NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS

Size: px
Start display at page:

Download "NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS"

Transcription

1 ETWORK PRESERVATIO THROUGH A TOPOLOGY COTROL ALGORITHM FOR WIRELESS MESH ETWORKS F. O. Aron, T. O. Olwal, A. Krien, Y. Hamam Tshwane University of Technology, Pretoria, Soth Africa. Dept of the French Soth African Technical Institte in Electronics The Meraka Institte, Concil of Scientific and Indstrial Research, Soth Africa jakajode@gmail.com, Thomas.olwal@gmail.com, krienam@tt.ac.za, hamama@tt.ac.za. ABSTRACT Wireless mesh networks (WMs) is becoming a promising new technology for extending coverage to farflng rral areas. This it achieves by linking the varios wireless LAS (WLAs) in distant locations ths providing a vital mode complimentary to the wireless infrastrctre-based networks. The benefits of WM deployments, however, come with certain challenges e.g., power management. While focssing on WM applications in rral areas, this paper explains the need for transmit power consmption control in WMs and proposes an Enhanced Local Minimm Shortest-path Tree (ELMST) algorithm for topology control for the WMs. The algorithm is distribted with each node sing only the information gathered locally to determine its own transmission power. In the first phase of its constrction, a minimm local shortest-path tree is obtained. The last phase then involves the removal of all nidirectional links. The performance of the algorithm is demonstrated via several simlation tests. The resltant network topology preserves network connectivity in addition to possessing other desirable featres sch as: (1) redction in the average node degree, (2) evenly distribted power consmption among the nodes as well as (3) a redced total power consmption leading to longer connectivity periods. KEY WORDS Topology Control, Wireless, Backbone, Mesh etwork, Energy Efficiency, Localized Algorithm. 1. ITRODUCTIO The efficient management of radio resorces (e.g., energy) in mltihop wireless networks (MWs) greatly impacts on the performance of sch networks [1]. Throgh transmission power control for instance, a network topology is affected, interference levels are adjsted and spatial channel re-se is enhanced. One way for efficient management is to have the network nodes select their appropriate logical neighbors (from a given physical topology network) according to some specified rles. For instance, there can be a coordinated decision making regarding each node s transmission power ranges with a goal of generating a network with some desired properties e.g., connectivity, redcing energy consmption and/or increasing network capacity [2]. This is referred to as topology control. Althogh several topology control techniqes e.g., [3], [], [5] with the aim of conserving power consmption have been proposed for other MWs like MAETs and wireless Sensor etworks (WSs), little attention has been drawn to sch needs in wireless mesh networks (WMs). This is mainly becase the backbone wireless mesh roters are static and have sally been assmed [6] to have electrical mains power spply and hence are prported not to have power constraints. However, with specific considerations to rral area applications of WMs, we arge that the mesh roters wold be stationary bt with power constraints. In rral areas, electrical mains power sorces are limited and/or often not available and the mesh nodes have to rely on exhastible and renewable means of energy spply sch as solar, battery or generator. Frthermore, the mesh clients are definitely power constrained [6]. With the aim of addressing these constraints, this paper proposes an energy-efficient topology control algorithm for WMs which comptes the best path based on the link weight fnctions. One advantage with this approach is that the channel conditions e.g., weather conditions are catered for since the link weights, as is shown later in this work (definition 2 and section B), is a fnction of the transmission power and the distances between nodes. The remainder of this paper is organized as follows. In section 2, the details of the network model is given. In section 3, previos related work is reviewed. The proposed algorithm is presented in section. Section 5 gives the simlation reslts and analysis. Finally, in section 6 the work is conclded and a sggestion for ftre work is given. 2. RELATED WORK Rodopl and Meng [7] describe the first algorithm which is based on the concept of relay region. A node decides to

2 relay throgh other nodes if less power will be consmed. The algorithm garantees the preservation of minimm energy paths between every pair of nodes connected in the original graph. Based on the reslts of [7], Li and Halpern [8] proposed an improved protocol which is comptationally simpler and better in performance with the reslting topology being a sb-network of the one generated by [7]. Li and Halpern [9] frther propose the small minimm energy commnication network (SMEC). In this algorithm, each node initially broadcasts hello message with some initial power and after reception of ACKs from the receiving nodes, checks if the crrent range covers the region of imal transmission range less the nion of the compliment of the relay regions of all the nodes reachable by node. The process terminates if node reaches its imal transmission power. The work in [7], [8] and [9], however, implicitly assme that a long link consmes more power than a shorter link, an assmption that is not practical for instance in heterogeneos networks according to [3]. In [10], [11], the concept of local neighborhood is first introdced. This concept proposes that a logical topological view of a node in a network be constrcted based only on its local information. This forms the basis of the family of the distribted and localized topology control algorithms. In the work of Li et al [10], a node bilds its local minimm spanning tree (LMST) based only on its one hop neighborhood information. It keeps only the one hop nodes as neighbors in the final topology. The reslting topology has been shown to be connected and with node degree bonded by six. In addition they provide an optional phase where the topology is transformed to one with bidirectional links only. However, LMST does not preserve the minimm energy paths. Another angle of approach is given by Li et al [12] for heterogeneos networks, in which the reslting network contains nidirectional links. Other old variants of topology control algorithms sch as in [13] also discss a distribted and localized algorithm to obtain a reliable high throghpt topology by adjsting a per node transmission power. However, their focs is not on minimizing the energy consmed in the network. All of the algorithms shown in [10], [11], [12], [13] have not been applied to WMs. It can not be generally assmed that the algorithms will atomatically fnction in WMs as the reqirements on network preservation, power efficiency and mobility are very different between WMs and other Mltihop etworks [6]. The algorithm proposed in this work consists of two phases with the reslting topology ensring connectivity and redced node logical ot degrees and is shown to apply for WMs. 3. ETWORK ARCHITECTURE AD SYSTEM MODEL In this section, the WM architectre considered in this paper is presented. Additionally a discssion is given on how the network is modelled. 3.1 Architectre A sample hybrid WM architectre modelled is as shown in figre 1. The network is composed of three grops of wireless network elements [6],[1]: (1) mesh gateways, mesh roter with gateway fnctionalities, are sed for relaying traffic between the WM and the internet, (2) Access Points, mesh roters, are the stationary nodes that act as wireless access points for the mesh clients and also form the mlti-hop wireless network infrastrctre and (3) Mesh clients are the end-ser mesh nodes. They are either mobile or stationary. Internet Figre 1: An example of a mesh network architectre for a commnity mesh networking for resorce sharing with six MAPs where one acts as a Gateway to the internet. It is important to note that the mesh gateways can also fnction as mesh roters [15], [16]. Hence, the mesh gateway nodes and the access points form the backbone wireless mesh network and are sfficiently referred to as mesh access points (MAPs). Examples of WM applications [6] inclde commnity srveillance, commnity resorce sharing, broadband home networking, enterprise networking. These applications generate a large amont of client to client traffic as well as client to gateway traffic [15], [17]. Hence, it is sfficient to assme that most traffic appear at the backbone network. The focs of this work is therefore, to imize certain properties sch as network lifetime based on the backbone wireless mesh network ths allowing s to ignore the mesh clients. 3.2 System Model Consider a set V { v v,..., } AP/Gateway Access Point Mobile/stationary device Wireless link Wired link = 1, 2 v n of randomly distribted static Ms located on a 2D plane, each node V has a niqe id( i ) = i, where 1 i ( = V, nmber of nodes) and is specified by its coordinates

