Hong Yao, Han Zhang, Changkai Zhang and Deze Zeng. Jie Wu* and Huanyang Zheng

Size: px
Start display at page:

Download "Hong Yao, Han Zhang, Changkai Zhang and Deze Zeng. Jie Wu* and Huanyang Zheng"

Transcription

1 330 Int. J. Coputational Science and Engineering, Vol. 4, No. 4, 207 Data or index: a trade-off in obile delay tolerant network Hong Yao, Han Zhang, Changkai Zhang and Deze Zeng Hubei Key Laboratory of Intelligent Geo-Inforation Proceing, School of Coputer Science, China Univerity of Geocience, Wuhan, Hubei, , China Eail: yaohong@cug.edu.cn Eail: ylarohn@gail.co Eail: cug09evan@gail.co Eail: dazzae@gail.co Jie Wu* and Huanyang Zheng Departent of Coputer and Inforation Science, Teple Univerity, Philadelphia, PA 922, USA Eail: iewu@teple.edu Eail: huanyang.zheng@teple.edu *Correponding author Abtract: Acquiring content through obile network i a baic and general topic. Mobile node have two different way of obtaining data. The firt ethod i to download data quickly through 3G/4G network, which i expenive. The econd way i to get data fro other node by ean of delay tolerant network (DTN), which are uch cheaper, but are tie-conuing. Throwboxe deployed in DTN act a fixed ferry node. The index record the hitorical encounter inforation, in order to give the obile node predictive abilitie regarding future encounter event. We try to copare the effectivene when we replace oe pace for the data to index. We bring forward an index-baed buffer pace anageent echani for throwboxe, by which obile node can have the chance to fetch data at a lower total cot. Preliinary iulation deontrate that the buffer pace allocation trategy i affected by oe yte paraeter, and that replacing oe pace for data with an index can lower the yte total cot ignificantly in ot cae. Siulation reult alo how that the index-baed buffer pace anageent echani outperfor other echani which only tore data ite or hold an index of tatic ize. Keyword: obile network; delay tolerant network; DTN; throwbox; index. Reference to thi paper hould be ade a follow: Yao, H., Zhang, H., Zhang, C., Zeng, D., Wu, J. and Zheng, H. (207) Data or index: a trade-off in obile delay tolerant network, Int. J. Coputational Science and Engineering, Vol. 4, No. 4, pp Biographical note: Hong Yao received hi PhD in Coputer Architecture fro the Huazhong Univerity of Science and Technology, Wuhan, Hubei, China in 200. He i currently an Aociate Profeor with the School of Coputer Science, China Univerity of Geocience, Wuhan , China. He i alo with Hubei Key Laboratory of Intelligent Geo-Inforation Proceing, China Univerity of Geocience, Wuhan , China. Hi current reearch interet include coputer network and ditributed yte. Han Zhang received hi Mater degree in School of Coputer Science, China Univerity of Geocience, Wuhan , China in 205. Hi current reearch interet include coputer network and ditributed yte. Changkai Zhang i puring hi MS in School of Coputer Science at China Univerity of Geocience, Wuhan , China. Hi current reearch interet include coputer network, and ditributed yte. Copyright 207 Indercience Enterprie Ltd.

2 Data or index: a trade-off in obile delay tolerant network 33 Deze Zeng received hi PhD and MS in Coputer Science fro the Univerity of Aizu, Aizu-Wakaatu, Japan, in 203 and 2009, repectively. He received hi BS degree fro the School of Coputer Science and Technology, Huazhong Univerity of Science and Technology, China in He i currently an Aociate Profeor with the School of Coputer Science, China Univerity of Geocience, China. He i alo with Hubei Key Laboratory of Intelligent Geo-Inforation Proceing, China Univerity of Geocience, Wuhan , China. Hi current reearch interet include: cloud coputing, oftware-defined enor network, data centre networking, networking protocol deign and analyi. Jie Wu i the Chair and Laura H. Carnell Profeor in the Departent of Coputer and Inforation Science at Teple Univerity. Prior to oining Teple Univerity, he wa a Progra Director at the National Science Foundation and Ditinguihed Profeor at the Florida Atlantic Univerity. Hi current reearch interet include obile coputing and wirele network, routing protocol, cloud and green coputing, network trut and ecurity, and ocial network application. He regularly publihe in cholarly ournal, conference proceeding and book. Huanyang Zheng received hi BEng in Telecounication Engineering fro Beiing Univerity of Pot and Telecounication, Beiing, China, in 202. He i currently a PhD candidate in the Departent of Coputer and Inforation Science, Teple Univerity, Philadelphia, Pennylvania, USA. Hi current reearch focue on obile network, ocial network, and cloud yte. Introduction The rapid growth of all kind of obile device lead to a obile data exploion. According to Cico Viual Networking Index (Cico VNI) ( obile data traffic will increae ten-fold between 204 and 209. Mobile data traffic will grow at a CAGR of 57% between 204 and 209, reaching 24.3 exabyte per onth by 209. Mobile data offloading ee to be the ot proiing olution at thi oent. On the other hand, a lot of obile data flow are not delay-enitive, e.g., eaging, file tranfer, and data dieination. And, Lee et al. (203) indicate that delayed traniion can achieve ubtantial gain. In Meheti and Spyropoulo (204), the author further analye the proble and give oe expreion to chooe the optial deadline. In thi paper, we explore a new way to offload the obile data by uing DTN a a collaborative entirety. In Fall (2003), delay tolerant network (DTN) perfor the o-called tore-carry-forward paradig to deliver eage in an end-to-end fahion, ince the obile node ha a high node obility, a low cache capability, and a liited energy, haring data between node ay not be efficient enough. An alternative approach i to equip the DTN with dedicated fixed node, called throwboxe in Zhao et al. (2006), which are tationary wirele node with ignificantly iproved torage and energy capabilitie that iply act a fixed relay. Traditional offloading trategy and the deadline-driven echani ake obile node alway try to wait fetching data fro throwboxe until the deadline. For oe data requet which can hardly be fetched before deadline, obile node alo have to wait till the deadline. A lot of waiting tie i unneceary and wated. To addre thi iue, we bring index into throwboxe. Index i a table file recording the hitorical contact inforation between obile node and throwboxe. Throwboxe can ue thi knowledge to predict future contact event and give obile node prediction about whether they can fetch the data fro throwboxe. Many obility odel in Jereie et al. (2006), Spyropoulo et al. (2006) and Ibrahi et al. (2007) prove that the contact event between throwboxe and obile node i predictable. With the prediction, obile node can ake a wie choice to avoid the eaningle waiting. However, the added index file hare the liited buffer with the data. Soe data pace ut be acrificed for toring the index file. So, here coe the proble: i it worthy to add the index file into throwboxe although it ay reduce the hit rate of uer fetching data fro throwboxe? Our initial otivation i to find out the effect of replacing oe of the data pace with the index file. We define that the total cot of the data fetching i fored by the tie conuption and traniion cot. And how to balance data pace and index file pace, to achieve the iniied total cot, under different network condition, i the obective of thi work. The key contribution of thi paper are uaried a follow: We add an index file to the throwboxe, aking throwboxe able to not only tore data ite, but alo give obile node uggetion about how to fetch the requeted data in a in-cot way. We propoe a novel future event prediction algorith. Differing fro the traditional approach, we et the data contact event a the prediction target intead of the obile node contact event. We preent a index-baed buffer allocation echani to balance the data file pace and index file pace to achieve the iniie total cot. We conduct extenive iulation to evaluate the index-baed echani. The reult clearly how that the index-baed buffer allocation echani

