Capacity Analysis for Flat and Clustered Wireless Sensor Networks

Size: px
Start display at page:

Download "Capacity Analysis for Flat and Clustered Wireless Sensor Networks"

Transcription

1 International Conferene on Wireless Algoritms, Systems and Appliations Capaity Analysis for Flat and Clustered Wireless Sensor etworks Min Song, Bei He Department of Eletrial and Computer Engineering Old Dominion University orfolk, VA 359 {msong, Abstrat Wireless sensor networks are often divided into lusters to gain ig-performane and prolong network lifetime. In tis paper we analyze te network apaity of two different aritetures, named flat sensor network and lustered sensor network. For ea network, we first define te network model and ten analyze te network apaity and te fators tat affet te apaity. umerial results suggest tat lustering an signifiantly improve te network apaity. We also found tat te apaity of a lustered network is saturated after te number of lusters is above a ertain value. For lustered network ariteture, we furter study te apaity differene wit or witout te distributed oordination funtion. It is found tat tere is a ritial value of te number of luster eads beyond wi te network apaity of two lustered models approaes te same. esults from tis resear will provide guidane in deploying igperformane wireless sensor networks. 1. Introdution eent advanes in miro-eletro-meanial systems tenology, wireless ommuniations, and digital eletronis ave put wireless sensor networks into a wide range of appliations [1]. A wireless sensor network is omposed of a large number of sensor nodes wit a sort-range radio and on-board proessing apability, wi are densely deployed eiter inside or lose to te penomenon to sense ertain pysial penomena. At te same time tese sensor nodes must organize temselves to form a multi-op ommuniation network, sine teir main task is to report te raw or partially proessed data to a entral unit, alled sink. Te sink is te ultimate destination of data from all sensor nodes. Terefore, te basi ommuniation model of wireless sensor networks is many-to-one type. We use te same definition in [] to desribe te transport apaity of su many-to-one type: wen all or many of te soures are transmitting to a single sink, te trougput apaity is te per soure data trougput. Ariteturally, sensor nodes an be organized as a flat network or a lustered network. In te flat ariteture, all sensor nodes transmit teir own data and relay data for oter nodes to te sink. In te lustered ariteture, adaent nodes are organized as a luster; a ead is eleted for ea luster. Sensor nodes tat belong to te same luster an only send or relay data to teir luster ead. Te luster ead ten relays te data to te sink via a long-aul ommuniation link. Clustering brings many advantages, for example, it allows for salability of MAC and routing, and it solves energy unbalaning penomena [3]. Cluster eads an also serve as fusion points to aggregate and proess data, to redue te transmitted data to te sink. Te standardized MAC tenique of 8.11 protools is alled distributed oordination funtion (DCF) [4]. DCF desribes a four-way andsaking tenique, known as TS/CTS/DATA/ACK meanism, to redue ollisions aused by idden terminals. In te flat network ariteture, DCF is applied to detet and notify te interferene. But wen DCF is applied to te lustered network ariteture, it may redue te network apaity. In tis paper our onern is te apaity analysis of flat sensor networks and lustered sensor networks. Te unique ontribution of our work is te definition of an operational lustered network model. Unlike ideal lustered model, our network model does not assume ea node witin te lusters spontaneously knows wen te interferene ours and ow to avoid it. We analyze ow te ombination of DCF and lustering affets te network apaity. To make te analysis simple, sensor nodes and luster eads are stationary ere. Te rest of tis paper is organized as follows. Setion presents some related work. Setion 3 gives te flat network model and analyzes its apaity. In X/7 $5. 7 IEEE DOI 1.119/WASA

