Deakin Research Online

Size: px
Start display at page:

Download "Deakin Research Online"

Transcription

1 Deakn Research Onlne Ths s the publshed verson: Chellappa Doss, Robn, Chandra, D., Pan, L., Zhou, Wanle and Chowdhury, Morshed 6, Address reuse n wreless sensor networks, n ATNAC, Australan Telecommuncaton Networks and Applcatons Conference, 6., Australan Telecommuncaton Networks & Applcatons Conference, Melbourne, Vc, pp. 9-. Avalable from Deakn Research Onlne: Every reasonable effort has been made to ensure that permsson has been obtaned for tems ncluded n Deakn Research Onlne. If you beleve that your rghts have been nfrnged by ths repostory, please contact drosupport@deakn.edu.au Copyrght : 6, ATNAC

2 Address Reuse n Wreless Sensor Networks R. Chellappa Doss, D. Chandra, L. Pan, W.Zhou, M. Chowdhury School of Engneerng and Informaton Technology Deakn Unversty, Burwood Hwy, Vctora 5, Australa. {rchell, dchandra, ln, wanle, muc}@deakn.edu.au Abstract Sensor Networks have applcatons n dverse felds. Whle unque addressng s not a requrement of many data collectng applcatons of wreless sensor networks, t s vtal for the success of applcatons such as emergency response. Data that cannot be assocated wth a specfc node becomes useless n such stuatons. In ths work we propose a dynamc addressng mechansm for wreless sensor networks. The scheme enables successful reuse of addresses n event-drven wreless sensor networks. It also elmnates the need for network-wde Duplcate Address Detecton (DAD) to ensure unqueness of network level addresses. Keywords Wreless Sensors, System Desgn. I. INTRODUCTION Wreless sensor networks (WSN) represent the next step n the evoluton of wreless communcaton. They are self-organzng networks that do not depend on a fxed communcaton nfrastructure []. An applcaton that s becomng ncreasngly attractve s the use of WSNs for emergency (frst) response n mass casualty ncdents. It s envsoned that these networks wll play a pvotal role n dsaster response and recovery []. WSN applcatons can be categorzed as ether datacentrc or node-centrc applcatons. Whle both categores of applcatons are concerned wth data montorng/collectng, data-centrc applcatons do not requre the node of data generaton to be unquely dentfed. Unlke n data-centrc applcatons, nodecentrc applcatons requre the dentty of the node of data generaton. In such applcatons data that s collected becomes useless f the source (sensor node) cannot be unquely dentfed. An example s vtal-sgn montorng applcatons such as n emergency response [] []. Two levels of nformaton can be dentfed n sensor nodes events and data. Events are defned as crtcal data that s generated by a node [5] (e.g., a patent s vtal sgn measurement falls below a crtcal threshold or enemy movement has been detected). In event-drven sensor networks only events are of nterest and need to be communcated to the snk. In ths work, we propose an On-demand Locaton Aded Addressng mechansm that can enable address reuse by explotng the random nature of event occurrence n large scale WSNs. In secton II we present related work followed by our proposed scheme n Secton III. Analyss of the scheme s presented n Secton IV. We conclude wth fnal comments n Secton V. II. RELATED WORK The need for effcent addressng schemes s well artculated wth varous addressng schemes proposed n lterature [] [5] [6] [7] [8] [9]. In [] an energy-effcent node addressng scheme usng spatal reuse of locally unque addresses s presented. Nodes are organzed n a herarchy of logcal layers and used to satsfy the unqueness condton. TreeCast [5] s a stateless addressng scheme proposed for effcent addressng. It requres the constructon of multple dsjont trees. A smlar scheme [8] s based on the concept of herarchcal levels and repeated patterns and supports self-organzaton n sensor networks. In [] a dstrbuted on-demand addressng mechansm s proposed for assgnment of MAC addresses. It explots spatal reuse of addresses and uses Huffman codng to reduce the address length n the packer header. Event-drven addressng has been proposed n [7]. Local unqueness between mmedate neghbors s amed for wth lnk level addressng whle an on-demand mechansm for network level addressng s proposed. The addressng protocol s coupled wth the routng protocol and employs Duplcate Address Detecton (DAD). In [6], data aggregaton and dluton by modulus addressng s proposed whle an addressng mechansm based on a herarchcal archtecture usng de Brujn graphs s proposed n [9]. All of the above addressng schemes place the complexty of the addressng process on the sensor nodes by nsstng on strct organzaton or by DAD through floodng. In our work the complexty s removed from the sensor nodes to the network control centre (snk). III. DYNAMIC ADDRESSING FOR WSNS The proposed addressng mechansm s an on-demand addressng protocol that employs a lease-based approach for address assgnment. It explots the random nature of event occurrence n event-drven sensor networks. Snce events occur at random, addresses can be assgned and released n a dynamc manner enablng the reuse of addresses. In large scale sensor networks such an approach wll reduce the overhead of addressng qute sgnfcantly. Locaton awareness s a requrement of many WSN applcatons [6]. The proposed mechansm ncorporates locaton awareness and works wth both absolute and relatve levels of awareness. The proposed