3 332 H. Yao et al. ignificantly outperfor the traditional data-only echani. The reainder of thi paper i organied a follow. We introduce the yte odel in Section 2, and then we introduce the data encounter prediction approach in Section 3. The buffer pace allocation echani i preented in Section 4. Siulation reult which are preented in Section 5 prove our theory. Finally, we review the related work in Section 6 and conclude the paper in Section 7. 2 Syte odel In thi ection, we introduce the yte odel, including network odel, utility odel and delivery odel. 2. Network odel We conider a obile network with a node et N = N t N n, where N t and N n donate the et of throwboxe and obile node, repectively. All the obile node independently and randoly ove on a two-dienional plane. Throwboxe are ditributed on oe pot of the plane. We aue that all the throwboxe are fully connected. All the data tored in both obile node and throwboxe for a dataet M. Each data i with equal ize and can be copletely delivered within one encounter. Mobile node randoly requet data i M. The data i tored in throwboxe and obile node. Each throwbox ha a liited buffer. We conider all ditributed buffer for into an unifor one, becaue of they are fully connected. The ize of the big buffer i denoted a B and we define that b data and b index repreent the ize of buffer pace tored data and index file, repectively. Mobile node have two choice to fetch the requeted data: fetch the data through cellular network with traniion cot cc at any location 2 fetch the data fro throwboxe via Wi-Fi with traniion cot c d, when obile node are in a location near the throwbox, a hown in Figure. 2.2 Utility odel Baed on the baic network odel, we preent the utility odel a follow. Each ucceful data fetching contain a benefit, denoted by W(t). The benefit decreae linearly a tie t elape. The initial benefit of a data i denoted by W, while the initial benefit of different data are different. The ditribution for the initial benefit of different data follow the truncated noral ditribution, the ean value of which i denoted by W. The decreaed benefit value within each unit tie interval i defined a the benefit decay coefficient, denoted by ζ. Forally, the benefit atifie the following forula: Wt () = W tζ () The utility i defined a the benefit inu the traniion cot, denoted by U(t). Let c denote the total cot incurred by eage forwarding until tie t, then the utility atifie: Ut () = Wt () c (2) and (2) can be changed into: Ut () = W ( tζ + c) (3) We define the t d, which ake the utility equal zero, i the deadline of a data fetching. Aue that the total cot of a data fetching including the tie conuption and traniion cot i denoted a: a = tζ + c. Our obective i to axiie the utility. 2.3 Delivery odel A obile node generate different data requet, each requet with the deadline t d. Once a data requet i generated, according to the coparion of deadline and etiated encounter tie, obile node now need to decide whether to fetch the data in the cellular network. Depending on whether the throwbox tore the requeted data or not, there are two different ode for the obile node to get the data fro throwbox: Figure 2 Data contact tieline Figure The network odel 2.3. Direct ode If any throwbox hold the requeted data, the obile node will reply with the requeted data iediately Indirect ode Otherwie, the throwbox replie an etiation about how long it will take to get the requeted data fro DTN, and the

4 Data or index: a trade-off in obile delay tolerant network 333 probability. Then, the node can ake a deciion whether to fetch the data via cellular network right now. 3 Data contact prediction In thi ection, we introduce the data contact prediction algorith. The data contact prediction include two part: hitory record collecting and future contact prediction. Table Data ite Contact hitory record Contact tie t 2nd kth Data t t 2 t k Data 2 T 2 t 22 t 2k Data i t i t i2 t ik Data M t M t M2 t Mk 3. Hitory record collecting When a obile node carrying data ite i contact with a throwbox, we conider thi contact event a a data contact of ite i. Throwboxe will record the nae of the data and the current tie. Then, throwboxe ue thee record to build a data contact table. The data contact table i tored a an index file in the big buffer. Table give an exaple. Then, the tie pan in contact table can be ued a input to predict the tie of the next data contact. 3.2 Future contact prediction We introduce a novel algorith to predict future data contact: tie-window-baed predict algorith. Figure 2 how an exaple about one data ite contact tieline (a row in the data contact table), where the tie pot i denoted a t and t k repreent the tie pot of the k th data contact. The offline tie i denoted a T. Tie-window-baed prediction ue the forer k offline tie to predict the k th offline tie T k. J = {T, T 2,, T i,, T k } repreent the et of one data ite offline tie fro the firt data contact to the k th. We conider the axiu offline tie in et J i T Max, T Max > T i J and we take Δt T a the iniu decreae eta, where t = Max. Then we ue Δt to build an arithetic progreion K = {Δt, 2Δt,, iδt,, kδt}. Every ite in K i a candidate predicted offline tie. By coparing the candidate predicted offline tie with every hitorical offline tie, we can find a ot reliable value. (4) ue thee candidate of K a an input to calculate the reliability R(iΔt) of each candidate predicted offline tie: k 0 a = i t T Ri ( t) =, a =, i [, k] k i t > T k (4) where a i an indicator and equal to only when the candidate i larger than the offline tie T. Then, we copare R(iΔt) with a threhold R th, and take the iniu R(iΔt) of all R(iΔt) that larger than the threhold a R : { th} Rin = in R( i t) R( i t) > R, i [, k] (5) The threhold R th can be ued to control the preferred R(iΔt), we take the R th = 0.5 here. Under thi etting, the calculated iδt i cloe to the edian value of all the offline tie T i. We take the iδt whoe reliability i R in a the final predicted offline tie PT k : k { ( ) in} PT = i t R i t = R (6) In reality, the data encounter frequency can change dynaically becaue the obile node do not hold the data ite all the tie, the total copie of one data ite i not tatic. To quickly adapt to uch dynaic factor, we iprove the baic ethod by a tie-window technique. It principle i to egent the whole tieline into a erie of aller tie window and to place the highet ephai on the ot recent record while gradually decreaing the ephai on the preceding one. Suppoe the tieline wa divided into tie window, and the et of the data ite offline tie alo wa divided into all et: { T, T,..., Tk},{ Tk + Tk,..., T( + ) k },...,{ T( ) k, T( ) k, , T k }, and the accuracy calculated of the th tie window i expreed a: ( + ) k a k = 0 ( ) + i t T R i t =, a = k i t > T Now, (4) can be iproved and expreed a a weighted average of R (iδt) over tie window: Ri ( t) = ω R ( i t) + ω R ( i t) ω R ( i t) 2 2 = ω R ( i t) = where ω i the weight of the tie window. Different weight-election ethod (e.g., linearly or exponentially decreaing weight) would dicard the hitory data at different rate. Here, we iply give the th tie window the weight of: ω i= (7) (8) = (9) i Lot of prediction algorith accuracy rate grow extreely lowly after they have enough hitorical record, which ean there i a convergence tate. Through tet and analyi, we find that the convergence accuracy of the tie-window-baed prediction i 80% and the convergence ize of the index i 40 (ore detail will be hown in Section 5).

