SECTOR BASED MULTICAST ROUTING ALGORITHM FOR MOBILE AD-HOC NETWORKS

Size: px
Start display at page:

Download "SECTOR BASED MULTICAST ROUTING ALGORITHM FOR MOBILE AD-HOC NETWORKS"

Transcription

1 SECTOR BASED MULTICAST ROUTING ALGORITHM OR MOBILE AD-HOC NETWORKS Murali Paramewaran 1 and Chittaranjan Hota 2 1 Department of Computer Science & Information Sytem, BITS-Pilani, Pilani, India 2 Department of Computer Science & Information Sytem, BITS-Pilani, Hyderabad, India ABSTRACT Multicat routing algorithm for mobile ad-hoc network have been extenively reearched in the recent pat. In thi paper, we preent two algorithm for dealing with multicat routing problem uing the notion of virtual force. We look at the effective force exerted on a packet and determine whether a node could be conidered a a Steiner node. The node' location information i ued to generate virtual circuit correponding to the multicat route. QoS parameter are taken into conideration in the form of virtual dampening force. The firt algorithm produce relatively minimal multicat tree under the et of contraint. We improve upon the firt algorithm and preent a econd algorithm that provide improvement in average reidual energy in the network a well a effective cot per data packet tranmitted. In thi paper, the virtual-force technique ha been applied for multicat routing for the firt time in mobile ad-hoc network. KEYWORDS Network Protocol, Wirele Network, Mobile Network, Routing Protocol, Multicating, 1. INTRODUCTION A mobile ad-hoc network (MANET) involve independent node that are rapidly deployed in an environment. Thee mobile node mut make the correct routing deciion in the preence of node mobility, tranient link failure and energy and other contraint. In the event of ending multiple copie of the ame information to multiple node, ue of multicat routing i the preferred option. Depending on how the ditribution path among multicat group member are created, multicat routing protocol can be claified into tree-baed, meh-baed and hybrid multicat routing protocol [1]. Tree-baed protocol can further be ub-divided into ource-tree and core-tree protocol. In our algorithm, we take the middle path by letting the multicat tree be created by the initial packet in tranit. The creation of multicat tree can be equated with the Steiner tree problem. Steiner tree problem for a graph G(V,E) i the problem of finding a tree panning all node in Q, where Q V, uch that the length of the reultant tree i minimized [2],[3]. The et of node S, where S V, S Q = ϕ, are known a Steiner node. A Steiner minimal tree contructed for a local ub-graph of a G need not be part of the minimal tree contructed for the entire graph [2]. Steiner tree problem i known to be NP-complete for planar graph. Approximation algorithm like the one given in [4] have been uggeted for the Steiner tree problem. A related notion i to claify a tree a relatively minimal Steiner tree. In a relatively minimal Steiner tree, the length of DOI : /ijwmn

2 the tree i minimal for the pecific et of node choen to be part of the tree. The problem of multicating reduce to finding a minimal Steiner tree in a graph. The tak of a multicat routing problem i to determine the correct et of Steiner node S o that the tree can reach all terminal node in Q. or efficient communication, any multicat tree created mut at leat be relatively minimal. In our approach, we attempt to determine a relatively minimal Steiner tree with the help of virtual force approach. The notion of virtual force had been explored in deployment problem in wirele enor network [5],[6], and in routing in MANET [7]. In the virtual force approach (VA), the participating node and/or the packet in tranit are applied with ome electric charge. The electrotatic force are computed and the routing deciion i made baed on the magnitude and direction of the reultant force. Poduri, et al. [5] demontrated the ue of a combination of attractive and repulive force for olving enor deployment problem in wirele enor network. Liu, et al. [7],[8] ued the concept of virtual force in unicat routing for MANET. In the routing algorithm for MANET, the reultant force i ued only to make a deciion to move the packet forward. Our main contribution in thi paper i the ue of virtual force in multicat routing for MANET. The notion of virtual force i ued to guide the packet toward the detination. The effective force on the packet i a um of contributing force value from the detination, the ource node and the packet itelf. In addition to the forward guiding force, we ue dampener to limit choice of the next node in the path to accommodate QoS parameter. The combined reult of thee force will let the packet know whether it i currently in a Steiner node. The reultant force will be toward the node that will be in the path to the majority of the detination node in one direction of a branch in the multicat tree. In thi paper, we have ued the virtual force technique for multicating. While attempting to ue the technique for multicating, we identified everal new iue that were not preent in unicat routing algorithm. The firt algorithm propoed in thi paper deal with directly impoing the virtual force technique for MANET. We provide a refined algorithm that ue virtual force in a lightly different manner. We divide the region around the current node into ector and perform a virtual-force baed multicat routing on each of the ector. Multicat routing uing virtual force technique i attempted for the firt time in thi paper. A far a we know, no other paper ha uggeted the ue of ector of variable arc-length for performing multicat routing, in conjunction with the virtual force technique. The remainder of the paper i organized a follow: ection 2 decribe the related work for our algorithm. Section 3 provide overall decription of the technique, along with baic idea, aumption ued and the modelling detail. Section 4 decribe the firt algorithm propoed, viz. multicat routing algorithm uing virtual-force. Section 5 decribe the detail of the ector-baed virtual force-baed multicat routing algorithm. Section 6 contain the imulation reult, while ection 7 conclude the paper. 2. RELATED WORKS Gilbert, et al. in [2] had put forth the criteria that the angle between out-going edge at a branch node for a Steiner node i 120. A relatively minimal Steiner tree i a Steiner tree when thi angle i greater than or equal to 120 for all internal node. In their paper, they have uggeted an inductive property for contructing relatively minimal Steiner tree with the help of unit tenion force from the group node. However, in a real-world network, we do not have control over the location of variou node in the network. Thu, we hould ideally be chooing branching node uch that the angle between the out-going edge are exactly 120, but till be able to handle cae where appropriate node are not available in thoe poition. 50