3 ( x( ), y( )) at any instance. Each node V is assigned a power fnction p tx where p tx ( d ) is the minimm transmission power needed to establish a commnication link to another node v V located d distance away from. Two assmptions are made: (1) that the imm transmission power, p tx, V is the same and (2) that the imm distance, D, needed for any two nodes v V to commnicate directly is also the same. tx p tx Therefore, p ( D) =, V. At the beginning of p tx simlation, every node transmits with fll power and an indced graph modelled as a qasi Unit Disk Graph (qudg), G = ( V, E) is created. Here, V is the set of all nodes in the network and E is the set of all links/edges i.e., E = {( d( D}. The WM topology is modelled as a weight directed graph in which for each edge ( E, node v has to be within the transmission range of. The notation d( denotes the Eclidean distance between the nodes and v. The following gives a list of definitions to the terms sed in the paper. Definition 1 (Accessible eighborhood Set): The Accessible eighborhood Set,, is defined as the set A of all nodes that have a direct link with node, when transmits at imm transmission power. The set is given by = { v V d( D}. A Definition 2 (Weight Fnction): An edge ( has a weight given by the following expression: α w ( = t. d( + rx(, (1) where t is a threshold related to signal to noise ratio at node and α [ 2,5] is a constant real nmber depending on the wireless transmission environment. Both parts of (1) are smmed p to give the transmission power. The first part is the transmitter power consmed by transmitting a packet from node to v and rx( is the receiver power. Assming all receivers have the same threshold power for signal detection hence the vale of t becomes some appropriate constant. Definition 3 (Logical eighbor Set): A logical L L neighbor set of node is given by S. ode v S if and only if there exists an edge ( in the topology generated by the algorithm and = { v V v}. S L Definition (Flly Connected): A network is flly connected if and only if V, there exist either a direct path or a mltihop path from to every other node v V in the network. Definition 5 (Relay Region): Given a node v, let the physical location of v be denoted by Loc (. The relay region of the transmit-relay node pair (, is the physical region RL sch that relaying throgh v to v any other point in RL v consmes a lesser power than direct transmission to that point. Definition 6 (etwork Lifetime): Given a set of nodes V and for all v V an energy vale E (, the lifetime of node v is Lt = { t f ( t) E( } ntil when E ( = 0, v v where f v (t) is the energy consmed by v. The network lifetime LtV = Minv V ( Ltv ) i.e., the time taken till the first node goes off. Definition 7 (Bi-directionality): A topology G = ( V, E ) generated by the algorithm is bi-directional if, E = {( ( E( G ) and ( v, ) E( G )} and V = V.. PROPOSED ALGORITHM In this section, we present the algorithm design assmptions. Additionally, a two phased design algorithm i.e., constrction of a Local Minimm Shortest-path Tree and nidirectional links removal is proposed..1 Algorithm Design Assmptions The design of the algorithm assmes that: (1) each node se either a GPS receiver or other localization techniqes [20] to gather its location information, (2) each node ses an omni-directional antenna for both transmission and reception, (3) each node is able to adjst its own transmission power and () the initial topology graph G = ( V, E) is flly connected. The objective of the topology control algorithm is to find a sbgraph of the qudg, G = ( V, E), sch that the resltant topology preserves certain network reqirements namely, decrease in average node degree, an averagely low power consmption ths longer network lifetime and a maintenance of connectivity in the resltant network topology. Each node mst adjst its transmission radis to redce its power consmption while still maintaining the connectivity. Since the architectre is more of infrastrctre-less, the topology has to be constrcted in a distribted and localized manner to avoid flooding of the network. This implies that, each node mst establish its transmission power based only on the information of the nodes reachable by a small constant nmber of hops..2 The ELMST Algorithm Design Phases Phase 1: Constrction of Local Minimm Shortest path Tree (LM-SPT).

4 In this phase, each node gathers neighbor information and constrcts an LM-SPT (as depicted in Figre 2). The phase involves three stages: i. Information collection and exchange: - Each node in this step periodically broadcasts a beacon Hello messages sing imm power p. The ii. iii. tx information exchanged here incldes the node ID and the position in the 2D plane. This information is sed to calclate the node to node distance, the link weights and the path weights. The link weight represents the power reqired for transmission along a link, and the path weight represents the sm of all minimm link weights of a path from sorce to destination. The reslt of this stage is the Accessible eighborhood Set A for each node V. The Hello message is also sent by each node asynchronosly and periodically giving each node s information abot its neighbors. Constrction of a Logical Visible eighborhood Topology: - Each node applies the concept of the relay region in order to gather the nodes in the set of Logical Visible eighborhood. The set LV ( k) A at k = 1. If a node v A is in the relay region of another node w A then node v is moved to a new set of non neighbors called otbr. This is repeated for all the nodes i A. All nodes reachable via other nodes are moved ot of the set A and the remaining set is called LV( ). Each node then applies the Dijkstra s algorithm independently from a sorce node to all the other nodes in V in order to bild its LM-SPT a Figre 2: (a) the topology from the point of view of node before topology control. (b) the view after topology control. Compting the transmission power: - Each node comptes its minimal transmission power to cover only all of the nodes contained in the set LV( k ), in which case, it determines which node among the nodes is frthest. The node then adjsts its transmission power to reach this node and ths all other nodes in the set LV ( k) are covered. The set is given by G = ( V, E ). From the information on the location of the nodes, the inter node distance is calclated. The distance is applied in the b propagation model formlas to obtain the minimm transmission power. The free space model is sed for short distances and the two ray grond reflection model is sed for longer distances depending on the vale of the Eclidean distance in relation to the cross over distance. The cross over distance is calclated sing the following expression: Cross _ over _ dist π h h t r =, (2) where h t = h r = 1.5, are the antenna heights of the transmitter and receiver respectively. Lambda λ, denotes the wavelength. For d( v ) < Cross_over_dist, the Free Space model is sed whereas if d( v ) Cross_over_dist, the Two-raygrond model is sed. The free-space propagation model is given by the following expression: λ 2 RxThresh(( π d ) L ) Pmin = 2. (3) G G λ The two ray grond reflection model is given by the following expression: RxThresh( d L ) t r Pmin =, () G G h h 2 2 t r t r where G t = G r = 1 is the transmitter and receiver Antenna gain respectively, L = 1 is path loss exponent and again the vales of h h = t = r Figre 2 shows an illstration of the operations of phase 1. ode broadcasts hello messages with fll transmission power and obtains responses from the nodes in the A sch as nodes 2,3,5,6 and 7. After stage 2, node establishes that node 7 is in the relay region of node 6 and node 2 is in the relay region of node 3 hence, LV () = {3,5,6} and otbr () = {2, 7}. In stage 2, node calclates its final transmission power as that sed to reach node 6 which is the frthest node in the LV() set. The LM-SPT is then bilt sing the Dijkstra s algorithm. Table 1 shows the algorithm that rns in each node V to compte the minimm transmission power. Let p ( be the minimm power reqired to transmit a data packet from node to node v at any time instance. Also let initial power p tx p = and F( p) be the region that node can reach if it broadcasts with power p. It is assmed that every node knows its terrain and antennae characteristics and is able to compte the region F ( p). The sets Accessible eighborhood ( A ), ot neighbor ( otbr ), and Logical Visible

