Extended Synchronization Signals for Eliminating PCI Confusion in Heterogeneous LTE

Size: px
Start display at page:

Download "Extended Synchronization Signals for Eliminating PCI Confusion in Heterogeneous LTE"

Transcription

1 1 Extended Syncronization Signals for Eliminating PCI Confusion in Heterogeneous LTE Amed H. Zaran Department of Electronics and Electrical Communications Cairo University Egypt. Abstract Heterogeneous long term evolution (LTE) networks evolve as a possible solution to accommodate te exponential growt of mobile data. However te eterogeneity introduces several design callenges suc as increasing interference and mobility overead. In tis paper we propose Extended Syncronization Signals (ESS) to eliminate te unavoidable pysical cell identity (PCI) confusion problem in dense eterogeneous LTE deployments. Te ESS is also designed to reduce signaling overead and andover delay. Our analysis sows a andover delay reduction of 65% can be realized. Additionally we sow tat PCI confusion probability can be practically eliminated in case of centralized planning and a reduction of five order of magnitude in confusion probability can be attained in case of distributed planning. I. INTRODUCTION Te deployment of eterogeneous long term evolution (LTE) cellular systems represents a very promising approac to accommodate te exponential growt in mobile data [1]. In eterogeneous deployment a macrocell tier typically provides full coverage using base stations (BS) wit large footprints wile oter BSs wit smaller footprints suc as relay BSs and femto-bss are implemented to improve or extend te coverage in teir locality. Tis eterogeneous deployment especially femtocells not only boost te system spectral efficiency and enables traffic offloading from te congested macro-tier but also increases te average revenue per user extends te mobile terminal (MT) battery life and enances te customer loyalty. Te introduction of femtocells introduces several design issues including but not limited to interference mitigation mobility overead and self-organization aspects. Typically femtocells increase te rate of cell crossing in te system and consequently increase signaling overead for location update and andover. Additionally LTE standards define tree access modes for femtocells [2] including closed access open access and ybrid access. Closed access cells are restricted to a set of users. Hence additional signaling overead may be incurred if a MT tried to camp on a cell tat it as no rigt to access. On performing andovers te MT provides te serving BS wit a measurement report including te signal strengt and a PCI for eac detected cell. If te serving BS as two or more neigbors aving te same PCI it would not be able to determine te MT target BS. Tis problem is known as PCI confusion [3]. In te eterogeneous deployment te PCI confusion problem seems to be unavoidable due to te Tis work is part of te 4G++ project (4gpp-project.net) supported by te National Telecom Regulatory Autority of Egypt ( expected large number of femtocells and te limited range of PCI in LTE standards. Typically te PCI is derived from two pysical layer signals known as te primary syncronization signal (PSS) and te secondary syncronization signal (SSS). Te PSS and SSS ave a sort transmission time interval of 0.5ms to speed te cell searc process. Additionally tey are used to derive te cell scrambling codes. Hence every BS sould ave a unique PCI in its neigborood. In tis paper we present a framework for eliminating te PCI confusion problem in eterogeneous LTE using our novel concept of extended syncronization signals (ESS). Te ESS extends te basic syncronization signals (BSS) by embedding additional information about te femtocell. Based on ESS we propose a centralized PCI planning algoritm tat practically eliminates te PCI confusion possibility. Additionally we sow tat ESS reduces bot signaling load and andover delay wen compared to existing design alternatives. Furtermore te proposed design enables te te MT to identify te femtocell access mode leading to a furter reduction in te overall system signaling overead as well as te MT battery consumption. Te rest of tis paper is organized as follows. In Section II we present an overview for background and related work. In Section III we present our framework tat tackles PCI confusion design issues in eterogeneous deployments followed by our performance evaluation in Section IV. Finally we conclude and present future work in Section V. II. BACKGROUND AND RELATED WORK Tis section first briefly introduce LTE access procedure after wic a brief overview for femtocell access modes is ten provided. PCI relevant topics are te presented presented in te last subsection. A. LTE Access Procedure In order to communicate wit LTE system a MT sould first acquire syncronization wit te cell and ten receive and decode cell system information. Te syncronization process is known as cell searc and is performed on powering up te MT and is repeated wenever te MT is interested in using a new BS. During te cell searc te MT searces for te PSS and SSS witin LTE frames. Eac LTE frame spans 10ms and is divided into 1ms sub-frames wic are furter subdivided into two slots containing six or seven OFDM symbols. In frequency division duplexing (FDD) LTE te PSS