3 addressng scheme has fve man phases of operaton. We shall dscuss the operatons of each of these phases n detal below. A. Boot Up Phase The dynamc addressng mechansm s used only for the assgnment of network level addresses. Durng the boot up phase each node self-assgns a lnk-level address that s locally unque. The assgnment of the lnk-level address proceeds along smlar lnes as descrbed n [7]. The negotated lnk-level address s assgned permanently to a node and s only reassgned n the event of the orgnal node dyng or reconfguraton when new nodes jon the network. Durng the boot up phase the Snk (S) broadcasts a confguraton packet that contans the locaton of the snk (x, y co-ordnates). The purpose of ths confguraton packet s to allow each of the sensor nodes to calculate ther dstances from the snk. A sensor node s deemed to have successfully joned the network (booted) only after the recepton of ths confguraton packet. The dstance of the sensor node from the snk, d,sink s calculated accordng to (). Snce the sensor nodes are relatvely statonary, recalculaton of the dstance s not requred after boot up. Each sensor node s assumed to be connected to a locaton devce such as a GPS recever. It s to be noted that the use of GPS measurements s only needed durng the boot up phase and hence the overhead of locaton awareness wll not be sgnfcant (.e., once d,sink has been calculated the GPS recever s turned off to conserve energy). Alternate boot up procedures based on parent nodes and tree-based routng can also be used. d, SINK ( xsink x ) ( ysink y ) () Snce the topology of wreless sensor networks s dynamc, t s possble that new nodes wll jon the network ether to replace nodes that have faled (ded) or to expand the network. To complete self-confguraton a new sensor node jonng the network sends a jon request that s receved by all nodes wthn ts transmsson range. The one-hop neghbours respond to the jon request wth a confguraton packet (they have prevously receved from the snk) that contans the locaton nformaton of the snk. On the recepton of ths confguraton packet the bootup phase s completed. The purpose of the locaton nformaton s to enable energyeffcent forwardng of messages. B. Address Request Phase Once a node has successfully completed the boot up phase t becomes a canddate for address request. A node performs ts data montorng functon wth lmted levels of local processng to generate an event. In order for the event to be communcated relably to the snk a network level address s requred to dentfy the source of the event at the snk (lnk-level addresses are only locally unque). The node generates an address_request packet of the form {Source, Type, event_id, motedst, motedst Source }. Source s the lnk level address of the requestng node, Type denotes the type of packet and doubles as an dentfer for the destnaton of the address request packet (snce all address requests are destned for the snk), event_id s an dentfer for the specfc event generatng the request and s used to map an address allocaton to the correspondng address_request, motedst Source s the dstance of the requestng sensor node from the snk calculated usng () and motedst s the dstance of the forwardng node from the snk. motedst s used by forwardng nodes n ther decson makng process (.e., to decde f a node s closer to the snk than the forwardng node to t). The dstance of the requestng sensor s ncluded n the address request packet as the Snk s not aware of the locaton of the deployed sensors. The event_id carred n the address request packet s generated usng a random functon that takes the lnk-level address of the sensor node as an nput to unquely dentfy the address request and to match the correspondng reply (address allocaton) from the snk to the orgnal address request. Ths s needed as the lnk-level addresses are only locally unque. Forwardng of the address request from the sensor node to the snk s done makng use of lmted-scope floodng. Ths s acheved makng use of the dstance rule. We defne the dstance rule to be a node j forwards an address request from node only f t s closer to the snk than node (.e., the forwardng node to t). The dstance rule has been prevously used n locaton aded routng protocols [] for moble ad hoc networks and s shown to be an effectve mechansm. The dstance rule effectvely creates a multcast group towards the snk and hence s dfferent from greedy forwardng (that can suffer from local ma). A forwardng node wll change the value of motedst n the address request packet to ts own motedst j to enable ts neghbours to apply the dstance rule. The value of motedst Source remans unchanged. C. Address Allocaton Phase The snk mantans an address_allocaton table wth a lst of addresses and a correspondng status flag for each address. On the recept of an address_request the snk allocates a free address to the requestng node based on avalablty or alternatvely dscards the request. The snk also has the opton to queue the request untl an address becomes avalable or for a pre-defned tme nterval. In our analyss and smulatons for the sake of tractablty address requests are not queued. On the recept of the address_request packet the snk responds wth an address_allocaton packet of the form {Source Type, event_id, motedst Source, Address, motedst }. Source denotes the lnk level address of the destnaton sensor, Type denotes the packet type and also doubles to dentfy the sender as the Snk, event_id s coped to the address_allocaton packet from the correspondng address_request packet and s used to match the address_allocaton message to the requestng sensor, motedst Source denotes the dstance of the requestng sensor from the snk and s coped from the

