Millimeter-Wave Multi-Hop Wireless Backhauling for 5G Cellular Networks

Size: px
Start display at page:

Download "Millimeter-Wave Multi-Hop Wireless Backhauling for 5G Cellular Networks"

Transcription

1 2017 IEEE 85th Vehiclar Technology Conference (VTC-Spring) Millimeter-Wave Mlti-Hop Wireless Backhaling for 5G Celllar Networks B. P. S. Sahoo, Chn-Han Yao, and Hng-Y Wei Gradate Institte of Electrical Engineering, National Taiwan University, Taiwan Abstract The millimeter-wave (mmwave) bands, roghly referred to GHz, have been widely recognized as a promising candidate for dense deployment of small-cells backhal network. The dense small-cell deployment prodces a hge amont of backhal traffic, and directional commnication poses a significant challenge. In this paper, we propose a dynamic frame reconfigration scheme which provides greater flexibility for dynamic traffic adaptation in mlti-hop mmwave relay backhal. This allows better exploitation of the traffic dynamics in smallcell. In addition, we present a traffic load and link-qality aware mlti-hop relay backhal schedling algorithm to maximize the overall system performance. The extensive simlation reslts demonstrate the speriority of or proposed algorithm when compared with other schemes. I. INTRODUCTION Globally, the demand for higher data-rate is continally increasing. This, in trn, has led to a significant increase in capacity reqirements for the backhal network. In traditional wireless system, the mlti-hop aided transmission has been considered as an effective way to increase the coverage, throghpt and transmission reliability of networks [1][2]. Ths, the mlti-hop relaying is likely to play a significant role in mmwave celllar systems for self backhaling. The designing of schedling policies for these systems is challenging de both adaptive directional transmissions and dynamic timedivision dplexing schedles, which are key enabling featres of mmwave systems [2]. For designing schedling policies, there are two aspects of challenges in the backhal network of relay aided mmwave systems. In the first aspect, providing greater flexibility in dynamic adaptation for beam-specific transmit/receive selection to cater the hge backhal traffic. In the second, the inter-bs schedling mechanism shold serve the maximm backhal traffic demand and provide higher throghpt. The schedling mechanism shold be able to ensre fair transmission opportnity for each BS with non-niform traffic load in the relay system which is a challenging task. In this paper, we investigate the mlti-hop relaying transmission challenges for mmwave systems. We discss three soltions based on the point-to-point (P2P) link-qality and traffic-load at each BS that optimizes the overall network performance. Firstly, we present Load-iBS, a traffic-load based inter-bs schedling mechanism. This approach ses the trafficload metrics to maximize the performance withot acqiring link-state information. Secondly, we present Link-iBS, a linkqality based inter-bs schedling mechanism. This approach ses the link-qality metric to determine the schedling decision to maximize the performance. Finally, we present throghpt-optimal inter-bs, TO-iBS, a combined version of both Load-iBS and Link-iBS mechanism. This approach ses both the traffic-load and link-qality metrics, and sbseqently reallocate the power proportional to the transmission reqirements to determine the schedling decision. Henceforth, the main contribtion are smmarized as follows: We propose a frame reconfigration scheme which provides greater flexibility in dynamic traffic adaptation. We formlate the inter-bs schedling problem into a nonlinear integer programming, i.e. to maximize the nmber of flows to meet the traffic demand. We present a novel heristic schedling algorithm with adaptive power allocation method for mlti-hop relaying by extensively considering the traffic load at each BS. The proposed inter-bs schedling mechanism showcase sperior performance compared with other schemes. Related Work: There are ample of existing MAC protocols recently proposed for mmwave system [3][5][8] that are based on TDMA inclding several schedling algorithms that spports concrrent transmissions [7][9], and dynamic TDD algorithms [6][11] designed to take the advantage of beamforming. In [7], the athors propose a spatial-time division mltiple access (STDMA) algorithm that schedles both non-interfering and interfering links simltaneosly. It aims to maximize the overall system throghpt. However, it does not allow the exploitation of the traffic dynamics. Recently, athors in [9] proposed a QoS-aware schedling algorithm that partially considers the traffic dynamics, however, it does not exploit the flexibility to adapt flctating capacity reqirements in the backhal. A fndamental problem is ths to exploit the traffic dynamics and flctating capacity reqirements to determine the backhal schedling decision. In this work, a dynamic dplexing scheme is considered, where each BS determine its transmit-receive dplex pattern. A. Network Model II. SYSTEM OVERVIEW We consider a mlti-hop celllar network consisting of a set of mmwave-enabled small-cell enodeb (SeNB), where a macrocell enodeb (MeNB) provides a root from which connections goes to the SeNB at the edge via relay SeNBs that are self-backhaled on mmwave band as shown in Fig. 1. Copyright 2017 held by B. P. S. Sahoo, Chn-Han Yao, and Hng-Y Wei. Pblication Rights Licensed to IEEE

