On Maximizing the Lifetime of Delay-Sensitive Wireless Sensor Networks with Anycast

Size: px
Start display at page:

Download "On Maximizing the Lifetime of Delay-Sensitive Wireless Sensor Networks with Anycast"

Transcription

1 On Maxmzng the Lfetme of Delay-Senstve Wreless Sensor Networks wth Anycast Joohwan Km, Xaojun Ln, Ness B. Shroff, and Prasun Snha School of Electrcal and Computer Engneerng, Purdue Unversty Departments of ECE and CSE, The Oho State Unversty Emal:{ jhkm, Abstract Sleep-wake schedulng s an effectve mechansm to prolong the lfetme of energy-constraned wreless sensor networks. However, t ncurs an addtonal delay for packet delvery when each node needs to wat for ts next-hop relay node to wake up, whch could be unacceptable for delay-senstve applcatons. Pror work n the lterature has proposed to reduce ths delay usng anycast, where each node opportunstcally selects the frst neghborng node that wakes up among multple canddate nodes. In ths paper, we study the jont control problem of how to optmally control the sleep-wake schedule, the anycast canddate set of next-hop neghbors, and anycast prortes, to maxmze the network lfetme subject to a constrant on the expected end-to-end delay. We provde an effcent soluton to ths jont control problem. Our numercal results ndcate that the proposed soluton can substantally outperform pror heurstc solutons n the lterature, especally under the practcal scenaros where there are obstructons n the coverage area of the wreless sensor network. Index Terms Anycast, Sleep-wake schedulng, Sensor network, Energy-effcency, Delay I. INTRODUCTION Sleep-wake schedulng s an effectve mechansm to prolong the lfetme of energy-constraned sensor networks. In ths paper, we are partcularly nterested n event-drven wreless sensor networks, where events occur occasonally. Therefore, by puttng nodes to sleep when there are no events, the energy consumpton of the sensor nodes can be sgnfcantly reduced. In the lterature, synchronzed sleep-wake schedulng protocols have been proposed n [1] [3]. In these protocols, sensor nodes perodcally or aperodcally exchange synchronzaton nformaton wth neghborng nodes. However, these synchronous protocols could ncur addtonal communcaton overhead, and consume a consderable amount of energy. In ths work, we are nterested n asynchronous sleep-wake schedulng protocols such as those proposed n [4], [5]. In these protocols, the sleep-wake schedule at each node s ndependent of that of other nodes, and thus no synchronzaton s requred. However, due to the lack of knowledge of the sleepwake schedule of other nodes, t ncurs addtonal delays for packet delvery when each node needs to wat for ts next-hop node to wake up. Ths delay could be unacceptable for delay- Ths work has been partally supported by the Natonal Scence Foundaton through awards CNS , CNS , CNS , CCF , and ARO MURI Award No. W911NF (SA08-03). senstve applcatons, such as fre detecton or tsunam alarm, whch requre that the event reportng delay be small. Pror work n the lterature has proposed the use of anycast to reduce ths event reportng delay [6] [10]. In contrast to tradtonal sleep-wake schedulng, where each sendng node wakes up a partcular next-hop relay node, n anycast each sendng node tres to wake up a group of neghborng nodes n a canddate set, and the sendng node then pcks the frst node that wakes up to relay packets. Roughly speakng, f each neghborng node wakes up once every T tme, by selectng a canddate set of n nodes, the tme needed before the frst node wakes up s on average around T n (assumng that the sleepwake schedules of the n nodes are ndependent). Thus, the delay to wake up the next-hop neghbors can be sgnfcantly reduced. On the other hand, the end-to-end delay not only depends on the per-hop delay, but also the end-to-end path that packet traverses. Hence, the set of canddate nodes must be carefully chosen because t wll also affect the possble routng paths. The exstng anycast schemes n the lterature have manly focused on the so-called MAC-layer anycast problem,.e., they try to fnd the canddate set at each node such that some local measure of delay s mnmzed. For the routng path, they ether use a separate routng algorthm [8], [9], or rely on geographcal nformaton [6], [7], [10]. Thus, the nteractons between the choce of the canddate set and the routng path was not systematcally studed, and t s then unclear whether such approaches wll mnmze the actual end-to-end delay. In ths paper, we drectly optmze the system wth respect to the end-to-end delay. In partcular, we formulate the jont control problem of how to optmally control the sleep-wake schedule, the anycast canddate set of neghborng nodes, and anycast prortes among neghborng nodes, to maxmze the network lfetme subject to a constrant on the end-to-end delay. We provde an effcent soluton to ths jont control problem, and as a part of soluton, we also show how to optmally choose the canddate set n order to mnmze the end-to-end delay for all nodes. The rest of ths paper s organzed as follows. In Secton II, we descrbe the system model and ntroduce the lfetmemaxmzaton problem that we ntend to solve. In Secton III, we analyze the end-to-end delay under anycast, and we develop an optmal dstrbuted anycast algorthm that mn-

2 Report Documentaton Page Form Approved OMB No Publc reportng burden for the collecton of nformaton s estmated to average 1 hour per response, ncludng the tme for revewng nstructons, searchng exstng data sources, gatherng and mantanng the data needed, and completng and revewng the collecton of nformaton. Send comments regardng ths burden estmate or any other aspect of ths collecton of nformaton, ncludng suggestons for reducng ths burden, to Washngton Headquarters Servces, Drectorate for Informaton Operatons and Reports, 1215 Jefferson Davs Hghway, Sute 1204, Arlngton VA Respondents should be aware that notwthstandng any other provson of law, no person shall be subject to a penalty for falng to comply wth a collecton of nformaton f t does not dsplay a currently vald OMB control number. 1. REPORT DATE REPORT TYPE N/A 3. DATES COVERED - 4. TITLE AND SUBTITLE On Maxmzng the Lfetme of Delay-Senstve Wreless Sensor Networks wth Anycast 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) School of Electrcal and Computer Engneerng, Purdue Unversty 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR S ACRONYM(S) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for publc release, dstrbuton unlmted 13. SUPPLEMENTARY NOTES The orgnal document contans color mages. 14. ABSTRACT 15. SUBJECT TERMS 11. SPONSOR/MONITOR S REPORT NUMBER(S) 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU a. REPORT unclassfed b. ABSTRACT unclassfed c. THIS PAGE unclassfed 18. NUMBER OF PAGES 9 19a. NAME OF RESPONSIBLE PERSON Standard Form 298 (Rev. 8-98) Prescrbed by ANSI Std Z39-18