5 eighborhood ( LV () ) of node are initialized to empty set,φ. ode broadcasts the Hello messages at fll transmission power p tx stating its position. It collects all the ACKs recording each nodes ID, and Location ( Loc ( ) in the Accessible eighborhood set A tx = { v Loc( F( p ), v } where Loc ( is the location of the node v and F ( p tx ) is the region covered by node at fll transmission power. Table 1. The Topology Control Algorithm Listing Phase 1: Inpt: the set, ) G = ( V E Otpt: Power assignment to node p = p tx A initialize the imm power = φ accessible neighbors at 003 otbr = φ non neighbor set 00 LV( ) For every node v A, node comptes the distance d ( and the power p( and arranges them in ascending order. For every two nodes v,w A, if node v is in the relay region of node w i.e., Loc( RL w and p( + p( w, p( then node v is moved to the otbr set, otherwise it remains. If p = p tx = φ local Visible neighbors at p () Begin 005 broadcast Hello message with p = p tx 006 receive Acks and record the neighbors id and their locations in the set A 007 A = { v Loc( F( ptx ), v } 008 if ( A == φ ) 009 Retrn, 010 else 011 v A, calclate distance d ( 012 sort distance in ascending order. 013 calclate p (, v A sing d (, received power & propagation models. 01 sort A by p(, in increasing order, v A 015 for each v A do w A do Loc( RL && p( + p( w, p( otbr = otbr v 016 for each 017 if w then { } Loc RL otbr = otbr 018 else if ( v && p( + p( v, p( then { w} 019 LV() = A otbr 020 p( ) = { p( v LV( ), F p F p tx (, ) (, )} Loc( RL v and p( + p( v, p( then node w is moved to the otbr set otherwise it remains. The Logical Visible eighborhood of node i.e., LV () is therefore given by the set A less otbr set of node. Phase 2: Removal of Unidirectional links. Bi-directional links are qite important for link level acknowledgements and for packet transmissions and retransmissions over the nreliable wireless medim. In phase two of the algorithm, nidirectional links generated in phase 1 are removed so as to obtain bi-directional edges sing edge addition. The reslting topology is given by G = ( V, E ) where V = V, E = {( ( E( G ) and ( v, ) E( G )}. Table 2 depicts the algorithm sed. For every node v LV( ), if there is an edge v, then there mst be an edge v and node LV(. Table 2. Algorithm Listing For Unidirectional Links Removal Phase 2: Inpt: LV 1 hop ni/bi - directional link neighbors of. Otpt: () LV () new () 5. SIMULATIO AD RESULTS LV with bi-directional links Convert to bidirectional (*convert nidirectional links to bidirectional links*) 001 LV () 1 hop nidirectional neighbors of node 002 if 003 for each node k in ) 00 if edge k LV ( and LV(k) 005 then add edge k 006 then add node in LV (k) 007 repeat 2 6 for all V 008 Retrn ) LV ( In this section, some of the simlation reslts to verify the effectiveness of ELMST are presented. The performance of ELMST and IEEE b Maximm Power are compared. The topology control algorithm is implemented in S-2. The nodes are randomly distribted in a rectanglar region of 1200m x 1200m and are varied in nmber from 10 to 100 nodes. All the nodes have a imm transmission range D of 250m. A carrier freqency of 2.GHz and a transmission bandwidth of 2MHz is sed. It is assmed that the omni-directional antennas sed have a 0dB gain and are placed at a height of 1.5m above a node. OLSR is sed as the roting protocol in the simlations de to its distribtive natre. UDP traffic is sed as the application traffic sorce with the nmber of connections varying from 10, 20, 30 or 0.

6 The average connectivity is obtained by evalating the average node degree (the mean connectivity per node) sing the formla C = y /( ), where y is the nmber of nodes reachable by node and is the total nmber of nodes in the network. The average mean connectivity denoted by ψ is given by: 1 1 C = 0 ψ =, (5) which is eqivalent to smming p all the mean connectivity of every node in the entire network. The vale of C shold not be too large as this wold imply that a node commnicates even with very distant nodes and this increases interference and collision and also wastes energy. On the other hand, it shold not be made too small as this wold imply that longer paths have to be taken to reach destinations and this also increases the overall energy consmption in the network. Figre 3 shows a comparison of the average node degree levels. The ELMST algorithm records a great redction in the average node degree not exceeding 6.0 for the entire 10 to 100 nodes network, while maintaining node connectivity. This reslts from the fact that with redced power, a node s neighbors becomes only those that are closest to the node nless there is no relay node to a far neighbor. Figre : Performance comparisons between a conventional IEEE b at Max transmission power and ELMST in terms of network lifetime for a 50nodes network. Similarly, in figre 5, a network of 100nodes is simlated with 0 traffic connections at random times. As expected with controlled power, ELMST ensres the network remains connected p to 85s. This is becase, at redced per node transmission energy, channel contention is redced and a nodes total amont of processing power is redced as it only reaches few neighbors and eventally the overall consmed power in the network is redced. Figre 3: Performance comparisons between a conventional IEEE b at Max transmission power and ELMST in terms of Average ode Degree. odes range from 10 to 100. The lifetime of each of the network instances is also considered. This is measred in terms of the nmber of nodes that remain alive over a period of time. The simlations are based on the assmption that nodes are static and are rn for a period of 150 seconds. Figre shows the lifetime of a network of 50 nodes with 20 traffic connections at random times. A total of 102 packets were sent with 512bytes of data. It is noted that when sing imm power, the network gets disconnected after arond 52s. At a controlled power, the lifetime is extended to the 73s. Figre 5: Performance comparisons between a conventional IEEE b at Max transmission power and ELMST in terms of network lifetime for a 100 nodes network. 6. COCLUSIO In order to realize the effectiveness of WMs, the lifetime of the network is very critical. In this work, an enhanced minimm shortest-path tree based energy efficient topology control algorithm (ELMST) for wireless mesh networks with limited mobility was presented. The algorithm ses only the locally available information to determine the nodes that shold be its logical neighbors at any given time. The reslting