2 The backhal network, N (B, L), operates in slotted time t {0, 1, 2,... }, where B {1,..., B} denotes the set of SeNBs and L {1,..., L} denotes the set of P2P links, indexed by b and l respectively. We denote the cardinalities of these sets as B and L respectively. Fig. 1: Illstration of 5G mmwave self-backhal network. We assme, all the nodes have adaptive beamforming capabilities, and are able to transmit to or receive from mltiple neighbors concrrently. The transmission over each link is defined by the general half-dplex constrained. The channel condition remains the same throghot a frame, bt may vary dynamically from frame to frame. The system rns a bootstrapping program by which each node is capable of detecting and identifying its set of neighbors. B. Physical Model For mmwave commnications based on the abstraction sed in the prior stdy [2], the received power at receiver v B from a transmitter B with transmitting power P t (, v), can be calclated as: P r (, v) = P t (, v)ψ(, v)p L(, v) 1 (1) where ψ is the combined antenna gain of the receiver and transmitter, and P L(, v) 1 is the associated path-loss in db. Withot loss of generality, we consider the Line-of-Sight (LOS) model, expressed in (2), since Non-Line-of-Sight (NLOS) transmissions sffers from higher attenation than LOS transmission, hence, not sitable for backhal transmission [9]. It is noted that an extension to inclde both LOS and NLOS model is straightforward. P L(, v)[db] = α + 10β log 10 v + ξ (2) where ξ N(0, σ 2 ), and α and β are provided in Table I. Let G 2 max be the maximm gain on the desired backhal link v. We assme, SINR v is the instantaneos SINR vale of link v, which is compted based on the active links in the crrent network schedle at t. This ratio is defined in the expression (3) as below SINR v = P t(, v)g 2 maxp L(, v) 1 I 0 + σ 2 N (3) where P t (, v) is the transmitting power from node to node v, assming I 0 is the interference de to concrrent transmission, and σn 2 is the thermal noise power. Given the SINR and allocated bandwidth, we assme that the maximm data rate on link v, i.e., the achievable capacity, expressed in (4), can be estimated as R v = ηw log 2 (1 + SINR v ) (4) where W is the mmwave system bandwidth allocated to the link, η is the bandwidth overhead. C. Backhal Traffic Flows Let data that is destined for node v B be labeled as. Every node keeps internal qees that store data according to its destination. Let (t) be the crrent amont of data for node v in node, where v N(), the set of neighbor nodes of. The nits of (t) can be integer nits of packets or ( real valed ) nits of bits. Specifically, we define Q (t) = (t) as the matrix of crrent qee backlogs at. We Q (N()) assme that Q () (t) = 0 for all slots t, as no qee stores data destined for itself. The qee backlogs from one slot to the next satisfy the following, for all, v B, sch that v: (t + 1) max [ Q (t) v=1 (t), 0 ] + A (v) (t) where A (v) (t) is the amont of new data that arrives at node from v N() on slot t. (t) be the matrix exogenos arrival on t, for the node B, it is calclated by adding the traffic from access network (UE BS) and the traffic from all other backhal nodes (BS BS) as Let A (v) (5) A (v) (t) = λ 0 + λ (v) p v (6) v=1 where λ 0 is the traffic from access network to node, and p v is the probability that the traffic is transmitted from node v to, where v N(). We assme that λ () = 0 for all B, as no data arrives that is destined for itself. Ths, A (v) (t) is a matrix of non-negative real nmbers, with zeros on the diagonal. D. TDD Frame Reconfigrations for Backhaling To better exploit the traffic variations, enhanced Interference Mitigation and Traffic Adaptation (eimta) was introdced [4], which notably allows dynamic adaptation of the TDD pattern. Each TD-LTE frame consists of 10 sbframes, which is preconfigred for downlink (D) or for plink (U) resorces. LTE offers 7 different patterns to statically configre the sbframes as D, or L, as shown in Fig. 2. On the downside, it sffers from nbalanced allocation of UL and DL time-slots in neighboring nodes. On the other hand, with an increased focs on small-cell deployments, the basis for the backhal resorce allocation design shold be dynamic TDD

3 where a sbframe carrying data (or the whole frame) shold be assigned either for transmission or for reception as part of the dynamic schedling decisions. We proposed a novel dynamic frame reconfigration mechanism, where each sbframe cold be allowed to transmit to or receive from mltiple nodes concrrently, a maximm-size data frame according to the channel capacity. This allows better exploitation of the traffic dynamics in small-cell deployments. Fig. 2: The LTE TDD configrations. Specifically, or proposed scheme incldes two steps: firstly, we assme a mechanism is in place to poll the transmission reqests from neighboring nodes, so that each node cold be aware of the traffic demand of its neighbor nodes; secondly, the sbframes are reconfigred dynamically as part of the dynamic schedling algorithm. E. Problem Formlation The schedling of sbframes is the TDD configration that is sed for inter-bs data commnication. We consider a qeed traffic network where an end-to-end flow with a minimm throghpt reqirement is transmitted throgh mltiple hops. We calclate the traffic load at each BS and establish a schedle to carry inter-bs data by exploiting concrrent transmissions. For this prpose, we present a schedling mechanism to find the set of transmitting and receiving nodes, T and R, respectively. Assming the crrent amont of traffic that is destined to node v from is (t) on slot t. Let max (t) be µ v the maximm amont of traffic that can be delivered from v with the crrent P2P link condition µ v on t. It means choosing a higher µ v is amonts to maximizing the amont of traffic than can be transmitted. Ths, we want to choose an improved µ v for each P2P link so as to maximize the amont of traffic that can be delivered on slot t over the whole network. We assme the traffic demand is Q N() (D) on each link N(), we aim to maximize the total amont of traffic demand served over the whole network by allowing concrrent transmission nder the crrent channel conditions, and halfdplex transmission constraints. Given the hge traffic load at each BS in the backhal network, and the limited nmber of timeslots; the optimal schedle, while providing a fair transmission opportnity for each BS, shold also served as mch traffic demands as possible. The optimal backhal traffic schedling problem can be formlated as follows. Q = arg max µ v sbject to =1 =1 B L b=1 l=1 µ v (7) P t () P max, B (8) W W max, B (9) l t + l t v 1, if node and v are adjacent;, v (10) This is a non-linear integer programming problem, and is NP-hard. Constraint (8) indicates the total power is shared dring concrrent transmission, (9) indicates the total bandwidth is shared among mltiple links, and (10) indicates the halfdplex assmption, where adjacent links cannot be schedled concrrently in the same schedle. Since it is difficlt to solve the problem (7) in polynomial time, we propose a distribted heristic algorithm instead to solve this in Section III. III. THE SCHEDULING POLICY The proposed heristic algorithm yields the T and R set for each sbframes of Flexible Frame, while enabling the spatial rese to maximize the total throghpt of the system. A. Set Membership Metric To achieve high transmission data rate for each traffic flow, links with higher channel qality are sally preferred in link activation selection. Therefore, nodes involved in each active flow can transmit or receive maximm traffic. In addition, considering a qeed network, when traffic aggregates at some nodes, congestion may occr and these nodes become bottleneck of the network. Therefore, selection of appropriate nodes for transmission or reception is important to improve the network throghpt, considering both the link qality and the traffic loads at the node. When a node receives a transmission traffic reqest, it calclates the traffic load at each neighboring node sing the local one-hop information, inclding the P2P channel statistics. Based on this metric, we categorise or proposed schedling algorithm into three parts and describe it in next sbsection. B. The Proposed Schedling Policy 1) Load-based inter-bs Schedler (Load-iBS): As the name sggests, in Load-iBS we consider the traffic load at each BS to determine the T and R set. BS with maximm traffic to transmit is selected as a member of T in the crrent sbframe. Therefore, the network can transmit maximm aggregate traffic at any sbframe. Note that the sccessfl reception is proportional to the transmission reqirement and

