusion Long Han 2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks Available online at www.sciencediect.com Ad Hoc Netwoks 7 (29) 23 247 www.elsevie.com/locate/adhoc Minimizing spatial and time esevation with Collision-Awae DCF in mobile ad hoc netwoks Lubo Song a, Chansu

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

Erasure-Coding Based Routing for Opportunistic Networks

Erasure-Coding Based Routing for Opportunistic Networks Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,

More information

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen Accuate Diffaction Efficiency Contol fo Multiplexed Volume Hologaphic Gatings Xuliang Han, Gichel Kim, and Ray T. Chen Micoelectonic Reseach Cente Depatment of Electical and Compute Engineeing Univesity

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

The concept of PARPS - Packet And Resource Plan Scheduling

The concept of PARPS - Packet And Resource Plan Scheduling The concept of PARPS - Packet And Resouce Plan Scheduling Magnus Eiksson 1 and Håkan Sätebeg 2 1) Dept. of Signals, Sensos and Systems, Royal Inst. of Technology, Sweden. E-mail: magnus.eiksson@ite.mh.se.

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

Event-based Location Dependent Data Services in Mobile WSNs

Event-based Location Dependent Data Services in Mobile WSNs Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,

More information

MANET QoS support without reservations

MANET QoS support without reservations SECURITY AND COMMUNICATION NETWORKS Secuity Comm. Netwoks (2010) Published online in Wiley InteScience (www.intescience.wiley.com)..183 SPECIAL ISSUE PAPER MANET QoS suppot without esevations Soon Y. Oh,

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1)

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1) 1 Multi Path PERT Ankit Singh and A. L. Naasimha Reddy Electical and Compute Engineeing Depatment, Texas A&M Univesity; email: eddy@ece.tamu.edu. Abstact This pape pesents a new multipath delay based algoithm,

More information

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),

More information

Heterogeneous V2V Communications in Multi-Link and Multi-RAT Vehicular Networks

Heterogeneous V2V Communications in Multi-Link and Multi-RAT Vehicular Networks 1 Heteogeneous V2V Communications in Multi-Link and Multi-RAT Vehicula Netwoks Miguel Sepulce and Javie Gozalvez Abstact Connected and automated vehicles will enable advanced taffic safety and efficiency

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

Separability and Topology Control of Quasi Unit Disk Graphs

Separability and Topology Control of Quasi Unit Disk Graphs Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,

More information

Analysis of Coexistence between IEEE , BLE and IEEE in the 2.4 GHz ISM Band

Analysis of Coexistence between IEEE , BLE and IEEE in the 2.4 GHz ISM Band Analysis of Coexistence between IEEE 82.5.4, BLE and IEEE 82. in the 2.4 GHz ISM Band Radhakishnan Nataajan, Pouia Zand, Majid Nabi Holst I. I NTRODUCTION In ecent yeas, the emegence of IoT has led to

More information

Quality-of-Content (QoC)-Driven Rate Allocation for Video Analysis in Mobile Surveillance Networks

Quality-of-Content (QoC)-Driven Rate Allocation for Video Analysis in Mobile Surveillance Networks Quality-of-Content (QoC)-Diven Rate Allocation fo Video Analysis in Mobile Suveillance Netwoks Xiang Chen, Jenq-Neng Hwang, Kuan-Hui Lee, Ricado L. de Queioz Depatment of Electical Engineeing, Univesity

More information

Bo Gu and Xiaoyan Hong*

Bo Gu and Xiaoyan Hong* Int. J. Ad Hoc and Ubiquitous Computing, Vol. 11, Nos. /3, 1 169 Tansition phase of connectivity fo wieless netwoks with gowing pocess Bo Gu and Xiaoyan Hong* Depatment of Compute Science, Univesity of

More information

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced

More information

1.3 Multiplexing, Time-Switching, Point-to-Point versus Buses

1.3 Multiplexing, Time-Switching, Point-to-Point versus Buses http://achvlsi.ics.foth.g/~kateveni/534 1.3 Multiplexing, Time-Switching, Point-to-Point vesus Buses n R m Aggegation (multiplexing) Distibution (demultiplexing) Simplest Netwoking, like simplest pogamming:

More information

A Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks

A Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks A Coss-Laye Famewok of QoS Routing and Distibuted Scheduling fo Mesh Netwoks Chi Haold Liu, Athanasios Gkelias, and Kin K. Leung Depatment of Electical and Electonic Engineeing, Impeial College London

More information

A ROI Focusing Mechanism for Digital Cameras

A ROI Focusing Mechanism for Digital Cameras A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula

More information

Mobility Pattern Recognition in Mobile Ad-Hoc Networks

Mobility Pattern Recognition in Mobile Ad-Hoc Networks Mobility Patten Recognition in Mobile Ad-Hoc Netwoks S. M. Mousavi Depatment of Compute Engineeing, Shaif Univesity of Technology sm_mousavi@ce.shaif.edu H. R. Rabiee Depatment of Compute Engineeing, Shaif

