Optimal Hierarchical Energy Efficient Design for MANETs Wasim El-Hajj Western Michigan University Kalamazoo, MI

Size: px
Start display at page:

Download "Optimal Hierarchical Energy Efficient Design for MANETs Wasim El-Hajj Western Michigan University Kalamazoo, MI"

Transcription

1 Optimal Hierarchical Energ Efficient Design for MAETs Wasim El-Ha Western Michigan Universit Kalamaoo, MI Dionsios Kountanis Western Michigan Universit Kalamaoo, MI, USA Ala Al-Fuqaha Western Michigan Universit Kalamaoo, MI, USA Hani Harbi UAE Universit United Arab Emirates ABSTRACT Due to the groing interest in mobile ireless Ad-Hoc netors (MAETs applications, researchers have proposed man routing protocols that differ in their obective. Energ efficienc and scalabilit are to of the most important obectives. In our previous or, e proposed a fu based hierarchical energ efficient routing protocol (FEER for large scale MAETs that aims to maimie the netor s lifetime and increase its scalabilit. The problem has to parts: the clustering part and the routing part. In the first part, e cluster the netor into to levels of hierarch (cluster heads and normal nodes, connect the cluster heads (bacbone ith each other, and connect the normal nodes to the cluster heads hile maimiing the netor lifetime. In the second part, e design energ efficient routing that uses the hierarchical structure. We call the first part, the energ efficient clustering problem (EEC. In this paper, e formulate three variations of EEC as integer linear programming (ILP problems. We first consider a netor ith a full connected bacbone (EEC-FCB. Then, e rela the full connected constraint and consider a netor ith a connected bacbone (EEC-CB, not necessaril full connected. Finall, e consider a more reliable netor (EEC-R b electing a bacup cluster head for each cluster. Categories and Subect Descriptors C.2. [Computer-Communication etors]: etor Architecture and Design; C.4 [Computer Sstems Organiation]: Performance of Sstems. General Terms Design, performance, theor. Keords Mobile ireless ad-hoc netor, hierarchical design, energ efficienc, and integer linear programming.. ITRODUCTIO An Ad-Hoc netor is a collection of autonomous arbitraril located ireless hosts (also called nodes, in hich an infrastructure is absent. The netor consists of nodes, hich act as routers in the netor. In other ords, a node is not onl responsible for sending and receiving its on data, but it also has to forard traffic to other nodes. The maor advantages of Ad-Hoc netors are rapid deploment, robustness, fleibilit and support for mobilit, hich are useful in a ide range of applications. Ad-Hoc netors are suitable in situations here an infrastructure doesn t eist or is epensive to deplo. Permission to mae digital or hard copies of all or part of this or for personal or classroom use is granted ithout fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To cop otherise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. IWCMC 06, Jul 3 6, 2006, Vancouver, British Columbia, Canada. Copright 2006 ACM /06/ $5.00. A tpical application is disaster recover, here the communication netor infrastructure is destroed and restoring communication quicl is important. Another idel used application is militar communication in hostile environments (battlefield. Troops ill be able to set up a communication netor using light eight ireless equipment in rapidl changing environments. A critical issue in the design of routing protocols for mobile ireless Ad-Hoc netors (MAETs is the efficient utiliation of resources such as limited energ. The problem becomes more challenging if the netor is deploed in large scale. In order to utilie the limited energ resources and to overcome the scalabilit problem that is inherent in flat netors [, 2], e previousl designed a fu based hierarchical energ efficient routing protocol (FEER that aims to maimie the lifetime of the netor [3]. The lifetime of the netor is decided b the lifetime of the eaest node i.e. the node ith the shortest time to survive. FEER organies the netor into to levels of hierarch (normal nodes level and cluster heads level. Initiall, FEER elects some nodes in the netor to act as cluster heads (CHs. It interconnects CHs to each other forming the netor bacbone. Then, it associates each normal node ith a CH. And finall it designs the routing scheme. FEER has to maor components: ( the first component is to cluster the netor such that the initial bacbone nodes are poerful enough to handle the traffic demand; (2 the second component designs the routing scheme and the maintenance scheme. In this paper, e onl consider the first component (the clustering part. We define the optimal solution to the energ efficient clustering problem hen the netor has a full connected bacbone (EEC-FCB b formulating it as an ILP problem. To mae the problem more practical, an etension to EEC-FCB is made in order to reduce the bacbone connections (EEC-CB. The ILP solutions of EEC-FCB and EEC-CB are compared ith each other and the data are analed. We also introduce another etension in order to mae the netor more reliable (EEC-R. EEC-R introduces a bacup CH for each cluster. In a situation here the CH fails, eaens, or moves outside its cluster coverage, the bacup cluster head (BCH taes over immediatel. BCHs are ver useful in netors that are ver mobile. It is orth noting that the ILP formulation is used as a theoretical basis and it is not intended to be used in practice. Our proposed ILP formulation finds the optimal clustering solution. Researchers can then compare their clustering approaches to our ILP formulation in order to evaluate the performance of their schemes. The remainder of this paper is organied as follos. Section 2 includes some related or done in energ efficient routing in MAETs. Section 3 presents an overvie of FEER. Section 4 defines the energ efficient clustering problem ith a full connected bacbone (EEC-FCB and its ILP formulation. Section 5 defines the energ efficient clustering problem ith a relaed bacbone (EEC-CB and its formulation. Section 6 287