7 topology ensres connectivity, lower average node degree as well as redced power consmption in the network. The algorithm was validated via simlations on the ns-2 platform. The algorithm was however limited to the static backbone mesh nodes. REFERECES [1] C.E. Jones, K. M. Sivalingam, P. Argrawal, & J.C. Chen, A srvey of energy efficient network topologies for wireless networks, Wireless networks, 7(), 2001, [2] P. Santi, Topology control in wireless ad hoc and sensor networks, ACM Compting Srvey, 37(2), 2005, [3] Y. Shen, Y. Cai, & X. X A shortest-path-based topology control algorithm in wireless mltihop networks. Compter Commnication Review, 37(5), 2007, [] Y. Wang and X. Shi, Efficient OnDemand Topology Control for Wireless Ad Hoc etworks. In Proc. Conference on Compter Commnications and etworks (ICCC 2005), 2005, [5] W.-Z. Song, Y. Wang, X.-Y. Li, & O. Frieder. Localized algorithms for energy efficient topology in wireless ad hoc networks. In Proc. ACM Mobihoc 0, 200. [6] I. F. Akyildiz, X. Wang, & W. Wang, Wireless mesh networks: a srvey, Elsevier Jornal of Compter etworks, 7, 2005, [7] V. Rodopl & T.H. Meng, Minimm energy mobile wireless networks, IEEE Jornal on Selected Areas in Commnications, 17(8), 1999, [8] L. Li & J. Halpern, Minimm energy mobile wireless networks revised. In Proc. IEEE ICC, Jne [9] L. Li & J.Y. Halpern, A minimm-energy pathpreserving topology-control algorithm, IEEE Transactions on Wireless Commnications, 3(3), 200, [10]. Li, J. Ho & L. Sha, Design and analysis of an MST-based distribted topology control algorithm. In Proc. IEEE IFOCOM, Jne [11] S.C. Wang, D.S.L. Wei, & S.Y. Ko, A topology control algorithm for constrcting power efficient wireless ad hoc networks. In Proc. IEEE GLOBECOM, December [12]. Li and J. Ho Topology Control in Heterogeneos Wireless etworks: Problems and Soltions. In Proc. of IEEE Infocom, Jne 200 [13] L. H Topology Control for Mltihop Packet radio etworks, IEEE Transactions on Commnications, 1(10), 1993, [1] B.-J. Ko, V. Misra, J. Padhye, & D. Rbenstein, Distribted channel assignment in mlti-radio mesh networks. In Proc. Wireless Commnications and etworking Conference (WCC), 2007, [15] P. Bahl, Opportnities and challenges of commnity mesh networking, keynote at mics workshop eth zrich, Jly, 200. [16] S. Waharte and R. Botaba, Tree-based WirelessMesh etwork Architectre, In Proc. 1 st Intnl. Workshop on Wireless Mesh etworks (Meshets), Hngary, Jly 2005 [17] S. Waharte, R. Botaba, Y. Iraqi, & B. Ishibashi, Roting protocols in wireless mesh networks: challenges and design considerations. In Proc. of the Mltimedia Tools and Applications (MTAP) Jornal, Special Isse on Advances in Consmer Commnications and etworking, [18] D. Panigrahi, P. Dtta, S. Jaiswal, K. V. M. aid & R. Rastogi, Minimm Cost Topology Constrction for Rral Wireless Mesh etworks. In Proc. IEEE IFOCOM, April [19] M. Bahramgiri, M. T. Hajiaghayi, and V. S. Mirrokni, Falt-tolerant and 3-dimensional distribted topology control algorithms in wireless mlti-hop networks. Wireless etworks, 12(2), [20] L. M. i, Y. Li Y. C. La and A. Patil. Landmarc, Indoor location sensing sing active rfid. Wireless etworks, 200.

Energy Efficient Topology Control Algorithm for Wireless Mesh Networks

Energy Efficient Topology Control Algorithm for Wireless Mesh Networks Energy Efficient Topology Control Algorithm for Wireless Mesh etworks a F O Aron*, b T O Olwal, a A Kurien c M O Odhiambo a Dept of Electrical Engineering, F SATIE, Tshwane University of Technology b The

More information

Cautionary Aspects of Cross Layer Design: Context, Architecture and Interactions

Cautionary Aspects of Cross Layer Design: Context, Architecture and Interactions Cationary Aspects of Cross Layer Design: Context, Architectre and Interactions Vikas Kawadia and P. R. Kmar Dept. of Electrical and Compter Engineering, and Coordinated Science Lab University of Illinois,

More information

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity

More information

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,

More information

The Disciplined Flood Protocol in Sensor Networks

The Disciplined Flood Protocol in Sensor Networks The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab

More information

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna

More information

5 Performance Evaluation

5 Performance Evaluation 5 Performance Evalation his chapter evalates the performance of the compared to the MIP, and FMIP individal performances. We stdy the packet loss and the latency to restore the downstream and pstream of

More information

Fault Tolerance in Hypercubes

Fault Tolerance in Hypercubes Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different

More information

A sufficient condition for spiral cone beam long object imaging via backprojection

A sufficient condition for spiral cone beam long object imaging via backprojection A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral

More information

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks Cost Based Local Forwarding Transmission Schemes for Two-hop Celllar Networks Zhenggang Zhao, Xming Fang, Yan Long, Xiaopeng H, Ye Zhao Key Lab of Information Coding & Transmission Sothwest Jiaotong University,

More information

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment

More information

Constructing Multiple Light Multicast Trees in WDM Optical Networks

Constructing Multiple Light Multicast Trees in WDM Optical Networks Constrcting Mltiple Light Mlticast Trees in WDM Optical Networks Weifa Liang Department of Compter Science Astralian National University Canberra ACT 0200 Astralia wliang@csaneda Abstract Mlticast roting