4 address request packet. Address denotes the allocated address; motedst denotes the dstance of the node that forwarded the orgnal address_request message to the snk. Lmted scope floodng usng the dstance rule s agan employed to forward the reply to the requestng node. However, some modfcaton s requred to make t effcent. At the frst nstance the address allocaton message s uncast usng motedst and the lnk level address to the node that forwarded the address request message. On recevng ths message the node then employs the dstance rule wth respect to the destnaton sensor. All calculatons are wth respect to the destnaton sensor and are done usng the value of motedst Source. Ths requres that the locaton nformaton (motedst Source ) of the fnal destnaton sensor s ncluded n the reply message generated by the snk. On sendng of the address_allocaton the snk stores the locaton nformaton of the requestng sensor node and the event_id and assocates ths par wth a network level address. SINK Tmer Broadcast packet sent SINK Req_Add pkt rcvd, Resp_Req_Add pkt sent Release_Add pkt rcvd Assgned Addr Released Tmer stopped T Sensor Node Broadcast packet rcvd, Req_Add pkt sent Resp_Req_Add pkt rcvd Release Add pkt sent Fgure. A Typcal Address Request, Allocaton and Release When the snk sends out an address allocaton response t starts a tmer (lease_tmer) that s assocated wth the allocated address. The value of ths tmer s set to T whch s the longest amount of tme that a node s allowed to hold on to an address. We refer to ths tme as a lease. T can be a fxed value. However there s the scope of extendng ths to dfferentate between dfferent classes of events. On the expry of the lease.e., lease_tmer the address becomes avalable for allocaton to a new node requestng an address. Along smlar lnes prorty queung can also be used to servce address requests that have been queued D. Address Release Phase To enable reuse of addresses and optmzaton of the sze of the address space, addresses are not allocated on a permanent bass to each sensor node. Instead, we adopt a lease based approach. Each address s held by a sensor for a perod of tme (less than T ) untl t completes communcaton related to an event. When communcaton s completed the sensor node explctly releases the address enablng the snk to reuse the address (pror to expry of T ) for another node. The success of lease based schemes depends on the Addr. Held effectveness of the lease management mechansm. We adopt a dstrbuted lease management mechansm for our scheme by combnng the snk based lease_tmer wth a node-based address release mechansm. The lease_tmer specfes the mum tme that a node can hold on to an address whle the node based address release mechansm enables release of an address pror to the expry of the lease_tmer. It can be argued that a purely snk-based scheme s preferable to reduce the computatonal load on ndvdual sensors. However, n event-drven networks a dstrbuted approach s more benefcal as t enables effcent reuse of addresses. When a node decdes to release an address t sends an address_release message of the form {Source, Type, motedst, Release_Address} to the snk. Source ndcates the lnk level address of the node, Type dentfes the packet as beng destned to the snk, motedst s the dstance of the forwardng node from the snk and Release_Address s the network level address beng released. The snk on recept of an address_release message deallocates the specfc address whch allows for the address to be reused by other nodes n the network. The release of the address s controlled entrely by the sensor nodes whle the address allocaton s controlled entrely by the snk nodes. The advantage of centralsed address allocaton controlled at the snk s that DAD can now be done at a central pont. In comparson, other schemes perform DAD by floodng the entre network to see f a duplcate address exsts across the network. Fgure llustrates a typcal address request, allocaton and release wth no packet loss. SINK Tmer Extended Broadcast packet sent Req_Add pkt rcvd, Resp_Req_Add pkt sent Rebndng Add OK Rebndng_ACK sent SINK T Release_Add pkt rcvd Tmer stopped Assgned Add Released T Sensor Node Broadcast packet rcvd, Req_Add pkt sent Event # Resp_Req_Add pkt rcvd Event # Occurs Rebndng_Addr pkt sent Rebndng_ACK pkt rcvd Release_Add pkt sent Fgure. A Typcal Address Rebnd and Address Release E. Address Rebnd Phase In order to further ncrease the reuse of addresses and reduce the overhead nvolved n address allocaton we allow nodes to also rebnd an address. The overhead of rebndng an address s much less n comparson to the overhead nvolved n address request/allocaton. The condton for the extenson of a lease s the occurrence of a new event pror to the release (.e., expry of the lease) of the current address. On the occurrence of a new event the sensor node sends out an address_rebnd message of the form {Source, Type, event_id, Address, motedst }. The felds have the same meanng as n earler phases. Addr. Held/Extended