2 2 is transmitted witin te last symbol of te first slot of subframes 0 and 5 wile te SSS is transmitted witin te second last symbol of te same slot. On locking te PSS and SSS te MT sould ave identified te frame timing and te cell PCI. Te PCI is obtained by direct mapping from te PSS (wic represents one of tree possible cell identities) and te SSS (wic represents one of 168 cell-group-identities). Once MT syncronizes wit a new cell te MT can acquire te reference signal wic enables te MT to determine te received signal strengt for mobility purposes and decode te broadcast transport cannel for obtaining relevant system information. Te system information includes a Master information block (MIB) and System information blocks (SIBs). Te MIB contains limited information and is transmitted over te broadcast cannel (BCH) wile te SIBs contain more detailed information and are transmitted over te downlink sared cannel (DL-SCH). It is wort noting tat for reading DL-SCH te MT as to first acquire MIB wose transmission time interval (TTI) is 40ms. SIB-1 contains information about te access rigts of te BS and as a typical TTI of 80ms. Oter SIB (SIB2-SIB13) contains oter relevant information and are typically transmitted at longer TTIs [4]. B. Femtocell Access Modes Te LTE standards define tree different access modes [2] including closed open and ybrid. Closed access femtocells are restricted to a specific set of users; open access femtocells can be used by any MT; and ybrid access femtocells can be accessed by any MT wit a prespecified set of users olding iger access priorities. In 3GPP standards te concept of closed subscriber group (CSG) is introduced to define te group of users wit specific access rigts to a closed or ybrid access femtocells. Te identification of te femtocell access mode is required to avoid unnecessary signaling sent by MTs requesting camping to femtocells tat tey do not ave te rigt to access. For example a MT tat as no subscription wit any CSG would not be interested in accessing closed access femtocells. Note tat femtocell access requests are forwarded by te serving BS to te network core were suc requests are processed. Hence suc unnecessary requests cause significant signaling and processing overead. In order to avoid suc overead a combination of a CSG indicator (one bit flag) and a CSG identifier are broadcasted in te SIBs to identify te access mode. However tis approac is expensive in terms of te associated delay wic is critical for active users aving ongoing real-time applications. Anoter alternative to avoid tis expensive delay is to split PCI range into groups corresponding to open access 1 ybrid access and closed access BSs. Hence te MT can identify te type of te femtocell by te end of te cell searc pase. However te limited range of PCI in eac cluster would magnify te PCI confusion problem. 1 Open access BSs include macro and open access femtocells. (a) PCI Collision C. PCI (b) PCI Confusion Figure 1: PCI Problems Typically te PCI sould represent a local unique identifier in te serving cell neigborood as it is directly mapped from te syncronization signals and is used in te derivation of te cell scrambling codes. Hence tere exist two typical PCI planning requirements including collision-free medium and confusion-free medium. Te former requirement mandates tat any two neigbor cells i.e. cells wit coverage overlap sould not ave te same PCI. If a PCI collision occurs te MT located in te common coverage of te two cells may not be able to decode te cannels of te serving base station as illustrated in Figure 1a. Te second requirement mandates tat any two cells aving te same PCI sould not sare a neigbor. In case of PCI confusion te serving cell would not be able to identify te target cell on receiving a measurement report for andover purposes as illustrated in Figure 1b. Two approaces are proposed in te literature to avoid PCI confusion for femtocells. Te first solution is based on including an additional identifier wit te PCI in te measurement report. Te global cell identifier (GCI) is a typical identifying parameter. Te GCI in LTE consists of two parts [5]: PLMN Identity: Te identity of te Public Land Mobile Network. CIPL: Unique Cell Identity for a cell witin a PLMN. Tis approac is a delay critical solution especially for active MTs because GCI would not be available until te MT reads te SIBs. Te second approac is to send conditional andover messages to all cells aving te same PCI in te serving cell neigborood. Te latter approac leads to a significant signaling and processing 2 load increase especially in dense femtocell deployment. PCI planning plays a role in reducing te PCI confusion problem. Two approaces are proposed for PCI allocation in LTE including centralized and distributed mecanisms. In te former a central entity typically located in te evolved packet core would collect te initiating femtocell information and assign it a new PCI based on a wider overview for te system wile in te latter eac femtocell allocates its PCI based on te local collected information. Note tat in macro-tier te base 2 Note tat all femtocell signaling as to to go troug te network core due to te independent nature of its implementation.