3 mzes the end-to-end delay of all nodes. In Secton IV, we solve the lfetme-maxmzaton problem. In Secton V, we provde smulaton results that llustrate the performance of our proposed algorthm compared to other heurstc algorthms n the lterature. II. SYSTEM MODEL We consder a wreless sensor network wth N nodes. Let N denote the set of all nodes n the network. Each sensor node s n charge of both detectng events and relayng packets. If a node detects an event, the node packs the event nformaton nto a packet, and delvers the packet to a snk s va multhop relayng. We assume n ths paper that there s a sngle snk, however, the analyss can be generalzed to the case wth multple snks. We assume that the sensor network employs sleep-wake schedulng to mprove energy-effcency and to prolong the network lfetme. Wth sleep-wake schedulng, nodes sleep for most of the tme and occasonally wake up for a short perod of tme t actve. When a node has a packet for node j to relay, t wll send a beacon sgnal followed by an ID sgnal (carryng sender nformaton). Let t B and t C be the duraton of the beacon sgnal and the ID sgnal, respectvely. When node j wakes up and senses a beacon sgnal, t keeps awake, watng for the followng ID sgnal to recognze the sender. When node j wakes up n the mddle of an ID sgnal, t keeps awake, watng for the next ID sgnal. If node j successfully recognzes the sender, and t s the next-hop node of node, t then communcates wth node to receve the packet. If a node wakes up and does not sense any beacon sgnal or any ID sgnal, t wll then go back to sleep. In ths paper, we assume that the tme nstants that a node j wakes up follow a Posson random process wth rate λ j. We also assume that the wake-up processes of dfferent nodes are ndependent. The ndependence assumpton s sutable for the scenaro where nodes do not synchronze ther wakeup tmes, whch s easer to mplement than other schemes that requre global synchronzaton [1] [3]. The advantage of Posson sleep-wake schedulng s that, due to ts memoryless property, sensor nodes are able to use a tme-nvarant optmal polcy to maxmze the network lfetme (see the dscusson n Secton III-B). Whle the analyss n ths paper focuses on the case when the wake-up tmes follow a Posson process, we expect that the methodology n the paper can also be extended to the case wth non-posson wake-up processes, wth more techncally-nvolved analyss. A well-known problem of usng sleep-wake schedulng n sensor networks s the addtonal delay ncurred when a node has to wat for ts next-hop node to wake up. To reduce ths delay, we use an anycast forwardng scheme descrbed n Fg. 1. Let C denote the set of nodes n the transmsson range of node. Suppose that node has a packet, and t needs to pck up a node n C to relay the packet. Each node mantans a lst of nodes that node ntends to use as a forwarder. We call the set of such nodes a forwardng set, whch s denoted by F. In addton, each node j s also assumed to mantan a lst of nodes that use node j as a forwarder (.e., j F ). As shown n Fg. 1, node starts sendng a beacon sgnal and an ID sgnal, successvely. All nodes n C hear these sgnals regardless of whom these sgnals are ntended for. A node j that wakes up durng the beacon sgnal or the ID sgnal wll check f t s n the forwardng set of node. If t s, node j sends one acknowledgement after the ID sgnal ends. After each ID sgnal, node checks whether there s any acknowledgement from nodes n F. If no acknowledgement s detected, node repeats the beacon- ID-sgnalng and acknowledgement-detecton processes untl t hears one. On the other hand, f there s an acknowledgement, t may take some addtonal tme for node to dentfy whch node acknowledges the beacon-id sgnals, especally when there are multple nodes that wake up at the same tme. We let t R denote the resoluton perod, durng whch tme node dentfes whch nodes have sent acknowledgements, and, f there are multple awake nodes, chooses one node among them that wll forward the packet. After the resoluton perod, the chosen node receves the packet from node durng the packet transmsson perod t P, and then starts the beacon- ID-sgnalng and acknowledgement-detecton processes to fnd the next forwarder. Snce nodes consume energy when awake, t actve should be as small as possble. However, t actve has to be larger than t A because otherwse a neghborng node could wake up after an ID sgnal and could turn to sleep before the next beacon sgnal. In ths paper, we set t actve = t A + t C so that the node that wakes up rght before the frst beacon sgnal also has the same chance of detectng the beacon sgnal as nodes that wake up between two beacon sgnals. A. Sleep-wake Schedule, Forwardng Set, and Prorty In ths model, there are three control varables that affect the network lfetme and the end-to-end delay experenced by a packet. 1) Sleep-Wake Schedule: The sleep-wake schedule s determned by the rate λ j of the Posson process wth whch each node j wakes up. If λ j ncreases, the expected one-hop delay wll decrease, and so wll the end-to-end delay of any routng paths that pass though node j. However, t leads to hgher energy consumpton at node j so that the network lfetme may decrease. In the rest of the paper, t s more convenent to work wth the noton of awake probablty whch s a functon of λ j. Suppose that node sends the frst beacon sgnal at tme 0, as n Fg. 1. If no nodes n F have heard the frst m 1 beacon and ID sgnals, then node transmts the m-th beacon and ID Fg. 1. System Model

4 sgnals n the tme-nterval [(t B +t C +t A )(m 1), (t B +t C + t A )(m 1)+t B +t C ]. For a neghborng node j to hear the m- th sgnals and to recognze the sender, t should wake up durng [(t B +t C +t A )(m 1) t A t C, (t B +t C +t A )m t A t C ]. Therefore, provded that node s sendng the m-th sgnals, the probablty that node j C wakes up and hears these sgnals s p j =1 e λj(t B+t C +t A ). We call p j the awake probablty of node j. It should be noted that, due to the memoryless property of a Posson random process, p j s same for each beacon-id sgnalng teraton, m. Note that there s a one-to-one mappng between the awake probablty p j and wakng-up frequency λ j. Hence, an awake probablty s also closely related to both delay and energy consumpton. Let p =(p, N) represent the global awake probablty vector. 2) Forwardng Set: The forwardng set F s the set of canddate nodes chosen to forward a packet at node. In prncple, the forwardng set should contan nodes that can quckly delver the packet to the snk. However, snce the end-to-end delay depends on the forwardng set of all nodes, choosng the correct forwardng set s not easy. We use a matrx A to represent the forwardng set of all nodes collectvely, as follows: A =[a j,=1,..., N, j =1,..., N] where a j =1f j s n node s forwardng set, and a j = 0 otherwse. We call ths matrx A the forwardng matrx. Recprocally, we defne F (A) as the forwardng set of node under forwardng matrx A,.e., F (A) ={j C a j =1}. We let A denote the set of all possble forwardng matrces. Wth anycast, a forwardng matrx determnes the paths that packets can potentally traverse. Let g(a) be the drected graph G(V, E(A)) wth vertces V = N, and edges E(A) ={(, j) j F (A)}. If there s a path n g(a) that leads from node to node j, we say that node s connected to node j. Otherwse, we call t dsconnected to node j. For convenence, we call a node that s connected (dsconnected) to snk s smply as connected (dsconnected). An acyclc path s the path whch does not traverse any node more than once. If g(a) has any cyclc path, we call t a cyclc graph, otherwse we call t an acyclc graph. 3) Prorty: When multple nodes send an acknowledgement after the same ID sgnal, the source node needs to pck one of them as a forwarder. We assume that node assgns prortes to all nodes n C, and wll pck the node wth the hghest prorty among these nodes that wake up. Clearly, the prorty assgnment wll also affect the expected delay. We use a matrx B to represent the global prorty decson, as follows: B =[b j,=1,..., N, j =1,..., N] where b j {1,, C } f j C, and b j =0otherwse. Ths b j represents the prorty of node j from the vewpont of node. We call ths matrx B the prorty matrx. The prorty matrx B further satsfes b j1 b j2 for all dstnct nodes j 1,j 2 C. Among the awake nodes, the node j that satsfes b j >b k for all the other nodes k wll be chosen as a forwarder. Note that even though only the nodes n a forwardng set need prortes, we here assgn prortes to all nodes to make prorty matrx B an ndependent control varable from forwardng matrx A. We let B denote the set of all possble prorty matrces. B. Performance Metrcs We next descrbe the performance metrcs that we are nterested n. 1) End-to-End Delay: We assume that the end-to-end delay for event delvery s domnated by the cumulatve sum of the delay for each hop to wake up and to relay a packet to ts next-hop neghbor. Ths s a reasonable approxmaton n many event-drven networks. Note that when an event occurs n an event-drven sensor network, the frst packet generated by the event usually suffers most of the delay because at every hop t has to wat for nodes to wake up so that t can be relayed. Once the frst packet goes through, the sensor nodes can stay awake for a whle, hence the delay of the subsequent packets are often much smaller. Therefore, n ths paper, we defne the end-to-end delay as the delay ncurred by the frst packet, whch s the sum of the delay for each hop to wake up and to relay the packet to ts next-hop neghbor. Gven A, B, and p, the stochastc process wth whch a packet traverses the network from the source node to the snk s completely specfed, and can be descrbed by a Markov process. We defne D ( p,a, B) as the expected end-to-end delay for a packet from node to reach snk s, when awake probablty vector p, forwardng matrx A, and prorty matrx B are gven. Snce snk s s the destnaton of all packets, the delay of packets from snk s s regarded as zero,.e., D s ( p,a, B) =0, regardless of p, A, and B. If node s dsconnected to snk s under forwardng matrx A, packets from the node cannot reach snk s. Therefore, the end-toend delay from such a node s regarded as nfnte,.e., D ( p,a, B) =. From now on, we call the expected endto-end delay from node to snk s smply as the delay from node. 2) Network Lfetme: We assume that node consumes u unt of energy each tme t wakes up. Let Q be the energy avalable to node. Then, the expected lfetme of node s Q u λ. By ntroducng the power consumpton rato e = u /Q, we can express the lfetme of node as T ( p) = 1 = t B + t C + t A e λ 1. (1) e ln (1 p ) Here we have used the defnton of the awake probablty p = 1 e λj(t B+t C +t A ) from (1). Note that n ths defnton of lfetme we have chosen not to account for the energy consumpton by data transmsson. Ths s a reasonable approxmaton for those event-drven sensor networks where events occur very rarely, n whch case the energy consumpton of the sensor nodes s domnated by the energy consumed durng the sleep-wake schedulng. We assume that the network lfetme s determned by the shortest lfetme of all nodes. In other words, the network