3 Mauve, et al. uggeted a multicat routing algorithm uing geometric information in [9]. Their greedy algorithm ue a heuritic dependent on the normalized number of next hop neighbour to determine whether a branching node in multicat tree ha been reached. The parameter λ ued in their algorithm determine how late the plit of the multicat forwarding will take place, with λ = 0 indicating an early plit and λ 1 for a very late plit. otopoulou, et al. [10] uggeted the ue of geo-circuit for unicat routing. They computed the unicat path from ource to detination baed on greedy poition-baed trategy and aigned a virtual circuit number to uch path. Once a geo-circuit wa etablihed, they re-ued thi geocircuit to end future packet to the detination till the end of traffic or till the path i updated due to node mobility. The idea of uing geographic virtual circuit can be ued for multicating a well, with a few minor reviion in the route caching ytem. Liu, et al. uggeted two routing algorithm, SWING [8] and SWING+ [7], for unicat routing in MANET baed on the notion of mall world network. Thee algorithm expanded the notion of virtual circuit a decribed by otopoulou, et al. [10] to include long virtual logical link to the urrounding neighbourhood of the current node with the help of virtual force. Thee two protocol were the firt unicat routing protocol to ue virtual force to compute the path toward detination. By computing the repulive force exerted on the neighbour of the current node, the next hop neighbour wa choen a the node with the maximum repulive force from the ource node toward the detination node. They demontrated that their approach work efficiently in a 3-D environment, a well. In thi paper, we extend the notion of virtual-force uggeted by Liu, et al. for multicat routing. Rahman et al. [11] divided the region around the current node into quadrant, and conidered four cloet node in each quadrant for determining the next hop in the multicat tree. Their contention wa that a plit in multicat packet will occur when the detination node belong to multiple quadrant around the current node. They later expanded their algorithm in [12] ued an intelligent energy matrix to increae the average life of the node in the network. Their algorithm provide a very reaonable length of the multicat tree. However, we found that by tatically fixing the quadrant, their algorithm wa generating lightly longer multicat tree. The notion of virtual force a decribed in [7] cannot be ued directly for the multicat routing problem. If we apply electrical charge in only the ource node and the packet, a wa decribed in Liu, et al. [7], we found that we could not really accommodate for multiple detination typical in a multicating environment. Initially, when we attempted to apply the electrical charge in detination node and the packet in tranit, we found that the packet wa moving toward a forceequilibrium poition over and over again, increaing the likelihood of loop in the multicat tree. Alo, upporting QoS parameter in a multicat route i lightly different than adding it in a imple virtual circuit becaue of the nature of path etablihment. Intead of limiting the deciion into fixed quadrant around the current node, a decribed in Rahman, et al. [12], we dynamically divide the region around the current node into α ector baed on the direction of the effective force due to the node in the multicat group. In thi paper, we have devied imple mechanim to adapt the concept of virtual circuit into the multicat environment. 3. MULTICAST ROUTING USING THE VIRTUAL ORCE TECHNIQUE In thi ection, we tart with a dicuion on the aumption and baic working of our multicat routing algorithm with the help of the virtual force technique. We then introduce the ytem model ued. 51

4 3.1. Aumption We aume that location information i available in all node in the network and that all node in the network will become eventually aware of location and mobility information. Mot off-thehelf product currently come with GPS facility. Our algorithm aume that there i an appropriate data tructure that can tore thi location information. Such a data tructure will allow look-up of node location from the node' addre. A far a proper working of the algorithm i concerned, the location information in the immediate vicinity of the current node need to be accurate. There can be light impreciion in the location value of farther node, a the algorithm only compute the bet likely member of the multicat route for the farther node. A the query for computing the multicat route reache cloer to the actual detination(), the intermediate node can divert the query appropriately a it i aumed that the cloer node will have more accurate information. All mobile node are aumed to be having omni-directional antenna, a i the cae with mot of the off-the-helf device. A our algorithm relie on the neighbourhood information derived from the Hello protocol, all mobile node need not be in the ame plane Baic Idea In thi algorithm, we aign poitive charge to ender, the multicat detination, and the packet. The packet i placed at a virtual point near the ender node, and will be guided by the effective repulive force to move toward the node in the multicat group. All the other node are given a tentative charge baed on QoS parameter. When a packet reache node u, we need to decide whether u i a branching node (a node at which the multicat tree branche) or not. If u i a branching node, we need to determine the number of branche to be taken, and the pecific neighbour that will become part of the branch. If u i not a branching node, then we need to determine which of the neighbour in the forwarding direction ha to be choen for the next hop. Let M be the et of node that are part of the multicat group. At the node u, we compute the effective force exerted on the packet due to node belonging to M, M. We take the direction of ˆ M a the forward direction. We compute the effective force on each of the k neighbouring node v 1, v 2,..., v k in neighbourhood et of the current node, N u, by taking into account the cumulative effect of dampening force( E ), u and M. By looking at the effective force on the neighbour, vi we determine the p neighbour w 1, w 2,..., w p which form part of the multicat route, and forward the query to them Sytem Model Liu, et al. [7] defined Equation 1 for computing the virtual force the current node v to the detination v d, where d max i the maximum ditance meaure, and d(v,v d ) i a meaure of ditance between v and v d. Thi equation i ufficient for dealing with a unicat tranmiion, and for the computation of imple, point-to-point force between any two node. However, for a multicat tranmiion, we need to expand the notion to incorporate all the multicat group node. det ( v v ) d d( v, v ), d max d = (1) 52

5 Alternatively, a definition of detination force a given in Equation 2 can alo be ued, where Q i a large contant charge value aigned for eae of computation. Thi i a minor modification of Equation 4 in [7]. det 2 Q, (2) d( v, v ) ( v vd ) =, v vd d At any node in the network, we compute the effective force on the node u due to the current et of detination, M, a hown in Equation 3. Here, i effective force on the node u exerted by all u, M the node in the et of current multicat detination, M. = u, M u, d d M (3) Apart from thi force acting on the packet, there i a force component from the ource node and a dampening force caued by other parameter determining the choice of the next node. The effective force on the packet p at node u i given in Equation 4. = + p, u u. M E u (4) The dampening force E produced by the node u depend on the variou QoS parameter that are u conidered. If k parameter are conidered, the weightage of the i th parameter i α i, the value of the parameter i in the node u i δ u i, the requeted value for the QoS parameter i δ req and the maximum value allowed for that parameter i λ max, then the value of the dampening force at node u i given by Equation 5. Here, for each parameter i, 0 β i 1 and β i = 1. E u ( ) i δ req δ i = u ˆ, u i max α (5) λ igure 1. A ample multi-cat plit node. 53