4 channel qality. The selection metric (hereinafter weight, ω) is calclated as below ω v =, v N() (11) 2) Link Qality-based inter-bs Schedler (Link-iBS): In the Link-iBS, to achieve the higher transmission data rate in each P2P link, the links with higher channel qality is activated for crrent sbframe. Therefore, the total traffic transmitted over each higher-qality P2P link is amonts to maximizing the overall network throghpt. However, this mechanism may lead to wastage transmission slot de to no traffic demand from nodes associated with that link. ω v = µ v (12) 3) Throghpt-Optimal inter-bs Schedler (TO-iBS): Considering either the load of each node or the P2P link qality may not lead to near-optimal throghpt performance in the network. Hence, differently from above two scheme, the TOiBS implements Load-iBS mechanism to obtain the T and R sets, and sbseqently implements a power reallocation mechanism to improve the active P2P link qality. We can calclate the weight as ω v = min [ Q v ], µ v (13) We tilize a proportional power allocation scheme with fractional path loss compensation for improving the link qality. We will describe it briefly. Let P max represents the maximm transmission power of the BS; P L represents the path loss between BS; SINR target represents the targeted received power level and P noise represents the noise power level. Then, the BS s transmitting power P t is set to SINR target = P t P noise P L (14) P t = ϕ P L, P min P t P max (15) where ϕ is the compensation factor and is set to ϕ [0, 1] in LTE standard with SINR target between 0 and 30dB. The psedo-code of the schedling algorithm is presented in Algorithm 1. IV. PERFORMANCE EVALUATION We considered a tree-strctred backhal network with m- hop i.e., the depth of the tree. We assme each node completes the traffic demand polling in the Anchor Frame. The basic system parameters sed for simlation are listed in Table I. The related parametres are based on [8]. In the simlation, we set two kinds of traffic model sch as: Poisson Process (PP), where each flow arrive follows a PP with arrival rate (6), and Interrpted Poisson Process (IPP), where each flow arrive follows an IPP represented by an ON-OFF process. In the ON state, a packet arrives in each time slot according to a Bernolli distribtion. In the OFF state, packets do not arrive. IPP traffic is typically brsty traffic. In order to show the advantages of or proposed scheme, we implemented the TDMA, and the Exhastive Search method for performance comparison. Algorithm 1: Millimeter-Wave Inter-BS Schedler Inpt : N (B, L, Q) Otpt: Set(T, R) 1 Implements at each SCBS b B. 2 Initialize: T = R = φ, and U = B 3 while U φ do 4 Calclate W = max v N() ω v ω v ; 5 foreach U do 6 v arg max W(v); v N() 7 if W() > W(v) then 8 if ω v ω v > 0 then v v 9 T = T {}; U = U\{}; Q () v = ( 0 v ) N(); 10 v maxq ( max ) ; v N() U 11 R = R {v maxq }; U = U\{v maxq }; Q () v maxq = 0, N(v max Q); 12 else 13 R = R {}; U = U\{}; 14 v maxq ( max v N() U = 0, ( v ) N(); ) Q v () ; 15 T = T {v maxq }; U = U\{v maxq }; Q (v maxq) = 0, N(v max Q); 16 end 17 end 18 end 19 end 20 retrn Set(T, R); Parameter TABLE I: Simlation Parameters Carrier freqency Dplex Mode System Bandwidth BS Transmit Power BS Antenna Gain Vale 28 GHz TDD 2 GHz 30 dbm 10 dbi Pathloss Parameter (P L), α = 72.0 P L = α + 10β log 10 (d) [db], d in meters β = 2.92 Beam-width We plot the network throghpt of five schemes nder the increasing nmber of flows in Fig. 3. It indicates the total throghpt of the backhal network i.e., the average sm of the throghpt of all sccessfl flows. We observe the performance trend of or proposed algorithm; more the demanding flows, more the aggregate transmission of data, and ths higher the system throghpt. In Fig. 4, we plot the nmber of sccessfl flows nder 45