2 Setion 4 we define te representative lustered network model and perform te apaity analysis. In Setion 5 numerial apaity omparison between flat and lustered aritetures is presented. Setion 6 onludes te paper.. elated work Gupta and Kumar [5] studied te trougput apaity of a wireless network. Wen a wireless network as n randomly loated nodes, ea apable of transmitting at W bits per seond and using a fixed radio range, te aievable per node trougput is Θ ( W nlogn). As a diret result te trougput at ea node dereases wit inreasing nodes, beause ea node gives up some of its available trougput to forward pakets from neigboring nodes. So it an be expeted tat if te soure nodes only link wit te nearest relay, and forwarding is limited to te relays, te trougput will inrease. However, Gupta and Kumar indiated tat te addition of dediated relays would not ange te saling properties if te relays use te same wireless annel. If mobility is used to redue te number of ops needed to rea te destination, te apaity obtained in [5] an be inreased. Paper [6] introdued a very partiular traffi pattern, named relay traffi pattern, to study te apaity of ad o networks. Aording to te relay traffi pattern, tere is only one ative soure/destination pair; all oter nodes (exept te sender and reeiver nodes) at as relays. It is possible to derive tat te upper bounds for te apaity in tis ase, wit te number of nodes n inreasing to infinity, is of O(logn) bits per seond. Paper [7] gave te performane analysis in a largesale lustered sensor network, in wi luster eads use multi-op ommuniations to transmit data to te sink. Analytial study was onduted to investigate ow parameters, su as te ommuniation distane of a luster ead, affet te network trougput. Te onlusion is tat te network trougput an be approximately doubled by not unneessarily relaying data in te neigborood of te sink. Duarte-Mel and Liu [] analytially evaluated te apaity of wireless sensor networks. Tey introdued an overall upper trougput bound as W/n per node. Tey studied under wat onditions tis bound an be aieved and under wat onditions it an not. Wen te bound is not met, tey dedued ow O(W/n) an be aieved wit a ig probability as te number of sensor nodes goes to infinity. By employing te lustering tenique, it is proved tat te apaity of te lustered network ould easily rea W/n wen ertain onditions, su as te number of luster eads and te radio range of sensor nodes, are satisfied. 3. Flat network model and apaity Te flat network model is defined as following: 1) Te sensing area is a irle of radius ; te sink is loated at te enter of te irle. ) Totally sensor nodes are uniformly distributed over te sensing area; all nodes sare a ommon wireless annel; te fixed transmitting range of ea node is r. 3) ode X i transmits data to node X suessfully only te following two onditions old: X i r and X k X i +, ere represents te guard zone to prevent a neigboring node X k from transmitting on te same annel at te same time. It also allows for impreision in te aieved range of transmissions. 4) Ea node as a single ommuniation annel, so no node an transmit and reeive data simultaneously; ea sensor node ommuniates wit te sink via a single-op or multi-op ommuniation. Apparently, transmitting interferene exists among nodes. Take node A in Figure 1 as an example. ode A an suessfully transmit data to oter nodes witout interferene unless tere are also transmissions from oter nodes witin te irle of radius r + entering on node A. To see te reason let us onsider te ase tat nodes A and C are transmitting data simultaneity. Te intended reeiver of A is B. If A and C are witin r + range, and B is loated witin te overlapping area between te irle of radius r around node A and te irle of radius r + around node C, C s transmission interferes wit te transmission from A to B. So te area of interferene of one transmitting node is a irle of radius r +. Figure 1. Commonly Interferene Model To study te apaity of su a flat network, we assume tat all sensor nodes sare te resoure by following a transmission sedule tat onsists of time slots. Tis sedule determines wi subset of nodes an transmit simultaneously, wit a onstraint tat every node as a ane to transmit. Sine te sink is a 5

3 bottlenek beause all pakets tend to onentrate in its reeiving annel, te trougput apaity of per node an be defined as te reiproal of te above sedule lengt. Let te number of nodes tat an transmit simultaneously be Sim. We ave π Sim π ( r (r + Wit te assumption tat ea node as te same traffi load, te sedule lengt, denoted by s, is determined as follows: s Sim ( r eall tat only te nodes tat are one op away from te sink transmit data to te sink. Te number of one-op nodes an be approximated as following: πr r one op π Let λ denote te per node apaity. In order to get maximized per node apaity, ea one-op node as to get an equal sare of te total traffi load. We derived te per node apaity as following: λ one op W s ) 3) Cluster eads annot send and reeive data simultaneously. 4) DCF is te MAC protool to notify interferene. Figure sows te lustered network ariteture. Ea luster overs an area of te same size, toug not neessarily te same sape, wi means te lusters essentially form a Voronoi tessellation [8] of te field. Witin ea luster, sensor nodes ommuniate wit teir luster ead via a single-op or multi-op ommuniation. Te luster ead ten ommuniates wit te sink. Here te lustered model is eterogeneous [9]. Te interferene area of su a lustered sensor network is analyzed by using Figure 3. Figure. Clustered etwork Ariteture We ave te per node apaityλ, W r λ (1) (r It is interesting to notie tat λ is independent wit. 4. Clustered network model and apaity As indiated in Eq. (1), λ an be inreased by reduing te number of sensor nodes. Tis inspires te idea of introduing some pure relay nodes serving exlusively as forwarders. Te lustered network model is defined as follows: 1) Totally sensor nodes are uniformly distributed over te sensing area; among of tem, nodes are luster eads; te number of sensor nodes in ea luster is tus. ) Two frequeny annels are used, one for te ommuniation between sensor nodes and luster eads and te oter one for te ommuniation between luster eads and te sink; te transmission apaity of ea annel is same as te one in flat network (W). Figure 3. Interferene model wen DCF is introdued In Figure 3, node D is transmitting data. odes B, C, E, and F ten an not transmit data, beause all of tem are loated in te irle of radius r + entering on node D. Furtermore, node A, toug apart te distane of 3r from node D, an not transmit data simultaneously. Atually node A an send orret TS to node B, but node D s transmissions prevent B from sending te orresponding CTS bak. So te area 51