6 4. MULTICAST ROUTING ALGORITHM USING VIRTUAL-ORCE In thi ection, we dicu the deign of the Multicat Routing Algorithm uing Virtual-force (MRAV) and it peudo-code A ample working of MRAV igure 1 how the node u that need to multicat to ix member of the multicat group M={D1,D2,D3,D4,D5,D6} repreented a circle. Other member of the MANET are indicated a black bubble. Viable communication link are indicated uing line. The node u ha five neighbouring node, namely A, B, C, E and. Let u conider the example of a multicat from node u to the et of detination node depicted in igure 1. The packet at node u experience virtual force a a reult of interaction with all the ix detination node. The direction of the force i indicated with the help of arrow in the figure. We firt compute the effective force on the packet that i currently at node u to each of the detination node. The arrow in the figure indicate the direction of the force vector due to the ix detination. By computing the effective force on the node, we can compute the general forward direction of the node. The igure 2(a) how the variou force value on the current node, u, of the network hown in igure 1. Here the reultant force at the node u i computed a vector addition of all force at the point correponding to node u. or the purpoe of illutration, let u aume that the forward direction, which i the direction of the reultant force, i toward D3. igure 2(b) how the cumulative um of force along the axe at node u. Since there are detination force affecting more than two direction in igure 2(b), it can be inferred that the node u i a branching node, alo termed a a plit node. It now ha to decide which among the node in it neighbourhood et (N u ) will form part of the multicat route. (a) igure 2(a). The virtual force exerted by the detination on node u. (b) Effecting force along axe. Let u have four ubet of the detination et M, named a M 1, M 2, M 3 and M 4, indicating the et of detination node that had contributed to the force vector upward, rightward, downward and leftward repectively. In igure 2(b), the element belonging to the ubet are indicated along with the force component to which they contribute. It can be een that D6 belong to the (b) 54

7 detination ubet M 3, M 2 contain {D4, D5} and M 4 contain {D1, D2}. M1 contain D2, D3, D4, and D5. rom igure 2(b), it can be inferred that only the detination D6 i contributing to the downward direction, which i the direction oppoite to the direction of the effective force at u. Alo, in a clockwie direction tarting from the left-ide, it can be oberved that the angle between D1 and D6 i greater than 180. Becaue of the factor that it i the only node in ubet M 3 a well a being more than 120, D6 i conidered eparate from the remaining et of detination node. To reach D6, the relevant neighbour of u are the node E and. If E i choen a a multicat forwarding node for u, then both detination D5 and D6 can be erved through it. In our algorithm, all node that are within ± 60 from the direction of the choen force vector are conidered to be part of the ame general path toward multicat et. The Query meage i forwarded to node E, with detination et a {D5, D6} When the multicat route query reache the node E, it identifie that D6 i it neighbour. So the node E directly communicate the query meage to D6. To communicate to D5, however, there i no path in the general direction toward it. Thu choice of E a the next node neighbour for communicating to D5 i a wrong one. To circumvent thi iue of wrongly identifying a neighbour to forward the multicat query, we firt evaluate all poibilitie firt, before deciding on the lit of mot uitable forwarding node. If the node till encounter a void, we chooe perimeter routing a dicued in Greedy Perimeter Statele Routing (GPSR)[13]. In thi cae, we firt try to combine D5 and D6 a wa dicued earlier, and then go on to determine the ret of the node to forward the query. The node D1 and D2 can be conidered together, a they form part of the et M 4. The effective force that act on the node B i the tronget among the neighbour of u. Hence, the forwarding node for thee two multicat detination will be B. The remaining node D3 and D4 can now be conidered. The cloet neighbour according to our force metric i node C. or the detination node D5, while comparing between the node C and the node E, it can be oberved that C feel a tronger force than E. The detination D5 i hence removed from the Query meage to node E and then attached to node C. The Query meage i going to be forwarded to the node B, C and E with the detination et marked a {D1, D2}, {D3, D4, D5} and {D6} repectively. Note that the node can be ued to replace E, a the effective force value on both E and due to node D6 i the ame The MRAV Algorithm In thi ection, we dicu the multicat routing algorithm uing virtual-force Data tructure Data tructure relevant for the algorithm are mentioned in thi ub ection. N u : Thi i typically implemented a a linked lit to tore the lit of neighbour of the current node. The lit i updated with the help of repone from the periodic Hello packet tranmitted a per the Hello Protocol. Ρ(M): Thi i the power et of M, uch that all node within each of the ubet created are reachable in increaing value of the angle. or example, in the ample network in igure 1, Ρ(M) may contain {D1, D2, D3}, but may not contain {D1, D3} a there exit a node D2 direction i in between D1 and D3. 55

8 Π : Thi i a priority queue that tore the ubet of node with highet force value on the front of the queue. It i aumed that thi queue alo ha eparate lookup function implemented that can retrieve the force value for any ubet given a input to the function. Thi can be achieved by including an auxiliary data tructure in the form of a hah table along with Π. v : The et of poible neighbour to chooe from, while marking a plit node. Thi lit tore the next node a well a the lit of detination that are reachable from it Algorithm The algorithm for ending a Query meage i hown in Algorithm 1. Once the Query meage ha reached the detination or a plit node, a virtual circuit linking the detination and the previou plit node or the ource node hall be contructed a the acknowledgement to the Query travel back to the ource node. Algorithm 1: Multicat routing Algorithm uing Virtual-force 1: procedure SendQuery(u,M) 2: if u M then // The current node i itelf a multicat detination 3: M M {u} 4: end if 5: for each v N v M do u // A neighbour of the current node i a multicat detination 6: Call SendQuery ( v, M ) 7: end for 8: Let M = M 9: Repeat 10: for each Ρ(M) do 11: calculatevirtualorce ( u, ) 12: Add, to Π(M) 13: end for 14: Let M be front(π(m)) 15: o o Compute w N,. t. uw, Mˆ 60 Mˆ, uw u 60 16: if = M then // all node are in the ame general direction M 17: Call SendQuery ( w, M ) and exit 18: end if 19: Add (w, M ) to v 20: Remove all entrie from Ρ(M) which contain the detination node M 21: M = M - M 22: while M ϕ 23: Mark u a plit node 24: for each v do v 25: if ϕ then v v max 26: elect w = max w, M E w w v 27: Check for other detination in the direction of uw and verify whether they can alo 56