5 lfetme for a gven awake probablty vector p s gven by T ( p) = mn N T ( p). The methodology of the paper may be extended to handle other defntons of lfetme, e.g., when the sensor network s consdered operatonal f less than a certan percentage of nodes are alve. However, we leave ths more general defnton of lfetme for future work. 3) Problem Formulaton: The objectve of ths paper s to choose awake probablty vector p, forwardng matrx A, and prorty matrx B to maxmze the network lfetme, subject to the constrant that the expected delay from each node to snk s s below the maxmum allowable delay,.e., (P) max p,a,b T ( p) subject to D ( p,a, B) ξ, N p (0, 1] N, A A, B B. where ξ s the maxmum allowable delay. III. MINIMIZATION OF END-TO-END DELAYS FOR GIVEN AWAKE PROBABILITIES In ths secton, we consder how each node should choose ts forwardng set and assgn prortes to neghborng nodes to mnmze the delay D ( p,a, B), when the awake probabltes are gven. Then, n Secton IV, we relax the fxed-probablty assumpton to solve problem (P). A. Local Delay Relatonshp We frst derve a recursve relatonshp for the delay, D ( p,a, B). When node has a packet, the probablty P j,h that node j n C becomes a forwarder rght after the h-th beacon-id sgnals s equal to the probablty that no nodes n C have woken up for the past h 1 beacon-id-sgnalng teratons, and node j wakes up at the h-th beacon-id sgnals whle all nodes wth a hgher prorty than node j reman sleepng at the h-th teraton,.e., P j,h = k F (A) (1 p k ) h 1 p j k F (A):b j<b k (1 p k ). Condtoned on ths event, the expected delay from node to snk s s gven by (t B + t C + t A )h + t R + t P + D j ( p,a, B). For ease of notaton, we defne the teraton perod t I t B + t C + t A and the data transmsson perod t D t R + t P. We can then calculate the expected delay D ( p,a, B) of node for gven awake probablty vector p, forwardng matrx A, and prorty matrx B as follows: = D ( p,a, B) [(t I h + t D + D j ( p,a, B))P j,h ] h=1 j F (A) = t D + + t I 1 j F (A) j F (A) (1 p j ) D j ( p,a, B)p j (1 p k ) k F (A):b j<b k 1.(2) (1 p j ) j F (A) We call (2) the local delay relatonshp, whch must hold for all nodes except the snk s. (Recall D s ( p,a, B) = 0 regardless of the delay of neghborng nodes.) B. The Optmal Forwardng Set and Prorty Assgnment In ths subsecton, we frst consder the hypothetcal scenaro where a node knows the delays D j from ts neghborng nodes j to snk s, and such delays D j are fxed. Under ths hypothess, we wll study how node should adjust ts own forwardng set and prorty assgnment to mnmze the expected delay from node to snk s. Then, n the next subsecton, we wll use the nsght from the result to determne the optmal forwardng matrx A, and prorty matrx B. Consder that a node has multple neghborng nodes wth fxed delay. Smlar to (2), we can calculate the expected delay from node to snk s for a gven neghborng delay vector π =(D j,j C ), forwardng set F, and prorty assgnment b as f( π, F, b ) t D + t I + j F D j p j k F :b j <b k (1 p k ) 1. (3) j F (1 p j ) We call the functon f(,, ) the local delay functon. We frst show that, n order to mnmze f(,, ), the optmal prorty assgnment b can be completely determned by the neghborng delay vector π. Proposton 1: Let b be the prorty assgnment that gves hgher prortes to neghborng nodes wth smaller delay,.e., for each par of nodes j and k satsfyng b j < b k, the nequalty D k D j holds. Then, for any gven F, f( π, F, b ) f( π, F, b ) (4) for all possble b. The detaled proof s provded n Appendx A n our on-lne techncal report [11]. The ntuton behnd Proposton 1 s that when multple nodes sends acknowledgements, selectng the node wth the smallest delay should mnmze the expected delay. Therefore, prortes must be assgned to neghborng nodes accordng to ther (known) delays D j, ndependent of awake probabltes and forwardng sets. In the sequel, we use b ( π ) to denote the optmal prorty assgnment for gven