4 of interferene of one transmitting node is a irle of radius3 r +. Te luster ead splits its time into two parts: reeiving data from sensor nodes and transmitting data to te sink. Let λ denote te per node apaity. So λ sould be te per node apaity aieved during te portion of time tat te luster ead is reeiving data. Ea luster ould be onsidered as a flat ariteture, and te luster ead is te sink. eall te interferene area is a irle of radius3 r + beause of DCF. Aording to Eq. (1), we get: W r W r λ () ( 3r ( ) (3r Comparing Eqs. (1) wit (), λ as one more fator, and is on te numerator position. At te same time, on te denominator position te interferene area is enlarged by te introdution of DCF. Tus it is not immediately lear weter λ is greater tanλ. In order to aieve te maximum apaity, te sink as to be busy all te time, wi means tat at any moment tere sould be one transmission between te sink and one of te luster eads. We assume tat all luster eads diretly ommuniate wit te sink and all luster eads transmit te same amount of data. So te sink splits its time period into time slots and assigns one slot to ea luster ead. Terefore, ea luster ead transmits 1 fration of te time, and uses ( 1 1 ) fration of te time to reeive data. Here luster eads serve only as simple relays by wi all sensed data are sent to te sink. If te total trougput aieved witin lusters is greater tan W, sensor nodes ave sent more to te luster eads tan tey an delivery to te sink. In tis ase, te sink as to drop some reeived data. Terefore, λ must satisfy te following inequality: λ (1 1 ) W After some algebra, we ave: W λ (3) ( 1) Sine te apaity λ must satisfy bot () and (3) simultaneously, it is as flowing: min( W r W λ, ) (4) (3r ( 1) 5. Comparative results In tis setion, te trougput apaity of different network aritetures is ompared. First, te lustered network model wit DCF is ompared wit te flat network model. Ten it is ompared wit te ideal lustered network witout DCF used in []. 5.1 Compare wit te flat network model In te ase of, wi means tere is no guard zone between two neigbor nodes, te omparative ratio K is te funtion of te number of luster eads as sown in Figure 4. Capaity atio K K vs wen guard zone apaity ratio K referene value umber of Cluster Heads Figure 4. Capaity ratio between lustered network wit DCF and flat network in te ase of In Figure 4, wen 3, te urve is always above te line wose value is 1, wi means te apaity of lustering network model wit DCF is greater tan tat of a flat network model. It is observed tat K ontinues inreasing wit te inreasing of, until it reaes te maximum value beause of te ontribution of lustering. Ten K dereases and eventually onverges to a ertain value wit te inreasing of to te infinity, wi results from te total trougput limitation indiated in formula (3). Similar urves were obtained wen. Tis proves tat te introdution of lustering is te maor fator to improve network apaity. 5. Compare wit te ideal lustered network eall tat DCF is not used in te ideal lustered network. Figure 5 sows te apaity ratio between 5

5 lustered network model wit DCF and te ideal lustered network model in te ase of. Capaity ation K K vs wen guard zone Conlusions In tis paper we studied te ommuniation apaity in many-to-one sensor networks. We defined a lustered network model tat uses DCF to andle te interferene. Comparing our model wit te flat network, te onlusion is tat lustering is te maor fator to improve network apaity. Witout enoug luster eads, te introdution of DCF into lustered network dereases te network apaity ompared wit te ideal lustered network. However, te two lustered models ave te same upper bound. We also found tat wen te number of luster eads reaes a ertain value, DCF does not affet te network apaity umber of Cluster Heads Figure 5. Capaity ratio between lustered network wit DCF and ideal lustered in te ase of As an be seen from Figure 5, before bot models rea teir apaity upper bounds, te introdution of DCF redues te network apaity. Wit te inreasing of te number of luster eads, te apaity differene beomes negligible. From Figure 5 we find tat tere is a ritial value of te number of luster eads beyond wi te network apaity of two lustered models approaes te same. We plot tis ritial value in Figure 6 for different guard zone size. From Figure 6 we find tat tis ritial value is independent wit te network size, but related wit te size of guard zone. If we enlarge guard zone between two neigboring nodes, we must add more luster eads to guarantee te network apaity. Critial value of luster eads atio between guard zone range and transmitted range /r Figure 6. Critial value of luster eads vs. guard zone size Aknowledgement Te resear of Min Song is supported by te ational Siene Foundation Career award. eferenes [1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayiri, Wireless sensor networks: a survey, IEEE Computer, vol. 38, no. 4, pp , Mar. [] E. J. Duarte-Melo and M. Liu, Data-gatering wireless sensor networks: organization and apaity, Computer etworks, vol. 43, no. 4, pp , 3. [3] Jing Ai, Damla Turgut, and Ladislau B ol oni, A luster-based energy balaning seme in eterogeneous wireless sensor networks, Pro. of te 4t International Conferene on etworking, pp , April 5. [4] G. Biani, Performane analysis of te IEEE 8.11 distributed oordination funtion, IEEE Journal on Seleted Areas in Communiation, vol.18, pp , Mar,. [5] P. Gupta, and P.. Kumar, Te apaity of wireless networks, IEEE Trans. on Information Teory, vol. 46, no., pp ,. [6] M. Gastpar, and M. Vetterli, On te apaity of wireless networks: te relay ase, Pro. of IEEE IFOCOM,. [7] Masasi Sugano, Yuii Kiri, and Masayuki Murata, Performane analysis of large-sale wireless sensor network ariteture wit multi-luster onfiguration, Pro. of IASTED International Conferene on etworks and Communiation Systems, pp , Mar 6. [8] A. Okabe, B. Boots, and K. Sugiara, Spatial Tessellation Conepts and Appliations of Voronoi Diagrams, Wiley, ew York, 199. [9] V. Matre and C. osenberg, Homogeneous vs eterogeneous lustered sensor networks: a omparative study, Pro. of IEEE ICC, vol. 6, pp , June 4. 53