2 presents the performance evaluation of EEC-FCB and EEC-CB. Section 7 describes the reliable energ efficient clustering problem (EEC-R and its formulation. Section 8 concludes the paper and discusses future or. 2. RELATED WORK Researchers have proposed man routing protocols that address the limited energ constraint found in MAETs [4-4]. Some of this or focuses on minimiing the total energ consumption rate of the netor. Hoever, this can lead to some nodes in the netor being drained out of energ ver quicl. Hence, instead of tring to minimie the total energ consumption, routing to maimie the netor s lifetime is considered [4-8]. In [4] and [5], a rigorous formulation using linear programming is presented hich attempts to capture the issue of poer consumption more precisel. The obective as to design the routing hile maimiing the netor lifetime. The give heuristic algorithms to solve the linear program approimatel, but the proposed approach can perform arbitraril bad in the orst case. In a later paper [6], a centralied algorithm to determine the maimum lifetime is presented, based on the Garg-Koenemann [7] algorithm for multicommodit flo. In [8], the authors consider the routing problem in MAET ith the goal of maimiing the lifetime of the netor. The propose a distributed routing algorithm that reaches the optimal (centralied solution to ithin an asmptoticall small relative error. Their approach is based on the formulation of multicommodit flo, and it allos considering different poer consumption models and bandidth constraints. It ors for both static and slol changing dnamic netors. Our energ efficient approach has some similarities ith other approaches in the sense that it designs the netor in a hierarchical fashion and then it achieves interconnectivit beteen various parts of the netor. But to our noledge nobod formulated this design problem as an ILP problem and analed its performance. In the net section, e give a brief overvie about FEER. 3. FEER OVERVIEW FEER protocol [3] is a hierarchical energ efficient routing scheme for large scale mobile ad-hoc netors that aims to maimie the netor s lifetime. Each node in the netor is characteried b its residual energ, traffic, mobilit, and degree. In [3], e developed a fu logic controller that combines these parameters, eeping in mind the snerg beteen them. Having non the qualit of each node, a centralied algorithm is used to cluster the netor into to groups (cluster members and cluster heads and then route messages beteen nodes. FEER also creates an etra tpe of nodes called guest nodes that are beneficial in minimiing cluster maintenance. In this paper e remove the guest nodes in order to reduce the compleit of the ILP formulation. FEER differs from other approaches in the folloing aspects: ( it uses a fu logic controller to evaluate the strength of each node. (2 It designs a fault tolerant bacbone that satisfies the netor communication demand. (3 It designs energ efficient routing that maimies netor lifetime. FEER achieves its goals b using man algorithms such as: dominating set lie algorithm, min cut algorithm, ma flo algorithm, and routing algorithm. The compleit of FEER is bounded b the compleit of the min cut algorithm hich is O(n EERGY EFFICIET CLUSTERIG WITH FULLY COECTED BACKBOE (EEC-FCB AD ILP FORMULATIO In this section, e define and formulate the energ efficient clustering problem hen the netor has a full connected bacbone (EEC-FCB. We formulate EEC-FCB as an ILP problem, here ever function must be linear, and the solutions of ever variable must be integer. In EEC-FCB, ever variable can be either 0 or and thus the formulation is called binar ILP formulation. 4. EEC-FCB definition Since flat netors have poor scalabilit [, 2], e designed our netor in a hierarchical fashion. To hierarchical levels are used: cluster heads (CHs level and normal nodes level. ormal nodes can onl communicate ith their corresponding CHs, hile CHs communicate ith each other. The EEC-FCB problem is to group a large set of mobile Ad-Hoc nodes into clusters, elect a CH for each cluster, connect cluster nodes to the chosen cluster heads, and full connect CHs ith each other (this condition ill be relaed in section 5 hile maimiing the netor lifetime. The radio model e use follos the most commonl used poer-attenuation model [5]. The signal poer falls as r, here r is the distance beteen the transmitter/receiver nodes and is a real constant dependent on the ireless environment, tpicall beteen 2 and 4. In our case, e set = 2 for communication beteen normal nodes and CHs, and = 3 for communication beteen CHs. The rationale for using more poer consumption beteen CHs ( = 3 is that CHs bare more burden than normal nodes and the are supposed to route all the traffic that is generated from their cluster members. 4.2 EEC-FCB ILP formulation To mae the ILP formulation eas to follo, e start b introducing the notations used in the formulation. The constants/variables and their definitions are presented as follos: : Total number of nodes in the netor predetermined. P: umber of clusters heads predetermined. d i : Euclidean distance beteen nodes i and. K : Ma number of nodes that can be connected to CH predetermined. c i : Cost of connecting a regular node i to CH (proportional to d. 2 i 3 h : Cost of connecting CH to CH (proportional to d. b : Weight associated ith CH. i : Variable. if node i is connected to CH ; 0 otherise. : Variable. CH is connected to CH ; 0 otherise. : Variable. if node is chosen to be a CH; 0 otherise. i : Variable. if i = and = ; 0 otherise. ote that b can be an meaningful eight assigned to a node (an appropriate eight is discussed in [3]. The higher the value of b, the better the node is. Since the obective function is a minimiation function, each value in the b arra is multiplied b -. EEC-FCB can be formulated as a binar ILP problem as follos: 288

3 Min,, ( = c Subect to: i i i i = ( P ( K i = i = = b ( P = = ( ( h c ; ( ; (2 = ( P P( P / 2 ; (3 P ; (4 = ( P ; = = ( P (5 ; (6 = 0 ; (7 ii = ; i; (8 i i ; i; (9 i i ; i; (0 i ; i; ( i i i i ; (2 ( P ( ; (3 {0,} ; i; (4 i {0,} ; ; (5 {0,} ; (6 ote that variables i,, and are beteen and. The obective function is divided into three parts. The first part calculates the cost of connecting normal nodes to CHs. The second part calculates the cost of electing CHs. The third part calculates the cost of connecting CHs ith each other. B minimiing the obective function, the poer consumption rate is optimied and the lifetime is maimied. Constraint indicates that if node is chosen to be a CH, it needs to support at least (P- other CHs. Constraint 2 indicates that if node is chosen to be a CH, it should be connected to at most (P- CHs and K regular nodes. Constraints and 2 also indicate that if node is a normal node, it should be connected to onl one CH. Constraint 3 indicates that the total number of interconnections is equal to the number of connections beteen regular nodes and CHs plus the number of connections that full connect the CHs. Constraint 4 indicates that the total number of CHs is P. Constraints 5 and 6 mae sure that matri (bacbone contains onl the connections that interconnect CHs. Constraints 7 and 8 indicate that matri is smmetric and its diagonal is 0. Constrains 9, 0, and indicate that i = onl if both i = and =, 0 other ise. i is used to simulate i. Constraints 2 and 3 ensure that if a node is chosen to be a regular node, it should be connected to onl one CH and not to another regular node. Constraints 4, 5, and 6 indicate that the variables have binar values. Figure shos the outcome of EEC-FCB on a netor of 9 nodes. odes, 2, and 3 are elected as CHs. odes 4 and 5 oin CH. odes 6 and 7 oin CH 2. odes 8 and 9 oin CH 3. In the net section, e etend EEC-FCB such that the bacbone connections are reduced. Figure : EEC-FCB for a netor of 9 nodes. 5. EERGY EFFICIET CLUSTERIG WITH COECTED BACKBOE (EEC-CB AD ILP FORMULATIO EEC-FCB (section 4 assumes that the bacbone netor is full connected. To mae the netor more practical, e rela this constraint and reduce the bacbone connections hile ensuring the netor connectivit. One a to ensure the bacbone connectivit is to connect one CH ith all the other CHs. We call such a CH the main cluster head (MCH. ote that, if a node is a MCH, then it is definitel a CH. If a node is a CH, then it might or might not be a MCH. If a node is a normal node, then it is neither a CH nor a MCH. We introduce a ne variable called M, here M = if node is a MCH; 0 otherise. Some of the constraints discussed in section 4 remain the same, hile others are added. EEC-CB is presented b the folloing binar ILP problem: Min,, Subect to: ( = c i M ; M {0,} ; i = b = = (7 (8 h 289