6 neghborng delay vector π,.e., for all nodes j and k n C, f b j ( π ) <b k ( π ), then D k D j. For ease of notaton, we defne the value of the local delay functon wth ths optmal prorty assgnment as ˆf( π, F ) f( π, F, b ( π )). The followng propertes characterze the structure of the optmal forwardng set. Proposton 2: For a gven π, let J 1, J 2, and J 3 be mutually dsjont subsets of C satsfyng b j 2 ( π ) <b j 1 ( π ) for all nodes j 1 J k and j 2 J k+1 (k =1, 2). Let j J k D j p j k J k :b D Jk = j ( π )<b k ( π )(1 p k) 1, j J k (1 p j ) denote the weghted average delay n J k for k =1, 2, 3. Then, the followng propertes related to ˆf( π, ) hold (a) ˆf( π, J 1 J 3 ) < ˆf( π, J 1 ) D J3 + t D < ˆf( π, J 1 ) D J3 + t D < ˆf( π, J 1 J 3 ). (b) ˆf( π, J 1 J 3 )= ˆf( π, J 1 ) D J3 + t D = ˆf( π, J 1 ) D J3 + t D = ˆf( π, J 1 J 3 ). (c) If ˆf( π, J 1 J 3 ) < ˆf( π, J 1 ), then ˆf( π, J 1 J 2 J 3 ) < ˆf( π, J 1 J 3 ). (d) If ˆf( π, J 1 J 3 )= ˆf( π, J 1 ), then ˆf( π, J 1 J 2 J 3 ) ˆf( π, J 1 J 3 ), and the equalty holds only when D j2 = D j3 for all j 2 J 2 and j 3 J 3. Proof: Ths proposton can be shown by notng that each node set J k (k =1, 2, 3) can be regarded as a node wth delay D Jk and awake probablty P Jk =1 j J k (1 p j ),.e., the probablty that any node n J k wakes up. Then, the local delay functon can be expressed as ˆf( π, K k=1j k )=t D + t I + K k=1 D k 1 J k P Jk l=1 (1 P J l ) 1 K k=1 (1 P J k ) for K = 1, 2, 3. Then, by algebrac manpulaton, we can establsh Propertes (a)-(d). Detals are agan avalable n Appendx B n [11]. The nterpretaton of Proposton 2 s straghtforward. For example, Property (a) mples that addng lower prorty nodes of J 3 nto the current forwardng set F = J 1 decreases the delay f and only f the weghted average delay n J 3 plus t D s smaller than the current delay. Usng Proposton 2, we can obtan the followng man result. Proposton 3: Let F = arg mn F C ˆf( π, F ). Then, F has the followng structural propertes. (a) F must contan all nodes j n C that satsfy D j < ˆf( π, F ) t D. (b) F cannot contan any nodes j n C that satsfy D j > ˆf( π, F ) t D. (c) For all nodes j n C that satsfy D j = ˆf( π, F ) t D, the followng relatonshp holds, ˆf( π, F )= ˆf( π, F \{j}) = ˆf( π, F {j}). We can prove Proposton 3 by usng the result of Proposton 2. (See the detal provded n Appendx C n [11].) From Proporton 3, we can characterze the optmal forwardng set as F = {j C D j < ˆf( π, F ) t D} G, where G s a subset of {j C D j = ˆf( π, F ) t D}. Ths means that f there exsts a node j such that D j = ˆf( π, F ) t D, F s not unque. In other words, f such a node j wakes up frst, there s no dfference n the overall delay whether node transmts a packet to ths node or wats for the other nodes n F to wake up. Snce the optmal forwardng set conssts of nodes whose delay s smaller than or equal to some threshold value, the smplest soluton to fnd the optmal forwardng sets s to run an exhaustve search from the hghest prorty,.e., k = C, to the lowest prorty,.e., k =1, to fnd the k that mnmzes ˆf( π, F,k ) where F,k = {j C b j ( π ) k}. If there are multple optmal forwardng sets, we only need to fnd one of them. In ths paper, we chose to use the set F = {j C D j < ˆf( π, F ) t D} as the optmal forwardng set because t s the frst one that we can obtan n the exhaustve search. Therefore, we redefne the optmal forwardng set F as the forwardng set that satsfes both F = arg mn F C ˆf( π, F ) and F = {j C D j < ˆf( π, F ) t D}. Note that wth ths defnton, the optmal forwardng set s unque. Then, the followng lemma helps us to fnd the optmal forwardng set more quckly. Lemma 1: For all F C that satsfes F = {j C D j < ˆf( π, F) t D }, F F. Proof: From Proposton 3 (a) and the defnton of F, all nodes k F satsfy D k < ˆf(π, F ) t D ˆf(π, F ) t D, for any subset F C. Snce F C, we obtan D k < ˆf(π, F) t D for all nodes k F. Hence, F F. Lemma 1 mples that when we exhaustvely search for the optmal forwardng set from k = C to k = 1, we can stop searchng f we fnd the frst (largest) k such that for all nodes j F,k, D j < ˆf( π, F,k ) t D, and for all nodes l/ F,k, D l ˆf( π, F,k ) t D. Snce all neghborng nodes are prortzed by ther delays, we do not need to compare the delays of all neghborng node wth the threshold value. Hence, the stoppng condton can be further smplfed as follows: node searches the largest k such that for node j wth b j ( π )=k, D j < ˆf( π, F,k ) t D, and for node l wth b l ( π )=k 1, D l ˆf( π, F,k ) t D. It should be noted that the optmal forwardng set s tmenvarant due to the memoryless property of a Posson random process. Specfcally, the expected tme for each node j n C to wake up s always the same as t I /p j regardless of how long the source node have wated. Therefore, the strategy to mnmze the expected delay s also tme-nvarant. C. Globally Optmal Forwardng and Prorty Matrces We next use the nsght of Secton III-B to develop an algorthm computng the globally optmal forwardng and prorty matrces for gven p. Ths algorthm has the flavor of the dstrbuted Bellman-Ford s algorthm for fndng the shortest paths. At each teraton, each node uses the delay estmates from the prevous teraton to update the forwardng set and the prorty assgnment. We wll show that the algorthm converges n N teratons, and the resultng A and B mnmze the expected delay D ( p,a, B).