9 be addreed by the ame neighbour, w. 28: SendQuery ( w, M ) 29: end if 30: end for 31: end procedure 5. SECTOR-BASED MULTICAST ROUTING ALGORITHM In thi ection, we dicu the ector-baed virtual-force-baed multi-cat routing algorithm Motivation Though MRAV ue virtual force technique to correctly identify the et of neighbour to whom the query meage need to be forwarded, the meage complexity for making the computation i on the higher ide. One of the reaon for higher overhead and energy conumption derive from the fact that the algorithm compare all the node in the neighbourhood for making the routing deciion. However, mot of the node queried are not in the general direction of communication. The number of node that need to be enquired about the effective force value can hence be reduced. At each node u, we need to identify the ubet of N u that are leat likely to be part of the multicat route. The primary challenge while trying to decide which node can be excluded for path computation come from the uncertainty regarding the ret of the network Baic working Unlike MRAV and [12], we divide the node around u into α ector, with each ector covering an angle of θ = 2 π. Here, α varie from 3 to 6 depending on the denity of the region α containing u. or α = 4, we haveθ = π. or each of the α ector containing ome detination 2 node, we elect the appropriate neighbour in that ector to forward the packet. We compute the effective force on each of the k neighbouring node v 1, v 2,..., v k in the ector, by taking into account the cumulative effect of dampening force( E ), u and M, where M M, M contain vi all the detination node in ector. Once the appropriate forwarding node v for the ector i determined, the packet i communicated to v along with M, which i the et of detination node to be handled in ector. When a ource node i intereted in tranmitting a packet to a multicat group M, it firt end a Query meage to etablih the multicat route. Thi Query meage contain a pointer to indicate the multicat group and the et of node in M repreented uing bit array. The algorithm for ending the Query meage i given in Algorithm 1. When a node u decide on forwarding a packet to the detination, it determine whether it ha to plit the multicat packet or not. The node determine whether all detination are in the ame general direction or not by computing the effective force from detination,. If u, M and u, M are in oppoing direction, then the node determine the appropriate neighbour in the, u forward direction to route the Query packet. The bet way to determine whether all node are in 57

10 the ame general direction i to check whether the direction of force from each detination, d i, where d i M, are within ± angle from. u, M θ 2 igure 3 how a imple illutration on how the force vector are ued in our algorithm. irt, by uing Equation 3, the effective repulive force on the node u due to the detination in multicat group M, given a, i computed. The next tep i to divide the region around the node u into u, M α ector. Here α i the plit parameter that we ue. or dividing the region into ector, we firt look at the unit vector correponding to the effective detination force, ˆ. rom the direction u, M of the unit vector, we take all node within angle θ ± a the firt ector, where π θ = 2. In the 2 α example in igure 3, α=4 and π θ =. The node within the next θ radian form part of the econd 2 ector. Thu, α ector will be marked around the current node u. The four ector in igure 3 are divided by the dotted line a illutrated. Now, we divide the neighbour of u into α et (V 1, V 2,..., V α ), uch that all neighbouring node in ector are put inide the et. We apply the ame procedure to divide the node in M into v (M 1, M 2,..., M α ), where each et M indicate the et of detination node in the current detination et M. In the example in igure 1, the et M i divided into two et M 1 = {d 1 } and M 2 = {d 2, d 3, d 4 } correponding to ector 1 and 2. Similarly, the neighbour of u are divided into two et; V 1 V i =N u, where N u i the et of neighbouring node of = {v n1, v n2 } and V 2 ={v n3, v n4, v n5 }. Here, U i the current node u. Alo, U i M i = M. igure 3. Virtual orce acting on node u with α=4. Once the ubet of M, M, ha been computed, we can eaily determine whether any ector i having detination or not by checking for the condition: M = ϕ. If the condition hold true, then 58

11 we don't have to explore that ector. If M ϕ, then we have to determine appropriate neighbour to forward the packet in that ector. To chooe the appropriate neighbour in ector, firt we have to determine whether v = ϕ. If o, then we have encountered a void in that ector. The implet way to overcome void in the network i to follow the approach taken by Liu, et al. in [7]. Virtual force i ued to cro acro the void if poible, or ele the perimeter rule of greedy perimeter tatele routing (GPSR) algorithm [13] i applied. If v ϕ, then the effective force on the packet a given in Equation 4 i computed for each neighbour in v. The neighbour w w v with the maximum force on the packet i choen a the next hop neighbour Algorithm The algorithm that ue the notion of ector and virtual force, ector-baed virtual force-baed multicat routing algorithm (VM), i hown in Algorithm 2. Algorithm 2: Virtual orce-baed Multicat routing algorithm 1: procedure SendQuery(u,M) 2: if u M then 3: M M {u} 4: end if 5: for each v N v M do u 6: Call SendQuery ( v, M ) 7: end for M u. m 8: calculatevirtualorce( u, ) 9: Divide region into α ector centred at u, each of angle θ uch that firt ector lie within θ ± of 2 ˆ u. M 10: for each ector do 11: ϕ v 12: for each v N do u 13: if = ector( v) then 14: v v v 15: end if 16: end for 17: end for 18: for each ector do 19: ϕ M 20: for each d M do 21: if = ec tor( d) then 22: d 23: end if 24: end for 25: end for M M 59