4 M = = ; (9 ( P 2 M ; i i = i (20 ( P P( P / 2 ; (2 ( P 2 = M ( P ; ; (22 (23 = ; ; (24 Constraints 2, 4, and 7 through 6 are also needed to formulate EEC-CB. Constraints 7 and 8 indicate that if a node is chosen as a MCH (M =, then it must be a CH ( = but the inverse is not true (discussed above. Constraint 9 indicates that there should be one MCH in the netor. This condition ensures the connectivit of the bacbone. Constraint 20 indicates that if a node as chosen as a MCH, then it must be connected to at least (P- other CH. Otherise, the node is ust a normal node or a CH. If it as a normal node (M = 0, it should be connected to eactl one CH. If it as a CH, it should be connected to at least one other CH. Constraint 2 is the same as constraint 3, but ith the equal sign changed to less than or equal. In this case, the bacbone netor is not full connected. Constraints 22 and 23 ensure that the MCH is connected to all other CHs, hile normal CH can be connected to a minimum of one other CH. Constraint 24 indicates that the matri (bacbone is smmetric; Figures 2 and 3 displa to sample eecutions of EEC-CB. Figure 3: EEC-CB for a netor of 8 nodes. 6. PERFORMACE EVALUATIO In this section e evaluate the performance of EEC-FCB and EEC-CB. etors of different sies and considered. For each netor, n nodes are uniforml distributed in a unit space. The average of K runs is calculated for each netor. Because EEC-FCB and EEC-CB taes lots of time to eecute (Pcomplete, e onl considered netors ith less than ten nodes. Figure 4 shos the results. EEC-FCB and EEC-CB produce netors ith close costs. But, EEC-CB has a loer cost because it designs a netor ith relaed bacbone i.e. less connections beteen CHs hich translates to less netor cost. ote that EEC-FCB and EEC-CB tend to choose as CHs nodes that are close to each other. As the distance beteen CHs increases, the obective function increases and thus the netor cost increases. Cost 4.E06 3.E06 2.E06.E06 0.E00 Performance Evaluation EEC-FCB EEC-CB umber of odes Figure 4: Costs of ILP, and ILP Etension. Figure 2: EEC-CB for the same netor presented in Figure. 7. EERGY EFFICIET CLUSTERIG WITH A RELIABLE BACKBOE (EEC-R AD ILP FORMULATIO In this section, e further etend EEC-FCB discussed in section IV so that each cluster ill be provided b a bacup cluster head (BCH. Having a BCH is ver useful in man situations such as: ( CH s energ becomes scarce and it can not handle the cluster demand. (2 CH is not able to cover all the nodes in its cluster because of mobilit. (3 Connectivit beteen CHs is broen also because of mobilit. (4 CH fails. 290

5 7. EEC-R definition EEC-R is to group a large set of nodes into clusters, elect each CH, elect each BCH, connect nodes to the chosen CHs and to the chosen BCHs, and full connect CHs and BCHs hile minimiing the poer consumption rate and maimiing the netor lifetime. ote that the bacbone connections can be reduced using the same technique used in section EEC-R ILP formulation The constants/variables notations given in section 4 are still the same ith i removed and three ne variables added. The ne variables are presented as follos: : Variable. if node is chosen to be a BCH, 0 otherise. t i : Variable. if both i = and =, 0 otherise. v i : Variable. if i = and =, 0 otherise. The obective function presented in section 4 is still the same. EEC-R can be formulated as the folloing binar ILP problem: Min,, ( = c i i = b = = ( h c Subect to: ; (25 0; 0 ; (26 Constraints 25 and 26 mae sure that if a node is chosen to be a CH, then it can not be a BCH. And if a node is chosen to be a BCH, then it can not be a CH. i (2P ( (2P ( (2( ; (27, constraint 27 puts a loer bound on the number of connections that node can mae ith other nodes. If node as elected as a CH ( = or as a BCH ( =, then node should be connected to at least all the other CHs and BCHs (2P- connections. If node as a normal node, then it should be connected to its CH and its BCH (2 connections. i ( K 2P ( ( ( 2P K 2 (2( ; (28, constraint 28 puts an upper bound on the number of connections that node can mae ith other nodes. The same reasoning applied in constraint 27 applies also in this constraint. i = i = ( P ( 2P 2P( P ; (29 Constraint 29 sums up the connections made beteen normal nodes and their associated CHs/BCHs plus the connections that full interconnects the CHs/BCHs. = = P ; (30 Constraint 30 indicates that the number of BCH is equal to the number of CHs. = 2( P 2( P ; (3 = = 2( P 2( P ; (32 Constraints 3 and 32 mae sure that matri contains onl the connections that interconnect CHs and BCH (bacbone netor. t ; i; (33 i i t ; i; (34 i t ; i; (35 i i Constraints 33, 34, and 35 mae sure that t i = onl if i = and =, 0 otherise. t i simulates i. t ; t i i ( P (36 ( ; (37 Constraints 36 and 37 are used to ensure that if a node is chosen to be a regular node, then it should be connected to one CH and not to another regular node. v ; i; (38 i i v ; i; (39 i v ; i; (40 i i Constraints 38, 39, and 40 mae sure that v i = onl if i = and =, 0 otherise. v i simulates i. v ; v i i ( P (4 ( ; (42 Constraints 4 and 42 ensure that if a node is chosen to be a regular node, then it should be connected to one BCH and not to another regular node. {0,} ; (43 t {0,} ; ; (44 v {0,} ; ; (45 Constraints 43, 44, and 45 are used to indicate that the variables are binar values. Figure 5 shos the output of EEC-R on a netor of 7 nodes. odes and 4 are elected as CHs. odes 2 and 3 are elected as BCHs for CHs and 4 respectivel. odes 5 and 6 are connected to CH and BCH 2. ode 7 is connected to CH 4 and BCH 3. The bacbone, composed of CHs and BCHs, is full connected. And the normal nodes are connected to both CHs and BCHs. 29

6 Figure 5: EEC-R for a netor of 7 nodes. 8. COCLUSIO AD FUTURE WORK Due to the vast number of useful applications in MAETs, designing an energ efficient routing protocol for such netors is becoming more and more important. Energ efficienc can be translated into the problem of maimiing the netor lifetime. Previousl, e proposed a hierarchical protocol (FEER that aims to maimie netor lifetime. In this paper, e describe the optimal solution to the energ efficient clustering problem (EEC b formulating it as an ILP problem. Three variations of EEC ere formulated. EEC-FCB designs a netor ith a full connected bacbone. EEC-CB reduces the bacbone connections hile ensuring netor connectivit. EEC-R designs a reliable netor b introducing a bacup cluster head for each cluster. We are no in the process of designing a distributed netor design and a distributed routing protocol that achieves the same goals. 9. REFERECE [] Gupta, P. and Kumar, P. R. The Capacit of Wireless etors. IEEE Transactions on Information Theor, IT- 46, 2 (March 2000, [2] Gupta, P., Gra, R., and Kumar, P. R. An Eperimental Scaling La for Ad Hoc etors. (Ma 6, 200, [3] El-Ha, W., Kountanis, D., Al-Fuqaha, A., and Guiani, M. A Fu-Based Hierarchical Energ Efficient Routing Protocol for Large Scale Mobile Ad Hoc etors (FEER. IEEE International Conference on Communication (ICC 06, (Istanbul, Ture, June-5, [4] Chang, J.-H. and Tassiulas, L. Routing for maimum sstem lifetime in ireless ad-hoc netors. In Proc. of 37th Annual Allerton Conference on Communication, Control, and Computing, (September 999. [5] Chang, J.-H. and Tassiulas, L. Energ conserving routing in ireless ad-hoc netors. In Proc. of IEEE IFOCOM, (March 2000, [6] Chang, J.-H. and Tassiulas, L. Fast approimation algorithms for maimum lifetime routing in ireless adhoc netors. In Lecture otes in Computer Science: etoring 2000, 85, (Ma 2000, [7] Garg,. and Koenemann, J. Faster and simpler algorithms for multicommodit flo and other fractional pacing problems. In Proc. of the 39 th Annual Smposium on Foundations of Computer Science, (ovember 998, [8] Sanar, A. and Liu, Z. Maimum lifetime routing in ireless ad-hoc netors. In Proc. of IEEE IFOCOM, (2004. [9] Lin, CR and Gerla, M. Adaptive Clustering for Mobile Wireless etors. IEEE JSAC, 5, (September 997, [0] Amis, D. and Praash, R. Load-Balancing Clusters in Wireless Ad Hoc etors. Proc. of the 3rd IEEE ASSET 00, (March 2000, [] Ru, J.-H., Song, S., and Cho, D.-H. e Clustering Schemes for Energ Conservation in To-Tiered Mobile Ad-Hoc etors. IEEE International Conference on Communication (ICC 0, 3, (June 200, [2] Wu, J. On Calculating Poer-Aare Connected Dominating Sets for Efficient Routing in Ad Hoc Wireless etors. Journal of Communication and etors, 4,, (March 2002, [3] Yu, J. Y. and Chong, P. H. J. 3hBAC (3-hop beteen Adacent Clusterheads: a ovel on-overlapping Clustering Algorithm for Mobile Ad Hoc etors. In Proc. of IEEE Pacrim 03,, (August 2003, [4] Kaadia, V. and Kumar, P. R. Poer control and clustering in ad hoc netors. In Proc. of IEEE IFOCOM, (2003. [5] Rappaport, T.S. Wireless Communications: Principles and Practices. Prentice Hall,