7 The algorthm s presented next. The OPT-DELAY Algorthm Step (1) At teraton 0, each node sets D (0) = { 0 f = s, otherwse. and F (0) =. Each node arbtrarly assgns prortes to neghborng nodes. Step (2) At teraton h ( 1), each node sets b (h) b ( π (h 1) ), where π (h 1) =(D (h 1) j,j C ). Step (3) Each node updates F (h) forwardng set for π (h 1) D (h) = and also updates D (h) = by fndng the optmal as follows (h 1) ˆf( π, F (h) ). (5) Step (4) If D (h) = D (h 1) for all nodes N, ths algorthm termnates. Otherwse, each node ncreases h by one and goes back to Step (2). To analyze the OPT-DELAY algorthm, we wll use the followng notatons. We defne the subgraph g (A) = G(V (A),E (A)) as the graph wth vertces V (A) = {j V (A) s connected to j n g(a)} and edges E (A) = {(j, k) E(A) {j, k} V (A)}. By conventon, node s connected to tself,.e., V (A) for all A A. Ths subgraph g (A) shows all possble paths from node under forwardng matrx A. For any forwardng matrx A, the number of dstnct acyclc paths n g(a) s fnte when the total number of nodes s fnte. Let g(a) be the maxmum length of acyclc paths n g(a). Then, the followng proposton states an mportant property for analyzng the OPT-DELAY algorthm. Proposton 4: For any p, A A, and B B such that g (A) s cyclc, there exst A A and B B such that g (A ) s acyclc, g (A ) g (A), and D ( p,a, B ) D ( p,a, B). The detaled proof s provded n Appendx D n [11]. Proposton 4 mples that for any forwardng and prorty matrces that cause a cyclc path from any node to snk s, there always exst other forwardng and prorty matrces wth whch all paths from node to snk s are acyclc, and the delay from node wth the new matrces s equal to or smaller than the delay wth the orgnal matrces. Ths s ntutvely true because t wll ncur hgher delay f the packets have to traverse loops. Let A (h) be the forwardng matrx that corresponds to F (h) =1f j F (h), or a (h) j =0, for all nodes N,.e., a (h) j otherwse. Smlarly, let B (h) be the prorty matrx n whch the transpose of the -th row s b (h). Let A ( p) and B ( p) be the forwardng and prorty matrces when the OPT-DELAY algorthm converges. (Note that p s fxed and gven.) The followng proposton provdes the key propertes of the algorthm. Proposton 5: The algorthm has the followng propertes: 1) At teraton h, g(a (h) ) s an acyclc graph. 2) The OPT-DELAY algorthm converges wthn N teratons. 3) For gven p, (A ( p), B ( p)) = arg mn A,B D ( p,a, B) for all nodes N. Proof: In ths paper, we show the basc deas of the proof. The detaled verson of proof s provded n Appendx E n [11]. We frst show that D (h+1) D (h) for h 1 and all nodes. Suppose n contrary that there exsts node such that D (h) < D (h+1). Then, from [11], we can show that < D (h) 1. there must exst node 1 C such that D (h 1) 1 Repeatng ths procedure, we can fnd a sequence of nodes 2,, k,, h 1 such that k C k 1 and D (h k) k < D (h k+1) k. For node h 1, D (1) h 1 < D (2) h 1. However, f snk s s n h 1 s transmsson range,.e., s C h 1, then D (k) h 1 = D (1) h 1 = t D +t I /p s at any teraton k, because node h 1 can delver the packet drectly to snk s. If snk s s not n C h 1, D (2) h 1 D (1) h 1 =. Ths leads to a contradcton. Thus, D (h+1) D (h) for all nodes N and teraton h>1. We now prove the frst property. Suppose n contrary that there s a cyclc path n g(a (h) ). Let the sequence of nodes along ths cyclc path be 1, 2,, K, and K+1 = 1,.e., k+1 F (h) k show that the delays along the cyclc path satsfy for k =1, 2,..., K. Then, from [11], we can D (h) 1 >D (h) 2 > >D (h) K >D (h) 1. Ths s a contradcton. Therefore, g(a (h) ) s an acyclc graph. Let A (h) = {A A g (A) h}. A (h) denotes the set of forwardng matrces wth whch the maxmum number of hops along acyclc paths from node to snk s s less than h. We now show that D (h) mn D ( p,a, B). (6) A A (h),b We prove by nducton. At teraton 1, F (1) = {s} and D (1) = t D +t I /p s f snk s C. Otherwse, F (1) = and D (1) =. Now consder the rght-hand-sde of (6). If A (1) s not an empty set, ths means that node has a drect path to snk s, whch mples that ts expected delay s t D + t I /p s. If A (1) s an empty set, ths means that there s no path for node to reach snk s wthn 1 hop, whch mples that the expected delay to reach snk s wthn 1 hop s nfnte. Therefore, (6) holds at teraton 1. Next, assume that the nducton hypothess (6) holds at teraton h,.e., D (h) mn D ( p,a, B) N. (7) A A (h),b Then, usng Proposton 4, we can show that (7) also holds at teraton h +1. (See the detal n Appendx E n [11].) Hence, (6) holds for all nodes. We next prove that D ( p,a (h), B (h) ) D (h). At teraton 1, F (1) = {s} f s C. Otherwse, F (1) =. Hence, { D ( p,a (1), B (1) td + t )= I /p s f s C, otherwse.

8 Thus, D ( p,a (1), B (1) ) = D (1) for all nodes, and so D ( p,a (h), B (h) ) D (h) holds at teraton 1. Next assume that the nducton hypothess D ( p,a (l), B (l) ) D (l) N (8) holds for all l h. Then, from [11], we can show that (8) also holds for l = h +1. Hence, D ( p,a (h), B (h) ) D (h) holds for all and h. From the prevous results, we conclude that D ( p,a (h), B (h) ) D (h) mn D ( p,a, B) (9) A A (h),b The maxmum length of an acyclc path s equal to or less than N. Therefore, A (N) = A for all nodes. Snce A (h) A, at teraton N, we obtan D ( p,a (N), B (N) )=D (N) = mn D ( p,a, B) A,B from (9). Hence, the algorthm must converge n at most N teratons, and A (h), B (h), and D (h) converge to the optmal forwardng matrx, the optmal prorty matrx, and the mnmum expected delay from node to snk s, respectvely. Proposton 5 shows that there always exsts (A, B) that can mnmze the delay from all nodes at the same tme, and (A( p), B( p)) corresponds to such a soluton. Furthermore, the graph g(a ( p)) s acyclc. The complexty of ths algorthm s gven by O(N). Moreover, ths algorthm can be mplemented n a fully dstrbuted fashon. IV. SOLUTION TO THE LIFETIME-MAXIMIZATION PROBLEM In ths secton, we solve the orgnal lfetme-maxmzaton problem (P), usng the results n prevous sectons. By lettng q = ln(1 p ) e, we can rewrte problem (P) as t I (P1) max mn, q,a,b N q subject to D ( p,a, B) ξ, N p =1 e q/e, N (10) q (0, ), N A A, B B. Snce for any gven p, A ( p) and B ( p) are the optmal forwardng matrx and the optmal prorty matrx, respectvely, that mnmze the delay from all nodes, we have D ( p,a ( p), B ( p)) D ( p,a, B) for all A and B. Hence, we can rewrte problem (P1) as follows: t I (P2) max mn, q N q subject to D ( p,a ( p), B ( p)) ξ, N p =1 e q /e, N q (0, ), N Problem (P2) can be further smplfed wth the followng proposton. Proposton 6: If q s the optmal soluton to problem (P2), then so s q such that q =(q = max k qk, N ),.e., we can let every node have the same q. Proof: Snce both solutons have the same objectve value, t s suffcent to show that f q s n the feasble set, so s q. Let p and p be the awake probablty vectors that correspond to q and q, respectvely, by (10). Snce p s monotoncally ncreasng as q ncreases, and q q, we have p p. (The symbol denotes componentwse nequalty,.e., f q p, then q p for all, where q and p are the -th components of q and p, respectvely.) Note that the delay D ( p,a ( p), B ( p)) from each node s a non-ncreasng functon wth respect to each component of p. (See Appendx F n [11].) Snce p p, for all nodes, we have D ( p,a ( p), B ( p)) D ( p, A ( p ), B ( p )). Hence, f q s n the feasble set, so s q. Usng the above proposton, we can rewrte problem (P2) nto a problem wth one varable q, (P3) mn q, subject to max D ( p,a( p), B( p)) ξ N p =1 e q/e, N q (0, ). If q s the soluton to problem (P3), then ( p, A( p ), B( p )) (p =1 /e e q ) corresponds to the soluton of the orgnal problem (P). Note that max N D ( p,a( p), B( p)) s a non-ncreasng functon of p. (See the proof of Proposton 6.) Snce p s an ncreasng vector of q, the smplest soluton to Problem (P3) s to lnearly search q such that max N D ( p,a( p), B( p)) = ξ where p =1 e q/e. We develop an effcent bnary search algorthm for computng the optmal value of q. The Bnary Search Algorthm for Problem (P3) Step (1) Intally, snk s sets p (1) =0.5 and k =1. Step (2) Snk s sets q (k) = ln(1 p (k) ) max N e. Step (3) Nodes run the OPT-DELAY algorthm for gven p (k) =(p (k) =1 e q(k) /e, N). Step (4) After N teratons, the optmal forwardng set and the optmal prorty assgnment under p (k) are found. Nodes j that are not n the other node s forwardng set,.e., j / F (A ( p (k) )) for all nodes, send feedback of ther delays D j ( p (k), A ( p (k) ), B ( p (k) )) to snk s. Step (5) Let D max be the maxmum feedback delay arrved at snk s. If D max >ξ +ɛ, then snk s sets p (k+1) = p (k) +0.5 k+1, ncreases k by one, and goes back to Step (2). If D max <ξ ɛ, then snk s sets p (k+1) = p (k) 0.5 k+1, ncreases k by one, and goes back to Step (2). If D max [ξ ɛ,ξ + ɛ], then the algorthm termnates, and returns q (k) as the optmal soluton to Problem (P3). The reason that we take q (k) wth respect to the maxmum e n Step (2) s because ths makes all p (k) less than or equal to p (k). (Note that we only search p (k) over (0, 1].) In