12 M 26: for each ector uch that ϕ do 27: if ϕ then v v max 28: elect w = max w, M E w v 29: SendQuery ( w, M ) 30: end if 31: end for 32: end procedure w 6. SIMULATION RESULTS We have performed imulation of our algorithm uing a imulator written in Python language. The imulator ue the ame energy model and Two Ray propagation model a implemented in n-2. or the imulation run, we have placed node in a fixed area of 2000m x 2000m with maximum tranmiion range et a 250m. We have compared MRAV and VM with the QBIECRA algorithm propoed by Rahman, et al. [11]. While comparing with the ector-baed VM algorithm, we have taken α value a 3, 4 and 6. We have choen QBIECRA ince it ue a notion of quadrant for computing the multicat tree. Though Rahman, et al. alo propoed another verion of their quadrant baed algorithm in [12], while performing imulation we didn t perceive a major difference between the reult of QBIECRA and 4-N Intelligent routing. Thi i may be due to the fact that thee algorithm only differ on the bai of which four neighbour are going to be choen for computing the next forwarding node in the multicat path. The imulation reult obtained are dicued in the ret of thi ection. igure 4. Average normalized reidual energy over time Average normalized reidual energy i computed a the average reidual energy of all node in the network normalized in percentage term to account for variation in initial energy value of variou node. We have computed the average of reidual energy in each of the node after completing one cycle of packet tranmiion for a ender node in each epoch, and are howing the normalized value in percentage term after each epoch. The reult for normalized average 60

13 reidual energy are hown in igure 4. MRAV perform lightly better than QBIECRA. We oberved that in the initial period, the choice made by QBIECRA and MRAV were ame in many cae. But the choice began to diverge only later, when there wa ignificant difference between the choice made, primarily due to the effect of the dampening force. or VM, we oberved that for all value of α, it performed a ame a or better than QBIECRA and MRAV. igure 5. Normalized cot per data packet over time Normalized cot per data packet i computed a the overall cot for ending a data packet from ource node to detination that i normalized in term of percentile energy cot for the ake of comparion acro multiple imulation run with varying network ize. The reult for thi metric are hown in igure 5. We oberved that VM perform better than QBIECRA primarily by optimizing the effective energy pent on optimal path computation. Due to the number of comparion made, MRAV wa performing wore than VM. We couldn t tatitically etablih a clear difference between MRAV and QBIECRA baed on normalized cot per data packet. igure 6. Average length of multicat tree with repect to number of node 61

14 We alo oberved the effective length of the multicat tree generated a hown in igure 6. We oberved a variation in the general trend of length of the multicat tree for 20 node for both of our algorithm. We attribute thi variation to the choice of multicat et, preence of void and other apect pecific to the tet graph ued for imulation. Even with thi variation, both MRAV and VM provided horter length for multicat tree a compared to QBIECRA. MRAV performed conitently better than QBIECRA a far a thi metric i concerned for a larger network. or very mall network, there wa no major difference between the two algorithm. We oberved that 120 i the bet angle between the branche for getting relatively minimal Steiner tree a defined by Gilbert, et al.[2]. A expected, the length of the multicat tree wa nearing the optimal value for α=3. We urpriingly found that we were getting good reult for α=4 a well. Thi wa primarily due to the fact that we were not having many out-going edge in the oppoite direction of the forward path. When it came to α=6, our algorithm performed wore a expected, a we were generating too many out-going edge in ome node reulting in a ub-optimal multicat tree. However, the performance of VM algorithm wa till better than QBIECRA a een from the figure. 7. CONCLUSIONS We have applied the notion of virtual force for energy efficient multicat routing in MANET. We have preented two algorithm centred on the virtual-force technique. Our algorithm generate relatively minimal Steiner tree for ue in multicat routing. The imulation reult indicate that our algorithm perform better than other quadrant/ector baed multicat routing algorithm. We have evaluated appropriate choice for the number of ector to be ued, and have found that α = 3 or 4 can be ued to generate energy efficient multicat path. While we were applying the notion of virtual force for multicating, we oberved that the approach a a whole provide good reult. We haven t yet explored the relationhip between the value of α and network denity and pread. However, we believe that there i till cope in fine tuning the force model ued. Though we had only ued life of the network for QoS, the dampening force can eaily be extended to include other parameter a well. The propoed algorithm have hown that the virtual force approach can be uccefully ued in MANET. To our knowledge, thi i the firt paper that perform multicat routing algorithm uing the virtual force approach in mobile ad-hoc network. Thi i alo the firt paper to perform virtual-force computation on the bai of ector. REERENCES [1] Luo Junhai, Ye Danxia, Xue Liu, and an Mingyu. A urvey of multicat routing protocol for mobile ad-hoc network. Communication Survey Tutorial, IEEE, 11(1):78 91, quarter [2] E. Gilbert and H. Pollak. Steiner minimal tree. SIAM Journal on Applied Mathematic, 16(1):1 29, [3] Marhall Bern and Paul Plamann. The Steiner problem with edge length 1 and 2. Information Proceing Letter, 32(4): , [4] Glencora Borradaile, Philip Klein, and Claire Mathieu. An o(n log n) approximation cheme for teiner tree in planar graph. ACM Tran. Algorithm, 5(3):31:1 31:31, July [5] S. Poduri and G.S. Sukhatme. Contrained coverage for mobile enor network. In Robotic and Automation, Proceeding. ICRA IEEE International Conference on, volume 1, page Vol.1, april-1 may

15 [6] Y. Zou and Krihnendu Chakrabarty. Senor deployment and target localization baed on virtual force. In INOCOM Twenty-Second Annual Joint Conference of the IEEE Computer and Communication. IEEE Societie, volume 2, page vol.2, march-3 april [7] Cong Liu and Jie Wu. Virtual-force-baed geometric routing protocol in manet. Parallel and Ditributed Sytem, IEEE Tranaction on, 20(4): , april [8] Cong Liu and Jie Wu. Swing: Small world iterative navigation greedy routing protocol in manet. In Computer Communication and Network, ICCCN Proceeding.15th International Conference on, page , oct [9] Martin Mauve, Holger üler, Jörg Widmer, and Thoma Lang. Poition-baed multicat routing for mobile ad-hoc network. SIGMOBILE Mob. Comput. Commun. Rev., 7(3):53 55, July [10] S. otopoulou-prigipa and A.B. McDonald. Gcrp: geographic virtual circuit routing protocol for ad hoc network. In Mobile Ad-hoc and Senor Sytem, 2004 IEEE International Conference on, page , oct [11].M. Rahman and M.A. Gregory. Quadrant baed intelligent energy controlled multicat algorithm for mobile ad hoc network. In Advanced Communication Technology (ICACT), th International Conference on, page , feb [12].M. Rahman and M.A. Gregory. 4-n intelligent manet routing algorithm. In Autralaian Telecommunication Network and Application Conference (ATNAC), 2011, page 1 6, nov [13] Brad Karp and H. T. Kung. Gpr: greedy perimeter tatele routing for wirele network. In Proceeding of the 6th annual international conference on Mobile computing and networking, MobiCom 00, page , New York, NY, USA, ACM. Author Murali Paramewaran: i currently puruing hi PhD in Computer Science and Engineering from Birla Intitute of Technology & Science, Pilani. Hi reearch interet include: Ditributed Algorithm, Wirele Ad hoc Network, and Network Security. He i a member of IEEE, ACM and IETE. Chittaranjan Hota: did hi PhD in Computer Science and Engineering from Birla Intitute of Technology & Science, Pilani. He wa the founding head at BITS Hyderabad and currently he i the aculty In-charge of Information Proceing Center. He ha been a viiting reearcher and viiting profeor at everal univeritie abroad over pat few year. He ha current reearch funding from organization like UGC, DIT, Intel, and TCS. He ha guided PhD tudent and currently guiding PhD tudent in the area of P2P Overlay, Information Security, Wirele Network, and Ditributed Scheduling. He i a member of IEEE, ACM, IE, and ISTE. 63