Combined Resource Allocation System for Device-to-Device Communication towards LTE Networks

Combined Resource Allocation System for Device-to-Device Communication towards LTE Networks 51 (216 DOI: 1151/ mateonf/2165651 ICCAE 216 Combined Resoure Alloation System for Devie-to-Devie Communiation towards LTE Networks Fakar Abbas 1, Ye Fang 1, uammad Irsad Zaoor 1, and Kasif Sultan 2 1

More information

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless

More information

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various

More information

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of

More information

Multi-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks

Multi-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks Multi-hop Fast Conflit Resolution Algorithm for Ad Ho Networks Shengwei Wang 1, Jun Liu 2,*, Wei Cai 2, Minghao Yin 2, Lingyun Zhou 2, and Hui Hao 3 1 Power Emergeny Center, Sihuan Eletri Power Corporation,

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

A MULTIRESOLUTION REMOTELY SENSED IMAGE SEGMENTATION METHOD COMBINING RAINFALLING WATERSHED ALGORITHM AND FAST REGION MERGING

A MULTIRESOLUTION REMOTELY SENSED IMAGE SEGMENTATION METHOD COMBINING RAINFALLING WATERSHED ALGORITHM AND FAST REGION MERGING A MULTIRESOLUTION REMOTELY SENSED IMAGE SEGMENTATION METHOD COMBINING RAINFALLING WATERSHED ALGORITHM AND FAST REGION MERGING Min Wang a a Key Laboratory of Virtual Geograpi Environment (Nanjing Normal

More information

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

Image Interpolation Using Classification-based Neural Networks

Image Interpolation Using Classification-based Neural Networks Image Interpolation Using Classifiation-ased eural etworks Hao Hu, Student Memer, IEEE, Paul M. Hofman and Gerard de Haan, Senior Memer, IEEE Astrat Standard interpolation metods generally use a uniform

More information

Accommodations of QoS DiffServ Over IP and MPLS Networks

Accommodations of QoS DiffServ Over IP and MPLS Networks Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering

More information

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive

More information

Acoustic Links. Maximizing Channel Utilization for Underwater

Acoustic Links. Maximizing Channel Utilization for Underwater Maximizing Channel Utilization for Underwater Aousti Links Albert F Hairris III Davide G. B. Meneghetti Adihele Zorzi Department of Information Engineering University of Padova, Italy Email: {harris,davide.meneghetti,zorzi}@dei.unipd.it

More information

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communiations 1 RAC 2 E: Novel Rendezvous Protool for Asynhronous Cognitive Radios in Cooperative Environments Valentina Pavlovska,

More information

Multi-Channel Wireless Networks: Capacity and Protocols

Multi-Channel Wireless Networks: Capacity and Protocols Multi-Channel Wireless Networks: Capaity and Protools Tehnial Report April 2005 Pradeep Kyasanur Dept. of Computer Siene, and Coordinated Siene Laboratory, University of Illinois at Urbana-Champaign Email:

More information

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based

More information

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification erformane Improvement of TC on Wireless Cellular Networks by Adaptive Combined with Expliit Loss tifiation Masahiro Miyoshi, Masashi Sugano, Masayuki Murata Department of Infomatis and Mathematial Siene,

More information

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr

More information

Mean Waiting Time Analysis in Finite Storage Queues for Wireless Cellular Networks

Mean Waiting Time Analysis in Finite Storage Queues for Wireless Cellular Networks Mean Waiting Time Analysis in Finite Storage ueues for Wireless ellular Networks J. YLARINOS, S. LOUVROS, K. IOANNOU, A. IOANNOU 3 A.GARMIS 2 and S.KOTSOOULOS Wireless Telecommunication Laboratory, Department

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

Efficient LUT-Based FPGA Technology Mapping for Power Minimization

Efficient LUT-Based FPGA Technology Mapping for Power Minimization Effiient LUT-Based FGA Tenology Mapping for ower Minimization Hao Li, Wai-Kei Mak, and Srinivas Katkoori Department of Computer Siene and Engineering University of Sout Florida, Tampa, FL USA (li5,wkmak,katkoori@see.usf.edu)

More information

More on Functions and Their Graphs

More on Functions and Their Graphs More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in

More information

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks A Dual-Hamiltonian-Path-Based Multiasting Strategy for Wormhole-Routed Star Graph Interonnetion Networks Nen-Chung Wang Department of Information and Communiation Engineering Chaoyang University of Tehnology,

More information

Plot-to-track correlation in A-SMGCS using the target images from a Surface Movement Radar

Plot-to-track correlation in A-SMGCS using the target images from a Surface Movement Radar Plot-to-trak orrelation in A-SMGCS using the target images from a Surfae Movement Radar G. Golino Radar & ehnology Division AMS, Italy ggolino@amsjv.it Abstrat he main topi of this paper is the formulation