9 Step (4), only such a node j that does not belong to any other forwardng set needs to send the feedback delay to the snk s because the node wth the maxmum delay does not belong to any other forwardng set accordng to Property (a) n Proposton 3. Snce snk s only needs to know the maxmum delay, there s no need for the other nodes to feedback ther delays. V. SIMULATION RESULTS In ths secton, we provde smulaton results to llustrate the performance advantage of our optmal anycast algorthm. We smulate a wreless sensor network wth 400 nodes deployed randomly over a 10-by-10 area wth unform dstrbuton, and the snk s s located at (0, 0). We assume that the transmsson range from each node s a dsc wth radus 1.5,.e., j C, f the dstance between node j and node s less than 1.5. The parameters t I and t D are set to 1 and 5, respectvely. We also assume that power consumpton rato e s dentcal for all nodes. A. Exstng Algorthms Proposed n the Lterature In ths subsecton, we revew some exstng algorthms that we wll compare wth our optmal algorthm. Normalzed-latency Anycast Algorthm: The normalzedlatency algorthm proposed n [10] s an anycast-based heurstc that explots geographc nformaton to reduce the delay from each node. Let d be the dstance from node to snk s, and let r j be the progress from node to node j toward snk s,.e., r j = d d j. If a node has a packet, let D be the one-hop delay from node to a next-hop node, and let R be the progress between two nodes. Snce node selects the next-hop node probablstcally, both D and R are random varables. The objectve of the normalzed latency algorthm s to fnd the forwardng set that mnmzes the expectaton of normalzed one-hop delay,.e., E[ D R ]. The dea behnd ths algorthm s to mnmze the expected delay per unt dstance, whch mght help to reduce the actual end-to-end delay. Nave Anycast Algorthm: The nave algorthm proposed n [10] s also an anycast-based heurstc algorthm that explots geographc nformaton. Under ths algorthm, each node ncludes all neghborng nodes wth postve progress n the forwardng set. Determnstc Routng Algorthm: By determnstc routng, we mean that each node has only one desgnated nexthop forwardng node. Therefore, determnstc routng can be vewed as a specal case of anycast, n whch the sze of the forwardng set at each node s restrcted to one. Therefore, nstead of fndng the optmal forwardng set F (h) = (h 1) arg mn F C ˆf( π, F) n Step (3) of the OPT-DELAY algorthm, we update F (h) accordng to F (h) = arg mn ˆf( π (h 1), F),. (11) F C : F =1 After the above modfcaton, the OPT-DELAY algorthm becomes one that fnds the optmal next hop under determnstc routng. Note that ths modfed algorthm s equvalent to the well-known Bellman-Ford shortest path algorthm, n whch the length of each lnk (, j) s gven by t I /p j +t D. Let D ( p) denote the mnmum delay from node under determnstc under the modfed algorthm converges to D ( p). In ths smulaton, n order to compare the network lfetme under the dfferent algorthms, we run the bnary search algorthm for Problem (P3), replacng the OPT-DELAY algorthm n Step (3) wth the above mentoned algorthms. routng. Then, D (h) B. Performance Comparson In Fg. 2, we compare the network lfetme under the dfferent algorthms, where x-axs represents dfferent maxmum allowable delays ξ n our orgnal Problem (P), and y- axs represents the maxmum lfetme for each ξ. The curve labeled Anycast (optmal) represents the lfetme under the optmal anycast algorthm,.e., the OPT-DELAY algorthm. The curves labeled Anycast (norm) and Anycast (nave) represent the lfetme under the normalzed-latency anycast algorthm, and under the nave anycast algorthm, respectvely. The curve labeled Determnstc routng represents the lfetme under the determnstc routng algorthm. Network Lfetme Anycast (optmal) Anycast (norm) 2 Anycast (nave) Determnstc Routng Maxmum Allowable Delay ξ * Fg. 2. The network lfetme accordng to dfferent allowable delay ξ when nodes are unformly deployed. From Fg. 2, we observe that all anycast algorthms sgnfcantly extend the lfetme compared to the determnstc routng algorthm. We also observe that the performance of the optmal and the normalzed-latency algorthm s very close. Note that the normalzed-latency algorthm gves preference to nodes wth larger progress, whle our optmal algorthm gves preference to nodes wth smaller delays. The results n Fg. 2 seem to suggest that there s a correlaton between progress and delay when nodes are deployed unformly. Fnally, the reason for the performance gap between the optmal and the nave algorthms s that transmttng a packet to a neghbor wth small progress s often not a good decson f a node wth hgher progress s expected to wake up soon. We next smulate a topology where there s a hole n the sensor feld as shown n Fg. 3. Ths s motvated by practcal scenaros, where there are obstructons n the sensor feld, e.g.,