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

Power Aware Location Aided Routing in Mobile Ad-hoc Networks

Power Aware Location Aided Routing in Mobile Ad-hoc Networks International Journal of Scientific and Reearch Publication, Volume, Iue 1, December 01 1 Power Aware Location Aided Routing in Mobile Ad-hoc Network Anamika Computer Science, Inderprataha Engineering

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline Generic Travere CS 62, Lecture 9 Jared Saia Univerity of New Mexico Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v) from the bag if (v i unmarked) mark v; parent(v) = p;

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

Motion Control (wheeled robots)

Motion Control (wheeled robots) 3 Motion Control (wheeled robot) Requirement for Motion Control Kinematic / dynamic model of the robot Model of the interaction between the wheel and the ground Definition of required motion -> peed control,

More information

Minimum Energy Reliable Paths Using Unreliable Wireless Links

Minimum Energy Reliable Paths Using Unreliable Wireless Links Minimum Energy Reliable Path Uing Unreliable Wirele Link Qunfeng Dong Department of Computer Science Univerity of Wiconin-Madion Madion, Wiconin 53706 qunfeng@c.wic.edu Micah Adler Department of Computer

More information

Research Article Longest Path Reroute to Optimize the Optical Multicast Routing in Sparse Splitting WDM Networks

Research Article Longest Path Reroute to Optimize the Optical Multicast Routing in Sparse Splitting WDM Networks International Optic Volume 0, Article ID 9, page http://dxdoiorg/0/0/9 Reearch Article Longet Path Reroute to Optimize the Optical Multicat Routing in Spare Splitting WDM Network Huanlin Liu, Hongyue Dai,

More information

A Multi-objective Genetic Algorithm for Reliability Optimization Problem

A Multi-objective Genetic Algorithm for Reliability Optimization Problem International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR

More information

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two

More information

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -

More information

Service and Network Management Interworking in Future Wireless Systems

Service and Network Management Interworking in Future Wireless Systems Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering

More information

3D SMAP Algorithm. April 11, 2012

3D SMAP Algorithm. April 11, 2012 3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative

More information

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.

More information

Chapter 13 Non Sampling Errors

Chapter 13 Non Sampling Errors Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption

More information

xy-monotone path existence queries in a rectilinear environment

xy-monotone path existence queries in a rectilinear environment CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of

More information

A Local Mobility Agent Selection Algorithm for Mobile Networks

A Local Mobility Agent Selection Algorithm for Mobile Networks A Local Mobility Agent Selection Algorithm for Mobile Network Yi Xu Henry C. J. Lee Vrizlynn L. L. Thing Intitute for Infocomm Reearch, 21 Heng Mui Keng Terrace, Singapore 119613 Email: {yxu, hlee, vriz}@i2r.a-tar.edu.g

More information

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov

More information

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in

More information

UC Berkeley International Conference on GIScience Short Paper Proceedings

UC Berkeley International Conference on GIScience Short Paper Proceedings UC Berkeley International Conference on GIScience Short Paper Proceeding Title A novel method for probabilitic coverage etimation of enor network baed on 3D vector repreentation in complex urban environment

More information

Diverse: Application-Layer Service Differentiation in Peer-to-Peer Communications

Diverse: Application-Layer Service Differentiation in Peer-to-Peer Communications Divere: Application-Layer Service Differentiation in Peer-to-Peer Communication Chuan Wu, Student Member, IEEE, Baochun Li, Senior Member, IEEE Department of Electrical and Computer Engineering Univerity

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

Algorithmic Discrete Mathematics 4. Exercise Sheet

Algorithmic Discrete Mathematics 4. Exercise Sheet Algorithmic Dicrete Mathematic. Exercie Sheet Department of Mathematic SS 0 PD Dr. Ulf Lorenz 0. and. May 0 Dipl.-Math. David Meffert Verion of May, 0 Groupwork Exercie G (Shortet path I) (a) Calculate

More information

Planning of scooping position and approach path for loading operation by wheel loader

Planning of scooping position and approach path for loading operation by wheel loader 22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader

More information

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT

More information

Multi-Target Tracking In Clutter

Multi-Target Tracking In Clutter Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

How to Select Measurement Points in Access Point Localization

How to Select Measurement Points in Access Point Localization Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,

More information

Multicast with Network Coding in Application-Layer Overlay Networks

Multicast with Network Coding in Application-Layer Overlay Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 1, JANUARY 2004 1 Multicat with Network Coding in Application-Layer Overlay Network Ying Zhu, Baochun Li, Member, IEEE, and Jiang Guo Abtract

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

Separation of Routing and Scheduling in Backpressure- Based Wireless Networks

Separation of Routing and Scheduling in Backpressure- Based Wireless Networks Separation of Routing and Scheduling in - Baed Wirele Network The MIT Faculty ha made thi article openly available. Pleae hare how thi acce benefit you. Your tory matter. Citation A Publihed Publiher Seferoglu,

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II IEEE INFOCO 2002 1 Ditributed Partial Information anagement (DPI) Scheme for Survivable Network - Part II Dahai Xu Chunming Qiao Department of Computer Science and Engineering State Univerity of New York