5 Forwardng nodes employ the dstance rule usng motedst. When the snk receves the address_rebnd message t checks to see that the address has not already been released on the Snk (.e., the lease_tmer has expred). If the address s stll bound on the snk t responds wth an acknowledgement (rebnd_ack) message of the form {Source, Type, Address, motedst, motedst Source }. Address represents the address that has been rebound and mote_dst Source, Source and event_id are used for forwardng and to dentfy the destnaton sensor node. When the snk receves an address_rebnd t resets the lease_tmer and the address s held for a perod T from the tme of rebnd. We reset the lease_tmer as falure to do ths can result n the address beng released on the Snk pror to release on the sensor node. It s also mperatve that the lease_tmer s assocated wth the current event. A sensor node assumes a successful rebnd only after the recept of a rebnd_ack message. The arrval of the rebnd_ack message does not have to be pror to completon of communcaton assocated wth the prevous event. However, f communcaton of the prevous event s completed pror to the recept of rebnd_ack then an address_release message s not sent. Instead on completon the node sends an address_request message. The ratonale behnd ths desgn s that n the event of a rebnd_ack arrvng after the completon of the communcaton assocated wth the prevous event the address s stll usable as t has been bound (for a perod T ) on the Snk. There s also not a need to explctly release the address n the event of the address_rebnd message beng lost as ths s addressed by the use of the lease_tmer (worst case scenaro). Further, the duplcate address_request wll be gnored by the snk. A typcal address rebnd scenaro wth no packet loss s presented n Fgure. IV. PROBABILITY OF ADDRESS ALLOCATION Our dynamc addressng protocol ssues and renews a network level address wth respect to a sensor s request; and, every allocated address wll be recycled by the snk on a gven tmeout value T. We assume a mal message loss rate s observable across the network. n n- n n- n- n- n- Fgure. State Machne of A Snk wth n Address Suppose a snk has n addresses, we then construct a state machne consstng of n state - states n to guarantee the address allocaton/renewal and state means denal of request. For each address n, two transtve actons - and are assocated wth address release/tmeout events and address allocaton/renewal events respectvely. Accordng to the defnton of Markov Chan [], the above state machne corresponds to the followng equaton of a probablty functon set P(t) and a transton matrx Q(t): P P( t) Q(t) () where P [ P, P,, P ] and Q( t) n ( ) n ( ) ( ) ( ) () For n, we get these two equatons after matrx multplcaton: P P P P P ( ) P P ( ) t () At any gven tme t, the snk ether ssues an address or denes the request,.e., Pn Pn P. At the ntal moment t after the Boot Up phase, the snk has n address, so P n () and P (). The sensor network reaches state f most addresses are allocated and many request and/or rebndng messages arrve smultaneously. On any stablzed network, the dervatve of the probabltes of each state tends to be zero. Therefore, we have P P P ( ) P P ( t) (5) Solvng these dfferental equatons, we wll get the soluton for the possblty of successfully acqurng an address from the snk P(t) P (t) P P P P P P Hence, we derve the lmt of P ( ) when t as: lm P t n t (6) (7) The successful possblty of address acquston,.e., the sum of possbltes of all states other than state, s equal to