5 334 H. Yao et al. Figure 3 Table 2 Para. c c c d t r t t 2 t d Data fetching tieline Syte paraeter Explanation Traniion cot of cellular network Traniion cot of DTN The tie of uer generate a data requet The tie of uer eet a throwbox The tie of uer fetch a data fro throwbox 4 Buffer pace allocation The deadline of a data requet Becaue of the liited buffer ize, a large index file ean le pace to tore data ite. In order to achieve a better yte perforance, an efficient buffer pace allocation trategy i needed iinently to conider the trade-off. In thi ection, we propoe a buffer pace allocation echani to anage the buffer pace in throwboxe. 4. Data fetching proce Coplete proce of one ucce data fetching i hown in Figure 3. All the paraeter are lited in Table 2. Baed on the network and delivery odel, a coplete proce of data fetching could be any one of the following five ituation: Cae : If obile node could not encounter any throwbox before the deadline, which ean it ipoible to fetch the data via DTN. The bet choice i to download the data via cellular network iediately. So, the total cot in thi cae i A = t r ζ + c c. Cae 2: If obile node chooe not to fetch the data via cellular network at t r, then encounter a throwbox before the requet deadline at t. Once the throwbox buffer tore the requeted data, obile node can coplete thi traniion by downloading it fro the throwbox. So, the total cot in thi cae i A 2 = t ζ + c d. Cae 3: If obile node eet a throwbox at t but the throwbox doe not have the data. Then, throwbox will reply a tie prediction which i t 2, and let obile node to chooe waiting for throwboxe to fetch it, or fetching it via cellular network iediately. If obile node chooe not to wait, then the total cot of thi data fetching i A 3 = t ζ + c c. Cae 4: After eeting the throwbox for the firt tie, the obile node could wait and continue oving. At tie t 2, obile node fetche the data via DTN fro another throwbox in indirect ode uccefully. Then, the total cot i A 4 = t 2 ζ + c d. Cae 5: Siilar to cae 4, obile node chooe to wait to fetch the data in indirect ode. However, a wrong tie prediction ake it could not fetch the data via DTN before the deadline. Mobile node ha to fetch the data via cellular network at deadline t d with the total cot A 5 = t d ζ + c c. 4.2 Utility function optiiation By analying the data fetching progre, we preent the optial ize of the index file to achieve the axiu utility. Theore : Suppoe the ize of the index buffer pace i denoted a, the optial ize achieved the axiu utility can be found and can be changed under different network condition. To a requet of data i, the utility i the reaining benefit when the traniion i finihed. Thu, the yte total benefit of ucce data fetching for a certain tie can be preented a: ( ) (0) U = W a total = where repreent the th data fetching. Since obile node requet the data randoly, the acce probability of each data i M i equal. Due to the ditribution for the initial benefit of different data follow the truncated noral ditribution with a ean value W, the u of ucce data fetching initial benefit can be calculated a W = W. Then (4) can be changed into: = total U = W a () = So, our obective can be converted to iniiing the total cot = a. Baed on the five data fetching cae, the total cot of one ucce fetching proce a rando data i can be preented a: a = P0A+ ( P0) ( PA 2 + ( P) Ax ) (2) where P 0 i the probability that the data requet deadline coe before obile node encountering a throwbox, and P i the probability that requeted data i exiting in the buffer of throwboxe. If requeted data i not in the data buffer, then the cot A x can be preented a:

6 Data or index: a trade-off in obile delay tolerant network 335 A = PA + ( P) A (3) x 2 y 2 3 where P 2 i the probability that the requeted data i exiting in the index file of throwboxe, in other word, a predicted t i can be delivered. A y i the cot after the predicted t i i given and A y can be preented a: Ay = P3( P4A3 + ( P4) A4) + ( P3) A5 (4) where P 3 i the accuracy of the predicted offline tie and P 4 i the probability that predicted data contact delay i within the requet deadline. Siultaneouly conidering (4), (5) and (6), the average total cot of one ucceful data downloading can be preented a: a = P0A+ ( P0)( PA 2 + ( P) { P2{ P3( P4A3 + ( P4) A4) + ( P3) A5 + ( P2) A3}) (5) In order to calculate the tie cot and traniion cot ynthetically, we tranfor all the cot into the for of c d. Suppoe that: t = c, t = c, t = c, t = c cc = 0cd r d 2 d 2 3 d 4 4 d (6) where 0,, 4 are controllable paraeter, by changing the value of 0,, 4, the yte can odify the weight of tie and traniion cot in the total cot and adapt the delay-enitive or the traniion-cot-enitive environent. Then, we can get: A = 0cd A2 = ( 2 + ) cd A3 = ( 2 + 0) c A4 = ( 3 + ) cd A5 = ( 4 + 0) c d d (7) Siultaneou (7) and (9), we can change the proble into calculating the iniied coefficient of c d. The ize of data index eta i k (a we explained in Section 3) and uppoe the ize of the index buffer pace are denoted a. So, P and P 2 can be preented a: B * P =, P2 =, ( 0, ) (8) M Mk where * = in{b, Mk} and it enure that there i at leat one pace to tore the data ite. P 0, P 3 and P 4 are known contant. Suppoe that F() repreent the coefficient function of (9): ai F () = (9) c d Then after erging iilar ter, F() can be preented a: α β (20) 2 F () = + + γ where α, β, γ are fored by paraeter B, M, k, P 0, P 3, P 4, 0,, 2, 3, 4. The derivative of F() can be preented a: F () = 2α + β (2) So, when α 0, F() achieve the iniu if: = β 2α o we can know that the optial atifie: β β, 0 < < 2α 2α β = 0, 0 > 2α * β *, > 2α and when α < 0, F() achieve the axiu if: = β 2α o we can know that the optial atifie: β 0, > 2α 2 = β, 2α 2 * * * * (22) (23) (24) (25) With all the paraeter entioned above, the utility function can evaluate the yte total utility, and give the optial index file ize. 4.3 Buffer pace anageent algorith Bae on the theoretical analyi above, we develop the index-baed buffer pace anageent algorith, a hown in Algorith. The index-baed buffer pace anageent guarantee that throwboxe will chooe the bet way to allocate the buffer pace to ake ure the yte total cot i the iniu. Index-baed buffer pace anageent include four phrae: trategy-chooing phrae, fill-up phrae, adutent phrae and tatic phrae. Buffer pace anageent algorith: Input: Syte paraeter: M, B, k, P 0, P 3, P 4, 0,, 4 ; : With all the paraeter, calculate the uing (6); 2: According to different α, copare the and * to deterine the optial ; 3: for each data i contact event do 4: if optial = 0 then 5: if b data < B then 6: if data i b data then 7: fetch data i into the buffer; 8: end if