More information

A Novel Feature Line Segment Approach for Pattern Classification

A Novel Feature Line Segment Approach for Pattern Classification 12th International Conference on Information Fuion Seattle, WA, USA, July 6-9, 2009 A Novel Feature Line Segment Approach for Pattern Claification Yi Yang Intitute of Integrated Automation Xi an Jiaotong

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

Edits in Xylia Validity Preserving Editing of XML Documents

Edits in Xylia Validity Preserving Editing of XML Documents dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online

More information

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt

More information

AUTOMATIC TEST CASE GENERATION USING UML MODELS

AUTOMATIC TEST CASE GENERATION USING UML MODELS Volume-2, Iue-6, June-2014 AUTOMATIC TEST CASE GENERATION USING UML MODELS 1 SAGARKUMAR P. JAIN, 2 KHUSHBOO S. LALWANI, 3 NIKITA K. MAHAJAN, 4 BHAGYASHREE J. GADEKAR 1,2,3,4 Department of Computer Engineering,

More information

Kinematics Programming for Cooperating Robotic Systems

Kinematics Programming for Cooperating Robotic Systems Kinematic Programming for Cooperating Robotic Sytem Critiane P. Tonetto, Carlo R. Rocha, Henrique Sima, Altamir Dia Federal Univerity of Santa Catarina, Mechanical Engineering Department, P.O. Box 476,

More information

else end while End References

else end while End References 621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized

More information

A Practical Model for Minimizing Waiting Time in a Transit Network

A Practical Model for Minimizing Waiting Time in a Transit Network A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,

More information

Stream: Low Overhead Wireless Reprogramming for Sensor Networks

Stream: Low Overhead Wireless Reprogramming for Sensor Networks Thi full text paper wa peer reviewed at the direction of IEEE Communication Society ubject matter expert for publication in the IEEE INFOCOM 27 proceeding. : Low Overhead Wirele Reprogramming for Senor

More information

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck. Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization

More information

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem

More information

Efficient Data Forwarding in Mobile Social Networks with Diverse Connectivity Characteristics

Efficient Data Forwarding in Mobile Social Networks with Diverse Connectivity Characteristics Efficient Data Forwarding in Mobile Social Network with Divere Connectivity Characteritic Xiaomei Zhang and Guohong Cao Department of Computer Science and Engineering The Pennylvania State Univerity, Univerity

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and

More information

An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring

An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring ABSTRACT Overlay network monitoring enable ditributed Internet application to detect and recover from path outage and period of degraded

More information

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal

More information

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

Diff-Max: Separation of Routing and Scheduling in Backpressure-Based Wireless Networks

Diff-Max: Separation of Routing and Scheduling in Backpressure-Based Wireless Networks Diff-Max: Separation of Routing and Scheduling in -Baed Wirele Network Hulya Seferoglu and Eytan Modiano Laboratory For Information and Deciion Sytem Maachuett Intitute of Technology {heferog, modiano}@mit.edu

More information

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh

More information

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent

More information

Embedding Service Function Tree with Minimum Cost for NFV Enabled Multicast

Embedding Service Function Tree with Minimum Cost for NFV Enabled Multicast 1 Embedding Service Function Tree with Minimum ot for NFV Enabled Multicat angbang Ren, Student Member, IEEE, eke Guo, Senior Member, IEEE, Yulong Shen, Member, IEEE, Guoming Tang, Member, IEEE, Xu Lin,

More information

Floating Point CORDIC Based Power Operation

Floating Point CORDIC Based Power Operation Floating Point CORDIC Baed Power Operation Kazumi Malhan, Padmaja AVL Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland Univerity, Rocheter, MI e-mail: kmalhan@oakland.edu,

More information

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1 (19) United State US 2011 0316690A1 (12) Patent Application Publication (10) Pub. No.: US 2011/0316690 A1 Siegman (43) Pub. Date: Dec. 29, 2011 (54) SYSTEMAND METHOD FOR IDENTIFYING ELECTRICAL EQUIPMENT

More information

New Structural Decomposition Techniques for Constraint Satisfaction Problems

New Structural Decomposition Techniques for Constraint Satisfaction Problems New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.

More information

Shortest Path Routing in Arbitrary Networks

Shortest Path Routing in Arbitrary Networks Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,

More information

Policy-based Injection of Private Traffic into a Public SDN Testbed

Policy-based Injection of Private Traffic into a Public SDN Testbed Intitut für Techniche Informatik und Kommunikationnetze Adrian Friedli Policy-baed Injection of Private Traffic into a Public SDN Tetbed Mater Thei MA-2013-12 Advior: Dr. Bernhard Ager, Vaileio Kotroni

More information

Image authentication and tamper detection using fragile watermarking in spatial domain

Image authentication and tamper detection using fragile watermarking in spatial domain International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: 2278 1323 Image authentication and tamper detection uing fragile watermarking

More information

/06/$ IEEE 364

/06/$ IEEE 364 006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;

More information

A Novel Grey-RSS Navigation System Design for Mobile Robots

A Novel Grey-RSS Navigation System Design for Mobile Robots A vel Grey-RSS Navigation Sytem Deign for Mobile Robot Albert Wen-Long Yao*,, Hin-Te Liao, and Shiou-De Chen Department of Mechanical and Automation Engineering, National Kaohiung Firt Univerity of Science

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

Shortest Paths with Single-Point Visibility Constraint

Shortest Paths with Single-Point Visibility Constraint Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet

More information

SIMIT 7. Profinet IO Gateway. User Manual

SIMIT 7. Profinet IO Gateway. User Manual SIMIT 7 Profinet IO Gateway Uer Manual Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult are only non-binding uggetion

More information

Chapter S:II (continued)

Chapter S:II (continued) Chapter S:II (continued) II. Baic Search Algorithm Sytematic Search Graph Theory Baic State Space Search Depth-Firt Search Backtracking Breadth-Firt Search Uniform-Cot Search AND-OR Graph Baic Depth-Firt

More information

A Study of a Variable Compression Ratio and Displacement Mechanism Using Design of Experiments Methodology

A Study of a Variable Compression Ratio and Displacement Mechanism Using Design of Experiments Methodology A Study of a Variable Compreion Ratio and Diplacement Mechanim Uing Deign of Experiment Methodology Shugang Jiang, Michael H. Smith, Maanobu Takekohi Abtract Due to the ever increaing requirement for engine