5 Fig. 3: System throghpt nder different traffic model static frame configration so it cannot accommodate flctating capacity reqirements. We can observe, the difference between TO-iBS and Exhastive Search is minor, both scheme almost accommodate similar nmber of demanding flows. The Exhastive Search iteratively select the best node from the network and add it to the T and R set. The speriority of or proposed scheme comes from two facts. First, it ses local information to acqire the knowledge of traffic information at each node and sbseqently makes the schedling decision. Secondly, the power reallocation proportional to the throghpt reqirements contribtes to the overall performance. different traffic types and loads with varying nmber of flows from 10 to 100. The end-to-end flow that sccessflly reached its destination node and also achieved its throghpt reqirement is conted as sccessfl flow. Under light load, the nmber of sccessfl flows keep increases with the traffic load. Under Poisson traffic, the Exhastive Search and TOiBS improves the sccess rate abot 10% compared with IPP traffic, nder light load. Fig. 4: No. of sccessfl flows nder different traffic model Fig. 5 demonstrates the brsty traffic and Poisson traffic in general experiences very similar average delay de to the node having traffic to transmit is more likely to have the transmission opportnity at the crrent sbframe. Therefore, the flow that arrives non-niformly, in IPP arrival case, easily misses the channel to transmit. Fig. 5: Transmission delay nder different traffic model In smmary, compared with TDMA and Exhastive Search, the proposed scheme, TO-iBS, has clear edge. TDMA has a V. CONCLUSION In this paper, we consider the problem of providing greater transmission/reception flexibility in the mmwave backhal network and design a dynamic frame reconfigration mechanism to overcome the static dplexing. We have formlated the selection of dplex schedles as an optimization problem and proposed an efficient algorithm to solve this by extensively considering the traffic load at each BS. Extensive simlation shows the speriority of or algorithm in achieving similar network throghpt and nmber of sccessfl flows comparing with optimal algorithm, nder fairly niform traffic. ACKNOWLEDGEMENT This work was financially spported by the Ministry of Science and Technology of Taiwan nder Grants MOST E , and sponsored by MediaTek Inc., Hsinch, Taiwan. REFERENCES [1] Z. Pi, F. Khan, An Introdction to Millimeter-Wave Mobile Broadband Systems, IEEE Commn. Mag., vol. 49, no. 6, pp , Jn [2] S. Singh, et al. Tractable Model for Rate in Self-Backhaled Millimeter Wave Celllar Networks, IEEE J. Sel. Areas Commn., vol. 33, no. 10, pp , Oct [3] S. Singh, R. Mdmbai, U. Madhow, Distribted Coordination with Deaf Neighbors: Efficient Medim Access for 60 GHz Mesh Networks, Proceedings IEEE INFOCOM, pp. 1 9, Mar [4] Volker Pali, Yi Li, Eiko Seidel, Dynamic TDD for LTE-A and 5G, Nomor Research GmbH, Sept [5] Chan-Y Tng, Chn-Yen Chen, and Hng-Y Wei, Next-Generation Directional mmwave MAC Time-Spatial Resorce Allocation, 11th Int l Conf. on Heterogeneos Networking for Qality, Reliability, Secrity and Robstness (Qshine 2015), Taipei, Taiwan, Ag [6] R. Ford, et al. Dynamic Time-domain Dplexing for Self-backhaled Millimeter Wave Celllar Networks, IEEE International Conference on Commnication Workshop (ICC), pp , Jne [7] J. Qiao, LX Cai, X. Shen, JW Mark, STDMA-based Schedling Algorithm for Concrrent Transmissions in Directional Millimeter Wave Networks, IEEE Int l Conf. on Comms., pp , Jne [8] C.Y. Chen, Y.Y. Chen, and H.Y. Wei, Mlti-Cell Interference Coordinated Schedling in mmwave 5G Celllar Systems, 8th Int l Conf. on Ubiqitos and Ftre Networks (ICUFN 2016), pp , Jl [9] Y. Zh, Y. Ni, J. Li, D. O. W, Y. Li, D. Jin, QoS-aware Schedling for Small Cell Millimeter Wave Mesh Backhal, IEEE International Conference on Commnications (ICC), pp. 1 6, May [10] Hng-Y Wei, Samrat Gangly, Raf Izmailov, and Zygmnt Haas, Interference-Aware IEEE WiMax Mesh Networks, The 61st IEEE Vehiclar Technology Conference (VTC Spring 05), May 2005 [11] J. Garcia-Rois, et al. On the Analysis of Schedling in Dynamic Dplex mlti-hop mmwave Celllar Systems, IEEE Transactions on Wireless Commnications, vol. 14, no. 11, pp , Nov

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks Cost Based Local Forwarding Transmission Schemes for Two-hop Celllar Networks Zhenggang Zhao, Xming Fang, Yan Long, Xiaopeng H, Ye Zhao Key Lab of Information Coding & Transmission Sothwest Jiaotong University,

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY 2007 1 On the Analysis of the Bletooth Time Division Dplex Mechanism Gil Zssman Member, IEEE, Adrian Segall Fellow, IEEE, and Uri Yechiali

More information

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity

More information

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 11: Semaphores Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Last time Worked throgh software implementation

More information

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna

More information

Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks

Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks 1 Efficient Schedling for Periodic Aggregation Qeries in Mltihop Sensor Networks XiaoHa X, Shaojie Tang, Member, IEEE, XiangYang Li, Senior Member, IEEE Abstract In this work, we stdy periodic qery schedling

More information

Isilon InsightIQ. Version 2.5. User Guide

Isilon InsightIQ. Version 2.5. User Guide Isilon InsightIQ Version 2.5 User Gide Pblished March, 2014 Copyright 2010-2014 EMC Corporation. All rights reserved. EMC believes the information in this pblication is accrate as of its pblication date.

More information

The Disciplined Flood Protocol in Sensor Networks

The Disciplined Flood Protocol in Sensor Networks The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab

More information

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands

More information

Making Full Use of Multi-Core ECUs with AUTOSAR Basic Software Distribution

Making Full Use of Multi-Core ECUs with AUTOSAR Basic Software Distribution Making Fll Use of Mlti-Core ECUs with AUTOSAR Basic Software Distribtion Webinar V0.1 2018-09-07 Agenda Motivation for Mlti-Core AUTOSAR Standard: SWC-Split MICROSAR Extension: BSW-Split BSW-Split: Technical

More information

Cautionary Aspects of Cross Layer Design: Context, Architecture and Interactions

Cautionary Aspects of Cross Layer Design: Context, Architecture and Interactions Cationary Aspects of Cross Layer Design: Context, Architectre and Interactions Vikas Kawadia and P. R. Kmar Dept. of Electrical and Compter Engineering, and Coordinated Science Lab University of Illinois,

More information

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment

More information

Networks An introduction to microcomputer networking concepts

Networks An introduction to microcomputer networking concepts Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES

More information

IoT-Cloud Service Optimization in Next Generation Smart Environments

IoT-Cloud Service Optimization in Next Generation Smart Environments 1 IoT-Clod Service Optimization in Next Generation Smart Environments Marc Barcelo, Alejandro Correa, Jaime Llorca, Antonia M. Tlino, Jose Lopez Vicario, Antoni Morell Universidad Atonoma de Barcelona,