6 n P n n n The value of success probablty of address allocaton ncreases provded a bgger rato of the product of over the product of, when the success probablty value approaches to ; and vce versa, a smaller rato of the product of over the product of gves a success probablty close to. The value of depends on the frequences of address release events and tmeout events; and the value of depends on the frequences of address request events and rebnd events. The rato of / s affected by message loss rate of the network - the loss of request and rebnd messages decreases and the loss of release messages ncreases, and the ncrement of the rato depends on whch loss rate s domnant. Suppose N ndependent events occurs at a frequency of /t mn and each lasts t, together wth n avalable addresses and the tmeout value T at the snk, we derve the rato of / n the followng scenaros: (8) No loss transmsson assumes no packet loss across the network. Thus, N request events, n rebnd events, release events and tmeout events occur at frequences of /t mn, / T t, /t and /T on the network respectvely. The rato of / becomes n n t T (9) N n t T t mn Symmetrc loss transmsson assumes consstent packet loss across the network at the rate c. So, ( c)(n ) request events, ( c)(n ) rebnd events and release events occur at frequences of /t mn, / T t and /t respectvely. The n tmeout events are not affected by the transmsson loss and occur at the frequency of /T. Therefore, the rato of / becomes n n t ( c) T () N n t T t mn Asymmetrc loss transmsson assumes messages are lost at dfferent rates - c from the snk to nodes, c from nodes to the snk. So, ( c c )(N ) request events, ( c c )(n ) rebnd messages and ( c )(n ) release messages occur at frequences of /t mn, / T t and /t respectvely. The n tmeout events are not affected by the transmsson loss and occur at the frequency of /T. Therefore, the rato of / becomes ( c ) ( n ) n t T () ( c c ) ( N ) ( c c ) ( n ) t mn T t Formula (9) () () suggest that the success rate of n address allocaton, essentally n ncreases when T t or t mn ncreases, or t or T decreases. Because t mn and t are determned by the events, the only vable approach s to confgure T, so that the address can be tmed out mmedately after events fnsh, whch s the focus of our future work on adaptve lease mechansms. V. CONCLUSIONS AND FUTURE WORK In ths work we have presented an addressng mechansm that s capable of achevng address reuse. Intal smulaton results (not presented due to space lmtatons) show the scheme to offer an address reuse factor of more than.5 wth mnmal address allocaton delays (around.6secs). In our future work we hope to evaluate the performance of the scheme through more detaled smulatons and nvestgate adaptve leases. REFERENCES []. K Lorncz et al., Sensor Networks for Emergency Response: Challenges and Opportuntes, IEEE Pervasve computng, Volume (), Oct-Dec, pp 6-. []. Vjay Kumar et al., Robot and Sensor Networks for Frst Responders, IEEE Pervasve computng, Volume (), Oct-Dec, pp -. []. M. Al and Z. A. Uzm, An Energy-Effcent Node Address Namng Scheme for Wreless Sensor Networks, Proceedngs of the IEEE Internatonal Networkng and Communcatons Conference (INCC ), June. []. C. Schurgers, G.Kulkarn, M.B. Srvastava, Dstrbuted On- Demand Address Allocaton n Wreless Sensor Networks, IEEE Transactons on Parallel and Dstrbuted Systems, Volume (), Oct, pp [5]. S. PalChaudhur et al., TreeCast: A Stateless Addressng and Routng Archtecture for Wreless Sensor Networks, Proceedngs of the 8 th Internatonal Parallel and Dstrbuted Processng Symposum (IPDPS ),. [6]. E. Cayrc, Data Aggregaton and Dluton by Modulus Addressng n Wreless Sensor Networks, IEEE Communcaton Letters, Volume 7(8), August. [7]. S. Moteg et al., Implementaton and Evaluaton of On-Demand Address Allocaton for Event-drven Sensor Network, Proceedngs of the 5 Symposum n Applcatons and the Internet (SAINT 5), January 5. [8]. J. Jobn et al., A Scheme for the Assgnment of Unque Addresses to Support Self-Organsaton n Wreless Sensor Networks, Proceedngs of the 6 th Vehcular Technology Conference (VTC ), September. [9]. T. Huynh and C. Hong, A Novel Addressng Archtecture for Wreless Sensor Network, th IEEE Performance Computng and Communcatons Conference (PCCC 5), Aprl 5. [].Y. B. Ko and N. H. Vadya, Locaton Aded Routng (LAR) n Moble Ad Hoc networks, Proceedngs of ACM/IEEE MOBICOM 98, Oct.998, pp [].John G. Kemeny and J. Laure Snell, Fnte Markov Chans, Publshed Prnceton, N.J.: Van Nostrand, 96,

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Avoiding congestion through dynamic load control

Avoiding congestion through dynamic load control Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks Communcatons and Network, 2016, 8, 45-55 Publshed Onlne February 2016 n ScRes. http://www.scrp.org/journal/cn http://dx.do.org/10.4236/cn.2016.81006 Performance Comparson of a QoS Aware Routng Protocol

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol 2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Connection-information-based connection rerouting for connection-oriented mobile communication networks

Connection-information-based connection rerouting for connection-oriented mobile communication networks Dstrb. Syst. Engng 5 (1998) 47 65. Prnted n the UK PII: S0967-1846(98)90513-7 Connecton-nformaton-based connecton reroutng for connecton-orented moble communcaton networks Mnho Song, Yanghee Cho and Chongsang

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture Goals and Approach CS 194: Dstrbuted Systems Resource Allocaton Goal: acheve predcable performances Three steps: 1) Estmate applcaton s resource needs (not n ths lecture) 2) Admsson control 3) Resource