3 3 stations can communicate to eac oter using X2 interface to collect information about neigbor cells. On te contrary femtocells only depends on te sensed information due to its deployment nature. In [6] and [7] te autors present PCI allocation under centralized and distributed settings for macrotier. In [8] te autors propose a PCI allocation algoritm for incremental network growt wit minimal overead using grap coloring as a typical tool for suc type of planning problems. In [9] te autors propose a centralized PCI assignment function entity tat collect information form initiating femtocells and ten assign te femtocell a suitable PCI. Tis information may include a list of sensed neigbors te configured access mode information (including te CSG ID) and previously assigned PCI if applicable. III. ESS FRAMEWORK In tis section we first present te concept of extended syncronization signal (ESS). Second we present te ESSbased PCI planning strategy in centralized and distributed deployments. A. Extended Syncronization Signals Bot PSS and SSS are based on Zadoff Cu (ZC) sequences [4]. Te PSS and SSS are respectively transmitted in te last and second-last symbols of sub-frame 0 and 5. Te PSS uses a 63-bit ZC sequence (only 62 bits are used after dropping te middle bit) tat is transmitted in bot PSS symbols. Te SSS uses two 31-bit ZC sequence tat are interleaved before transmission in te assigned slots; i.e two versions of SSS are transmitted in te defined OFDM symbols. Tis sift will allow te MT to acquire complete frame timing by detecting te PSS and one of te SSSs. Te syncronization ZC sequences are typically padded wit five zeros before and after te syncronization signals resulting in a 72-bit sequence tat is passed to te OFDM modulator. In te proposed extended syncronization signal design te padding zeros are replaced by additional information bits tat can be used for different purposes. Typically eigt 5-bit groups (totaling forty padding bits) can be used before and after te syncronization signals witin eac LTE frame. However te syncronization signal is extended wit only twenty bits since te cell searc process is concluded by locking one PSS and one SSS witin tis frame. Tese twenty bits are split into four five-bit groups denoted G1-G4. Tese groups are transmitted as sown in Figure 2. As sown in te figure G1 and G2 are respectively transmitted before and after PSS Zadoff- Cu codes. Similarly G3 and G4 are respectively transmitted before and after SSS Zadoff-Cu sequences. Note tat only femtocells would advertise suc additional information bits. Hence once a MT decodes te symbols of te syncronization signals it can identify it as a macrocell if all te information bits are set to zero. Additionally tese bits can be defined in different ways to obtain additional information about te femtocell. One possible design for suc additional information bits is Te most significant bit is used to determine te access mode of te femtocell. On decoding one in tis bit te Figure 2: Extended Syncronization Signal Structure (FDD LET) MT would identify te femtocell as a closed access cell; wile on decoding it as zero te MT would identify te femtocell as an open or ybrid access. Hence if a MT is not interested in CSG cells it would not proceed wit detecting te reference signal and can dismiss tis cell. Additionally it may start looking for anoter cell instantaneously. Consequently tis bit is considered as an early stage filtering rule tat reduces te MT battery consumption speeds mobility function and reduces overall signaling. Te remaining information bits are taken from one of te femtocell identifiers. For example te least significant bits of te GCI. Tis identifier would be sent witin te measurement report togeter wit te PCI to te serving BS. Tis additional identifier would not only significantly reduce te PCI confusion probability but will also improve te andover performance especially for real-time applications by reducing te time required for measurement gaps as presented in Section IV. To tis end it is wort noting tat ESS is compatible wit legacy devices tat can only send PCI in teir measurement report or employ measurement gaps to obtain te GCI. However tese legacy devices would not enjoy te benefits of ESS due to te iger probability of PCI confusion. B. PCI Planning 1) Centralized PCI Planning : By employing centralized PCI planning and ESS concept te PCI confusion can be practically eliminated for eterogeneous LTE systems. In tis section we assume tat te macro-tier is PCI confusion free and we focus on eliminating PCI confusion and collision problems at te femto-tier as well. In order to acieve tis te following PCI sets are defined - Ω s : a set of sensed PCIs at te download link (DL) of te initiating femtocell. - Ω n : a set of PCIs of te sensed neigbor BSs. Tese cells are determined by te PA-function according to te information provided in te Ω s.