More information

EFFICIENT ENERGY BASED CONGESTION CONTROL SCHEME FOR MOBILE AD HOC NETWORKS

EFFICIENT ENERGY BASED CONGESTION CONTROL SCHEME FOR MOBILE AD HOC NETWORKS FFICINT NRGY BASD CONGSTION CONTROL SCHM FOR MOBIL AD HOC NTWORKS 1 S.SHJA, 2 DR.RAMACHANDRA V PUJRI 1 Reseach Schola, Bhaathia Univesity, Coimbatoe. 2 Vice-Pincipal, KGiSL Institute of Technology, Saavanampatti,

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

On using circuit-switched networks for file transfers

On using circuit-switched networks for file transfers On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed

More information

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2 Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences Ameican Jounal of ata ining and Knowledge iscovey 27; 2(4): 2-8 http://www.sciencepublishinggoup.com//admkd doi:.648/.admkd.2724.2 Genealized Gey Taget ecision ethod Based on ecision akes Indiffeence Attibute

More information

ANN Models for Coplanar Strip Line Analysis and Synthesis

ANN Models for Coplanar Strip Line Analysis and Synthesis 200 IJCSNS Intenational Jounal of Compute Science and Netwok Secuity, VOL.8 No.10, Octobe 2008 Models fo Coplana Stip Line Analysis and J.Lakshmi Naayana D.K.Si Rama Kishna D.L.Patap Reddy Chalapathi Institute

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

Totally Disjoint Multipath Routing in Multihop Wireless Networks

Totally Disjoint Multipath Routing in Multihop Wireless Networks Totally isjoint Multipath Routing in Multihop Wieless Netwoks Sonia Wahate and Raouf outaba Univesity of Wateloo School of ompute Science Wateloo, anada {spwahate,boutaba}@uwateloo.ca bstact Speading taffic

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

Signal integrity analysis and physically based circuit extraction of a mounted

Signal integrity analysis and physically based circuit extraction of a mounted emc design & softwae Signal integity analysis and physically based cicuit extaction of a mounted SMA connecto A poposed geneal appoach is given fo the definition of an equivalent cicuit with SMAs mounted

More information

QUALITY OF SERVICE DESIGN ISSUES IN MULTIMEDIA COMMUNICATIONS OVER POWER LINE NETWORKS SRINIVAS KATAR

QUALITY OF SERVICE DESIGN ISSUES IN MULTIMEDIA COMMUNICATIONS OVER POWER LINE NETWORKS SRINIVAS KATAR QUALITY OF SERVICE DESIGN ISSUES IN MULTIMEDIA COMMUNICATIONS OVER POWER LINE NETWORKS By SRINIVAS KATAR A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs Fault-Toleant Routing Schemes in RDT(,,)/α-Based Inteconnection Netwok fo Netwoks-on-Chip Designs Mei Yang, Tao Li, Yingtao Jiang, and Yulu Yang Dept. of Electical & Compute Engineeing Univesity of Nevada,

More information

Comparisons of Transient Analytical Methods for Determining Hydraulic Conductivity Using Disc Permeameters

Comparisons of Transient Analytical Methods for Determining Hydraulic Conductivity Using Disc Permeameters Compaisons of Tansient Analytical Methods fo Detemining Hydaulic Conductivity Using Disc Pemeametes 1,,3 Cook, F.J. 1 CSRO Land and Wate, ndoooopilly, Queensland The Univesity of Queensland, St Lucia,

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

EE 6900: Interconnection Networks for HPC Systems Fall 2016

EE 6900: Interconnection Networks for HPC Systems Fall 2016 EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

Modeling a shared medium access node with QoS distinction

Modeling a shared medium access node with QoS distinction Modeling a shaed medium access node with QoS distinction Matthias Gies, Jonas Geutet Compute Engineeing and Netwoks Laboatoy (TIK) Swiss Fedeal Institute of Technology Züich CH-8092 Züich, Switzeland email:

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

Modeling spatially-correlated data of sensor networks with irregular topologies

Modeling spatially-correlated data of sensor networks with irregular topologies This full text pape was pee eviewed at the diection of IEEE Communications Society subject matte expets fo publication in the IEEE SECON 25 poceedings Modeling spatially-coelated data of senso netwoks

More information

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery Poceedings of the 4th WSEAS Intenational Confeence on luid Mechanics and Aeodynamics, Elounda, Geece, August 1-3, 006 (pp337-34) Consevation Law of Centifugal oce and Mechanism of Enegy Tansfe Caused in

More information

Wormhole Detection and Prevention in MANETs

Wormhole Detection and Prevention in MANETs Womhole Detection and Pevention in MANETs Lija Joy Compute Science and Engineeing KMEA Engineeing College Enakulum, Keala, India lijavj@gmail.com Sheena Kuian K Compute Science and Engineeing KMEA Engineeing