More information

Section 2.3: Calculating Limits using the Limit Laws

Section 2.3: Calculating Limits using the Limit Laws Section 2.3: Calculating Limits using te Limit Laws In previous sections, we used graps and numerics to approimate te value of a it if it eists. Te problem wit tis owever is tat it does not always give

More information

Partial Character Decoding for Improved Regular Expression Matching in FPGAs

Partial Character Decoding for Improved Regular Expression Matching in FPGAs Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia

More information

Cluster-based Cooperative Communication with Network Coding in Wireless Networks

Cluster-based Cooperative Communication with Network Coding in Wireless Networks Cluster-based Cooperative Communiation with Network Coding in Wireless Networks Zygmunt J. Haas Shool of Eletrial and Computer Engineering Cornell University Ithaa, NY 4850, U.S.A. Email: haas@ee.ornell.edu

More information

4.1 Tangent Lines. y 2 y 1 = y 2 y 1

4.1 Tangent Lines. y 2 y 1 = y 2 y 1 41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange

More information

New Channel Allocation Techniques for Power Efficient WiFi Networks

New Channel Allocation Techniques for Power Efficient WiFi Networks ew Channel Alloation Tehniques for Power Effiient WiFi etworks V. Miliotis, A. Apostolaras, T. Korakis, Z. Tao and L. Tassiulas Computer & Communiations Engineering Dept. University of Thessaly Centre

More information

An Alternative Approach to the Fuzzifier in Fuzzy Clustering to Obtain Better Clustering Results

An Alternative Approach to the Fuzzifier in Fuzzy Clustering to Obtain Better Clustering Results An Alternative Approah to the Fuzziier in Fuzzy Clustering to Obtain Better Clustering Results Frank Klawonn Department o Computer Siene University o Applied Sienes BS/WF Salzdahlumer Str. 46/48 D-38302

More information

Detection and Recognition of Non-Occluded Objects using Signature Map

Detection and Recognition of Non-Occluded Objects using Signature Map 6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,

More information

3.6 Directional Derivatives and the Gradient Vector

3.6 Directional Derivatives and the Gradient Vector 288 CHAPTER 3. FUNCTIONS OF SEVERAL VARIABLES 3.6 Directional Derivatives and te Gradient Vector 3.6.1 Functions of two Variables Directional Derivatives Let us first quickly review, one more time, te

More information

Gray Codes for Reflectable Languages

Gray Codes for Reflectable Languages Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings

More information

Year 11 GCSE Revision - Re-visit work

Year 11 GCSE Revision - Re-visit work Week beginning 6 th 13 th 20 th HALF TERM 27th Topis for revision Fators, multiples and primes Indies Frations, Perentages, Deimals Rounding 6 th Marh Ratio Year 11 GCSE Revision - Re-visit work Understand

More information

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer

More information

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

The Mathematics of Simple Ultrasonic 2-Dimensional Sensing

The Mathematics of Simple Ultrasonic 2-Dimensional Sensing The Mathematis of Simple Ultrasoni -Dimensional Sensing President, Bitstream Tehnology The Mathematis of Simple Ultrasoni -Dimensional Sensing Introdution Our ompany, Bitstream Tehnology, has been developing

More information

An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng

An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng An ffective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Ciming Huang and ei-heng Ceng 5 De c e mbe r0 International Journal of Advanced Information Tecnologies (IJAIT),

More information

Impeller design for an axial-flow pump based on multi-objective optimization

Impeller design for an axial-flow pump based on multi-objective optimization Indian Journal of Engineering & Materials Sienes Vol. 25, April 2018, pp. 183-190 Impeller design for an axial-flow pump based on multi-objetive optimization Hong-Seok Park, Fuqing Miao & Trung-Tan Nguyen*

More information

Coupled fluid structure interaction analysis on a cylinder exposed to ocean wave loading

Coupled fluid structure interaction analysis on a cylinder exposed to ocean wave loading Coupled fluid struture interation analysis on a ylinder exposed to oean wave loading Master s Tesis in Solid and Fluid Meanis RAMMOHAN SUBRAMANIA RAJA Department of Applied Meanis Division of Fluid meanis

More information

Linear Interpolating Splines

Linear Interpolating Splines Jim Lambers MAT 772 Fall Semester 2010-11 Lecture 17 Notes Tese notes correspond to Sections 112, 11, and 114 in te text Linear Interpolating Splines We ave seen tat ig-degree polynomial interpolation

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

Displacement-based Route Update Strategies for Proactive Routing Protocols in Mobile Ad Hoc Networks

Displacement-based Route Update Strategies for Proactive Routing Protocols in Mobile Ad Hoc Networks Displaement-based Route Update Strategies for Proative Routing Protools in Mobile Ad Ho Networks Mehran Abolhasan 1 and Tadeusz Wysoki 1 1 University of Wollongong, NSW 2522, Australia E-mail: mehran@titr.uow.edu.au,

More information

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections SVC-DASH-M: Salable Video Coding Dynami Adaptive Streaming Over HTTP Using Multiple Connetions Samar Ibrahim, Ahmed H. Zahran and Mahmoud H. Ismail Department of Eletronis and Eletrial Communiations, Faulty