4 4 - Ω nn : a set of PCIs of te neigbors of neigbors. Tis set is determined troug te information read from te SIBs and information stored in te PA-Function. - Ω a : te set of all possible PCIs. Tis set typically includes te 504 PCI defined in te standard. If te PCI range is split to define different ranges for various femtocell access modes tis set would include te corresponding PCI range for te type of te initiated femtocell. - Ω id : te set of PCIs of femtocells tat ave bot a common overlaying macrocell and identical ESS information bits to te initiating femtocell. For eliminating te PCI confusion te initiating femtocell sould not be assigned a PCI from Ω id. - Ω c : te set of te candidate PCIs. Tis set includes all te possible PCIs after excluding all te PCIs tat can cause a PCI collision or confusion problems i.e. Ω c = Ω a /[Ω n Ωnn Ωid ]. Once te Ω c is determined a PCI is selected and assigned to te initiating femtocell according to te adopted PCI selection policy. Tis policy can be selecting a random PCI from te list or coosing te least used PCI or any oter policy. 2) Distributed PCI Planning: In distributed PCI planning te process is mainly dependent on sensed information in te initiating femtocell DL. In enterprise implementations te femtocell may be able to communicate wit oter femtocells peers connected to te same communication backbone to collect more information about femtocells in te local neigborood. Hence Ω s Ω n Ω nn and Ω id are all based on locally sensed or collected information. Te allocated PCI is cosen randomly from te calculated Ω c. Hence te probability of PCI confusion is a non-zero probability. However by including te ESS information in te measurement report tis probability is far less tan te probability or PCI confusion in systems using basic syncronization signals (BSS). IV. PERFORMANCE EVALUATION A. Handover Delay Analysis Te andover delay denoted as d o in LTE as several components including - te cell searc delay denoted as d s required for locking PSS and SSS. Since te TTI of syncronization signals is 5ms te time required to lock te PSS is 2.5ms on average. Te following SSS would be transmitted after 5ms. Hence te cell searc delay is expected to be 7.5ms. - measurement delay denoted as d m required for reading te reference signal wic is transmitted in every resource block witing any sub-frame. Hence d m is estimated as 0.25ms. - reading system information delay denoted as d i required for obtaining GCI of femtocells from system information blocks. Tis delay include te delay required for reading MIB (20ms on average) and SIB-1 (40ms on average) totaling 60ms on average 3. - total andover messages propagation delay denoted as d l required for message propagation in between te serving 3 It is wort noting tat te MIB and SIB are transmitted several times witin teir TTIs. Depending on te te signal to interference and noise ratio users would be able to decode te information blocks after different number of block reception. and target BSs in te access part and te involved entities in te network core suc as te mobility management entity (MME) and te femto-gateway (F-GW). In any andover involving a femtocell two round trips are required. One way delay is required for submitting te measurement report to te evolved packet core network to ceck access rigts and decision taking. Assuming te MT as te rigt to access te target cell a round trip delay is required to forward te andover request to target BS and receiving te target BS confirmation. Finally anoter one way delay is required to send te andover acknowledgment to te MT. For more details about te andover procedure and signaling te reader is referred to [3]. In [10] one-way delay is estimated as 5ms. Hence te expected d l equals 20ms. - processing delay denoted as d p wic includes processing at MT macro-bs femto-bs and involved core network entities. Tis delay is common between bot BSS and ESS and is approximated to 0.5ms per involved entity. Hence te total processing delay at different involved entities is approximately assumed to be 5ms i.e. d p = 5ms. Te summation of tese delay components provides an estimate for te required andover delay. Yet te main difference between BSS- and ESS-based andover is eliminating te time required for reading te system information. Hence te andover delay for BSS-based system d BSS can be estimated as d BSS = d s + d m + d i + d l + d p 92.75ms. Te andover delay for ESS-bases system d ESS estimated as d ESS = d s + d m + d l + d p 32.75ms. can be Hence te proposed concept of ESS leads to a reduction of 65% in andover delay in comparison to BSS-based system tat depends on reading system information to avoid PCI confusion. Additionally adopting ESS would also prevent introducing any transmission gaps required for reading system information. Hence using ESS would improve te andover performance of real-time applications suc as voice and video communications. B. Access Mode Identification Identifying te femtocell access mode witout reading te system information is a required design feature. Tis feature not only reduces te battery usage of te MT [2] but also enables avoiding transmission gaps required for reading te system information for active MTs. ESS realizes tis goal witout compromising oter system configurations by including an access mode indicator in te most significant bit of te ESS. Hence by adopting ESS if a MT is only interested in open access or ybrid access femtocells te MT will instantaneously ignore closed access femtocells. Note tat te oter design alternative is to adopt PCI slicing into ranges dedicated for different access modes. Clearly te latter approac will magnify te PCI confusion problem especially if BSS is used. It is wort noting tat bot PCI range slicing and ESS can be used togeter and in tis case te entire 20 bits can be used for te additional identifier.