More information

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING International Jornal of Modern Engineering Research (IJMER) www.imer.com Vol.1, Isse1, pp-134-139 ISSN: 2249-6645 IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING

More information

Chapter 7 TOPOLOGY CONTROL

Chapter 7 TOPOLOGY CONTROL Chapter TOPOLOGY CONTROL Oeriew Topology Control Gabriel Graph et al. XTC Interference SINR & Schedling Complexity Distribted Compting Grop Mobile Compting Winter 00 / 00 Distribted Compting Grop MOBILE

More information

Illumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY

Illumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY Illmina LIMS Software Gide Jne 2017 ILLUMINA PROPRIETARY This docment and its contents are proprietary to Illmina, Inc. and its affiliates ("Illmina"), and are intended solely for the contractal se of

More information

Addressing in Future Internet: Problems, Issues, and Approaches

Addressing in Future Internet: Problems, Issues, and Approaches Addressing in Ftre Internet: Problems, Isses, and Approaches Mltimedia and Mobile commnications Laboratory Seol National University Jaeyong Choi, Chlhyn Park, Hakyng Jng, Taekyong Kwon, Yanghee Choi 19

More information

LWIP and Wi-Fi Boost Flow Control

LWIP and Wi-Fi Boost Flow Control LWIP and Wi-Fi Boost Flow Control David López-Pérez 1, Jonathan Ling 1, Bong Ho Kim 1, Vasdevan Sbramanian 1, Satish Kangovi 1, Ming Ding 2 1 Nokia Bell Laboratories 2 Data61, Astralia Abstract 3GPP LWIP

More information

Image Denoising Algorithms

Image Denoising Algorithms Image Denoising Algorithms Xiang Hao School of Compting, University of Utah, USA, hao@cs.tah.ed Abstract. This is a report of an assignment of the class Mathematics of Imaging. In this assignment, we first

More information

Master for Co-Simulation Using FMI

Master for Co-Simulation Using FMI Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany

More information

Tdb: A Source-level Debugger for Dynamically Translated Programs

Tdb: A Source-level Debugger for Dynamically Translated Programs Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,

More information

A sufficient condition for spiral cone beam long object imaging via backprojection

A sufficient condition for spiral cone beam long object imaging via backprojection A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral

More information

Constructing Multiple Light Multicast Trees in WDM Optical Networks

Constructing Multiple Light Multicast Trees in WDM Optical Networks Constrcting Mltiple Light Mlticast Trees in WDM Optical Networks Weifa Liang Department of Compter Science Astralian National University Canberra ACT 0200 Astralia wliang@csaneda Abstract Mlticast roting

More information

A Wireless MAC Protocol comparison.

A Wireless MAC Protocol comparison. Doc: IEEE P82.1192S1 IEEE 82.11 Wireless Access Method and Physical Layer Specifications Title: Presented by: A Wireless MAC Protocol comparison. Wim Diepstraten NCR SEUtrecht NCRAT&T Network Prodct Grop

More information

FLARE: Coordinated Rate Adaptation for HTTP Adaptive Streaming in Cellular Networks

FLARE: Coordinated Rate Adaptation for HTTP Adaptive Streaming in Cellular Networks FLARE: Coordinated Rate Adaptation for HTTP Adaptive Streaming in Celllar Networks Yongbin Im, Jinyong Han, Ji Hoon Lee, Yoon Kwon, Carlee Joe-Wong, Ted Taekyong Kwon, and Sangtae Ha University of Colorado

More information

Broadcasting XORs: On the Application of Network Coding in Access Point-to-Multipoint Networks

Broadcasting XORs: On the Application of Network Coding in Access Point-to-Multipoint Networks Broadcasting XORs: On the Application of Network Coding in Access Point-to-Mltipoint Networks The MIT Faclty has made this article openly available Please share how this access benefits yo Yor story matters

More information

Fault Tolerance in Hypercubes

Fault Tolerance in Hypercubes Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different

More information

TAKING THE PULSE OF ICT IN HEALTHCARE

TAKING THE PULSE OF ICT IN HEALTHCARE ICT TODAY THE OFFICIAL TRADE JOURNAL OF BICSI Janary/Febrary 2016 Volme 37, Nmber 1 TAKING THE PULSE OF ICT IN HEALTHCARE + PLUS + High-Power PoE + Using HDBaseT in AV Design for Schools + Focs on Wireless

More information

Minimal Edge Addition for Network Controllability

Minimal Edge Addition for Network Controllability This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,

More information

Lecture 13: Traffic Engineering

Lecture 13: Traffic Engineering Lectre 13: Traffic Engineering CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Mike Freedman, Nick Feamster, and Ming Zhang Lectre 13 Overview Dealing with mltiple paths Mltihoming Entact

More information

A Generic Real-Time Traffic Scheduler for OFDMA based Cellular Networks

A Generic Real-Time Traffic Scheduler for OFDMA based Cellular Networks A Generic Real-Time Traffic Schedler for OFDMA based Celllar Networks Basabdatta Palit 1, Meen Tyagi 2, Vinnakota Manoja 3,Svra Sekhar Das 1 1 Indian Institte of Technology Kharagpr, India. 2 CDOT-Centre

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 8: Threads Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Processes P1 P2 Recall that Bt OS A process

More information

EMC VNX Series. Problem Resolution Roadmap for VNX with ESRS for VNX and Connect Home. Version VNX1, VNX2 P/N REV. 03

EMC VNX Series. Problem Resolution Roadmap for VNX with ESRS for VNX and Connect Home. Version VNX1, VNX2 P/N REV. 03 EMC VNX Series Version VNX1, VNX2 Problem Resoltion Roadmap for VNX with ESRS for VNX and Connect Home P/N 300-014-335 REV. 03 Copyright 2012-2014 EMC Corporation. All rights reserved. Pblished in USA.