7 336 H. Yao et al. 9: ele 0: break; : end if 2: ele 3: if b data + < B then 4: record thi contact inforation into index file; 5: if i b data then 6: fetch data i into the buffer; 7: end if 8: ele 9: if < then 20: delete the data ite with the lowet initial benefit and record thi contact inforation; 2: ele 22: delete the oldet contact inforation and tore thi new one; 23: end if 24: end if 25: end if 26: end for 4.3. Strategy-chooing phrae At the very beginning of the yte operation, throwboxe ut deterine the torage trategy. Step and 2 calculate the uing (24) according to the correponding paraeter, then coparing the and * to chooe the optial which achieve the axiu yte benefit, and ue the optial to guide the later phrae Fill-up phrae Step 4 to 9 how that if the optial = 0, then throwboxe will tore the data ite into the buffer until it i full, intead of recording any contact inforation. After the buffer i full of data, the yte goe to the tatic phrae. If the optial = * or = β, then whenever a obile node holding 2 α oe data ite encounter a throwbox, throwbox will record the data contact inforation into index file, and fetch the data ite into the buffer if thee ite have no copie in the buffer (tep 0 4). Thi procedure will continue until the buffer i full, after that, yte goe to the next phrae Adutent phrae Once the buffer i full, yte uing tep 6 to 9 to delete one data ite and ue the epty pace to tore the upcoing data contact inforation. After a while, the epty pace will be ued up and another data ite will be deleted a before. Thi phrae will end a long a the index file reache the ize of optial and yte will go to the tatic phrae Static phrae In thi phrae, the proportion of data buffer and the index file will not change anyore. The replaceent trategy of new data contact record and new data ite are ae a the trategy in adutent phrae. 5 Evaluation and dicuion In thi ection, we preent our iulation to evaluate the perforance of buffer pace allocation algorith under variou etting. The evaluation ethod, etting, and reult are preented a follow. 5. Siulation etting and etric We ue two type of trace to conduct our iulation. The firt trace i generated by the ONE iulator in Keranen et al. (2009). We deploy 00 obile node in a all area of a real city: Helinki, Finland. Mobile node perfor hortet path ap-baed oveent pattern on the road. The econd trace i a large-cale dataet of real GPS trace fro around 320 taxie operational in the urban area in Roe, Italy. In the iulation, the virtual throwboxe are deployed in the treet in every two kiloetre. Each obile node ha a buffer to tore five data ite, and generate a requet of a rando data ite fro the et M. At the initiate tage of the yte, obile node tore five data ite randoly elected fro the et M and throwboxe have a hort tie to war up recogniing the baic inforation of the whole network. We run the iulation under two different nuber of data, M = 300, 400. Then we take P 4, B and k a our ain obect of obervation. Deadline i deterined by the initial benefit, the initial benefit W follow the truncated noral ditribution with the ean value W = 20,000. In order to iplify the iulation, we et different requet deadline to repreent the initial benefit. We et the default index eta ize a 0.05 while the ize of a data ite i et a. We cobine all throwboxe buffer a one big buffer ized fro B = 55 to B = 00 becaue of the full connection. In order to evaluate the effect of the index-baed buffer pace anageent algorith, we alo ipleent a traditional buffer anageent echani called data-only buffer pace anageent, where throwboxe ue all torage pace to tore the data ite. Table 3 Evaluation etting Paraeter nae Default Range Nuber of obile node N n Nuber of data M Deadline 20,000 5,000 45,000 Throwboxe buffer ize B Index eta ize k

8 Data or index: a trade-off in obile delay tolerant network Reult and dicuion Firtly, to evaluate the accuracy of the tie-window-baed prediction, we run oe tet and reult are hown a Figure 4. We record every encounter tie of a rando data ite i and repeat the iulation with different nuber of contact record for 00 tie each. Figure 4 how that the prediction accuracy i increaing a the hitorical record grow up until the index record about 40 tie contact inforation. Then, the prediction accuracy tay around the 80%. So, in the following iulation, throwboxe index only record 40 latet contact inforation. Figure 5 Syte average offloading ratio under generated trace, (a) offloading ratio v. ize of throwbox buffer (b) offloading ratio v. deadline (c) offloading ratio v. ize of index eta (ee online verion for colour) Figure 4 Prediction accuracy under different nuber of hitorical record (ee online verion for colour) (a) 5.2. Effect of the throwbox buffer ize Figure 5(a) and Figure 7(a) how the offloading ratio under different throwbox buffer ize. We can ee that when the ize of the throwbox buffer increae, the offloading ratio of two algorith will increae and the offloading ratio of index-baed algorith i alway higher than the data-only algorith. And we alo notice that the yte perforance i different under different nuber of data ite M = 300 and M = 400. More data ite ean ore diverity data requet, which will reduce the requet hit rate in the throwbox buffer. Figure 6(a) and Figure 8(a) give the average delay of all the data fetching. A we had expected, the average data fetching delay of index-baed algorith i uch lower than the data-only algorith. Thi i due to the future contact prediction algorith. (b) (c)