5 BSS ESS To tis end it is wort noting tat P c in systems wit centralized allocation function is deterministic and can be expressed as { } 0 nf n P c centralized = l 1 n f > n l Confusion Probability e-05 1e-06 were n l respectively equals n c and n c n id for BSS- and ESSbased systems. Hence using ESS would practically provide a PCI confusion free system as te number of femtocells witin an LTE macrocell will not practically approac n c n id even in 3d realizations. 1e-07 1e Number of Femtocells per Macrocell Figure 3: PCI confusion probability for BSS and ESS C. PCI Confusion Probability In tis section we compare te probability of PCI confusion denoted as P c of BSS and ESS for distributed PCI allocation. On using BSS te PCI confusion would occur if two or more femtocells use te same PCI under te same macrocell coverage. Note tat we assume no confusion would take place in te same tier since tis type of confusion can be avoided using self-ealing mecanisms wic are based on femtocell reconfiguration according to user measurement reports. We also assume tat te PCI is selected randomly from te estimated candidate set Ω c. Let n f denotes te number of femtocells installed in a specific macrocell and n c denotes te number of candidate PCI. Note tat n c equals te cardinality of Ω c. Hence P c for BSS can be expressed as P c = 1 P c were P c represents te probability of no PCI confusion. On using BSS Pc BSS can be derived as } P BSS c = { nc P nf n n f c n f n c 0 n f > n c were nc P nf represents te n f permutations. On using ESS a PCI confusion would occurs if two or more femtocells ave te same PCI te same access mode bit and identical 19 least significant bits of GCI. Hence te Pc ESS can be derived as { } P ESS c = (α 2 + (1 α) 2 ) (ncn id ) P nf (n id n c) nf n f n c n id 0 n f > n c n id were α represents te probability tat a femtocell access mode is closed and n id represents te number of possible combinations of te 19 least significant bits of te GCI; i.e. n id = Figure 3 plots te confusion probability for BSS- and SSSbased systems versus te number of femtocells per macrocell wit α = 0.5. Te figure clearly sows tat te confusion probability in BSS-based systems is very ig. On using ESS te PCI confusion probability significantly drops to about five order of magnitude less in comparison to BSS-based systems. V. CONCLUSION Te dense deployment of femtocell in LTE cellular networks introduces several design issues to te system. PCI confusion is one of te most critical mobility management callenges in eterogeneous LTE networks. Te existing solutions would eiter lead to an increase in andover delay or te signaling and processing overead in te network core and backaul. Te proposed ESS represents a novel practical framework to eliminate PCI confusion in eterogeneous deployment. Additionally te presented ESS design provides a means tat enables te MT to identify te femtocell access mode witout reading te system information. Hence ESS not only improves te andover performance for active MTs but also reduces te battery drainage and signaling load required for some essential mobility functions for bot active and idle devices. REFERENCES [1] A. Damnjanovic J. Montojo Y. Wei T. Ji T. Luo M. Vajapeyam T. Yoo O. Song and D. Malladi A survey on 3GPP eterogeneous networks IEEE Wireless Communications vol. 18 no. 3 pp [2] A. Golaup M. Mustapa and L. B. Patanapongpibul Femtocell access control strategy in UMTS and LTE IEEE Communication Magazine vol. 47 no. 9 pp [3] J. Zang and G. de la Roce Femtocells: Tecnologies and Deployment. Wiley Dec [4] E. Dalman S. Parkvall and J. Skold 4G: LTE/LTE-Advanced for Mobile Broadband. Academic Press [5] M. Amirijoo P. Frenger F. Gunnarsson H. Kallin J. Moe and K. Zetterberg Neigbor Cell Relation List and Pysical Cell Identity Self-Organization in LTE in Proc. IEEE Int. Conf. Communications Worksops ICC Worksops 08 pp [6] Y. Liu W. Li H. Zang and W. Lu Grap based automatic centralized PCI assignment in LTE in Proc. IEEE Symp. Computers and Communications (ISCC) pp [7] Y. Liu W. Li H. Zang and L. Yu Distributed PCI Assignment in LTE Based on Consultation Mecanism in Proc. 6t Int Wireless Communications Networking and Mobile Computing (WiCOM) Conf pp [8] T. Band G. Carle and H. Sanneck Grap coloring based pysicalcell-id assignment for LTE networks in Proc. of te 2009 Intl Conf. on Wireless Communications and Mobile Computing IWCMC 09 pp New York NY USA: ACM [9] Y. Wu H. Jiang Y. Wu and D. Zang Pysical Cell Identity Self- Organization for Home enodeb Deployment in LTE in Proc. 6t Int Wireless Communications Networking and Mobile Computing (WiCOM) Conf pp [10] D. Singal M. Kunapareddy and V. Cetlapalli LTE-Advanced: Latency Analysis for IMT-A Evaluation. Wite paper 2010.