More information

Lecture 14: Congestion Control

Lecture 14: Congestion Control Lectre 14: Congestion Control CSE 222A: Compter Commnication Networks George Porter Thanks: Amin Vahdat, Dina Katabi Lectre 14 Overview TCP congestion control review XCP Overview CSE 222A Lectre 14: Congestion

More information

Date: December 5, 1999 Dist'n: T1E1.4

Date: December 5, 1999 Dist'n: T1E1.4 12/4/99 1 T1E14/99-559 Project: T1E14: VDSL Title: Vectored VDSL (99-559) Contact: J Cioffi, G Ginis, W Y Dept of EE, Stanford U, Stanford, CA 945 Cioffi@stanforded, 1-65-723-215, F: 1-65-724-3652 Date:

More information

What s New in AppSense Management Suite Version 7.0?

What s New in AppSense Management Suite Version 7.0? What s New in AMS V7.0 What s New in AppSense Management Site Version 7.0? AppSense Management Site Version 7.0 is the latest version of the AppSense prodct range and comprises three prodct components,

More information

StaCo: Stackelberg-based Coverage Approach in Robotic Swarms

StaCo: Stackelberg-based Coverage Approach in Robotic Swarms Maastricht University Department of Knowledge Engineering Technical Report No.:... : Stackelberg-based Coverage Approach in Robotic Swarms Kateřina Staňková, Bijan Ranjbar-Sahraei, Gerhard Weiss, Karl

More information

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems Congestion-adaptive Data Collection with Accracy Garantee in Cyber-Physical Systems Nematollah Iri, Lei Y, Haiying Shen, Gregori Calfield Department of Electrical and Compter Engineering, Clemson University,

More information

5 Performance Evaluation

5 Performance Evaluation 5 Performance Evalation his chapter evalates the performance of the compared to the MIP, and FMIP individal performances. We stdy the packet loss and the latency to restore the downstream and pstream of

More information

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,

More information

Energy-Efficient Mobile-Edge Computation Offloading for Applications with Shared Data

Energy-Efficient Mobile-Edge Computation Offloading for Applications with Shared Data Energy-Efficient Mobile-Edge Comptation Offloading for Applications with Shared Data Xiangy He, Hong Xing, Ye Chen, Armgam Nallanathan School of Electronic Engineering and Compter Science Qeen Mary University

More information

EMC ViPR. User Guide. Version

EMC ViPR. User Guide. Version EMC ViPR Version 1.1.0 User Gide 302-000-481 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is accrate

More information

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems Reqirements Engineering Objectives An introdction to reqirements Gerald Kotonya and Ian Sommerville To introdce the notion of system reqirements and the reqirements process. To explain how reqirements

More information

Collision Avoidance and Resolution Multiple Access: First-Success Protocols

Collision Avoidance and Resolution Multiple Access: First-Success Protocols Collision Avoidance and Resoltion Mltiple Access: First-Sccess Protocols Rodrigo Garcés and J.J. Garcia-Lna-Aceves askin Center for Compter Engineering and Information Sciences University of California

More information

EXAMINATIONS 2010 END OF YEAR NWEN 242 COMPUTER ORGANIZATION

EXAMINATIONS 2010 END OF YEAR NWEN 242 COMPUTER ORGANIZATION EXAINATIONS 2010 END OF YEAR COPUTER ORGANIZATION Time Allowed: 3 Hors (180 mintes) Instrctions: Answer all qestions. ake sre yor answers are clear and to the point. Calclators and paper foreign langage

More information

This chapter is based on the following sources, which are all recommended reading:

This chapter is based on the following sources, which are all recommended reading: Bioinformatics I, WS 09-10, D. Hson, December 7, 2009 105 6 Fast String Matching This chapter is based on the following sorces, which are all recommended reading: 1. An earlier version of this chapter

More information

Evaluating Influence Diagrams

Evaluating Influence Diagrams Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will

More information

Topic Continuity for Web Document Categorization and Ranking

Topic Continuity for Web Document Categorization and Ranking Topic Continity for Web ocment Categorization and Ranking B. L. Narayan, C. A. Mrthy and Sankar. Pal Machine Intelligence Unit, Indian Statistical Institte, 03, B. T. Road, olkata - 70008, India. E-mail:

More information

Maximum Weight Independent Sets in an Infinite Plane

Maximum Weight Independent Sets in an Infinite Plane Maximm Weight Independent Sets in an Infinite Plane Jarno Nosiainen, Jorma Virtamo, Pasi Lassila jarno.nosiainen@tkk.fi, jorma.virtamo@tkk.fi, pasi.lassila@tkk.fi Department of Commnications and Networking

More information

Resolving Linkage Anomalies in Extracted Software System Models

Resolving Linkage Anomalies in Extracted Software System Models Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program

More information

QoS-driven Runtime Adaptation of Service Oriented Architectures

QoS-driven Runtime Adaptation of Service Oriented Architectures Qo-driven Rntime Adaptation of ervice Oriented Architectres Valeria ardellini 1 Emiliano asalicchio 1 Vincenzo Grassi 1 Francesco Lo Presti 1 Raffaela Mirandola 2 1 Dipartimento di Informatica, istemi

More information

STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWORK DYNAMICS FOR STATIC OPTIMIZATION

STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWORK DYNAMICS FOR STATIC OPTIMIZATION STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWOR DYNAMICS FOR STATIC OPTIMIZATION Grsel Serpen and Yifeng X Electrical Engineering and Compter Science Department, The University of Toledo, Toledo, OH

More information

Features. ICMS Integrated Corrosion Management System

Features. ICMS Integrated Corrosion Management System ICMS Integrated Corrosion System Featres Total Corrosion Data Data Exhange with DCS/PCS/SCADA Systems Correlate Corrosion & Process Data Enables Highly Cost-Effective Asset Designed Specifically for Corrosion

More information

NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS

NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS ETWORK PRESERVATIO THROUGH A TOPOLOGY COTROL ALGORITHM FOR WIRELESS MESH ETWORKS F. O. Aron, T. O. Olwal, A. Krien, Y. Hamam Tshwane University of Technology, Pretoria, Soth Africa. Dept of the French