9 338 H. Yao et al. Figure 6 Syte average delay under generated trace, (a) delay v. ize of throwbox buffer (b) delay v. deadline (c) delay v. ize of ize of index eta (ee online verion for colour) Figure 7 Syte average offloading ratio under real trace, (a) offloading ratio v. ize of throwbox buffer (b) offloadingratio v. deadline (c) offloading ratio v. ize of index eta (ee online verion for colour) (a) (a) (b) (b) (c) (c)

10 Data or index: a trade-off in obile delay tolerant network 339 Figure 8 Syte average delay under real trace, (a) delay v. ize of throwbox buffer (b) delay v. deadline (c) delay v. ize of ize of index eta (ee online verion for colour) (a) rate of the data-only algorith i very low and increaing rate of the index-baed algorith i uch higher at the beginning and gradually low down. To the data-only algorith, due to lack of network global inforation, data ite in throwboxe buffer do not change ince the buffer i full. It can increae the hit rate in throwboxe buffer but the efficiency i quite low. When the deadline i long enough for ot data requet can be fetched fro other obile node, the increaing rate reduce. The initial benefit influence to average delay i repreented in Figure 6(b) and Figure 8(b). A we can ee, when the deadline i hort, the gap between the two algorith i quite narrow. But a the deadline increaed, the gap i wider and wider. The reaon i that when the deadline i hort, obile node can hardly have chance to eet the throwboxe ore than once, o the index-baed algorith can barely help obile node to fetch data. But when the deadline enlarge, the advantage of index-baed algorith how up and lot of requet were offloaded before the deadline coing. However, a longer deadline cannot give the data-only algorith the ae benefit, o the gap becoe wider. (b) Effect of the index eta ize Figure 5(c) and Figure 7(c) how that a the ize of the index eta becoe larger, the offloading ratio i reducing. Thi i becaue when the ize of index eta i all (e.g., k = 0.0), replacing a data ite can tore 00 ore data index into the buffer and the pace of three data ite can tore all the data index if the nuber of data i 300, thi kind of replacing i very efficient. When the ize of index eta i increaing, replacing data ite with index i till ueful but not that ignificantly. The average delay howed in Figure 6(c) and Figure 8(c) alo give the ae reult. A aller index eta ize give throwboxe ore pace to tore data ite and it can bring a horter delay. (c) Effect of the deadline Figure 5(b) and Figure 7(b) how the offloading ratio under different initial benefit. Initial benefit deterined the deadline of each data requet, o we chooe to change the deadline to oberve the yte perforance. The increaing 6 Related work Throwboxe-baed DTN are firt propoed in Zhao et al. (2006). In the later work in Ibrahi et al. (2007, 2009), iulation reult and real deployent have deontrated that iporting a nuber of throwboxe into the DTN can indeed iprove the routing perforance and overall throughput. Beide, oe other tudie focuing on analytical odel for delay ditribution in Gu et al. (200) and deigning/evaluating routing trategie in Gu et al. (200) for throwbox-baed DTN are alo preented. Meanwhile, Baneree et al. (200) conider the proble about energy efficiency of each throwbox node for throwbox-baed DTN. The ain difference between our work and previou work i that we ipleent a contact prediction echani on throwboxe, by acrificing oe data torage, and treat throwboxe a both data buffer and forecat equipent. To the bet of our knowledge, thi i the firt work that ake throwboxe becoe ultifunctional.

11 340 H. Yao et al. In exiting prediction-baed chee, obile node obility and contact i etiated baed on a hitory of obervation. A repreentative cae i uing utility-routing in Lindgren et al. (2003) and Zhang et al. (2007), where obile node conider the utility value a the predictor of two node future likelihood of encounter. Deng and Chang (204) propoe a ulticat routing chee baed on ocial difference (SDMR), which conider the ocial difference between node, including both the iilarity and the centrality difference. LeBrun et al. (2005) propoe a routing algorith for VANET that ue the current poition and traectorie of node to predict their future poition and calculate the ditance to the detination. Yeh et al. (204) reveal a yte perforance prediction and analyi ethod for ulti-core yte by adopting electronic yte-level (ESL) deign ethodology. In Burn et al. (2005), they propoe a prediction chee that ue pat frequencie of contact, a well a the pat contact. Another prediction-baed generic algorith for DTN routing i MobySpace in Leguay et al. (2006), which ue a highdienional Euclidean pace contructed upon node obility pattern. The aor difference between our approach and previou work i we take the data a our target of prediction. 7 Concluion In thi paper, we introduce a novel throwbox deign by adding an index file into the buffer, which odifie the throwbox fro a pure data buffer into a data tranfer helper with future prediction. Aiing at the trade-off between data and index, we propoe a utility function to evaluate the yte perforance under different cobination of variable. Theoretical analyi how that replacing oe data ite with an index file in the buffer can reduce the total cot effectively in ot cae. Siulation reult alo prove that the index-baed prediction play an iportant role in reducing the traniion cot of data fetching. Beide, iulation further how that the index-baed buffer pace allocation echani outperfor the iple index-added echani. Our future work will ainly focu on two apect. The firt i to extend current yte odel to enable data traniion aong obile node. Secondly, we will bring in real-world trace into iulation to evaluate the yte perforance. Acknowledgeent Thi reearch wa upported by the NSF of China (Grant No , , , ), the China Potdoctoral Science Foundation funded proect (Grant No. 204M562086), the Fundaental Reearch Fund for National Univerity, China Univerity of Geocience, Wuhan (Grant No. CUG4065, CUGL50829), the Provincial Natural Science Foundation of Hubei (Grant No. 205CFA065). Reference Baneree, N., Corner, M.D. and Levine, B.N. (200) Deign and field experientation of an energy-efficient architecture for DTN throwboxe, IEEE/ACM Tranaction on Networking, Vol. 8, No. 2, pp Burn, B., Brock, O. and Levine, B.N. (2005) MV routing and capacity building in diruption tolerant network, in IEEE INFOCOM. Cico Viual Networking Index (Cico VNI) Forecat and Methodology, White Paper [online] Deng, X. and Chang, L. (204) A tie-conidered ulticat routing chee baed on ocial difference in delay-tolerant network, in International Journal of Ebedded Syte, Vol. 6, No., pp Fall, K. (2003) A delay tolerant network architecture for challenged internet, in ACM SIGCOMM. Gu, B., Hong, X., Wang, P. and Borie, R. (200) Latency analyi for thrown box baed eage dieination, in IEEE Globeco. Ibrahi, M., Al Hanbaliand, A. and Nain, P. (2007) Delay and reource analyi in MANET in preence of throwboxe, Perforance Evaluation, Vol. 64, No. 9 2, pp Ibrahi, M., Nain, P. and Carrera, I. (2009) Analyi of relay protocol for throwbox-equipped DTN, in WiOPT. Jereie, L., Tiur, F. and Vania, C. (2006) Evaluating obility pattern pace routing for DTN, in IEEE INFOCOM. Keranen, A., Ott, J. and Karkkainen, T. (2009) The ONE iulator for DTN protocol evaluation, in Siutool. LeBrun, J., Chuah, C. and Ghoal, D. (2005) Knowledge baed opportunitic forwarding in vehicular wirele ad hoc network, IEEE VTC, Vol. 4, pp Lee, K., Lee, J., Yi, Y., Rhee, I. and Chong, S. (203) Mobile data offloading: how uch can WiFi deliver?, IEEE/ACM Tranaction on Networking, Vol. 2, No. 2, pp Leguay, J., Friedan, T. and Conan, V. (2006) Evaluating obility pattern pace routing, in IEEE INFOCOM. Lindgren, A., Doria, A. and Schelen, O. (2003) Probabilitic routing in interittently connected network, ACM SIGMOBILE Mobile Coputing and Counication Review, Vol. 7, No. 3, pp Meheti, F. and Spyropoulo, T. (204) I it worth to be patient? Analyi and optiization of delayed obile data offloading, in IEEE INFOCOM. Spyropoulo, T., Pouni, K. and Raghavendra, C.S. (2006) Perforance analyi of obility-aited routing, in ACM MobiHoc. Yeh, J.C., Lin, C.H. and Liu, C.N. (204) Multi-core yte perforance prediction and analyi at the ESL, in International Journal of Coputational Science and Engineering, Vol. 9, No. 2, pp Zhang, X., Neglia, G., Kuroe, J. and Towley, D. (2007) Perforance odeling of epideic routing, Coputer Network, Vol. 5, No. 0, pp Zhao, W., Chen, Y., Aar, M., Coer, M.D., Levine, B.N. and Zegura, E. (2006) Capacity enhanceent uing throwboxe in DTN, in IEEE MASS.