On the Use of Radio Resource Tests in Wireless ad hoc Networks

On the Use of Radio Resource Tests in Wireless ad hoc Networks Tecnical Report RT/29/2009 On te Use of Radio Resource Tests in Wireless ad oc Networks Diogo Mónica diogo.monica@gsd.inesc-id.pt João Leitão jleitao@gsd.inesc-id.pt Luis Rodrigues ler@ist.utl.pt Carlos

More information

Real-Time Wireless Routing for Industrial Internet of Things

Real-Time Wireless Routing for Industrial Internet of Things Real-Time Wireless Routing for Industrial Internet of Tings Cengjie Wu, Dolvara Gunatilaka, Mo Sa, Cenyang Lu Cyber-Pysical Systems Laboratory, Wasington University in St. Louis Department of Computer

More information

Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks

Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Okan Yilmaz and Ing-Ray Cen Computer Science Department Virginia Tec {oyilmaz, ircen}@vt.edu

More information

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness 1 Optimal In-etwork Packet Aggregation Policy for Maimum Information Fresness Alper Sinan Akyurek, Tajana Simunic Rosing Electrical and Computer Engineering, University of California, San Diego aakyurek@ucsd.edu,

More information

Intra- and Inter-Session Network Coding in Wireless Networks

Intra- and Inter-Session Network Coding in Wireless Networks Intra- and Inter-Session Network Coding in Wireless Networks Hulya Seferoglu, Member, IEEE, Atina Markopoulou, Member, IEEE, K K Ramakrisnan, Fellow, IEEE arxiv:857v [csni] 3 Feb Abstract In tis paper,

More information

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various

More information

Distributed and Optimal Rate Allocation in Application-Layer Multicast

Distributed and Optimal Rate Allocation in Application-Layer Multicast Distributed and Optimal Rate Allocation in Application-Layer Multicast Jinyao Yan, Martin May, Bernard Plattner, Wolfgang Mülbauer Computer Engineering and Networks Laboratory, ETH Zuric, CH-8092, Switzerland