More information

Evaluating Influence Diagrams

Evaluating Influence Diagrams Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will

More information

Mobility Control and Its Applications in Mobile Ad Hoc Networks

Mobility Control and Its Applications in Mobile Ad Hoc Networks Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai Department of Compter Science and Engineering Florida Atlantic Uniersity Boca Raton, FL 3331 Abstract Most existing localized

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY 2007 1 On the Analysis of the Bletooth Time Division Dplex Mechanism Gil Zssman Member, IEEE, Adrian Segall Fellow, IEEE, and Uri Yechiali

More information

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands

More information

Networks An introduction to microcomputer networking concepts

Networks An introduction to microcomputer networking concepts Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES

More information

Minimal Edge Addition for Network Controllability

Minimal Edge Addition for Network Controllability This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,

More information

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING International Jornal of Modern Engineering Research (IJMER) www.imer.com Vol.1, Isse1, pp-134-139 ISSN: 2249-6645 IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING

More information

Tdb: A Source-level Debugger for Dynamically Translated Programs

Tdb: A Source-level Debugger for Dynamically Translated Programs Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,

More information

Lecture 10. Diffraction. incident

Lecture 10. Diffraction. incident 1 Introdction Lectre 1 Diffraction It is qite often the case that no line-of-sight path exists between a cell phone and a basestation. In other words there are no basestations that the cstomer can see

More information

Multi-lingual Multi-media Information Retrieval System

Multi-lingual Multi-media Information Retrieval System Mlti-lingal Mlti-media Information Retrieval System Shoji Mizobchi, Sankon Lee, Fmihiko Kawano, Tsyoshi Kobayashi, Takahiro Komats Gradate School of Engineering, University of Tokshima 2-1 Minamijosanjima,

More information

Chapter 5 Network Layer

Chapter 5 Network Layer Chapter Network Layer Network layer Physical layer: moe bit seqence between two adjacent nodes Data link: reliable transmission between two adjacent nodes Network: gides packets from the sorce to destination,

More information

IoT-Cloud Service Optimization in Next Generation Smart Environments

IoT-Cloud Service Optimization in Next Generation Smart Environments 1 IoT-Clod Service Optimization in Next Generation Smart Environments Marc Barcelo, Alejandro Correa, Jaime Llorca, Antonia M. Tlino, Jose Lopez Vicario, Antoni Morell Universidad Atonoma de Barcelona,

More information

Image Compression Compression Fundamentals

Image Compression Compression Fundamentals Compression Fndamentals Data compression refers to the process of redcing the amont of data reqired to represent given qantity of information. Note that data and information are not the same. Data refers

More information

Constructing and Comparing User Mobility Profiles for Location-based Services

Constructing and Comparing User Mobility Profiles for Location-based Services Constrcting and Comparing User Mobility Profiles for Location-based Services Xihi Chen Interdisciplinary Centre for Secrity, Reliability and Trst, University of Lxemborg Jn Pang Compter Science and Commnications,

More information

A Recovery Algorithm for Reliable Multicasting in Reliable Networks

A Recovery Algorithm for Reliable Multicasting in Reliable Networks A Recovery Algorithm for Reliable Mlticasting in Reliable Networks Danyang Zhang Sibabrata Ray Dept. of Compter Science University of Alabama Tscaloosa, AL 35487 {dzhang, sib}@cs.a.ed Ragopal Kannan S.

More information

Chapter 7 TOPOLOGY CONTROL

Chapter 7 TOPOLOGY CONTROL Chapter TOPOLOGY CONTROL Oeriew Topology Control Gabriel Graph et al. XTC Interference SINR & Schedling Complexity Distribted Compting Grop Mobile Compting Winter 00 / 00 Distribted Compting Grop MOBILE

More information

POWER-OF-2 BOUNDARIES

POWER-OF-2 BOUNDARIES Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of

More information

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003 From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information

More information

Constrained Routing Between Non-Visible Vertices

Constrained Routing Between Non-Visible Vertices Constrained Roting Between Non-Visible Vertices Prosenjit Bose 1, Matias Korman 2, André van Renssen 3,4, and Sander Verdonschot 1 1 School of Compter Science, Carleton University, Ottawa, Canada. jit@scs.carleton.ca,

More information

What s New in AppSense Management Suite Version 7.0?

What s New in AppSense Management Suite Version 7.0? What s New in AMS V7.0 What s New in AppSense Management Site Version 7.0? AppSense Management Site Version 7.0 is the latest version of the AppSense prodct range and comprises three prodct components,

More information

An Extended Fault-Tolerant Link-State Routing Protocol in the Internet

An Extended Fault-Tolerant Link-State Routing Protocol in the Internet An Extended Falt-Tolerant Link-State Roting Protocol in the Internet Jie W, Xiaola Lin, Jiannong Cao z, and Weijia Jia x Department of Compter Science and Engineering Florida Atlantic Uniersit Boca Raton,

More information

Real-time mean-shift based tracker for thermal vision systems

Real-time mean-shift based tracker for thermal vision systems 9 th International Conference on Qantitative InfraRed Thermography Jly -5, 008, Krakow - Poland Real-time mean-shift based tracker for thermal vision systems G. Bieszczad* T. Sosnowski** * Military University

More information

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,

More information

IP Multicast Fault Recovery in PIM over OSPF

IP Multicast Fault Recovery in PIM over OSPF 1 IP Mlticast Falt Recovery in PIM over OSPF Abstract Relatively little attention has been given to nderstanding the falt recovery characteristics and performance tning of native IP mlticast networks.

More information

Mobility Control and Its Applications in Mobile Ad Hoc Networks

Mobility Control and Its Applications in Mobile Ad Hoc Networks Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai, Florida Atlantic Uniersity Abstract Most eisting localized protocols in mobile ad hoc netorks, sch as data commnication

More information

Resolving Linkage Anomalies in Extracted Software System Models

Resolving Linkage Anomalies in Extracted Software System Models Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program

More information

A choice relation framework for supporting category-partition test case generation

A choice relation framework for supporting category-partition test case generation Title A choice relation framework for spporting category-partition test case generation Athor(s) Chen, TY; Poon, PL; Tse, TH Citation Ieee Transactions On Software Engineering, 2003, v. 29 n. 7, p. 577-593

More information

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz

More information

Computer-Aided Mechanical Design Using Configuration Spaces

Computer-Aided Mechanical Design Using Configuration Spaces Compter-Aided Mechanical Design Using Configration Spaces Leo Joskowicz Institte of Compter Science The Hebrew University Jersalem 91904, Israel E-mail: josko@cs.hji.ac.il Elisha Sacks (corresponding athor)