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Hierarchical clustering for gene expression data analysis

Hierarchical clustering for gene expression data analysis Herarchcal clusterng for gene expresson data analyss Gorgo Valentn e-mal: valentn@ds.unm.t Clusterng of Mcroarray Data. Clusterng of gene expresson profles (rows) => dscovery of co-regulated and functonally

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

Research Article Energy Efficient Interest Forwarding in NDN-Based Wireless Sensor Networks

Research Article Energy Efficient Interest Forwarding in NDN-Based Wireless Sensor Networks Moble Informaton Systems Volume 2016, Artcle ID 3127029, 15 pages http://dx.do.org/10.1155/2016/3127029 Research Artcle Energy Effcent Interest Forwardng n NDN-Based Wreless Sensor Networks Shua Gao, 1

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach Dstrbuted Resource Schedulng n Grd Computng Usng Fuzzy Approach Shahram Amn, Mohammad Ahmad Computer Engneerng Department Islamc Azad Unversty branch Mahallat, Iran Islamc Azad Unversty branch khomen,

More information

Comparison of Heuristics for Scheduling Independent Tasks on Heterogeneous Distributed Environments

Comparison of Heuristics for Scheduling Independent Tasks on Heterogeneous Distributed Environments Comparson of Heurstcs for Schedulng Independent Tasks on Heterogeneous Dstrbuted Envronments Hesam Izakan¹, Ath Abraham², Senor Member, IEEE, Václav Snášel³ ¹ Islamc Azad Unversty, Ramsar Branch, Ramsar,

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

Scheduling and queue management. DigiComm II

Scheduling and queue management. DigiComm II Schedulng and queue management Tradtonal queung behavour n routers Data transfer: datagrams: ndvdual packets no recognton of flows connectonless: no sgnallng Forwardng: based on per-datagram forwardng

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

Life Tables (Times) Summary. Sample StatFolio: lifetable times.sgp

Life Tables (Times) Summary. Sample StatFolio: lifetable times.sgp Lfe Tables (Tmes) Summary... 1 Data Input... 2 Analyss Summary... 3 Survval Functon... 5 Log Survval Functon... 6 Cumulatve Hazard Functon... 7 Percentles... 7 Group Comparsons... 8 Summary The Lfe Tables

More information

A Traffic Aware Routing Protocol for Congestion Avoidance in Content-Centric Network

A Traffic Aware Routing Protocol for Congestion Avoidance in Content-Centric Network , pp.69-80 http://dx.do.org/10.14257/jmue.2014.9.9.08 A Traffc Aware Routng Protocol for Congeston Avodance n Content-Centrc Network Jung-Jae Km 1, Mn-Woo Ryu 2*, S-Ho Cha 3 and Kuk-Hyun Cho 1 1 Dept.

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Summarizing Data using Bottom-k Sketches

Summarizing Data using Bottom-k Sketches Summarzng Data usng Bottom-k Sketches Edth Cohen AT&T Labs Research 8 Park Avenue Florham Park, NJ 7932, USA edth@research.att.com Ham Kaplan School of Computer Scence Tel Avv Unversty Tel Avv, Israel

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

MODELING THE RELIABILITY OF INFORMATION MANAGEMENT SYSTEMS BASED ON MISSION SPECIFIC TOOLS SET SOFTWARE

MODELING THE RELIABILITY OF INFORMATION MANAGEMENT SYSTEMS BASED ON MISSION SPECIFIC TOOLS SET SOFTWARE Knowledge Dynamcs MODELING THE ELIABILITY OF INFOMATION MANAGEMENT SYSTEMS BASED ON MISSION SPECIFIC TOOLS SET SOFTWAE Cezar VASILESCU Assocate Professor, egonal Department of Defense esources Management

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

SRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions

SRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions SRB: Shared Runnng Buffers n Proxy to Explot Memory Localty of Multple Streamng Meda Sessons Songqng Chen,BoShen, Yong Yan, Sujoy Basu, and Xaodong Zhang Department of Computer Scence Moble and Meda System

More information

Reliability and Performance Models for Grid Computing

Reliability and Performance Models for Grid Computing Relablty and Performance Models for Grd Computng Yuan-Shun Da,2, Jack Dongarra,3,4 Department of Electrcal Engneerng and Computer Scence, Unversty of Tennessee, Knoxvlle 2 Department of Industral and Informaton

More information

Quantifying Performance Models

Quantifying Performance Models Quantfyng Performance Models Prof. Danel A. Menascé Department of Computer Scence George Mason Unversty www.cs.gmu.edu/faculty/menasce.html 1 Copyrght Notce Most of the fgures n ths set of sldes come from