U(t) = W (t) c (2) and (2) can be changed into:

U(t) = W (t) c (2) and (2) can be changed into: Data or Index: A Trade-Off in Mobile Delay Tolerant Networks Hong Yao, Han Zhang, Jie Wu, Huanyang Zheng, Changkai Zhang, Deze Zeng School of Computer Science, China University of Geoscience, Wuhan, China

More information

PERFORMANCE MEASUREMENT OF OEE USING DATA ENVELOPMENT ANALYSIS (DEA) Muhamad Arifpin Mansor 1 and Ario Ohsato 2

PERFORMANCE MEASUREMENT OF OEE USING DATA ENVELOPMENT ANALYSIS (DEA) Muhamad Arifpin Mansor 1 and Ario Ohsato 2 National Conference in Mechanical Engineering Reearch and Potgraduate Student (1 t NCMER 2010) 26-27 MAY 2010, FKM Conference Hall, UMP, Kuantan, Pahang, Malayia; pp. 65-71 ISBN: 978-967-5080-9501 (CD

More information

Position Control of Manipulator s Links Using Artificial Neural Network with Backpropagation Training Algorithm

Position Control of Manipulator s Links Using Artificial Neural Network with Backpropagation Training Algorithm Poition Control of Manipulator Link Uing Artificial Neural Network with Backpropagation Training Algorith Thiang, Handry Khowanto, Tan Hendra Sutanto Electrical Engineering Departent, Petra Chritian Univerity

More information

Geometry Inspired Algorithms for Linear Programming

Geometry Inspired Algorithms for Linear Programming Geoetry Inpired Algorith or Linear Prograing Dhananjay P. Mehendale Sir Parahurabhau College, Tilak Road, Pune-4030, India Abtract In thi paper we dicu oe novel algorith or linear prograing inpired by

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

Performance analysis of hybrid (M/M/1 and M/M/m) client server model using Queuing theory

Performance analysis of hybrid (M/M/1 and M/M/m) client server model using Queuing theory International Journal of Electronic and Couter cience Engineering vailable Online at wwwijeceorg IN- 77-9 erforance analyi of hybrid M/M/ and M/M/ client erver odel uing ueuing theory atarhi Guta, Dr Rajan

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan

More information

DENSE CORRESPONDING PIXEL MATCHING USING A FIXED WINDOW WITH RGB INDEPENDENT INFORMATION

DENSE CORRESPONDING PIXEL MATCHING USING A FIXED WINDOW WITH RGB INDEPENDENT INFORMATION ISRS Annal of the hotograetry, Reote Sening and Spatial Inforation Science Volue I-4, 202 XXII ISRS Congre 25 Augut 0 Septeber 202, Melbourne, Autralia DENSE CORRESONDING IXEL MATCHING USING A FIXED WINDOW

More information

UC Berkeley International Conference on GIScience Short Paper Proceedings

UC Berkeley International Conference on GIScience Short Paper Proceedings UC Berkeley International Conference on GIScience Short Paper Proceeding Title A novel method for probabilitic coverage etimation of enor network baed on 3D vector repreentation in complex urban environment

More information

Contents. Cameron Ellum and Prof. Naser El- Sheimy 19 April 2005 mobile multi-sensor systems research group

Contents. Cameron Ellum and Prof. Naser El- Sheimy 19 April 2005 mobile multi-sensor systems research group The Coon Adjutent of GPS and Photograetric Caeron Ellu and Prof. Naer El- Sheiy 19 April 2005 obile ulti-enor yte reearch group Content Background Reearch objective Ipleentation Teting Concluion Outlook

More information

Anisotropy Estimation and Image Remapping Using Model Based Moveout

Anisotropy Estimation and Image Remapping Using Model Based Moveout Aniotropy Etiation and Iae Reappin Uin Model Baed Moveout Z. Liu* (PGS), N.D. Whitore (PGS) & C. Zhou (PGS) SUMMARY Typically odel paraeter etiation i achieved throuh ultiple iteration of linearized tooraphy

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

Cisco VM-FEX Best Practices for VMware ESX Environment

Cisco VM-FEX Best Practices for VMware ESX Environment Deployent Guide Cico VM-FEX Bet Practice for VMware ESX Environent Deployent Guide Deceber 211 Content 1 Executive Suary... 3 1.1 Target Audience... 3 1.2 Introduction... 3 2 Cico CS VM-FEX Bet Practice...