More information

QoS-driven Runtime Adaptation of Service Oriented Architectures

QoS-driven Runtime Adaptation of Service Oriented Architectures Qo-driven Rntime Adaptation of ervice Oriented Architectres Valeria ardellini 1 Emiliano asalicchio 1 Vincenzo Grassi 1 Francesco Lo Presti 1 Raffaela Mirandola 2 1 Dipartimento di Informatica, istemi

More information

Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks

Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks 1 Efficient Schedling for Periodic Aggregation Qeries in Mltihop Sensor Networks XiaoHa X, Shaojie Tang, Member, IEEE, XiangYang Li, Senior Member, IEEE Abstract In this work, we stdy periodic qery schedling

More information

Lecture 13: Traffic Engineering

Lecture 13: Traffic Engineering Lectre 13: Traffic Engineering CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Mike Freedman, Nick Feamster, and Ming Zhang Lectre 13 Overview Dealing with mltiple paths Mltihoming Entact

More information

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems Congestion-adaptive Data Collection with Accracy Garantee in Cyber-Physical Systems Nematollah Iri, Lei Y, Haiying Shen, Gregori Calfield Department of Electrical and Compter Engineering, Clemson University,

More information

(2, 4) Tree Example (2, 4) Tree: Insertion

(2, 4) Tree Example (2, 4) Tree: Insertion Presentation for se with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 B-Trees and External Memory (2, 4) Trees Each internal node has 2 to 4 children:

More information

This chapter is based on the following sources, which are all recommended reading:

This chapter is based on the following sources, which are all recommended reading: Bioinformatics I, WS 09-10, D. Hson, December 7, 2009 105 6 Fast String Matching This chapter is based on the following sorces, which are all recommended reading: 1. An earlier version of this chapter

More information

A personalized search using a semantic distance measure in a graph-based ranking model

A personalized search using a semantic distance measure in a graph-based ranking model Article A personalized search sing a semantic distance measre in a graph-based ranking model Jornal of Information Science XX (X) pp. 1-23 The Athor(s) 2011 Reprints and Permissions: sagepb.co.k/jornalspermissions.nav

More information

Tri-Edge-Connectivity Augmentation for Planar Straight Line Graphs

Tri-Edge-Connectivity Augmentation for Planar Straight Line Graphs Tri-Edge-Connectivity Agmentation for Planar Straight Line Graphs Marwan Al-Jbeh 1, Mashhood Ishaqe 1, Kristóf Rédei 1, Diane L. Sovaine 1, and Csaba D. Tóth 1,2 1 Department of Compter Science, Tfts University,

More information

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code:

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code: EE8 Winter 25 Homework #2 Soltions De Thrsday, Feb 2, 5 P. ( points) Consider the following fragment of Java code: for (i=; i

More information

Augmenting the edge connectivity of planar straight line graphs to three

Augmenting the edge connectivity of planar straight line graphs to three Agmenting the edge connectivity of planar straight line graphs to three Marwan Al-Jbeh Mashhood Ishaqe Kristóf Rédei Diane L. Sovaine Csaba D. Tóth Pavel Valtr Abstract We characterize the planar straight

More information

AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING

AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING Mingsheng LIAO, Li ZHANG, Zxn ZHANG, Jiangqing ZHANG Whan Technical University of Srveying and Mapping, Natinal Lab. for Information Eng. in

More information

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation Maximal Cliqes in Unit Disk Graphs: Polynomial Approximation Rajarshi Gpta, Jean Walrand, Oliier Goldschmidt 2 Department of Electrical Engineering and Compter Science Uniersity of California, Berkeley,

More information

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT PAAMETE OPTIMIZATION FO TAKAGI-SUGENO FUZZY MODELS LESSONS LEANT Manfred Männle Inst. for Compter Design and Falt Tolerance Univ. of Karlsrhe, 768 Karlsrhe, Germany maennle@compter.org Brokat Technologies

More information

Topic Continuity for Web Document Categorization and Ranking

Topic Continuity for Web Document Categorization and Ranking Topic Continity for Web ocment Categorization and Ranking B. L. Narayan, C. A. Mrthy and Sankar. Pal Machine Intelligence Unit, Indian Statistical Institte, 03, B. T. Road, olkata - 70008, India. E-mail:

More information

Efficient and Accurate Delaunay Triangulation Protocols under Churn

Efficient and Accurate Delaunay Triangulation Protocols under Churn Efficient and Accrate Delanay Trianglation Protocols nder Chrn Dong-Yong Lee and Simon S. Lam Department of Compter Sciences The University of Texas at Astin {dylee, lam}@cs.texas.ed November 9, 2007 Technical

More information

arxiv: v1 [cs.cg] 27 Nov 2015

arxiv: v1 [cs.cg] 27 Nov 2015 On Visibility Representations of Non-planar Graphs Therese Biedl 1, Giseppe Liotta 2, Fabrizio Montecchiani 2 David R. Cheriton School of Compter Science, University of Waterloo, Canada biedl@waterloo.ca

More information

Addressing in Future Internet: Problems, Issues, and Approaches

Addressing in Future Internet: Problems, Issues, and Approaches Addressing in Ftre Internet: Problems, Isses, and Approaches Mltimedia and Mobile commnications Laboratory Seol National University Jaeyong Choi, Chlhyn Park, Hakyng Jng, Taekyong Kwon, Yanghee Choi 19

More information

Data/Metadata Data and Data Transformations

Data/Metadata Data and Data Transformations A Framework for Classifying Scientic Metadata Helena Galhardas, Eric Simon and Anthony Tomasic INRIA Domaine de Volcea - Rocqencort 7853 Le Chesnay France email: First-Name.Last-Name@inria.fr Abstract

More information

Making Full Use of Multi-Core ECUs with AUTOSAR Basic Software Distribution

Making Full Use of Multi-Core ECUs with AUTOSAR Basic Software Distribution Making Fll Use of Mlti-Core ECUs with AUTOSAR Basic Software Distribtion Webinar V0.1 2018-09-07 Agenda Motivation for Mlti-Core AUTOSAR Standard: SWC-Split MICROSAR Extension: BSW-Split BSW-Split: Technical

More information

Computer User s Guide 4.0

Computer User s Guide 4.0 Compter User s Gide 4.0 2001 Glenn A. Miller, All rights reserved 2 The SASSI Compter User s Gide 4.0 Table of Contents Chapter 1 Introdction...3 Chapter 2 Installation and Start Up...5 System Reqirements

More information

arxiv: v3 [math.co] 7 Sep 2018

arxiv: v3 [math.co] 7 Sep 2018 Cts in matchings of 3-connected cbic graphs Kolja Knaer Petr Valicov arxiv:1712.06143v3 [math.co] 7 Sep 2018 September 10, 2018 Abstract We discss conjectres on Hamiltonicity in cbic graphs (Tait, Barnette,

More information

Alliances and Bisection Width for Planar Graphs

Alliances and Bisection Width for Planar Graphs Alliances and Bisection Width for Planar Graphs Martin Olsen 1 and Morten Revsbæk 1 AU Herning Aarhs University, Denmark. martino@hih.a.dk MADAGO, Department of Compter Science Aarhs University, Denmark.