Dept. of Computing Science & Math

Dept. of Computing Science & Math Lecture 4: Multi-Laer Perceptrons 1 Revie of Gradient Descent Learning 1. The purpose of neural netor training is to minimize the output errors on a particular set of training data b adusting the netor

More information

Internet Technology. 08. Routing. Paul Krzyzanowski. Rutgers University. Spring CS Paul Krzyzanowski

Internet Technology. 08. Routing. Paul Krzyzanowski. Rutgers University. Spring CS Paul Krzyzanowski Internet Technolog 08. Routing Paul Kranoski Rutgers Universit Spring 06 March, 06 CS 0-06 Paul Kranoski Routing algorithm goal st hop router = source router last hop router = destination router router

More information

A FRACTAL WATERMARKING SCHEME FOR IMAGE IN DWT DOMAIN

A FRACTAL WATERMARKING SCHEME FOR IMAGE IN DWT DOMAIN A FRACTAL WATERMARKING SCHEME FOR IMAGE IN DWT DOMAIN ABSTRACT A ne digital approach based on the fractal technolog in the Disperse Wavelet Transform domain is proposed in this paper. First e constructed

More information

End-to-end path: route

End-to-end path: route Multi-hop Wireless Netorks CMU CS 15-829: Internet-Scale Sensor Sstems Overvie: Large-Scale Wireless Sstems Small-Scale: Ho to build single-hop ireless LAN; ho to make TCP perform ell over it Large-Scale:

More information

A Robust and Real-time Multi-feature Amalgamation. Algorithm for Fingerprint Segmentation

A Robust and Real-time Multi-feature Amalgamation. Algorithm for Fingerprint Segmentation A Robust and Real-time Multi-feature Amalgamation Algorithm for Fingerprint Segmentation Sen Wang Institute of Automation Chinese Academ of Sciences P.O.Bo 78 Beiing P.R.China100080 Yang Sheng Wang Institute

More information

Ethernet Basics Learning Switches. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

Ethernet Basics Learning Switches. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers Ethernet Basics Learning Sitches based on Chapter 4 of CompTIA Netork+ Eam Guide, 4 th ed., Mike Meers Sitch Forarding A sitch forards frames based on destination MAC address Ho does the sitch kno hich

More information

4.5.2 The Distance-Vector (DV) Routing Algorithm

4.5.2 The Distance-Vector (DV) Routing Algorithm 4.5 ROUTING ALGORITHMS 371 highl congested (for eample, high-dela) links. Another solution is to ensure that not all routers run the LS algorithm at the same time. This seems a more reasonable solution,

More information

An Edge Detection Method Using Back Propagation Neural Network

An Edge Detection Method Using Back Propagation Neural Network RESEARCH ARTICLE OPEN ACCESS An Edge Detection Method Using Bac Propagation Neural Netor Ms. Utarsha Kale*, Dr. S. M. Deoar** *Department of Electronics and Telecommunication, Sinhgad Institute of Technology

More information

A Novel Adaptive Algorithm for Fingerprint Segmentation

A Novel Adaptive Algorithm for Fingerprint Segmentation A Novel Adaptive Algorithm for Fingerprint Segmentation Sen Wang Yang Sheng Wang National Lab of Pattern Recognition Institute of Automation Chinese Academ of Sciences 100080 P.O.Bo 78 Beijing P.R.China

More information

Neural Network Model Based Cluster Head Selection for Power Control in Mobile Ad-hoc Networks

Neural Network Model Based Cluster Head Selection for Power Control in Mobile Ad-hoc Networks Neural Network Model Based Cluster Head Selection for Power Control in Mobile Ad-hoc Networks Krishan Kumar,A.P.(CSE), Manav Rachna International University, Faridabad, Haryana, V.P.Singh,A.P.(CSE), Thapar

More information

INFORMATION CODING AND NEURAL COMPUTING

INFORMATION CODING AND NEURAL COMPUTING INFORATION CODING AND NEURAL COPUTING J. Pedro Neto 1, Hava T. Siegelmann 2, and J. Féli Costa 1 jpn@di.fc.ul.pt, iehava@ie.technion.ac.il, and fgc@di.fc.ul.pt 1 Faculdade de Ciências da Universidade de

More information

2400 IEEE SENSORS JOURNAL, VOL. 13, NO. 6, JUNE 2013

2400 IEEE SENSORS JOURNAL, VOL. 13, NO. 6, JUNE 2013 2400 IEEE SENSORS JOURNAL, VOL. 13, NO. 6, JUNE 2013 Optimizing Complex Cluster Formation in MANETs Using SAT/ILP Techniques Syed Zohaib Hussain Zahidi, Fadi Aloul, Member, IEEE, Assim Sagahyroon, and

More information

4.5 Routing Algorithms

4.5 Routing Algorithms 4.5 ROUTING ALGORITHMS 363 to hosts enjo the securit services provided b IPsec. On the sending side, the transport laer passes a segment to IPsec. IPsec then encrpts the segment, appends additional securit

More information

On Fault Tolerant Ad Hoc Network Design

On Fault Tolerant Ad Hoc Network Design On Fault Tolerant Ad Hoc Network Design Wassim El-Hajj College of Information Technology UAE University United Arab Emirates welhajj@uaeu.ac.ae Hazem Hajj Faculty of Engineering and Architecture American

More information

Optimized Barrier Location for Barrier Coverage in Mobile Sensor Networks

Optimized Barrier Location for Barrier Coverage in Mobile Sensor Networks 25 IEEE ireless Communications and Netorking Conference (CNC): - Track 3: Mobile and ireless Netorks Optimized Barrier Location for Barrier Coverage in Mobile Sensor Netorks Xiaoyun Zhang, Mathe L. ymore,

More information

D-Calib: Calibration Software for Multiple Cameras System

D-Calib: Calibration Software for Multiple Cameras System D-Calib: Calibration Software for Multiple Cameras Sstem uko Uematsu Tomoaki Teshima Hideo Saito Keio Universit okohama Japan {u-ko tomoaki saito}@ozawa.ics.keio.ac.jp Cao Honghua Librar Inc. Japan cao@librar-inc.co.jp