More information

Local Run Manager. Software Reference Guide for MiSeqDx

Local Run Manager. Software Reference Guide for MiSeqDx Local Rn Manager Software Reference Gide for MiSeqDx Local Rn Manager Overview 3 Dashboard Overview 4 Administrative Settings and Tasks 7 Workflow Overview 12 Technical Assistance 17 Docment # 1000000011880

More information

Tu P7 15 First-arrival Traveltime Tomography with Modified Total Variation Regularization

Tu P7 15 First-arrival Traveltime Tomography with Modified Total Variation Regularization T P7 15 First-arrival Traveltime Tomography with Modified Total Variation Reglarization W. Jiang* (University of Science and Technology of China) & J. Zhang (University of Science and Technology of China)

More information

VirtuOS: an operating system with kernel virtualization

VirtuOS: an operating system with kernel virtualization VirtOS: an operating system with kernel virtalization Rslan Nikolaev, Godmar Back SOSP '13 Proceedings of the Twenty-Forth ACM Symposim on Oper ating Systems Principles 이영석, 신현호, 박재완 Index Motivation Design

More information

ICMS3 Integrated Corrosion Management System

ICMS3 Integrated Corrosion Management System Integrated System Featres Total Data Data Exhange with DCS/PCS/SCADA Systems Correlate & Process Data Enables Highly Cost-Effective Asset Designed Specifically for Personnel Fll Client- Operation The Integrated

More information

Towards Understanding Bilevel Multi-objective Optimization with Deterministic Lower Level Decisions

Towards Understanding Bilevel Multi-objective Optimization with Deterministic Lower Level Decisions Towards Understanding Bilevel Mlti-objective Optimization with Deterministic Lower Level Decisions Ankr Sinha Ankr.Sinha@aalto.fi Department of Information and Service Economy, Aalto University School

More information

POWER-OF-2 BOUNDARIES

POWER-OF-2 BOUNDARIES Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of

More information

CAPL Scripting Quickstart

CAPL Scripting Quickstart CAPL Scripting Qickstart CAPL (Commnication Access Programming Langage) For CANalyzer and CANoe V1.01 2015-12-03 Agenda Important information before getting started 3 Visal Seqencer (GUI based programming

More information

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation Maximal Cliqes in Unit Disk Graphs: Polynomial Approximation Rajarshi Gpta, Jean Walrand, Oliier Goldschmidt 2 Department of Electrical Engineering and Compter Science Uniersity of California, Berkeley,

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 10: Lock Implementation Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Recap: Synchronization Race

More information

Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE j Networks

Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE j Networks Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE 802.16j Networks Shimpei Tanaka Graduate School of Information Science and Technology Osaka University, Japan sinpei-t@ist.osaka-u.ac.jp

More information

Secure Biometric-Based Authentication for Cloud Computing

Secure Biometric-Based Authentication for Cloud Computing Secre Biometric-Based Athentication for Clod Compting Kok-Seng Wong * and Myng Ho Kim School of Compter Science and Engineering, Soongsil University, Sangdo-Dong Dongjak-G, 156-743 Seol Korea {kswong,kmh}@ss.ac.kr

More information

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods Annals of Operations Research 106, 19 46, 2001 2002 Klwer Academic Pblishers. Manfactred in The Netherlands. Discrete Cost Mlticommodity Network Optimization Problems and Exact Soltion Methods MICHEL MINOUX

More information

Digital Image Processing Chapter 5: Image Restoration

Digital Image Processing Chapter 5: Image Restoration Digital Image Processing Chapter 5: Image Restoration Concept of Image Restoration Image restoration is to restore a degraded image back to the original image while image enhancement is to maniplate the

More information

Computer User s Guide 4.0

Computer User s Guide 4.0 Compter User s Gide 4.0 2001 Glenn A. Miller, All rights reserved 2 The SASSI Compter User s Gide 4.0 Table of Contents Chapter 1 Introdction...3 Chapter 2 Installation and Start Up...5 System Reqirements

More information

Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN:

Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: 1137-3601 revista@aepia.org Asociación Española para la Inteligencia Artificial España Zaballos, Lis J.; Henning, Gabriela

More information

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un Dynamic Maintenance of Majority Information in Constant Time per Update? Gdmnd S. Frandsen and Sven Skym BRICS 1 Department of Compter Science, University of arhs, Ny Mnkegade, DK-8000 arhs C, Denmark

More information

The single-cycle design from last time

The single-cycle design from last time lticycle path Last time we saw a single-cycle path and control nit for or simple IPS-based instrction set. A mlticycle processor fies some shortcomings in the single-cycle CPU. Faster instrctions are not

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 9: Synchronization (1) Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Cooperation between Threads

More information

Integration of Real-Time Software Modules for Reconfigurable Sensor-Based Control Systems

Integration of Real-Time Software Modules for Reconfigurable Sensor-Based Control Systems in Proc. of 1992 IEEE/RS International Conference on Intelligent Robots and Systems (IROS 92), Raleigh, NC, pp. 325-332, ly 7-10, 1992 Integration of Real-Time Software Modles for Reconfigrable Sensor-Based

More information

Availability Analysis of Application Servers Using Software Rejuvenation and Virtualization

Availability Analysis of Application Servers Using Software Rejuvenation and Virtualization Thein T, Park J S. Availability analysis of application servers sing software rejvenation and virtalization. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 24(2): 339 346 Mar. 2009 Availability Analysis of

More information

EMC M&R (Watch4net ) Installation and Configuration Guide. Version 6.4 P/N REV 02

EMC M&R (Watch4net ) Installation and Configuration Guide. Version 6.4 P/N REV 02 EMC M&R (Watch4net ) Version 6.4 Installation and Configration Gide P/N 302-001-045 REV 02 Copyright 2012-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished September, 2014 EMC believes

More information

Image Compression Compression Fundamentals

Image Compression Compression Fundamentals Compression Fndamentals Data compression refers to the process of redcing the amont of data reqired to represent given qantity of information. Note that data and information are not the same. Data refers

More information

DVR 630/650 Series. Video DVR 630/650 Series. 8/16-Channel real-time recording with CIF resolution. Flexible viewing with two monitor outputs