More information

Millimeter-Wave Multi-Hop Wireless Backhauling for 5G Cellular Networks

Millimeter-Wave Multi-Hop Wireless Backhauling for 5G Cellular Networks 2017 IEEE 85th Vehiclar Technology Conference (VTC-Spring) Millimeter-Wave Mlti-Hop Wireless Backhaling for 5G Celllar Networks B. P. S. Sahoo, Chn-Han Yao, and Hng-Y Wei Gradate Institte of Electrical

More information

Blended Deformable Models

Blended Deformable Models Blended Deformable Models (In IEEE Trans. Pattern Analysis and Machine Intelligence, April 996, 8:4, pp. 443-448) Doglas DeCarlo and Dimitri Metaxas Department of Compter & Information Science University

More information

TAKING THE PULSE OF ICT IN HEALTHCARE

TAKING THE PULSE OF ICT IN HEALTHCARE ICT TODAY THE OFFICIAL TRADE JOURNAL OF BICSI Janary/Febrary 2016 Volme 37, Nmber 1 TAKING THE PULSE OF ICT IN HEALTHCARE + PLUS + High-Power PoE + Using HDBaseT in AV Design for Schools + Focs on Wireless

More information

Multiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET

Multiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET Mltiple-Choice Test Chapter 09.0 Golden Section Search Method Optimization COMPLETE SOLUTION SET. Which o the ollowing statements is incorrect regarding the Eqal Interval Search and Golden Section Search

More information

A Unified Energy-Efficient Topology for Unicast and Broadcast

A Unified Energy-Efficient Topology for Unicast and Broadcast A Unified Energy-Efficient Topology for Unicast and Broadcast Xiang-Yang Li Dept. of Compter Science Illinois Institte of Technology, Chicago, IL, USA xli@cs.iit.ed Wen-Zhan Song School of Eng. & Comp.

More information

Reading. 13. Texture Mapping. Non-parametric texture mapping. Texture mapping. Required. Watt, intro to Chapter 8 and intros to 8.1, 8.4, 8.6, 8.8.

Reading. 13. Texture Mapping. Non-parametric texture mapping. Texture mapping. Required. Watt, intro to Chapter 8 and intros to 8.1, 8.4, 8.6, 8.8. Reading Reqired Watt, intro to Chapter 8 and intros to 8.1, 8.4, 8.6, 8.8. Recommended 13. Textre Mapping Pal S. Heckbert. Srvey of textre mapping. IEEE Compter Graphics and Applications 6(11): 56--67,

More information

Master for Co-Simulation Using FMI

Master for Co-Simulation Using FMI Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany

More information

New Architectures for Hierarchical Predictive Control

New Architectures for Hierarchical Predictive Control Preprint, 11th IFAC Symposim on Dynamics and Control of Process Systems, inclding Biosystems Jne 6-8, 216. NTNU, Trondheim, Norway New Architectres for Hierarchical Predictive Control Victor M. Zavala

More information

An Introduction to GPU Computing. Aaron Coutino MFCF

An Introduction to GPU Computing. Aaron Coutino MFCF An Introdction to GPU Compting Aaron Cotino acotino@waterloo.ca MFCF What is a GPU? A GPU (Graphical Processing Unit) is a special type of processor that was designed to render and maniplate textres. They

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 53 Design of Operating Systems Spring 8 Lectre 2: Virtal Memory Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Recap: cache Well-written programs exhibit

More information

Optimal Sampling in Compressed Sensing

Optimal Sampling in Compressed Sensing Optimal Sampling in Compressed Sensing Joyita Dtta Introdction Compressed sensing allows s to recover objects reasonably well from highly ndersampled data, in spite of violating the Nyqist criterion. In

More information

Maximum Weight Independent Sets in an Infinite Plane

Maximum Weight Independent Sets in an Infinite Plane Maximm Weight Independent Sets in an Infinite Plane Jarno Nosiainen, Jorma Virtamo, Pasi Lassila jarno.nosiainen@tkk.fi, jorma.virtamo@tkk.fi, pasi.lassila@tkk.fi Department of Commnications and Networking

More information

A GENERIC MODEL OF A BASE-ISOLATED BUILDING

A GENERIC MODEL OF A BASE-ISOLATED BUILDING Chapter 5 A GENERIC MODEL OF A BASE-ISOLATED BUILDING This chapter draws together the work o Chapters 3 and 4 and describes the assembly o a generic model o a base-isolated bilding. The irst section describes

More information

Functions of Combinational Logic

Functions of Combinational Logic CHPTER 6 Fnctions of Combinational Logic CHPTER OUTLINE 6 6 6 6 6 5 6 6 6 7 6 8 6 9 6 6 Half and Fll dders Parallel inary dders Ripple Carry and Look-head Carry dders Comparators Decoders Encoders Code

More information

Broadcasting XORs: On the Application of Network Coding in Access Point-to-Multipoint Networks

Broadcasting XORs: On the Application of Network Coding in Access Point-to-Multipoint Networks Broadcasting XORs: On the Application of Network Coding in Access Point-to-Mltipoint Networks The MIT Faclty has made this article openly available Please share how this access benefits yo Yor story matters

More information

A Wireless MAC Protocol comparison.