More information

Clustering Part 2. A Partitional Clustering

Clustering Part 2. A Partitional Clustering Universit of Florida CISE department Gator Engineering Clustering Part Dr. Sanja Ranka Professor Computer and Information Science and Engineering Universit of Florida, Gainesville Universit of Florida

More information

A Distributed Hierarchical Energy-Efficient Scheme for Large Scale Mobile Wireless Ad Hoc Networks

A Distributed Hierarchical Energy-Efficient Scheme for Large Scale Mobile Wireless Ad Hoc Networks Western Michigan University ScholarWorks at WMU Dissertations Graduate College 7-2006 A Distributed Hierarchical Energy-Efficient Scheme for Large Scale Mobile Wireless Ad Hoc Networks Wasim El Hajj Western

More information

Digital Watermarking of Still Images using the Discrete Wavelet Transform

Digital Watermarking of Still Images using the Discrete Wavelet Transform Buletinul Ştiinţific al Universităţii "Politehnica" din Timişoara Seria ELECTROICĂ şi TELECOMUICAŢII TRASACTIOS on ELECTROICS and COMMUICATIOS Tom 48(62) Fascicola 1 2003 Digital Watermarking of Still

More information

ROUTING OPTIMIZATION FOR FORCES BASED ON TRAFFIC MATRIX

ROUTING OPTIMIZATION FOR FORCES BASED ON TRAFFIC MATRIX ROUTING OPTIMIZATION FOR FORCES BASED ON TRAFFIC MATRIX 1 ZHOU MINHUI 2 WANG WEIMING 3 ZHOU JINGJING 1 Postgraduate of Information and Electrical Engineering Zhejiang Gongshang Universit Zhejiang China

More information

Lecture 16 Notes AVL Trees

Lecture 16 Notes AVL Trees Lecture 16 Notes AVL Trees 15-122: Principles of Imperative Computation (Fall 2015) Frank Pfenning 1 Introduction Binar search trees are an ecellent data structure to implement associative arras, maps,

More information

Mixture models and clustering

Mixture models and clustering 1 Lecture topics: Miture models and clustering, k-means Distance and clustering Miture models and clustering We have so far used miture models as fleible ays of constructing probability models for prediction

More information

Center Concentrated X-Torus Topology

Center Concentrated X-Torus Topology Center Concentrated X-Torus Topolog Dinesh Kumar 1, Vive Kumar Sehgal, and Nitin 3 1 Department of Comp. Sci. & Eng., Japee Universit of Information Technolog, Wanaghat, Solan, Himachal Pradesh, INDIA-17334.

More information

An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks

An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks Volume 2 Issue 9, 213, ISSN-2319-756 (Online) An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks Nishi Sharma Rajasthan Technical University Kota, India Abstract: The popularity of Wireless

More information

A Reduced Gaussian Mixture Representation Based On Sparse Modeling

A Reduced Gaussian Mixture Representation Based On Sparse Modeling A Reduced Gaussian Miture Representation Based On Sparse Modeling Hongyan Zhu Chongzhao Han Yan in Automation department School of Electronic & Information Engineering Xi an Jiaotong University Xi an.

More information

Efficient Node Reconfiguration in Mobile Ad Hoc Networks (MANETs) for Wireless Internet Access Point Connection

Efficient Node Reconfiguration in Mobile Ad Hoc Networks (MANETs) for Wireless Internet Access Point Connection Efficient Node Reconfiguration in Mobile Ad Hoc Networks (MANETs) for Wireless Internet Access Point Connection Kin Choong Yow School of Computer Engineering Nanyang Technological University Nanyang Avenue,

More information

Unsupervised Learning. Supervised learning vs. unsupervised learning. What is Cluster Analysis? Applications of Cluster Analysis

Unsupervised Learning. Supervised learning vs. unsupervised learning. What is Cluster Analysis? Applications of Cluster Analysis 7 Supervised learning vs unsupervised learning Unsupervised Learning Supervised learning: discover patterns in the data that relate data attributes with a target (class) attribute These patterns are then

More information

Modeling Transformations

Modeling Transformations Transformations Transformations Specif transformations for objects o Allos definitions of objects in on coordinate sstems o Allos use of object definition multiple times in a scene Adam Finkelstein Princeton

More information

Achieving QoS Through Network Coding

Achieving QoS Through Network Coding Achieving QoS Through Network Coding Marium Jalal Chaudhr, Farhat Saleemi, Fatima Jalal Chaudhr Abstract Network coding is a novel technique that includes man applications in realistic networking era.

More information

EBRP: Energy Band based Routing Protocol for Wireless Sensor Networks

EBRP: Energy Band based Routing Protocol for Wireless Sensor Networks EBRP: Energy Band based Routing Protocol for Wireless Sensor Networks Sasanka Madiraju Cariappa Mallanda #Rajgopal Kannan Arjan Durresi S.S.Iyengar {madiraju, Cariappa, rkannan, Durresi, iyengar}@csc.lsu.edu

More information

A Robust Method of Facial Feature Tracking for Moving Images

A Robust Method of Facial Feature Tracking for Moving Images A Robust Method of Facial Feature Tracking for Moving Images Yuka Nomura* Graduate School of Interdisciplinary Information Studies, The University of Tokyo Takayuki Itoh Graduate School of Humanitics and

More information

Sensor Stream Reduction For Clustered Wireless Sensor Networks

Sensor Stream Reduction For Clustered Wireless Sensor Networks Sensor Stream Reduction For Clustered Wireless Sensor Netorks André L. L. de Aquino 1, Carlos M. S. Figueiredo 2, Eduardo F. Nakamura 2, Alejandro C. Frery 3, Antonio A. F. Loureiro 1, Antônio Otávio Fernandes

More information

Modeling Transformations

Modeling Transformations Modeling Transformations Thomas Funkhouser Princeton Universit CS 426, Fall 2 Modeling Transformations Specif transformations for objects Allos definitions of objects in on coordinate sstems Allos use

More information

ExBCG-TC: Extended Borel Cayley Graph Topology Control for Ad Hoc Networks

ExBCG-TC: Extended Borel Cayley Graph Topology Control for Ad Hoc Networks Ex: Extended Borel Cayley Graph Topology Control for Ad Hoc Netorks Dongsoo Kim and Jaeook Yu Department of ECE Stony Brook University (SUNY) Stony Brook, NY 11794 2350 Email: {dongsoo.kim, jaeook.yu}@stonybrook.edu

More information

Module 3 Graph Theoretic Segmentation

Module 3 Graph Theoretic Segmentation Module 3 Graph Theoretic Segmentation Scott T. Acton Virginia Image and Video Analsis VIVA Charles L. Brown Department of Electrical and Computer Engineering Department of Biomedical Engineering Universit

More information

An algorithm to increase the residues of wrapped-phase in spatial domain

An algorithm to increase the residues of wrapped-phase in spatial domain An algorithm to increase the residues of rapped-phase in spatial domain Guangliang Du a, Minmin Wang a, Canlin Zhou a*,shuchun Si a, Hui Li a, Zhenkun Lei b,yanjie Li c a School of Phsics, Shandong Universit,