More information

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

Hybrid MPI-OpenMP Parallelization Of Image Reconstruction

Hybrid MPI-OpenMP Parallelization Of Image Reconstruction JOURNAL OF SOFTWARE, VOL. 8, NO. 3, MARCH 03 687 Hybrid MPI-OpenMP Parallelization Of Iage Recontruction Jinliang Wan College of Coputer and Inforation Engineering, Henan Univerity of Econoic and Law Zhengzhou,

More information

How to Select Measurement Points in Access Point Localization

How to Select Measurement Points in Access Point Localization Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent

More information

Automatic Pavement Crack Detection by Multi-Scale Image Fusion

Automatic Pavement Crack Detection by Multi-Scale Image Fusion Autoatic Paveent Crack Detection by Multi-Scale Iage Fuion Haifeng Li, Dezhen Song, Yu Liu, and Binbin Li Abtract Paveent crack detection fro iage i a challenging proble due to intenity inhoogeneity, topology

More information

Lip Segmentation with the Presence of Beards

Lip Segmentation with the Presence of Beards Lip Segentation with the Preence of Beard Author ang, S., Lau, W., Leung, S., Liew, A. Publihed 004 Conference Title Proceeding of the IEEE International Conference on Acoutic, Speech, and Signal Proceing,

More information

A MODULAR COMPOSABLE SOFTWARE ARCHITECTURE FOR THE SIMULATION OF MECHATRONIC SYSTEMS

A MODULAR COMPOSABLE SOFTWARE ARCHITECTURE FOR THE SIMULATION OF MECHATRONIC SYSTEMS Proceeding of DETC 98 1998 ASME 18th Coputer in Engineering Conference Septeber 13-16, 1998, Atlanta, Georgia, USA DETC98/CIE-5704 A MODULAR COMPOSABLE SOFTWARE ARCHITECTURE FOR THE SIMULATION OF MECHATRONIC

More information

Efficient Data Forwarding in Mobile Social Networks with Diverse Connectivity Characteristics

Efficient Data Forwarding in Mobile Social Networks with Diverse Connectivity Characteristics Efficient Data Forwarding in Mobile Social Network with Divere Connectivity Characteritic Xiaomei Zhang and Guohong Cao Department of Computer Science and Engineering The Pennylvania State Univerity, Univerity

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

A Multi-objective Genetic Algorithm for Reliability Optimization Problem

A Multi-objective Genetic Algorithm for Reliability Optimization Problem International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR

More information

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in

More information

Dynamical Topology Analysis of VANET Based on Complex Networks Theory

Dynamical Topology Analysis of VANET Based on Complex Networks Theory BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 14, Special Issue Sofia 014 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.478/cait-014-0053 Dynaical Topology Analysis

More information

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

An NoC Traffic Compiler for efficient FPGA implementation of Parallel Graph Applications

An NoC Traffic Compiler for efficient FPGA implementation of Parallel Graph Applications An NoC Traffic Copiler for efficient FPGA ipleentation of Parallel Graph Application Nachiket Kapre California Intitute of Technology, Paadena, CA 9115 nachiket@caltech.edu André DeHon Univerity of Pennylvania

More information

Modeling and Analysis of Slow CW Decrease for IEEE WLAN

Modeling and Analysis of Slow CW Decrease for IEEE WLAN Modeling and Analyi of Slow CW Decreae for IEEE 82. WLAN Qiang Ni, Imad Aad 2, Chadi Barakat, and Thierry Turletti Planete Group 2 Planete Group INRIA Sophia Antipoli INRIA Rhône-Alpe Sophia Antipoli,

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

PERFORMANCE OPTIMIZATIONS FOR PATCHMATCH-BASED PIXEL- LEVEL MULTIVIEW INPAINTING

PERFORMANCE OPTIMIZATIONS FOR PATCHMATCH-BASED PIXEL- LEVEL MULTIVIEW INPAINTING PERFORMANCE OPTIMIZATIONS FOR PATCHMATCH-BASED PIXEL- LEVEL MULTIVIEW INPAINTING Shao-Ping Lu, Beerend Ceulean, Adrian Munteanu, Peter Schelken Departent of Electronic and Inforatic, Vrije Univeriteit

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl. Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable

More information

Laboratory Exercise 1

Laboratory Exercise 1 Laboratory Eercie Switche, Light, and Multipleer The purpoe of thi eercie i to learn how to connect iple input and output device to an FPGA chip and ipleent a circuit that ue thee device. We will ue the

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

A Novel Feature Line Segment Approach for Pattern Classification

A Novel Feature Line Segment Approach for Pattern Classification 12th International Conference on Information Fuion Seattle, WA, USA, July 6-9, 2009 A Novel Feature Line Segment Approach for Pattern Claification Yi Yang Intitute of Integrated Automation Xi an Jiaotong

More information

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem Theoretical Analysis of Local Search and Siple Evolutionary Algoriths for the Generalized Travelling Salesperson Proble Mojgan Pourhassan ojgan.pourhassan@adelaide.edu.au Optiisation and Logistics, The

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

LJPS Gurgaon. Class XII- Physics - Assignment Topic: - Ray Optics

LJPS Gurgaon. Class XII- Physics - Assignment Topic: - Ray Optics LJPS Gurgaon 1. The refractive index of the ediu i 3. What i the angle of refraction, if the unpolaried light i incident on it at the polarizing angle of the ediu? [An : 30 degree] Cla XII- Phyic - Aignent

More information

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se

More information

Using the Spanning Tree of a Criminal Network for Identifying its Leaders

Using the Spanning Tree of a Criminal Network for Identifying its Leaders Uing the Spanning Tree of a Criinal etwork for Identifying it Leader Kaal Taha, Senior Meber, IEEE and Paul D. Yoo, Senior Meber, IEEE Abtract We introduce a forenic analyi yte called that identifie the

More information

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13 Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical

More information

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de

More information

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong 4th International Conference on Machinery, Material and Computing Technology (ICMMCT 2016) A Load Balancing Model baed on Load-aware for Ditributed Controller Fengjun Shang, Wenjuan Gong College of Compute

More information

A Practical Model for Minimizing Waiting Time in a Transit Network

A Practical Model for Minimizing Waiting Time in a Transit Network A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,

More information

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Iue 4, April 2015 International Journal Advance Reearch in Computer Science and Management Studie Reearch Article / Survey Paper / Cae Study Available online at: www.ijarcm.com

More information

Integrating fast mobility in the OLSR routing protocol

Integrating fast mobility in the OLSR routing protocol Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit

More information

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance A Hybrid Deployable Dynamic Traffic Aignment Framework for Robut Online Route Guidance Sriniva Peeta School of Civil Engineering, Purdue Univerity Chao Zhou Sabre, Inc. Sriniva Peeta School of Civil Engineering

More information

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity

More information

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds * Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm

More information

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem

More information

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh

More information

Frequency Table Computation on Dataflow Architecture

Frequency Table Computation on Dataflow Architecture Frequency Table Computation on Dataflow Architecture P. Škoda *, V. Sruk **, and B. Medved Rogina * * Ruđer Bošković Intitute, Zagreb, Croatia ** Faculty of Electrical Engineering and Computing, Univerity

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial

More information

Keywords: Defect detection, linear phased array transducer, parameter optimization, phased array ultrasonic B-mode imaging testing.