10 a lake or a mountan where sensor nodes cannot be deployed. The smulaton result based on ths topology s provded n Fg Maxmum Delay Node Lake Fg. 3. Node deployment and routng paths under dfferent forwardng algorthms when p =0.5: The dotted lnes llustrate all routng paths under the optmal anycast algorthm, the thck sold lnes llustrate the unque routng path under the determnstc routng path, and thn sold lnes llustrate all routng paths under the normalzed-latency anycast algorthm Network Lfetme Anycast (optmal) Anycast (norm) 2 Anycast (nave) Determnstc Routng Maxmum Allowable Delay ξ * Fg. 4. The network lfetme accordng to dfferent allowable delay ξ when nodes are not unformly dstrbuted. From ths fgure, we observe that the optmal anycast algorthm substantally outperforms the other algorthms ncludng the normalzed-latency anycast algorthm. Fg 3 provdes us wth the ntuton for ths performance gap. We plot the routng paths from the nodes wth the largest delay. The dotted lnes (above the hole) llustrate all routng paths under the optmal anycast algorthm. The thck sold lnes (above the hole) llustrate the unque routng path under the determnstc routng algorthm. The thn sold lnes (above the hole) llustrate all routng paths under the normalzed-latency anycast algorthm. The routng paths under the nave anycast algorthm are omtted because they are smlar to those under the normalzedlatency anycast algorthm. In our optmal algorthm, n order to reduce the delay, a packet s frst forwarded to neghbors wth negatve progress but smaller delay. However, under the normalzed-latency algorthm, all packet are forwarded only to nodes wth postve progress, and hence they take longer detours. Therefore, the result of Fg 3 shows that when the node dstrbuton s not unform, there may not be a strong correlaton between progress and delay. Thus, the anycastbased heurstc algorthms dependng only on geographcal nformaton could perform poorly. VI. CONCLUSION In ths paper, we study how to use anycast to reduce the end-to-end delay and to prolong the lfetme of wreless sensor networks employng asynchronous sleep-wake schedulng. In partcular, we study the jont control problem of how to optmally control the sleep-wake schedule, the anycast canddate set of next-hop neghbors, and the anycast prortes, n order to maxmze the network lfetme subject to a upper lmt on the expected end-to-end delay. We provde an effcent soluton to ths jont control problem, and as a part of the soluton, we also show how to optmally choose the anycast canddate set to mnmze the end-to-end delay from all sensor nodes. Our numercal results suggest that the proposed soluton can substantally outperform pror heurstc solutons n the lterature under practcal scenaros where there are obstructons n the coverage area of the wreless sensor network. The algorthms that we have developed can be easly appled to energy-constraned event-drven wreless sensor networks. In future work, we plan to extend the result to the case wth non-posson sleep-wake patterns, and to handle more general notons of network lfetme. REFERENCES [1] W. Ye, H. Hedemann, and D. Estrn, Medum Access Control wth Coordnated Adaptve Sleepng for Wreless Sensor Networks, IEEE/ACM Transactons on Networkng, vol. 12, no. 3, pp , June [2] T. van Dam and K. Langendoen, An Adaptve Energy-Effcent MAC Protocol for Wreless Sensor Networks, n Proc. SenSys 03, November 2003, pp [3] G. Lu, B. Krshnamachar, and C. S. Raghavendra, An Adaptve Energy-Effcent and Low-Latency MAC for Data Gatherng n Wreless Sensor Networks, n Proc. IPDPS 04, Aprl 2004, pp [4] J. Polastre, J. Hll, and D. Culler, Versatle Low Power Meda Access for WIreless Sensor Networks, n Proc. SenSys 04, November 2004, pp [5] J. Polastre, J. Hll, P. Levs, J. Zhao, D. Culler, and S. Shenker, A Unfyng Lnk Abstracton for Wreless Sensor Networks, n Proc. SenSys 05, November 2005, pp [6] M. Zorz and R. R. Rao, Geographc Random Forwardng (GeRaF) for Ad Hoc and Sensor Networks: Energy and Latency Performance, IEEE transactons on Moble Computng, vol. 2, no. 4, pp , October [7], Geographc Random Forwardng (GeRaF) for Ad hoc and Sensor Networks: Multhop Performance, IEEE transactons on Moble Computng, vol. 2, no. 4, pp , October [8] R. R. Choudhury and N. H. Vadya, MAC-Layer Anycastng n Ad Hoc Networks, SIGCOMM Computer Communcaton Revew, vol. 34, no. 1, pp , January [9] S. Jan and S. R. Das, Explotng Path Dversty n the Lnk Layer n Wreless Ad Hoc Networks, n Proc. WoWMoM, June 2007, pp [10] S. Lu, K.-W. Fan, and P. Snha, CMAC: An Energy Effcent MAC Layer Protocol Usng Convergent Packet Forwardng for Wreless Sensor Networks, n Proc. SECON 07, San Dego, CA, June [11] J. Km, X. Ln, N. B. Shroff, and P. Snha, On Maxmzng the Lfetme of Delay-Senstve Wreless Sensor Networks wth Anycast, Techncal Report, Purdue Unversty, km309/km08tech.pdf, 2007.

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

CS 534: Computer Vision Model Fitting

CS 534: Computer Vision Model Fitting CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

5 The Primal-Dual Method

5 The Primal-Dual Method 5 The Prmal-Dual Method Orgnally desgned as a method for solvng lnear programs, where t reduces weghted optmzaton problems to smpler combnatoral ones, the prmal-dual method (PDM) has receved much attenton

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks 12 IEEE Wreless Communcatons and Networkng Conference: Moble and Wreless Networks Onlne Polces for Opportunstc Vrtual MISO Routng n Wreless Ad Hoc Networks Crstano Tapparello, Stefano Tomasn and Mchele

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

THere are increasing interests and use of mobile ad hoc

THere are increasing interests and use of mobile ad hoc 1 Adaptve Schedulng n MIMO-based Heterogeneous Ad hoc Networks Shan Chu, Xn Wang Member, IEEE, and Yuanyuan Yang Fellow, IEEE. Abstract The demands for data rate and transmsson relablty constantly ncrease

More information

IP mobility support is becoming very important as the

IP mobility support is becoming very important as the 706 IEEE TRANSACTIONS ON COMPUTERS, VOL. 52, NO. 6, JUNE 2003 A New Scheme for Reducng Lnk and Sgnalng Costs n Moble IP Young J. Lee and Ian F. Akyldz, Fellow, IEEE Abstract IP moblty support s provded

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

On the Exact Analysis of Bluetooth Scheduling Algorithms

On the Exact Analysis of Bluetooth Scheduling Algorithms On the Exact Analyss of Bluetooth Schedulng Algorth Gl Zussman Dept. of Electrcal Engneerng Technon IIT Hafa 3000, Israel glz@tx.technon.ac.l Ur Yechal Dept. of Statstcs and Operatons Research School of

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Loop-Free Multipath Routing Using Generalized Diffusing Computations

Loop-Free Multipath Routing Using Generalized Diffusing Computations 1 Loop-Free Multpath Routng Usng Generalzed Dffusng Computatons Wllam T. Zaumen J.J. Garca-Luna-Aceves Sun Mcrosystems, Inc. Computer Engneerng Department 901 San Antono Avenue School of Engneerng Palo

More information

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks Mddle-East Journal of Scentfc Research 2 (): 566-574, 202 ISSN 990-9233 IDOSI Publcatons, 202 DOI: 0.5829/dos.mejsr.202.2..43 Performance Improvement of Drect Dffuson Algorthm n Sensor Networks Akbar Bemana

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Unsupervised Learning

Unsupervised Learning Pattern Recognton Lecture 8 Outlne Introducton Unsupervsed Learnng Parametrc VS Non-Parametrc Approach Mxture of Denstes Maxmum-Lkelhood Estmates Clusterng Prof. Danel Yeung School of Computer Scence and

More information

MULTIHOP wireless networks are a paradigm in wireless

MULTIHOP wireless networks are a paradigm in wireless 400 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 17, NO. 1, JANUARY 2018 Toward Optmal Dstrbuted Node Schedulng n a Multhop Wreless Network Through Local Votng Dmtros J. Vergados, Member, IEEE, Natala

More information

Space-Optimal, Wait-Free Real-Time Synchronization

Space-Optimal, Wait-Free Real-Time Synchronization 1 Space-Optmal, Wat-Free Real-Tme Synchronzaton Hyeonjoong Cho, Bnoy Ravndran ECE Dept., Vrgna Tech Blacksburg, VA 24061, USA {hjcho,bnoy}@vt.edu E. Douglas Jensen The MITRE Corporaton Bedford, MA 01730,

More information

DECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks

DECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks da Rocha Henrques et al. EURASIP Journal on Wreless Communcatons and Networkng (2016) 2016:163 DOI 10.1186/s13638-016-0662-9 RESEARCH Open Access DECA: dstrbuted energy conservaton algorthm for process

More information

Computer Communications

Computer Communications Computer Communcatons 3 (22) 3 48 Contents lsts avalable at ScVerse ScenceDrect Computer Communcatons journal homepage: www.elsever.com/locate/comcom On the queueng behavor of nter-flow asynchronous network

More information

A Decentralized Lifetime Maximization Algorithm for Distributed Applications in Wireless Sensor Networks

A Decentralized Lifetime Maximization Algorithm for Distributed Applications in Wireless Sensor Networks A Decentralzed Lfetme Maxmzaton Algorthm for Dstrbuted Applcatons n Wreless Sensor Networks Vrgna Pllon, Mauro Franceschell, Lug Atzor, Alessandro Gua Dept. of Electrcal and Electronc Engneerng, Unversty

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol 2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen

More information

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding Tarno et al. EURASIP Journal on Wreless Communcatons and Networkng 214, 214:81 http://wcn.euraspournals.com/content/214/1/81 RESEARCH Open Access QoS-aware routng for heterogeneous layered uncast transmssons