More information

Mobile Agents based Reliable and Energy Efficient Routing Protocol for MANET

Mobile Agents based Reliable and Energy Efficient Routing Protocol for MANET 110 Mobile Agents based Reliable and Energ Efficient Routing Protocol for MANET Saravanan Nallusam 1*, Subramani Appavupillai 2, Sivakumar Ponnusam 3 1 K. S. R. College of Engineering, Tiruchengode, Namakkal,

More information

Bias-Variance Decomposition Error Estimators

Bias-Variance Decomposition Error Estimators Bias-Variance Decomposition Error Estimators Cross-Validation Bias-Variance tradeoff Intuition Model too simple does not fit the data well a biased solution. Model too comple small changes to the data,

More information

Bias-Variance Decomposition Error Estimators Cross-Validation

Bias-Variance Decomposition Error Estimators Cross-Validation Bias-Variance Decomposition Error Estimators Cross-Validation Bias-Variance tradeoff Intuition Model too simple does not fit the data well a biased solution. Model too comple small changes to the data,

More information

Integrating Customer Requirements into Data Product Design

Integrating Customer Requirements into Data Product Design 114 Econom Informatics, 2003 Integrating Customer Requirements into Data Product Design Ec., Ph.D. candidate Otilia PÎRLOG Successful data products are ones that meet customer needs, are innovative and

More information

Instruction Fetch Energy Reduction Using Loop Caches For Embedded Applications with Small Tight Loops. Lea Hwang Lee, William Moyer, John Arends

Instruction Fetch Energy Reduction Using Loop Caches For Embedded Applications with Small Tight Loops. Lea Hwang Lee, William Moyer, John Arends Instruction Fetch Energy Reduction Using Loop Caches For Embedded Applications ith Small Tight Loops Lea Hang Lee, William Moyer, John Arends Instruction Fetch Energy Reduction Using Loop Caches For Loop

More information

A Distributed Backbone Formation Algorithm for Mobile Ad Hoc Networks

A Distributed Backbone Formation Algorithm for Mobile Ad Hoc Networks A Distributed Backbone Formation Algorithm for Mobile Ad Hoc Networks Orhan Dagdeviren and Kayhan Erciyes Izmir Institute of Technology Computer Eng. Dept., Urla, Izmir 35340, Turkey {orhandagdeviren,

More information

Acyclic orientations do not lead to optimal deadlock-free packet routing algorithms

Acyclic orientations do not lead to optimal deadlock-free packet routing algorithms Acyclic orientations do not lead to optimal deadloc-ree pacet routing algorithms Daniel Šteanovič 1 Department o Computer Science, Comenius University, Bratislava, Slovaia Abstract In this paper e consider

More information

VORONOI LEACH FOR ENERGY EFFICIENT COMMUNICATION IN WIRELESS SENSOR NETWORKS

VORONOI LEACH FOR ENERGY EFFICIENT COMMUNICATION IN WIRELESS SENSOR NETWORKS VORONOI LEACH FOR ENERGY EFFICIENT COMMUNICATION IN WIRELESS SENSOR NETWORKS D. Satyanarayana Department of Electrical and Computer Engineering University of Buraimi Al Buraimi, Sultanate of Oman Sathyashree.

More information

Deepti Jaglan. Keywords - WSN, Criticalities, Issues, Architecture, Communication.

Deepti Jaglan. Keywords - WSN, Criticalities, Issues, Architecture, Communication. Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Cooperative

More information

9/17/2009. Wenyan Li (Emily Li) Sep. 15, Introduction to Clustering Analysis

9/17/2009. Wenyan Li (Emily Li) Sep. 15, Introduction to Clustering Analysis Introduction ti to K-means Algorithm Wenan Li (Emil Li) Sep. 5, 9 Outline Introduction to Clustering Analsis K-means Algorithm Description Eample of K-means Algorithm Other Issues of K-means Algorithm

More information

Lecture Notes on AVL Trees

Lecture Notes on AVL Trees Lecture Notes on AVL Trees 15-122: Principles of Imperative Computation Frank Pfenning Lecture 19 March 28, 2013 1 Introduction Binar search trees are an ecellent data structure to implement associative

More information

The optimisation of shot peen forming processes

The optimisation of shot peen forming processes The optimisation of shot peen forming processes T. Wang a, M.J. Platts b, J. Wu c a School of Engineering and Design, Brunel University, Uxbridge UB8 3PH, U. b Department of Engineering, University of

More information

Study on Determination of Preceding Vehicle Motion State at the Traffic Lights Intersection

Study on Determination of Preceding Vehicle Motion State at the Traffic Lights Intersection 2014 b IFSA Publishing, S. L. http://.sensorsportal.com Stud on Determination of Preceding Vehicle Motion State at the raffic Lights Intersection 1 Cailin Wu, 2 Huicheng Yang 1 China College of Electrical

More information

The Prediction of Real estate Price Index based on Improved Neural Network Algorithm

The Prediction of Real estate Price Index based on Improved Neural Network Algorithm , pp.0-5 http://dx.doi.org/0.457/astl.05.8.03 The Prediction of Real estate Price Index based on Improved Neural Netor Algorithm Huan Ma, Ming Chen and Jianei Zhang Softare Engineering College, Zhengzhou

More information

3-Dimensional Viewing

3-Dimensional Viewing CHAPTER 6 3-Dimensional Vieing Vieing and projection Objects in orld coordinates are projected on to the vie plane, hich is defined perpendicular to the vieing direction along the v -ais. The to main tpes

More information

Computer Graphics. P04 Transformations. Aleksandra Pizurica Ghent University

Computer Graphics. P04 Transformations. Aleksandra Pizurica Ghent University Computer Graphics P4 Transformations Aleksandra Pizurica Ghent Universit Telecommunications and Information Processing Image Processing and Interpretation Group Transformations in computer graphics Goal:

More information

Estimation of Tikhonov Regularization Parameter for Image Reconstruction in Electromagnetic Geotomography

Estimation of Tikhonov Regularization Parameter for Image Reconstruction in Electromagnetic Geotomography Rafał Zdunek Andrze Prałat Estimation of ikhonov Regularization Parameter for Image Reconstruction in Electromagnetic Geotomograph Abstract: he aim of this research was to devise an efficient wa of finding

More information

Proactive Channel Allocation for Ad-Hoc Networks

Proactive Channel Allocation for Ad-Hoc Networks Proactive Channel Allocation for Ad-Hoc Netorks Yosi Ben-Asher 1 and Yehuda Era 1 1 CS Department, University of Haifa, Haifa, Israel Abstract In this ork e consider the problem of creating multi-edge

More information

Video Seamless Splicing Method Based on SURF Algorithm and Harris Corner Points Detection

Video Seamless Splicing Method Based on SURF Algorithm and Harris Corner Points Detection Vol13 (Softech 016), pp138-14 http://dxdoiorg/101457/astl016137 Video Seamless Splicing Method Based on SURF Algorithm and Harris Corner Points Detection Dong Jing 1, Chen Dong, Jiang Shuen 3 1 College

More information

NP-Complete Chapter 8

NP-Complete Chapter 8 NP-omplete hapter 8 10/3/2005 Kumar S5311 1 Polnomial lgorithms Problems encountered so far are polnomial time algorithms The worst-case running time of most of these algorithms is On k time, for some