More information

4.1 Tangent Lines. y 2 y 1 = y 2 y 1

4.1 Tangent Lines. y 2 y 1 = y 2 y 1 41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange

More information

An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng

An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng An ffective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Ciming Huang and ei-heng Ceng 5 De c e mbe r0 International Journal of Advanced Information Tecnologies (IJAIT),

More information

Multi-Stack Boundary Labeling Problems

Multi-Stack Boundary Labeling Problems Multi-Stack Boundary Labeling Problems Micael A. Bekos 1, Micael Kaufmann 2, Katerina Potika 1 Antonios Symvonis 1 1 National Tecnical University of Atens, Scool of Applied Matematical & Pysical Sciences,

More information

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks Downloaded from vbn.aau.dk on: April 7, 09 Aalborg Universitet etwork Coding to Enance Standard Routing Protocols in Wireless Mes etworks Palevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank;

More information

Mean Waiting Time Analysis in Finite Storage Queues for Wireless Cellular Networks

Mean Waiting Time Analysis in Finite Storage Queues for Wireless Cellular Networks Mean Waiting Time Analysis in Finite Storage ueues for Wireless ellular Networks J. YLARINOS, S. LOUVROS, K. IOANNOU, A. IOANNOU 3 A.GARMIS 2 and S.KOTSOOULOS Wireless Telecommunication Laboratory, Department

More information

Symmetric Tree Replication Protocol for Efficient Distributed Storage System*

Symmetric Tree Replication Protocol for Efficient Distributed Storage System* ymmetric Tree Replication Protocol for Efficient Distributed torage ystem* ung Cune Coi 1, Hee Yong Youn 1, and Joong up Coi 2 1 cool of Information and Communications Engineering ungkyunkwan University

More information

A UPnP-based Decentralized Service Discovery Improved Algorithm

A UPnP-based Decentralized Service Discovery Improved Algorithm Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol.1, No.1, Marc 2013, pp. 21~26 ISSN: 2089-3272 21 A UPnP-based Decentralized Service Discovery Improved Algoritm Yu Si-cai*, Wu Yan-zi,

More information

Vector Processing Contours

Vector Processing Contours Vector Processing Contours Andrey Kirsanov Department of Automation and Control Processes MAMI Moscow State Tecnical University Moscow, Russia AndKirsanov@yandex.ru A.Vavilin and K-H. Jo Department of

More information

Author's personal copy

Author's personal copy Autor's personal copy Information Processing Letters 09 (009) 868 875 Contents lists available at ScienceDirect Information Processing Letters www.elsevier.com/locate/ipl Elastic tresold-based admission

More information

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science A Cost Model for Distributed Sared Memory Using Competitive Update Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, Texas, 77843-3112, USA E-mail: fjkim,vaidyag@cs.tamu.edu

More information

Abstract of the Book

Abstract of the Book Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the

More information

4.2 The Derivative. f(x + h) f(x) lim

4.2 The Derivative. f(x + h) f(x) lim 4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially

More information

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method Engineering, 2013, 5, 522-526 ttp://dx.doi.org/10.4236/eng.2013.510b107 Publised Online October 2013 (ttp://www.scirp.org/journal/eng) Two Modifications of Weigt Calculation of te Non-Local Means Denoising

More information

More on Functions and Their Graphs

More on Functions and Their Graphs More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in

More information

Protecting Storage Location Privacy in Sensor Networks

Protecting Storage Location Privacy in Sensor Networks Protecting Storage Location Privacy in Sensor Networks Jianming Zou, Wenseng Zang, and Daji Qiao Iowa State University Ames, IA 511 Email: {jmzou,wzang,daji}@iastate.edu ASTAT Numerous scemes ave been

More information

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer

More information

AVL Trees Outline and Required Reading: AVL Trees ( 11.2) CSE 2011, Winter 2017 Instructor: N. Vlajic

AVL Trees Outline and Required Reading: AVL Trees ( 11.2) CSE 2011, Winter 2017 Instructor: N. Vlajic 1 AVL Trees Outline and Required Reading: AVL Trees ( 11.2) CSE 2011, Winter 2017 Instructor: N. Vlajic AVL Trees 2 Binary Searc Trees better tan linear dictionaries; owever, te worst case performance