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

WIRELESS communication technology has gained widespread

WIRELESS communication technology has gained widespread 616 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 4, NO. 6, NOVEMBER/DECEMBER 2005 Dstrbuted Far Schedulng n a Wreless LAN Ntn Vadya, Senor Member, IEEE, Anurag Dugar, Seema Gupta, and Paramvr Bahl, Senor

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Mobile Adaptive Distributed Clustering Algorithm for Wireless Sensor Networks

Mobile Adaptive Distributed Clustering Algorithm for Wireless Sensor Networks Internatonal Journal of Computer Applcatons (975 8887) Volume No.7, Aprl Moble Adaptve Dstrbuted Clusterng Algorthm for Wreless Sensor Networks S.V.Mansekaran Department of Informaton Technology Anna Unversty

More information

A Sub-Critical Deficit Round-Robin Scheduler

A Sub-Critical Deficit Round-Robin Scheduler A Sub-Crtcal Defct ound-obn Scheduler Anton Kos, Sašo Tomažč Unversty of Ljubljana, Faculty of Electrcal Engneerng, Ljubljana, Slovena E-mal: anton.kos@fe.un-lj.s Abstract - A scheduler s an essental element

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Risk-Based Packet Routing for Privacy and Compliance-Preserving SDN

Risk-Based Packet Routing for Privacy and Compliance-Preserving SDN Rsk-Based Packet Routng for Prvacy and Complance-Preservng SDN Karan K. Budhraja Abhshek Malvankar Mehd Bahram Chnmay Kundu Ashsh Kundu Mukesh Snghal, Unversty of Maryland, Baltmore County, MD, USA Emal:

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

DUE to the rapid progress of wireless communication

DUE to the rapid progress of wireless communication IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 2, NO. 3, JULY-SEPTEMBER 2003 207 An Effcent Fault-Tolerant Approach for Moble IP n Wreless Systems Jenn-We Ln and Joseph Arul, Member, IEEE Abstract Ths paper

More information

Design of the Application-Level Protocol for Synchronized Multimedia Sessions

Design of the Application-Level Protocol for Synchronized Multimedia Sessions Desgn of the Applcaton-Level Protocol for Synchronzed Multmeda Sessons Chun-Chuan Yang Multmeda and Communcatons Laboratory Department of Computer Scence and Informaton Engneerng Natonal Ch Nan Unversty,

More information

An Online Delay Efficient Multi-Class Packet Scheduler for Heterogeneous M2M Uplink Traffic

An Online Delay Efficient Multi-Class Packet Scheduler for Heterogeneous M2M Uplink Traffic An Onlne Delay Effcent Mult-Class Packet Scheduler for Heterogeneous M2M Uplnk Traffc Akshay Kumar, Ahmed Abdelhad and Charles Clancy Hume Center, Vrgna Tech Emal:{akshay2, aabdelhad, tcc}@vt.edu Abstract

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems Fast Retransmsson of Real-Tme Traffc n HIPERLAN/ Systems José A Afonso and Joaqum E Neves Department of Industral Electroncs Unversty of Mnho, Campus de Azurém 4800-058 Gumarães, Portugal {joseafonso,

More information

Efficient Broadcast Disks Program Construction in Asymmetric Communication Environments

Efficient Broadcast Disks Program Construction in Asymmetric Communication Environments Effcent Broadcast Dsks Program Constructon n Asymmetrc Communcaton Envronments Eleftheros Takas, Stefanos Ougaroglou, Petros copoltds Department of Informatcs, Arstotle Unversty of Thessalonk Box 888,

More information

Fibre-Optic AWG-based Real-Time Networks

Fibre-Optic AWG-based Real-Time Networks Fbre-Optc AWG-based Real-Tme Networks Krstna Kunert, Annette Böhm, Magnus Jonsson, School of Informaton Scence, Computer and Electrcal Engneerng, Halmstad Unversty {Magnus.Jonsson, Krstna.Kunert}@de.hh.se

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

Dynamic Camera Assignment and Handoff

Dynamic Camera Assignment and Handoff 12 Dynamc Camera Assgnment and Handoff Br Bhanu and Ymng L 12.1 Introducton...338 12.2 Techncal Approach...339 12.2.1 Motvaton and Problem Formulaton...339 12.2.2 Game Theoretc Framework...339 12.2.2.1

More information

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor

More information

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like:

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like: Self-Organzng Maps (SOM) Turgay İBRİKÇİ, PhD. Outlne Introducton Structures of SOM SOM Archtecture Neghborhoods SOM Algorthm Examples Summary 1 2 Unsupervsed Hebban Learnng US Hebban Learnng, Cntd 3 A