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

AMERICAN UNIVERSITY OF BEIRUT IMPROVING DATA COMMUNICATIONS IN VEHICULAR AD HOC NETWORKS VIA COGNITIVE NETWORKS TECHNIQUES ALI JAWAD GHANDOUR

AMERICAN UNIVERSITY OF BEIRUT IMPROVING DATA COMMUNICATIONS IN VEHICULAR AD HOC NETWORKS VIA COGNITIVE NETWORKS TECHNIQUES ALI JAWAD GHANDOUR AMERICAN UNIVERSITY OF BEIRUT IMPROVING DATA COMMUNICATIONS IN VEHICULAR AD HOC NETWORKS VIA COGNITIVE NETWORKS TECHNIQUES by ALI JAWAD GHANDOUR A thesis submitted in patial fulfillment of the equiements

More information

Improved Utility-based Congestion Control for Delay-Constrained Communication

Improved Utility-based Congestion Control for Delay-Constrained Communication Impoved Utility-based Congestion Contol fo Delay-Constained Communication Stefano D Aonco, Laua Toni, Segio Mena, Xiaoqing Zhu, and Pascal Fossad axiv:5.2799v3 [cs.ni] 2 Jan 27 Abstact Due to the pesence

More information

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

On the throughput-cost tradeoff of multi-tiered optical network architectures

On the throughput-cost tradeoff of multi-tiered optical network architectures 1 On the thoughput-cost tadeoff of multi-tieed optical netwok achitectues Guy Weichenbeg, Vincent W. S. Chan, and Muiel Médad Laboatoy fo Infomation and Decision Systems Massachusetts Institute of Technology

More information

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network An Efficient andove Mechanism Using the Geneal Switch Management Potocol on a Multi-Potocol abel Switching Netwok Seong Gon hoi, yun Joo Kang, and Jun Kyun hoi Using the geneal switch management potocol

More information

View Synthesis using Depth Map for 3D Video

View Synthesis using Depth Map for 3D Video View Synthesis using Depth Map fo 3D Video Cheon Lee and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 1 Oyong-dong, Buk-gu, Gwangju, 500-712, Republic of Koea E-mail: {leecheon, hoyo}@gist.ac.k

More information

On Adaptive Bandwidth Sharing with Rate Guarantees

On Adaptive Bandwidth Sharing with Rate Guarantees On Adaptive Bandwidth Shaing with Rate Guaantees N.G. Duffield y T. V. Lakshman D. Stiliadis y AT&T Laboatoies Bell Labs Rm A175, 180 Pak Avenue Lucent Technologies Floham Pak, 101 Cawfods Cone Road NJ

More information

The Dual Round Robin Matching Switch with Exhaustive Service

The Dual Round Robin Matching Switch with Exhaustive Service The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line

More information

Modeling Spatially Correlated Data in Sensor Networks

Modeling Spatially Correlated Data in Sensor Networks Modeling Spatially Coelated Data in Senso Netwoks Apoova Jindal and Konstantinos Psounis Univesity of Southen Califonia The physical phenomena monitoed by senso netwoks, e.g. foest tempeatue, wate contamination,

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers XFVHDL: A Tool fo the Synthesis of Fuzzy Logic Contolles E. Lago, C. J. Jiménez, D. R. López, S. Sánchez-Solano and A. Baiga Instituto de Micoelectónica de Sevilla. Cento Nacional de Micoelectónica, Edificio

More information

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:

More information

Delay-Optimized File Retrieval under LT-Based Cloud Storage

Delay-Optimized File Retrieval under LT-Based Cloud Storage infomation: DOI 10.1109/TCC.015.404, IEEE Tansactions on Cloud Computing IEEE TRANSACTIONS ON CLOUD COMPUTING 1 Delay-Optimized File Retieval unde LT-Based Cloud Stoage Haifeng Lu,Chuan Heng Foh, Senio

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

An effective hop-by-hop Interest shaping mechanism for CCN communications

An effective hop-by-hop Interest shaping mechanism for CCN communications An effective hop-by-hop Inteest shaping mechanism fo CCN communications Natalya Rozhnova, Sege Fdida To cite this vesion: Natalya Rozhnova, Sege Fdida. An effective hop-by-hop Inteest shaping mechanism

More information

Annales UMCS Informatica AI 2 (2004) UMCS

Annales UMCS Informatica AI 2 (2004) UMCS Pobane z czasopisma Annales AI- Infomatica http://ai.annales.umcs.pl Annales Infomatica AI 2 (2004) 33-340 Annales Infomatica Lublin-Polonia Sectio AI http://www.annales.umcs.lublin.pl/ Embedding as a

More information

Time-Constrained Big Data Transfer for SDN-Enabled Smart City

Time-Constrained Big Data Transfer for SDN-Enabled Smart City Emeging Tends, Issues, and Challenges in Big Data and Its Implementation towad Futue Smat Cities Time-Constained Big Data Tansfe fo SDN-Enabled Smat City Yuanguo Bi, Chuan Lin, Haibo Zhou, Peng Yang, Xuemin

More information