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 14

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 14 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 14 1 Two notes on routing algorithm Do not believe ou can understand an routing protocol, e.g.,

More information

Quad-Tree Based Geometric-Adapted Cartesian Grid Generation

Quad-Tree Based Geometric-Adapted Cartesian Grid Generation Quad-Tree Based Geometric-Adapted Cartesian Grid Generation EMRE KARA1, AHMET ĐHSAN KUTLAR1, MEHMET HALUK AKSEL 1Department of Mechanical Engineering Universit of Gaziantep 7310 Gaziantep TURKEY Mechanical

More information

An Immunity-based Ant Colony Optimization Topology Control Algorithm for 3D Wireless Sensor Networks

An Immunity-based Ant Colony Optimization Topology Control Algorithm for 3D Wireless Sensor Networks Sensors & Transducers 013 by IFSA http://www.sensorsportal.com An Immunity-based Ant Colony Optimization Topology Control Algorithm for 3D Wireless Sensor Networs Dequan Yang School of automation Being

More information

2D transformations and homogeneous coordinates

2D transformations and homogeneous coordinates 2D transformations and homogeneous coordinates Dr Nicolas Holzschuch Universit of Cape Ton e-mail: holzschu@cs.uct.ac.za Map of the lecture Transformations in 2D: vector/matri notation eample: translation,

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks

Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Khaled M. Alzoubi Department of Computer Science Illinois Institute of Technology Chicago, IL 6066 alzoubi@cs.iit.edu Peng-Jun Wan Department

More information

Solving Fuzzy Linear Programming by Using Revised Tsao s Method

Solving Fuzzy Linear Programming by Using Revised Tsao s Method ustralian Journal of asic and pplied Sciences, 4(1): 4592-46, 21 ISS 1991-8178 Solving Fuzz inear Programming b Using evised Tsao s Method S.H. asseri, M. Sohrabi Department of Mathematical Sciences, Mazandaran

More information

Chapter 3. Interpolation. 3.1 Introduction

Chapter 3. Interpolation. 3.1 Introduction Chapter 3 Interpolation 3 Introduction One of the fundamental problems in Numerical Methods is the problem of interpolation, that is given a set of data points ( k, k ) for k =,, n, how do we find a function

More information

triangles leaves a smaller spiral polgon. Repeating this process covers S with at most dt=e lights. Generaliing the polgon shown in Fig. 1 establishes

triangles leaves a smaller spiral polgon. Repeating this process covers S with at most dt=e lights. Generaliing the polgon shown in Fig. 1 establishes Verte -Lights for Monotone Mountains Joseph O'Rourke Abstract It is established that dt=e = dn=e?1 verte -lights suce to cover a monotone mountain polgon of t = n? triangles. A monotone mountain is a monotone

More information

DISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS

DISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-56 DISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS Haftom Gebrehiwet Kidanu 1, Prof. Pallam

More information

A dynamic programming algorithm for perceptually consistent stereo

A dynamic programming algorithm for perceptually consistent stereo A dynamic programming algorithm for perceptually consistent stereo The Harvard community has made this article openly available. Please share ho this access benefits you. Your story matters. Citation Accessed

More information

A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks

A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks Jing Ai, Damla Turgut, and Ladislau Bölöni Networking and Mobile Computing Research Laboratory (NetMoC) Department of Electrical

More information

Max-Flow Min-Cost Algorithm for A Supply Chain Network

Max-Flow Min-Cost Algorithm for A Supply Chain Network APDSI Full Paper (Jul, ) Ma-Flow Min-Cost Algorithm for A Suppl Chain Network Shu-Yi Chen ), Ching-Chin Chern ) ) Dept. of Information Management, National Taiwan Universit (d455@im.ntu.edu.tw) ) Dept.

More information

All in Focus Image Generation based on New Focusing Measure Operators

All in Focus Image Generation based on New Focusing Measure Operators (JACSA nternational Journal of Advanced Computer Science and Applications, Vol 7, No, 06 All in Focus mage Generation based on New Focusing Measure Operators Hossam Eldeen M Shamardan epartment of nmation

More information

Series 430 Pneumatic Indicating Controllers. Equipment for Pressure Temperature Standardized signals

Series 430 Pneumatic Indicating Controllers. Equipment for Pressure Temperature Standardized signals eries 40 Pneumatic Indicating Controllers Equipment for Pressure emperature tandardized signals Associated Data heets 70 EN to 7045 EN Edition October 00 Information heet 700 EN eries 40 Pneumatic Indicating

More information

Localized Construction of Bounded Degree and Planar Spanner for Wireless Ad Hoc Networks

Localized Construction of Bounded Degree and Planar Spanner for Wireless Ad Hoc Networks 1 Localized Construction of Bounded Degree and Planar Spanner for Wireless Ad Hoc Netorks Yu Wang Xiang-Yang Li Department of Computer Science, University of North Carolina at Charlotte, 9201 University

More information

arxiv: v2 [math.co] 14 Aug 2018

arxiv: v2 [math.co] 14 Aug 2018 EDGE ERASURES AND CHORDAL GRAPHS arxiv:706.04537v2 [math.co] 4 Aug 208 JARED CULBERTSON, DAN P. GURALNIK, AND PETER F. STILLER Abstract. We prove several results about chordal graphs and eighted chordal

More information

Geometric Model of Camera

Geometric Model of Camera Geometric Model of Camera Dr. Gerhard Roth COMP 42A Winter 25 Version 2 Similar Triangles 2 Geometric Model of Camera Perspective projection P(X,Y,Z) p(,) f X Z f Y Z 3 Parallel lines aren t 4 Figure b

More information

Chapter 2 Part 5 Combinational Logic Circuits

Chapter 2 Part 5 Combinational Logic Circuits Universit of Wisconsin - Madison ECE/Comp Sci 352 Digital Sstems Fundamentals Kewal K. Saluja and Yu Hen Hu Spring 2002 Chapter 2 Part 5 Combinational Logic Circuits Originals b: Charles R. Kime and Tom

More information

When two-hop meets VoFi

When two-hop meets VoFi This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE CCC 00 proceedings. When two-hop meets VoFi Sathya arayanan *,

More information

A Cluster-based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks

A Cluster-based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks A Cluster-based Energy Balancing cheme in Heterogeneous Wireless ensor etworks Jing Ai, Damla Turgut, and Ladislau Bölöni Department of Electrical and Computer Engineering University of Central Florida

More information

Network layer. Two Key Network-Layer Functions. Datagram Forwarding table. IP datagram format. IP Addressing: introduction

Network layer. Two Key Network-Layer Functions. Datagram Forwarding table. IP datagram format. IP Addressing: introduction Netork laer transport segment sending to receiing host on sending side encapslates segments into grams on rcing side, deliers segments to transport laer laer protocols in eer host, roter roter eamines

More information

Mobile ad hoc networks. Sources and sinks revisited. Singleg versus multiple-hops. apps) & multimedia (voice, video); i.e., humans in the loop

Mobile ad hoc networks. Sources and sinks revisited. Singleg versus multiple-hops. apps) & multimedia (voice, video); i.e., humans in the loop Mobile ad hoc networks 2 Wireless Sensor Architecture Nodes N d ttalking lki tto each h other th Nodes talking to some node in another network (Web server on the, ee.g.) g) GENERAL PRINCIPLES AND ARCHITECTURES

More information

Grid and Mesh Generation. Introduction to its Concepts and Methods

Grid and Mesh Generation. Introduction to its Concepts and Methods Grid and Mesh Generation Introduction to its Concepts and Methods Elements in a CFD software sstem Introduction What is a grid? The arrangement of the discrete points throughout the flow field is simpl

More information

Epipolar Constraint. Epipolar Lines. Epipolar Geometry. Another look (with math).