DVR 630/650 Series. Video DVR 630/650 Series. 8/16-Channel real-time recording with CIF resolution. Flexible viewing with two monitor outputs Video DVR 630/650 Series DVR 630/650 Series 8/16-Channel real-time recording with resoltion Flexible viewing with two monitor otpts Remote viewing, playback, control, and configration Easy Pan/Tilt/Zoom

More information

Picking and Curves Week 6

Picking and Curves Week 6 CS 48/68 INTERACTIVE COMPUTER GRAPHICS Picking and Crves Week 6 David Breen Department of Compter Science Drexel University Based on material from Ed Angel, University of New Mexico Objectives Picking

More information

Design and Optimization of Multi-Faceted Reflectarrays for Satellite Applications

Design and Optimization of Multi-Faceted Reflectarrays for Satellite Applications Design and Optimization of Mlti-Faceted Reflectarrays for Satellite Applications Min Zho, Stig B. Sørensen, Peter Meincke, and Erik Jørgensen TICRA, Copenhagen, Denmark ticra@ticra.com Abstract The design

More information

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT PAAMETE OPTIMIZATION FO TAKAGI-SUGENO FUZZY MODELS LESSONS LEANT Manfred Männle Inst. for Compter Design and Falt Tolerance Univ. of Karlsrhe, 768 Karlsrhe, Germany maennle@compter.org Brokat Technologies

More information

Optimal Sampling in Compressed Sensing

Optimal Sampling in Compressed Sensing Optimal Sampling in Compressed Sensing Joyita Dtta Introdction Compressed sensing allows s to recover objects reasonably well from highly ndersampled data, in spite of violating the Nyqist criterion. In

More information

Research Article Designing a Channel Access Mechanism for Wireless Sensor Network

Research Article Designing a Channel Access Mechanism for Wireless Sensor Network Hindawi Wireless Commnications and Mobile Compting Volme 217, Article ID 7493269, 31 pages https://doi.org/1.1155/217/7493269 Research Article Designing a Channel Access Mechanism for Wireless Sensor Network

More information

Integration of Real-Time Software Modules for Reconfigurable Sensor-Based Control Systems

Integration of Real-Time Software Modules for Reconfigurable Sensor-Based Control Systems In Proceedings of International Symposim on Intelligent Robotics (ISIR 93) Bangalore, India, anary 1993.. Integration of Real-Time Software Modles for Reconfigrable Sensor-Based Control Systems David B.

More information

DIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES

DIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES DIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES Binh-Son Ha 1 Imari Sato 2 Kok-Lim Low 1 1 National University of Singapore 2 National Institte of Informatics, Tokyo, Japan ABSTRACT Dal

More information

Chapter 5 Network Layer

Chapter 5 Network Layer Chapter Network Layer Network layer Physical layer: moe bit seqence between two adjacent nodes Data link: reliable transmission between two adjacent nodes Network: gides packets from the sorce to destination,

More information

(2, 4) Tree Example (2, 4) Tree: Insertion

(2, 4) Tree Example (2, 4) Tree: Insertion Presentation for se with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 B-Trees and External Memory (2, 4) Trees Each internal node has 2 to 4 children:

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 12: Deadlock Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Deadlock the deadly embrace! Synchronization

More information

Abstract 1 Introduction

Abstract 1 Introduction Combining Relevance Information in a Synchronos Collaborative Information Retrieval Environment Colm Foley, Alan F. Smeaton and Gareth J. F. Jones Centre for Digital Video Processing and Adaptive Information

More information

Offline and Online Scheduling of Concurrent Bags-of-Tasks on Heterogeneous Platforms

Offline and Online Scheduling of Concurrent Bags-of-Tasks on Heterogeneous Platforms Offline and Online Schedling of Concrrent Bags-of-Tasks on Heterogeneos Platforms Anne Benoit, Loris Marchal, Jean-François Pinea, Yves Robert, Frédéric Vivien To cite this version: Anne Benoit, Loris

More information

Lecture 10. Diffraction. incident

Lecture 10. Diffraction. incident 1 Introdction Lectre 1 Diffraction It is qite often the case that no line-of-sight path exists between a cell phone and a basestation. In other words there are no basestations that the cstomer can see

More information

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz

More information

Cross-Layer QoS Support in the IEEE Mesh Network

Cross-Layer QoS Support in the IEEE Mesh Network Cross-Layer QoS Support in the IEEE 802.16 Mesh Network Chun-Chuan Yang, Yi-Ting Mai and Liang-Chi Tsai Multimedia and Communications Laboratory Department of Computer Science and Information Engineering

More information

AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING

AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING Mingsheng LIAO, Li ZHANG, Zxn ZHANG, Jiangqing ZHANG Whan Technical University of Srveying and Mapping, Natinal Lab. for Information Eng. in

More information

An Extreme Value Approach to Information Technology Security Investment

An Extreme Value Approach to Information Technology Security Investment Association for Information Systems AIS Electronic Library (AISeL) ICIS 2005 Proceedings International Conference on Information Systems (ICIS) December 2005 An Extreme Vale Approach to Information Technology

More information

FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES

FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES RICARDO G. DURÁN AND ARIEL L. LOMBARDI Abstract. We consider the nmerical approximation of a model convection-diffsion

More information

QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered Control Technique

QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered Control Technique 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered

More information

Factors Influencing Performance of Firefly and Particle Swarm Optimization Algorithms

Factors Influencing Performance of Firefly and Particle Swarm Optimization Algorithms Factors Inflencing Performance of Firefly and Particle Swarm Optimization Algorithms Damanjeet Kar, UIET, Panjab University, Chandigarh Abstract In this paper, two natre inspired meta heristic approaches

More information

Multiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET

Multiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET Mltiple-Choice Test Chapter 09.0 Golden Section Search Method Optimization COMPLETE SOLUTION SET. Which o the ollowing statements is incorrect regarding the Eqal Interval Search and Golden Section Search

More information