Keywords: Defect detection, linear phased array transducer, parameter optimization, phased array ultrasonic B-mode imaging testing. Send Order for Reprint to reprint@benthamcience.ae 488 The Open Automation and Control Sytem Journal, 2014, 6, 488-492 Open Acce Parameter Optimization of Linear Phaed Array Tranducer for Defect Detection

More information

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.5, Septeber 205 AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM Xie Yang and Cheng Wushan College of Mechanical Engineering,

More information

A Novel Grey-RSS Navigation System Design for Mobile Robots

A Novel Grey-RSS Navigation System Design for Mobile Robots A vel Grey-RSS Navigation Sytem Deign for Mobile Robot Albert Wen-Long Yao*,, Hin-Te Liao, and Shiou-De Chen Department of Mechanical and Automation Engineering, National Kaohiung Firt Univerity of Science

More information

Distribution-based Microdata Anonymization

Distribution-based Microdata Anonymization Ditribution-baed Microdata Anonymization Nick Kouda niverity of Toronto kouda@c.toronto.edu Ting Yu North Carolina State niverity yu@cc.ncu.edu Diveh Srivatava AT&T Lab Reearch diveh@reearch.att.com Qing

More information

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt

More information

Research Article Longest Path Reroute to Optimize the Optical Multicast Routing in Sparse Splitting WDM Networks

Research Article Longest Path Reroute to Optimize the Optical Multicast Routing in Sparse Splitting WDM Networks International Optic Volume 0, Article ID 9, page http://dxdoiorg/0/0/9 Reearch Article Longet Path Reroute to Optimize the Optical Multicat Routing in Spare Splitting WDM Network Huanlin Liu, Hongyue Dai,

More information

Improve Peer Cooperation using Social Networks

Improve Peer Cooperation using Social Networks Iprove Peer Cooperation using Social Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Noveber 5, 2007 Corresponding

More information

The Data Locality of Work Stealing

The Data Locality of Work Stealing The Data Locality of Work Stealing Umut A. Acar School of Computer Science Carnegie Mellon Univerity umut@c.cmu.edu Guy E. Blelloch School of Computer Science Carnegie Mellon Univerity guyb@c.cmu.edu Robert

More information

Drawing Lines in 2 Dimensions

Drawing Lines in 2 Dimensions Drawing Line in 2 Dimenion Drawing a traight line (or an arc) between two end point when one i limited to dicrete pixel require a bit of thought. Conider the following line uperimpoed on a 2 dimenional

More information

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract

More information

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT

More information

Image authentication and tamper detection using fragile watermarking in spatial domain

Image authentication and tamper detection using fragile watermarking in spatial domain International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: 2278 1323 Image authentication and tamper detection uing fragile watermarking

More information

Multipath Selection and Channel Assignment in Wireless Mesh Networks

Multipath Selection and Channel Assignment in Wireless Mesh Networks Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,

More information

Service and Network Management Interworking in Future Wireless Systems

Service and Network Management Interworking in Future Wireless Systems Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering

More information

Minimum Energy Reliable Paths Using Unreliable Wireless Links

Minimum Energy Reliable Paths Using Unreliable Wireless Links Minimum Energy Reliable Path Uing Unreliable Wirele Link Qunfeng Dong Department of Computer Science Univerity of Wiconin-Madion Madion, Wiconin 53706 qunfeng@c.wic.edu Micah Adler Department of Computer

More information

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online

More information

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term

More information

Knowledge Discovery Applied to Agriculture Economy Planning

Knowledge Discovery Applied to Agriculture Economy Planning Knowledge Discovery Applied to Agriculture Econoy Planning Bing-ru Yang and Shao-un Huang Inforation Engineering School University of Science and Technology, Beiing, China, 100083 Eail: bingru.yang@b.col.co.cn

More information

Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity

Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity Modelling the impact of cyber attack on the traffic control centre of an urban automobile tranport ytem by mean of enhanced cyberecurity Yoana Ivanova 1,* 1 Bulgarian Academy of Science, Intitute of ICT,

More information

3D SMAP Algorithm. April 11, 2012

3D SMAP Algorithm. April 11, 2012 3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

Power Aware Location Aided Routing in Mobile Ad-hoc Networks

Power Aware Location Aided Routing in Mobile Ad-hoc Networks International Journal of Scientific and Reearch Publication, Volume, Iue 1, December 01 1 Power Aware Location Aided Routing in Mobile Ad-hoc Network Anamika Computer Science, Inderprataha Engineering

More information

( ) subject to m. e (2) L are 2L+1. = s SEG SEG Las Vegas 2012 Annual Meeting Page 1

( ) subject to m. e (2) L are 2L+1. = s SEG SEG Las Vegas 2012 Annual Meeting Page 1 A new imultaneou ource eparation algorithm uing frequency-divere filtering Ying Ji*, Ed Kragh, and Phil Chritie, Schlumberger Cambridge Reearch Summary We decribe a new imultaneou ource eparation algorithm

More information

A Local Mobility Agent Selection Algorithm for Mobile Networks

A Local Mobility Agent Selection Algorithm for Mobile Networks A Local Mobility Agent Selection Algorithm for Mobile Network Yi Xu Henry C. J. Lee Vrizlynn L. L. Thing Intitute for Infocomm Reearch, 21 Heng Mui Keng Terrace, Singapore 119613 Email: {yxu, hlee, vriz}@i2r.a-tar.edu.g

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information

Database Design on Mechanical Equipment Operation Management System Zheng Qiu1, Wu kaiyuan1, Wu Chengyan1, Liu Lei2

Database Design on Mechanical Equipment Operation Management System Zheng Qiu1, Wu kaiyuan1, Wu Chengyan1, Liu Lei2 2nd International Conference on Advances in Mechanical Engineering and Industrial Inforatics (AMEII 206) Database Design on Mechanical Equipent Manageent Syste Zheng Qiu, Wu kaiyuan, Wu Chengyan, Liu Lei2

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput Modeling the Effect of Mobile Handoff on TCP and TFRC Throughput Antonio Argyriou and Vijay Madietti School of Electrical and Computer Engineering Georgia Intitute of Technology Atlanta, Georgia 3332 25,

More information