More information

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,

More information

19.2 Surface Area of Prisms and Cylinders

19.2 Surface Area of Prisms and Cylinders Name Class Date 19 Surface Area of Prisms and Cylinders Essential Question: How can you find te surface area of a prism or cylinder? Resource Locker Explore Developing a Surface Area Formula Surface area

More information

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness 1 Optimal In-etwork Packet Aggregation Policy for Maimum Information Fresness Alper Sinan Akyurek, Tajana Simunic Rosing Electrical and Computer Engineering, University of California, San Diego aakyurek@ucsd.edu,

More information

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY Dileep P, Bhondarkor Texas Instruments Inorporated Dallas, Texas ABSTRACT Charge oupled devies (CCD's) hove been mentioned as potential fast auxiliary

More information

Detection of RF interference to GPS using day-to-day C/No differences

Detection of RF interference to GPS using day-to-day C/No differences 1 International Symposium on GPS/GSS Otober 6-8, 1. Detetion of RF interferene to GPS using day-to-day /o differenes Ryan J. R. Thompson 1#, Jinghui Wu #, Asghar Tabatabaei Balaei 3^, and Andrew G. Dempster

More information

Introduction to Seismology Spring 2008

Introduction to Seismology Spring 2008 MIT OpenCourseWare http://ow.mit.edu 1.510 Introdution to Seismology Spring 008 For information about iting these materials or our Terms of Use, visit: http://ow.mit.edu/terms. 1.510 Leture Notes 3.3.007

More information

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Ho Wireless Networks Giorgio Quer, Federio Librino, Lua Canzian, Leonardo Badia, Mihele Zorzi, University of California San Diego La

More information

The influence of QoS routing on the achievable capacity in TDMA based Ad hoc wireless networks

The influence of QoS routing on the achievable capacity in TDMA based Ad hoc wireless networks Wireless Netw () 6:9 DOI.7/s76-8-- The influene of QoS routing on the ahievable apaity in TDMA based Ad ho wireless networks S. Sriram Æ T. Bheemarjuna Reddy Æ C. Siva Ram Murthy Published online: August

More information

DECT Module Installation Manual

DECT Module Installation Manual DECT Module Installation Manual Rev. 2.0 This manual desribes the DECT module registration method to the HUB and fan airflow settings. In order for the HUB to ommuniate with a ompatible fan, the DECT module

More information

Improved flooding of broadcast messages using extended multipoint relaying

Improved flooding of broadcast messages using extended multipoint relaying Improved flooding of broadast messages using extended multipoint relaying Pere Montolio Aranda a, Joaquin Garia-Alfaro a,b, David Megías a a Universitat Oberta de Catalunya, Estudis d Informàtia, Mulimèdia

More information

Multi-Stack Boundary Labeling Problems

Multi-Stack Boundary Labeling Problems Multi-Stack Boundary Labeling Problems Micael A. Bekos 1, Micael Kaufmann 2, Katerina Potika 1 Antonios Symvonis 1 1 National Tecnical University of Atens, Scool of Applied Matematical & Pysical Sciences,

More information

The Capacity of Wireless Networks

The Capacity of Wireless Networks The Capacity of Wireless Networks Piyush Gupta & P.R. Kumar Rahul Tandra --- EE228 Presentation Introduction We consider wireless networks without any centralized control. Try to analyze the capacity of

More information

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer

More information

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 Note: Tere will be a very sort online reading quiz (WebWork) on eac reading assignment due one our before class on its due date. Due dates can be found

More information

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University

More information

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks Downloaded from vbn.aau.dk on: April 7, 09 Aalborg Universitet etwork Coding to Enance Standard Routing Protocols in Wireless Mes etworks Palevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank;

More information

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks 62 Uplink Channel Alloation Sheme and QoS Management Mehanism for Cognitive Cellular- Femtoell Networks Kien Du Nguyen 1, Hoang Nam Nguyen 1, Hiroaki Morino 2 and Iwao Sasase 3 1 University of Engineering

More information

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion

More information

Stable Road Lane Model Based on Clothoids

Stable Road Lane Model Based on Clothoids Stable Road Lane Model Based on Clothoids C Gakstatter*, S Thomas**, Dr P Heinemann*, Prof Gudrun Klinker*** *Audi Eletronis Venture GmbH, **Leibniz Universität Hannover, ***Tehnishe Universität Münhen

More information

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks International Journal of Computer Theory and Engineering, Vol. 5, No. 2, April 213 A Multi-Head Clustering Algorithm in Vehiular Ad Ho Networks Shou-Chih Lo, Yi-Jen Lin, and Jhih-Siao Gao Abstrat Clustering