Epipolar Constraint. Epipolar Lines. Epipolar Geometry. Another look (with math). Epipolar Constraint Epipolar Lines Potential 3d points Red point - fied => Blue point lies on a line There are 3 degrees of freedom in the position of a point in space; there are four DOF for image points

More information

Survivability Evaluation in Wireless Sensor Network

Survivability Evaluation in Wireless Sensor Network 2011 3rd International Conference on Advanced Management Science IPEDR vol.19 (2011) (2011) IACSIT Press, Singapore Survivability Evaluation in Wireless Sensor Network Vahid Mavaji 1, Bahareh Abbasi 2

More information

Figure 1. Clustering in MANET.

Figure 1. Clustering in MANET. Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

Soldiers Group Behaviors Simulation Based on Improved MAPRM

Soldiers Group Behaviors Simulation Based on Improved MAPRM TELKOMNIKA, Vol. 11, No. 5, May 2013, pp. 2545 ~ 2552 e-issn: 2087-278X 2545 Soldiers Group Behaviors Simulation Based on Improved MARM Meng Li* 1, Jia-hong Liang 1, Shi-lei Li 2 1 College of Mechanical

More information

Broadcast on Clusters of SMPs with Optimal Concurrency

Broadcast on Clusters of SMPs with Optimal Concurrency Broadcast on Clusters of SMPs ith Optimal Concurrency Yuzhong Sun +, David Bader +, and X. Lin * + Department of Electrical and Computer Engineering University of Ne Mexico * Department of Electrical and

More information

Implementation of a Turbo Encoder and Turbo Decoder on DSP Processor-TMS320C6713

Implementation of a Turbo Encoder and Turbo Decoder on DSP Processor-TMS320C6713 International Journal of Engineering Research and Development e-issn : 2278-067X, p-issn : 2278-800X,.ijerd.com Volume 2, Issue 5 (July 2012), PP. 37-41 Implementation of a Turbo Encoder and Turbo Decoder

More information

Geodesic Ham-Sandwich Cuts

Geodesic Ham-Sandwich Cuts Geodesic Ham-Sandich Cuts Prosenjit Bose School of Computer Science Carleton Universit jit@cs.carleton.ca John Iacono Dep. of Comp. and Inf. Sci. Poltechnic Universit jiacono@pol.edu Erik D. Demaine MIT

More information

Novel Design of Three-Dimensional Crossbar for Future Network on Chip based on Post-Silicon Devices

Novel Design of Three-Dimensional Crossbar for Future Network on Chip based on Post-Silicon Devices ovel Design of Three-Dimensional for Future etwork on Chip based on Post-Silicon Devices Kumiko omura Keiko Abe, Shinobu Fujita Corporate R&D Center, Toshiba Corporation,, Komukai Toshiba-cho, Saiwai-ku,

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introdction (forarding and roting) Reie of qeeing theor Roting algorithms Link state, Distance Vector Roter design and operation IP: Internet Protocol IP4 (datagram format, addressing, ICMP,

More information

Formats. SAS Formats under OpenVMS. Writing Binary Data CHAPTER 13

Formats. SAS Formats under OpenVMS. Writing Binary Data CHAPTER 13 263 CHAPTER 13 Formats SAS Formats under OpenVMS 263 Writing Binary Data 263 SAS Formats under OpenVMS A SAS format is an instruction or template that the SAS System uses to rite data values. Most SAS

More information

L-Tangent Norm: A Low Computational Cost Criterion for Choosing Regularization Weights and its Use for Range Surface Reconstruction

L-Tangent Norm: A Low Computational Cost Criterion for Choosing Regularization Weights and its Use for Range Surface Reconstruction Proceedings of 3DPVT'8 - the Fourth International Smposium on 3D Data Processing, Visualiation and Transmission L-Tangent Norm: A Low Computational Cost Criterion for Choosing Regulariation Weights and

More information

Fast and Scalable Conflict Detection for Packet Classifiers

Fast and Scalable Conflict Detection for Packet Classifiers Fast and Scalable Conflict Detection for Packet Classifiers Florin Baboescu, George Varghese Dept. of Computer Science and Engineering University of California, San Diego 95 Gilman Drive La Jolla, CA9293-4

More information

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS e-issn 2455 1392 Volume 1 Issue 1, November 2015 pp. 1-7 http://www.ijcter.com ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS Komal Shah 1, Heena Sheth 2 1,2 M. S. University, Baroda Abstract--

More information

Boolean Function Simplification

Boolean Function Simplification Universit of Wisconsin - Madison ECE/Comp Sci 352 Digital Sstems Fundamentals Charles R. Kime Section Fall 200 Chapter 2 Combinational Logic Circuits Part 5 Charles Kime & Thomas Kaminski Boolean Function

More information

Informats. SAS Informats under OpenVMS. Reading Binary Data CHAPTER 15

Informats. SAS Informats under OpenVMS. Reading Binary Data CHAPTER 15 321 CHAPTER 15 Informats SAS Informats under OpenVMS 321 Reading Binary Data 321 SAS Informats under OpenVMS A SAS informat is an instruction or template that the SAS System uses to read data values into

More information

Continuous-field path planning with constrained path-dependent state variables

Continuous-field path planning with constrained path-dependent state variables Continuous-field path planning with constrained path-dependent state variables G. Aorkor Mills-Tette, Anthon Stentz and M. Bernardine Dias Abstract Planning autonomous long range traverses for planetar

More information

Series 430 Type 3430 Pneumatic Indicating Controllers. Equipment for Pressure Temperature Standard Signals

Series 430 Type 3430 Pneumatic Indicating Controllers. Equipment for Pressure Temperature Standard Signals Series 430 pe 3430 Pneumatic Indicating Controllers Equipment for Pressure emperature Standard Signals Associated Data Sheets 703 EN to 7045 EN Edition October 00 Information Sheet 7030 EN Series 430 Pneumatic

More information

An Analysis of Interference as a Source for Diffraction

An Analysis of Interference as a Source for Diffraction J. Electromagnetic Analysis & Applications, 00,, 60-606 doi:0.436/jemaa.00.0079 Published Online October 00 (http://.scirp.org/journal/jemaa) 60 An Analysis of Interference as a Source for Diffraction

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March-2015 1464 Performance Evaluation of AODV and DSDV Routing Protocols through Clustering in MANETS Prof. A Rama Rao, M

More information

Ashish Negi Associate Professor, Department of Computer Science & Engineering, GBPEC, Pauri, Garhwal, Uttarakhand, India

Ashish Negi Associate Professor, Department of Computer Science & Engineering, GBPEC, Pauri, Garhwal, Uttarakhand, India Volume 7, Issue 1, Januar 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparative Analsis

More information