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and Thi article appeared in a journal publihed by Elevier. The attached copy i furnihed to the author for internal non-commercial reearch and education ue, including for intruction at the author intitution

More information

A TOPSIS based Method for Gene Selection for Cancer Classification

A TOPSIS based Method for Gene Selection for Cancer Classification Volume 67 No17, April 2013 A TOPSIS baed Method for Gene Selection for Cancer Claification IMAbd-El Fattah,WIKhedr, KMSallam, 1 Department of Statitic, 3 Department of Deciion upport, 2 Department of information

More information

DECENTRALIZED structured overlays and distributed. Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn

DECENTRALIZED structured overlays and distributed. Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Harvard Technical Report TR-3-4 Ditributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Jonathan Ledlie and Margo Seltzer Abtract Numerou propoal exit for load balancing in peer-to-peer (pp)

More information

Landmark Selection and Greedy Landmark-Descent Routing for Sensor Networks

Landmark Selection and Greedy Landmark-Descent Routing for Sensor Networks 1 Landmark Selection and Greedy Landmark-Decent Routing for Senor Network An Nguyen Nikola Miloavljević Qing Fang Jie Gao Leonida J. Guiba Department of Computer Science, Stanford Univerity. {anguyen,nikolam,guiba}@c.tanford.edu

More information

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Iue 4, April 2015 International Journal Advance Reearch in Computer Science and Management Studie Reearch Article / Survey Paper / Cae Study Available online at: www.ijarcm.com

More information

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks Nearly Contant Approximation for Data Aggregation Scheduling in Wirele Senor Network Scott C.-H. Huang, Peng-Jun Wan, Chinh T. Vu, Yinghu Li and France Yao Computer Science Department, City Univerity of

More information

Domain-Specific Modeling for Rapid System-Wide Energy Estimation of Reconfigurable Architectures

Domain-Specific Modeling for Rapid System-Wide Energy Estimation of Reconfigurable Architectures Domain-Specific Modeling for Rapid Sytem-Wide Energy Etimation of Reconfigurable Architecture Seonil Choi 1,Ju-wookJang 2, Sumit Mohanty 1, Viktor K. Praanna 1 1 Dept. of Electrical Engg. 2 Dept. of Electronic

More information

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds * Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm

More information

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,

More information

Energy-efficient beaconless geographic routing in energy harvested wireless sensor networks

Energy-efficient beaconless geographic routing in energy harvested wireless sensor networks CONCURRNCY AND COMPUTATION: PRACTIC AND XPRINC Concurrency Computat.: Pract. xper. (2012) Publihed online in Wiley Online Library (wileyonlinelibrary.com)..2838 SPCIAL ISSU PAPR nergy-efficient beaconle

More information

On Peer-to-Peer Media Streaming Λ

On Peer-to-Peer Media Streaming Λ On eer-to-eer Media Streaming Λ Dongyan Xu y, Mohamed Hefeeda, Suanne Hambruch, Bharat Bhargava Department of Computer Science urdue Univerity, Wet Lafayette, IN 797 fdxu, hefeeda, eh, bbg@c.purdue.edu

More information

Optimal Peer-to-Peer Technique for Massive Content Distribution

Optimal Peer-to-Peer Technique for Massive Content Distribution 1 Optimal Peer-to-Peer Technique for Maive Content Ditribution Xiaoying Zheng, Chunglae Cho and Ye Xia Computer and Information Science and Engineering Department Univerity of Florida Email: {xiazheng,

More information

Priority-Based Distribution Trees for Application-Level Multicast

Priority-Based Distribution Trees for Application-Level Multicast Priority-Baed Ditribution Tree for Application-Level Multicat Jürgen Vogel, Jörg Widmer, Dirk Farin, Martin Mauve, Wolfgang Effelberg Praktiche Informatik IV, Univerity of Mannheim, Germany vogel, widmer,

More information

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity

More information

Research Article Real-Time Communications in Large-Scale Wireless Networks

Research Article Real-Time Communications in Large-Scale Wireless Networks Hindawi Publihing Corporation International Journal of Digital Multimedia Broadcating Volume 2008, Article ID 586067, 16 page doi:10.1155/2008/586067 eearch Article eal-time Communication in Large-Scale

More information

An Intro to LP and the Simplex Algorithm. Primal Simplex

An Intro to LP and the Simplex Algorithm. Primal Simplex An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n

More information

A Unicast-based Approach for Streaming Multicast

A Unicast-based Approach for Streaming Multicast A Unicat-baed Approach for Streaming Multicat Reuven Cohen and Gideon Kaempfer Department of Computer Science Technion, Haifa 32000, Irael Abtract Network layer multicat i know a the mot efficient way

More information

Markov Random Fields in Image Segmentation

Markov Random Fields in Image Segmentation Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image

More information

Semi-Distributed Load Balancing for Massively Parallel Multicomputer Systems

Semi-Distributed Load Balancing for Massively Parallel Multicomputer Systems Syracue Univerity SUFAC lectrical ngineering and Computer Science echnical eport College of ngineering and Computer Science 8-1991 Semi-Ditributed Load Balancing for aively Parallel ulticomputer Sytem

More information

An Approach to a Test Oracle for XML Query Testing

An Approach to a Test Oracle for XML Query Testing An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,

More information

Drawing Lines in 2 Dimensions

Drawing Lines in 2 Dimensions Drawing Line in 2 Dimenion Drawing a traight line (or an arc) between two end point when one i limited to dicrete pixel require a bit of thought. Conider the following line uperimpoed on a 2 dimenional

More information

Modeling of underwater vehicle s dynamics

Modeling of underwater vehicle s dynamics Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation

More information

Distributed Media-Aware Rate Allocation for Video Multicast over Wireless Networks

Distributed Media-Aware Rate Allocation for Video Multicast over Wireless Networks Ditributed Media-Aware Rate Allocation for Video Multicat over Wirele Network Xiaoqing Zhu, Thoma Schierl, Thoma Wiegand, Senior Member, IEEE, and Bernd Girod, Fellow, IEEE Abtract A unified optimization

More information