More information

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis

More information

RANGE DOPPLER ALGORITHM FOR BISTATIC SAR PROCESSING BASED ON THE IMPROVED LOFFELD S BISTATIC FORMULA

RANGE DOPPLER ALGORITHM FOR BISTATIC SAR PROCESSING BASED ON THE IMPROVED LOFFELD S BISTATIC FORMULA Progress In Eletromagnetis Researh Letters, Vol. 27, 161 169, 2011 RANGE DOPPLER ALGORITHM FOR ISTATIC SAR PROCESSING ASED ON THE IMPROVED LOFFELD S ISTATIC FORMULA X. Wang 1, * and D. Y. Zhu 2 1 Nanjing

More information

Approximate logic synthesis for error tolerant applications

Approximate logic synthesis for error tolerant applications Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION

KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION Cuiui Kang 1, Shengai Liao, Shiming Xiang 1, Chunhong Pan 1 1 National Laboratory of Pattern Reognition, Institute of Automation, Chinese

More information

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1. Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,

More information

Static Interprocedural Optimizations in Java

Static Interprocedural Optimizations in Java ! "! " " # $ % & $ ' ( % ) * +, -. / 0 / 1 2 3 ) ) * 4 5 6 7 5 8 9 : 8 ; 5 < 5 = 8 >? : 6 @ = 8 = A A 5 A 4 : B C D 7 = 7 E : 6 ; E > 5 F 6 E G 5 8 < E 7 H I J K K L : D 7? M = E 6 L 7 8 5 5 7 4 ; @ 4

More information

A Comparison of Hard-state and Soft-state Signaling Protocols

A Comparison of Hard-state and Soft-state Signaling Protocols University of Massahusetts Amherst SholarWorks@UMass Amherst Computer Siene Department Faulty Publiation Series Computer Siene 2003 A Comparison of Hard-state and Soft-state Signaling Protools Ping Ji

More information

Performance Benchmarks for an Interactive Video-on-Demand System

Performance Benchmarks for an Interactive Video-on-Demand System Performane Benhmarks for an Interative Video-on-Demand System. Guo,P.G.Taylor,E.W.M.Wong,S.Chan,M.Zukerman andk.s.tang ARC Speial Researh Centre for Ultra-Broadband Information Networks (CUBIN) Department

More information

Distributed Resource Allocation Strategies for Achieving Quality of Service in Server Clusters

Distributed Resource Allocation Strategies for Achieving Quality of Service in Server Clusters Proeedings of the 45th IEEE Conferene on Deision & Control Manhester Grand Hyatt Hotel an Diego, CA, UA, Deember 13-15, 2006 Distributed Resoure Alloation trategies for Ahieving Quality of ervie in erver

More information

LRED: A Robust and Responsive AQM Algorithm Using Packet Loss Ratio Measurement

LRED: A Robust and Responsive AQM Algorithm Using Packet Loss Ratio Measurement IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, TPDS-179-5 1 LRED: A Robust and Responsive AQM Algorithm Using Paket Loss Ratio Measurement Chonggang Wang, Member, IEEE, Jianghuan Liu, Member, IEEE,

More information

arxiv: v1 [cs.db] 13 Sep 2017

arxiv: v1 [cs.db] 13 Sep 2017 An effiient lustering algorithm from the measure of loal Gaussian distribution Yuan-Yen Tai (Dated: May 27, 2018) In this paper, I will introdue a fast and novel lustering algorithm based on Gaussian distribution

More information

A {k, n}-secret Sharing Scheme for Color Images

A {k, n}-secret Sharing Scheme for Color Images A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University

More information

Redundancy Awareness in SQL Queries

Redundancy Awareness in SQL Queries Redundancy Awareness in QL Queries Bin ao and Antonio Badia omputer Engineering and omputer cience Department University of Louisville bin.cao,abadia @louisville.edu Abstract In tis paper, we study QL

More information

Chapter K. Geometric Optics. Blinn College - Physics Terry Honan

Chapter K. Geometric Optics. Blinn College - Physics Terry Honan Capter K Geometric Optics Blinn College - Pysics 2426 - Terry Honan K. - Properties of Ligt Te Speed of Ligt Te speed of ligt in a vacuum is approximately c > 3.0µ0 8 mês. Because of its most fundamental

More information

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically 2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use

More information

2.8 The derivative as a function

2.8 The derivative as a function CHAPTER 2. LIMITS 56 2.8 Te derivative as a function Definition. Te derivative of f(x) istefunction f (x) defined as follows f f(x + ) f(x) (x). 0 Note: tis differs from te definition in section 2.7 in

More information

On the Use of Radio Resource Tests in Wireless ad hoc Networks

On the Use of Radio Resource Tests in Wireless ad hoc Networks Tecnical Report RT/29/2009 On te Use of Radio Resource Tests in Wireless ad oc Networks Diogo Mónica diogo.monica@gsd.inesc-id.pt João Leitão jleitao@gsd.inesc-id.pt Luis Rodrigues ler@ist.utl.pt Carlos

More information

DoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay

DoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay DoS-Resistant Broadast Authentiation Protool with Low End-to-end Delay Ying Huang, Wenbo He and Klara Nahrstedt {huang, wenbohe, klara}@s.uiu.edu Department of Computer Siene University of Illinois at