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

GSLM Operations Research II Fall 13/14

GSLM Operations Research II Fall 13/14 GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are

More information

Minimum Cost Optimization of Multicast Wireless Networks with Network Coding

Minimum Cost Optimization of Multicast Wireless Networks with Network Coding Mnmum Cost Optmzaton of Multcast Wreless Networks wth Network Codng Chengyu Xong and Xaohua L Department of ECE, State Unversty of New York at Bnghamton, Bnghamton, NY 13902 Emal: {cxong1, xl}@bnghamton.edu

More information

Greedy Technique - Definition

Greedy Technique - Definition Greedy Technque Greedy Technque - Defnton The greedy method s a general algorthm desgn paradgm, bult on the follong elements: confguratons: dfferent choces, collectons, or values to fnd objectve functon:

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

Optimizing Energy-Latency Trade-off in Sensor Networks with Controlled Mobility

Optimizing Energy-Latency Trade-off in Sensor Networks with Controlled Mobility Optmzng Energy-Latency Trade-off n Sensor Networks wth Controlled Moblty Ryo Sughara Rajesh K. Gupta Computer Scence and Engneerng Department Unversty of Calforna, San Dego La Jolla, Calforna 9293 Emal:

More information

Utility Constrained Energy Minimization In Aloha Networks

Utility Constrained Energy Minimization In Aloha Networks Utlty Constraned Energy nmzaton In Aloha Networks Amrmahd Khodaan, Babak H. Khalaj, ohammad S. Taleb Electrcal Engneerng Department Sharf Unversty of Technology Tehran, Iran khodaan@ee.shrf.edu, khalaj@sharf.edu,

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

A Frame Packing Mechanism Using PDO Communication Service within CANopen

A Frame Packing Mechanism Using PDO Communication Service within CANopen 28 A Frame Packng Mechansm Usng PDO Communcaton Servce wthn CANopen Mnkoo Kang and Kejn Park Dvson of Industral & Informaton Systems Engneerng, Ajou Unversty, Suwon, Gyeongg-do, South Korea Summary The

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Decson surface s a hyperplane (lne n 2D) n feature space (smlar to the Perceptron) Arguably, the most mportant recent dscovery n machne learnng In a nutshell: map the data to a predetermned

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

An Approximation to the QoS Aware Throughput Region of a Tree Network under IEEE CSMA/CA with Application to Wireless Sensor Network Design

An Approximation to the QoS Aware Throughput Region of a Tree Network under IEEE CSMA/CA with Application to Wireless Sensor Network Design An Approxmaton to the QoS Aware Throughput Regon of a Tree Network under IEEE 802.15.4 CSMA/CA wth Applcaton to Wreless Sensor Network Desgn Abht Bhattacharya a, Anurag Kumar a a Dept. of Electrcal Communcaton

More information

An efficient iterative source routing algorithm

An efficient iterative source routing algorithm An effcent teratve source routng algorthm Gang Cheng Ye Tan Nrwan Ansar Advanced Networng Lab Department of Electrcal Computer Engneerng New Jersey Insttute of Technology Newar NJ 7 {gc yt Ansar}@ntedu

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Maintaining temporal validity of real-time data on non-continuously executing resources

Maintaining temporal validity of real-time data on non-continuously executing resources Mantanng temporal valdty of real-tme data on non-contnuously executng resources Tan Ba, Hong Lu and Juan Yang Hunan Insttute of Scence and Technology, College of Computer Scence, 44, Yueyang, Chna Wuhan

More information

K-means and Hierarchical Clustering

K-means and Hierarchical Clustering Note to other teachers and users of these sldes. Andrew would be delghted f you found ths source materal useful n gvng your own lectures. Feel free to use these sldes verbatm, or to modfy them to ft your

More information

EXTENDED BIC CRITERION FOR MODEL SELECTION

EXTENDED BIC CRITERION FOR MODEL SELECTION IDIAP RESEARCH REPORT EXTEDED BIC CRITERIO FOR ODEL SELECTIO Itshak Lapdot Andrew orrs IDIAP-RR-0-4 Dalle olle Insttute for Perceptual Artfcal Intellgence P.O.Box 59 artgny Valas Swtzerland phone +4 7

More information

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks A Load-balancng and Energy-aware Clusterng Algorthm n Wreless Ad-hoc Networks Wang Jn, Shu Le, Jnsung Cho, Young-Koo Lee, Sungyoung Lee, Yonl Zhong Department of Computer Engneerng Kyung Hee Unversty,

More information

Repeater Insertion for Two-Terminal Nets in Three-Dimensional Integrated Circuits

Repeater Insertion for Two-Terminal Nets in Three-Dimensional Integrated Circuits Repeater Inserton for Two-Termnal Nets n Three-Dmensonal Integrated Crcuts Hu Xu, Vasls F. Pavlds, and Govann De Mchel LSI - EPFL, CH-5, Swtzerland, {hu.xu,vasleos.pavlds,govann.demchel}@epfl.ch Abstract.

More information

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.

More information

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Aggregated traffic flow weight controlled hierarchical MAC protocol for wireless sensor networks

Aggregated traffic flow weight controlled hierarchical MAC protocol for wireless sensor networks Ann. Telecommun. (29) 64:75 721 DOI.7/s12243-9-95- Aggregated traffc flow weght controlled herarchcal MAC protocol for wreless sensor networks M. Abdur Razzaque M. Mamun-Or-Rashd Muhammad Mahbub Alam Choong

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

WITH rapid improvements of wireless technologies,

WITH rapid improvements of wireless technologies, JOURNAL OF SYSTEMS ARCHITECTURE, SPECIAL ISSUE: HIGHLY-RELIABLE CPS, VOL. 00, NO. 0, MONTH 013 1 Adaptve GTS Allocaton n IEEE 80.15.4 for Real-Tme Wreless Sensor Networks Feng Xa, Ruonan Hao, Je L, Naxue

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

with `ook-ahead for Broadcast WDM Networks TR May 14, 1996 Abstract

with `ook-ahead for Broadcast WDM Networks TR May 14, 1996 Abstract HPeR-`: A Hgh Performance Reservaton Protocol wth `ook-ahead for Broadcast WDM Networks Vjay Svaraman George N. Rouskas TR-96-06 May 14, 1996 Abstract We consder the problem of coordnatng access to the

More information

Report on On-line Graph Coloring

Report on On-line Graph Coloring 2003 Fall Semester Comp 670K Onlne Algorthm Report on LO Yuet Me (00086365) cndylo@ust.hk Abstract Onlne algorthm deals wth data that has no future nformaton. Lots of examples demonstrate that onlne algorthm

More information

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION 24 CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION The present chapter proposes an IPSO approach for multprocessor task schedulng problem wth two classfcatons, namely, statc ndependent tasks and

More information

Convolutional interleaver for unequal error protection of turbo codes

Convolutional interleaver for unequal error protection of turbo codes Convolutonal nterleaver for unequal error protecton of turbo codes Sna Vaf, Tadeusz Wysock, Ian Burnett Unversty of Wollongong, SW 2522, Australa E-mal:{sv39,wysock,an_burnett}@uow.edu.au Abstract: Ths

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Programming in Fortran 90 : 2017/2018

Programming in Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values

More information

Chapter 6 Programmng the fnte element method Inow turn to the man subject of ths book: The mplementaton of the fnte element algorthm n computer programs. In order to make my dscusson as straghtforward

More information