A Wireless MAC Protocol comparison. Doc: IEEE P82.1192S1 IEEE 82.11 Wireless Access Method and Physical Layer Specifications Title: Presented by: A Wireless MAC Protocol comparison. Wim Diepstraten NCR SEUtrecht NCRAT&T Network Prodct Grop

More information

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read. The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5

More information

Hardware-Accelerated Free-Form Deformation

Hardware-Accelerated Free-Form Deformation Hardware-Accelerated Free-Form Deformation Clint Cha and Ulrich Nemann Compter Science Department Integrated Media Systems Center University of Sothern California Abstract Hardware-acceleration for geometric

More information

Unit Testing with VectorCAST and AUTOSAR

Unit Testing with VectorCAST and AUTOSAR Unit Testing with VectorCAST and AUTOSAR Vector TechDay Software Testing with VectorCAST V1.0 2018-11-15 Agenda Introdction Unit Testing Demo Working with AUTOSAR Generated Code Unit Testing AUTOSAR SWCs

More information

Date: December 5, 1999 Dist'n: T1E1.4

Date: December 5, 1999 Dist'n: T1E1.4 12/4/99 1 T1E14/99-559 Project: T1E14: VDSL Title: Vectored VDSL (99-559) Contact: J Cioffi, G Ginis, W Y Dept of EE, Stanford U, Stanford, CA 945 Cioffi@stanforded, 1-65-723-215, F: 1-65-724-3652 Date:

More information

Varistors: Ideal Solution to Surge Protection

Varistors: Ideal Solution to Surge Protection aristors: deal Soltion to Srge Protection By Brno van Beneden, ishay BCcomponents, Malvern, Pa. f yo re looking for a srge protection device that delivers high levels of performance while addressing pressres

More information

CS 4204 Computer Graphics

CS 4204 Computer Graphics CS 424 Compter Graphics Crves and Srfaces Yong Cao Virginia Tech Reference: Ed Angle, Interactive Compter Graphics, University of New Mexico, class notes Crve and Srface Modeling Objectives Introdce types

More information

A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA

A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA Mei Zho*, Ling-li Tang, Chan-rong Li, Zhi Peng, Jing-mei Li Academy of Opto-Electronics, Chinese Academy of Sciences, No.9, Dengzhang

More information

Stereo Matching and 3D Visualization for Gamma-Ray Cargo Inspection

Stereo Matching and 3D Visualization for Gamma-Ray Cargo Inspection Stereo Matching and 3D Visalization for Gamma-Ray Cargo Inspection Zhigang Zh *ab, Y-Chi H bc a Department of Compter Science, The City College of New York, New York, NY 3 b Department of Compter Science,

More information

The extra single-cycle adders

The extra single-cycle adders lticycle Datapath As an added bons, we can eliminate some of the etra hardware from the single-cycle path. We will restrict orselves to sing each fnctional nit once per cycle, jst like before. Bt since

More information

Isilon InsightIQ. Version 2.5. User Guide

Isilon InsightIQ. Version 2.5. User Guide Isilon InsightIQ Version 2.5 User Gide Pblished March, 2014 Copyright 2010-2014 EMC Corporation. All rights reserved. EMC believes the information in this pblication is accrate as of its pblication date.

More information

Comparison of memory write policies for NoC based Multicore Cache Coherent Systems

Comparison of memory write policies for NoC based Multicore Cache Coherent Systems Comparison of memory write policies for NoC based Mlticore Cache Coherent Systems Pierre Gironnet de Massas, Frederic Petrot System-Level Synthesis Grop TIMA Laboratory 46, Av Felix Viallet, 38031 Grenoble,

More information

Constraint-Driven Communication Synthesis

Constraint-Driven Communication Synthesis Constraint-Drien Commnication Synthesis Alessandro Pinto Goqiang Wang Lca P. Carloni Abstract Constraint-drien Commnication Synthesis enables the atomatic design of the commnication architectre of a complex

More information

Lecture 4: Routing. CSE 222A: Computer Communication Networks Alex C. Snoeren. Thanks: Amin Vahdat

Lecture 4: Routing. CSE 222A: Computer Communication Networks Alex C. Snoeren. Thanks: Amin Vahdat Lectre 4: Roting CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Amin Vahdat Lectre 4 Overview Pop qiz Paxon 95 discssion Brief intro to overlay and active networking 2 End-to-End Roting

More information

TDT4255 Friday the 21st of October. Real world examples of pipelining? How does pipelining influence instruction

TDT4255 Friday the 21st of October. Real world examples of pipelining? How does pipelining influence instruction Review Friday the 2st of October Real world eamples of pipelining? How does pipelining pp inflence instrction latency? How does pipelining inflence instrction throghpt? What are the three types of hazard

More information

Subgraph Matching with Set Similarity in a Large Graph Database

Subgraph Matching with Set Similarity in a Large Graph Database 1 Sbgraph Matching with Set Similarity in a Large Graph Database Liang Hong, Lei Zo, Xiang Lian, Philip S. Y Abstract In real-world graphs sch as social networks, Semantic Web and biological networks,

More information

Appearance Based Tracking with Background Subtraction

Appearance Based Tracking with Background Subtraction The 8th International Conference on Compter Science & Edcation (ICCSE 213) April 26-28, 213. Colombo, Sri Lanka SD1.4 Appearance Based Tracking with Backgrond Sbtraction Dileepa Joseph Jayamanne Electronic

More information

METAMODEL FOR SOFTWARE SOLUTIONS IN COMPUTED TOMOGRAPHY

METAMODEL FOR SOFTWARE SOLUTIONS IN COMPUTED TOMOGRAPHY VOL. 10, NO 22, DECEBER, 2015 ISSN 1819-6608 ETAODEL FOR SOFTWARE SOLUTIONS IN COPUTED TOOGRAPHY Vitaliy ezhyev Faclty of Compter Systems and Software Engineering, Universiti alaysia Pahang, Gambang, alaysia

More information

Secure Biometric-Based Authentication for Cloud Computing

Secure Biometric-Based Authentication for Cloud Computing Secre Biometric-Based Athentication for Clod Compting Kok-Seng Wong * and Myng Ho Kim School of Compter Science and Engineering, Soongsil University, Sangdo-Dong Dongjak-G, 156-743 Seol Korea {kswong,kmh}@ss.ac.kr

More information

Designing and Optimization of Heterogeneous OTN/DWDM Networks with Intermediate Grooming

Designing and Optimization of Heterogeneous OTN/DWDM Networks with Intermediate Grooming Designing and Optimization of Heterogeneos OTN/DWDM Networks with Intermediate Grooming Afonso Oliveira IST (METI afonso.oliveira@ist.tl.pt ABSTRACT The coexistence of annels with different bitrates in

More information

An Optimization of Granular Network by Evolutionary Methods

An Optimization of Granular Network by Evolutionary Methods An Optimization of Granlar Networ by Evoltionary Methods YUN-HEE HAN, KEUN-CHANG KWAK* Dept. of Control, Instrmentation, and Robot Engineering Chosn University 375 Seos-dong, Dong-g, Gwangj, 50-759 Soth

More information

Efficient Holistic Control over Industrial Wireless Sensor-Actuator Networks

Efficient Holistic Control over Industrial Wireless Sensor-Actuator Networks Efficient Holistic Control over Indstrial Wireless Sensor-Actator Networks Yehan Ma Cyber-Physical Systems Laboratory Washington University in St. Lois, USA Chenyang L Cyber-Physical Systems Laboratory

More information