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

FEAR: Fuzzy-Based Energy Aware Routing Protocol for Wireless Sensor Networks

FEAR: Fuzzy-Based Energy Aware Routing Protocol for Wireless Sensor Networks Int l J. of Communcatons, etwork and System Scences, 2011, 4, 403-415 do:10.4236/jcns.2011.46048 Publshed Onlne June 2011 (http://www.scrp.org/journal/jcns) FEAR: Fuzzy-Based Energy Aware Routng Protocol

More information

A fault tree analysis strategy using binary decision diagrams

A fault tree analysis strategy using binary decision diagrams Loughborough Unversty Insttutonal Repostory A fault tree analyss strategy usng bnary decson dagrams Ths tem was submtted to Loughborough Unversty's Insttutonal Repostory by the/an author. Addtonal Informaton:

More information

Performance Analysis of Markov Modulated 1-Persistent CSMA/CA Protocols with Exponential Backoff Scheduling

Performance Analysis of Markov Modulated 1-Persistent CSMA/CA Protocols with Exponential Backoff Scheduling Performance Analyss of Markov Modulated -Persstent CSMA/CA Protocols wth ponental Backoff Schedulng Pu ng Wong, Dongje Yn, and Tony T. Lee, Abstract. Ths paper proposes a Markovan model of -persstent CSMA/CA

More information

Classifying Acoustic Transient Signals Using Artificial Intelligence

Classifying Acoustic Transient Signals Using Artificial Intelligence Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)

More information

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,

More information

CS 268: Lecture 8 Router Support for Congestion Control

CS 268: Lecture 8 Router Support for Congestion Control CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

A Fair Access Mechanism Based on TXOP in IEEE e Wireless Networks

A Fair Access Mechanism Based on TXOP in IEEE e Wireless Networks 11 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 8, No. 1, Aprl 16 A Far Access Mechansm Based on TXOP n IEEE 8.11e Wreless Networks Marjan Yazdan 1, Maryam Kamal, Neda

More information

Voice capacity of IEEE b WLANs

Voice capacity of IEEE b WLANs Voce capacty of IEEE 82.b WLANs D. S. Amanatads, V. Vtsas, A. Mantsars 2, I. Mavrds 2, P. Chatzmsos and A.C. Boucouvalas 3 Abstract-There s a tremendous growth n the deployment and usage of Wreless Local

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

An efficient iterative source routing algorithm

An efficient iterative source routing algorithm An effcent teratve source routng algorthm Gang Cheng Ye Tan Nrwan Ansar Advanced Networng Lab Department of Electrcal Computer Engneerng New Jersey Insttute of Technology Newar NJ 7 {gc yt Ansar}@ntedu

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Quantifying Responsiveness of TCP Aggregates by Using Direct Sequence Spread Spectrum CDMA and Its Application in Congestion Control

Quantifying Responsiveness of TCP Aggregates by Using Direct Sequence Spread Spectrum CDMA and Its Application in Congestion Control Quantfyng Responsveness of TCP Aggregates by Usng Drect Sequence Spread Spectrum CDMA and Its Applcaton n Congeston Control Mehd Kalantar Department of Electrcal and Computer Engneerng Unversty of Maryland,

More information

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors Optmal Fault-Tolerant Routng n Hypercubes Usng Extended Safety Vectors Je Wu Department of Computer Scence and Engneerng Florda Atlantc Unversty Boca Raton, FL 3343 Feng Gao, Zhongcheng L, and Ynghua Mn

More information

Optimal Distribution of Remotely-Subscribed Multicast Traffic within a Proxy Mobile IPv6 Domain by Using Explicit Multicast

Optimal Distribution of Remotely-Subscribed Multicast Traffic within a Proxy Mobile IPv6 Domain by Using Explicit Multicast ptmal strbuton of Remotely-Subscrbed Multcast Traffc wthn a Proxy Moble v6 oman by Usng Explct Multcast us M. Contreras *, Carlos J. Bernardos * Core Networ Evoluton Telefónca I+ on Ramón de la Cruz, 82-84,

More information

A Saturation Binary Neural Network for Crossbar Switching Problem

A Saturation Binary Neural Network for Crossbar Switching Problem A Saturaton Bnary Neural Network for Crossbar Swtchng Problem Cu Zhang 1, L-Qng Zhao 2, and Rong-Long Wang 2 1 Department of Autocontrol, Laonng Insttute of Scence and Technology, Benx, Chna bxlkyzhangcu@163.com

More information