More information

Automated Generation of Interactive 3D Exploded View Diagrams

Automated Generation of Interactive 3D Exploded View Diagrams Automated Generation of Interative 3D Exloded View Diagrams Abstrat We resent a system for reating and viewing interative exloded views of omlex 3D models. In our aroa, a 3D inut model is organized into

More information

Cluster-Based Cumulative Ensembles

Cluster-Based Cumulative Ensembles Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,

More information

An Experimental Study of Fractional Cooperation in Wireless Mesh Networks

An Experimental Study of Fractional Cooperation in Wireless Mesh Networks An Experimental tudy of Frational Cooperation in Wireless Mesh Networks Anthony Cale, Nariman Farsad, and Andrew W. Ekford Dept. of Computer iene and Engineering, York University 47 Keele treet, Toronto,

More information

NOTES: A quick overview of 2-D geometry

NOTES: A quick overview of 2-D geometry NOTES: A quick overview of 2-D geometry Wat is 2-D geometry? Also called plane geometry, it s te geometry tat deals wit two dimensional sapes flat tings tat ave lengt and widt, suc as a piece of paper.

More information

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science A Cost Model for Distributed Sared Memory Using Competitive Update Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, Texas, 77843-3112, USA E-mail: fjkim,vaidyag@cs.tamu.edu

More information

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors We are InteOpen, te world s leading publiser o Open ess books Built by sientists, or sientists 4,000 6,000 0M Open aess books available International autors and editors Downloads Our autors are among te

More information

Numerical simulation of hemolysis: a comparison of Lagrangian and Eulerian modelling

Numerical simulation of hemolysis: a comparison of Lagrangian and Eulerian modelling Modelling in Mediine and Biology VI 361 Numerial simulation of hemolysis: a omparison of Lagrangian and Eulerian modelling S. Pirker 1, H. Shima 2 & M. Stoiber 2 1 Johannes Kepler University, 4040 Linz,

More information

the data. Structured Principal Component Analysis (SPCA)

the data. Structured Principal Component Analysis (SPCA) Strutured Prinipal Component Analysis Kristin M. Branson and Sameer Agarwal Department of Computer Siene and Engineering University of California, San Diego La Jolla, CA 9193-114 Abstrat Many tasks involving

More information

INTERPOLATED AND WARPED 2-D DIGITAL WAVEGUIDE MESH ALGORITHMS

INTERPOLATED AND WARPED 2-D DIGITAL WAVEGUIDE MESH ALGORITHMS Proeedings of the COST G-6 Conferene on Digital Audio Effets (DAFX-), Verona, Italy, Deember 7-9, INTERPOLATED AND WARPED -D DIGITAL WAVEGUIDE MESH ALGORITHMS Vesa Välimäki Lab. of Aoustis and Audio Signal

More information

Episode 12: TCP/IP & UbiComp

Episode 12: TCP/IP & UbiComp Episode 12: TCP/IP & UbiComp Hannes Frey and Peter Sturm University of Trier Outline Introdution Mobile IP TCP and Mobility Conlusion Referenes [1] James D. Solomon, Mobile IP: The Unplugged, Prentie Hall,

More information

Exploring the Commonality in Feature Modeling Notations

Exploring the Commonality in Feature Modeling Notations Exploring the Commonality in Feature Modeling Notations Miloslav ŠÍPKA Slovak University of Tehnology Faulty of Informatis and Information Tehnologies Ilkovičova 3, 842 16 Bratislava, Slovakia miloslav.sipka@gmail.om

More information

We P9 16 Eigenray Tracing in 3D Heterogeneous Media

We P9 16 Eigenray Tracing in 3D Heterogeneous Media We P9 Eigenray Traing in 3D Heterogeneous Media Z. Koren* (Emerson), I. Ravve (Emerson) Summary Conventional two-point ray traing in a general 3D heterogeneous medium is normally performed by a shooting

More information

Chapter 2: Introduction to Maple V

Chapter 2: Introduction to Maple V Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard

More information

CleanUp: Improving Quadrilateral Finite Element Meshes

CleanUp: Improving Quadrilateral Finite Element Meshes CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)

More information

Intra- and Inter-Stream Synchronisation for Stored Multimedia Streams

Intra- and Inter-Stream Synchronisation for Stored Multimedia Streams IEEE International Conferene on Multimedia Computing & Systems, June 17-23, 1996, in Hiroshima, Japan, p 372-381 Intra- and Inter-Stream Synhronisation for Stored Multimedia Streams Ernst Biersak, Werner

More information

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization Self-Adaptive Parent to Mean-Centri Reombination for Real-Parameter Optimization Kalyanmoy Deb and Himanshu Jain Department of Mehanial Engineering Indian Institute of Tehnology Kanpur Kanpur, PIN 86 {deb,hjain}@iitk.a.in

More information

The Implementation of RRTs for a Remote-Controlled Mobile Robot

The Implementation of RRTs for a Remote-Controlled Mobile Robot ICCAS5 June -5, KINEX, Gyeonggi-Do, Korea he Implementation of RRs for a Remote-Controlled Mobile Robot Chi-Won Roh*, Woo-Sub Lee **, Sung-Chul Kang *** and Kwang-Won Lee **** * Intelligent Robotis Researh

More information