More information

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 Note: Tere will be a very sort online reading quiz (WebWork) on eac reading assignment due one our before class on its due date. Due dates can be found

More information

Tuning MAX MIN Ant System with off-line and on-line methods

Tuning MAX MIN Ant System with off-line and on-line methods Université Libre de Bruxelles Institut de Recerces Interdisciplinaires et de Développements en Intelligence Artificielle Tuning MAX MIN Ant System wit off-line and on-line metods Paola Pellegrini, Tomas

More information

An Anchor Chain Scheme for IP Mobility Management

An Anchor Chain Scheme for IP Mobility Management An Ancor Cain Sceme for IP Mobility Management Yigal Bejerano and Israel Cidon Department of Electrical Engineering Tecnion - Israel Institute of Tecnology Haifa 32000, Israel E-mail: bej@tx.tecnion.ac.il.

More information

INTRODUCTION TO LTE. ECE MOBILE COMMUNICATION Monday, 25 June 2018

INTRODUCTION TO LTE. ECE MOBILE COMMUNICATION Monday, 25 June 2018 INTRODUCTION TO LTE ECE 2526 - MOBILE COMMUNICATION Monday, 25 June 2018 1 WHAT IS LTE? 1. LTE stands for Long Term Evolution and it was started as a project in 2004 by the Third Generation Partnership

More information

Cubic smoothing spline

Cubic smoothing spline Cubic smooting spline Menu: QCExpert Regression Cubic spline e module Cubic Spline is used to fit any functional regression curve troug data wit one independent variable x and one dependent random variable

More information

FEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH

FEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH FEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH, Abstract In the future of Mobile networks it is important to implement a Femtocell at homes and to improve the domestic network. Even

More information

Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks

Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks Hulya Seferoglu, Atina Markopoulou EECS Dept, University of California, Irvine {seferog, atina}@uci.edu Abstract We

More information

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks An Algoritm for Loopless Deflection in Potonic Packet-Switced Networks Jason P. Jue Center for Advanced Telecommunications Systems and Services Te University of Texas at Dallas Ricardson, TX 75083-0688

More information

ANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS

ANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS NTNN SPHRICL COORDINT SSTMS ND THIR PPLICTION IN COMBINING RSULTS FROM DIFFRNT NTNN ORINTTIONS llen C. Newell, Greg Hindman Nearfield Systems Incorporated 133. 223 rd St. Bldg. 524 Carson, C 9745 US BSTRCT

More information

Investigating an automated method for the sensitivity analysis of functions

Investigating an automated method for the sensitivity analysis of functions Investigating an automated metod for te sensitivity analysis of functions Sibel EKER s.eker@student.tudelft.nl Jill SLINGER j..slinger@tudelft.nl Delft University of Tecnology 2628 BX, Delft, te Neterlands

More information

CS 234. Module 6. October 25, CS 234 Module 6 ADT Dictionary 1 / 22

CS 234. Module 6. October 25, CS 234 Module 6 ADT Dictionary 1 / 22 CS 234 Module 6 October 25, 2016 CS 234 Module 6 ADT Dictionary 1 / 22 Case study Problem: Find a way to store student records for a course, wit unique IDs for eac student, were records can be accessed,

More information

Linear Interpolating Splines

Linear Interpolating Splines Jim Lambers MAT 772 Fall Semester 2010-11 Lecture 17 Notes Tese notes correspond to Sections 112, 11, and 114 in te text Linear Interpolating Splines We ave seen tat ig-degree polynomial interpolation

More information

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically 2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use

More information

George Xylomenos and George C. Polyzos. with existing protocols and their eæciency in terms of

George Xylomenos and George C. Polyzos. with existing protocols and their eæciency in terms of IP MULTICASTING FOR WIRELESS MOBILE OSTS George Xylomenos and George C. Polyzos fxgeorge,polyzosg@cs.ucsd.edu Computer Systems Laboratory Department of Computer Science and Engineering University of California,

More information

Multi-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art

Multi-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art Multi-Objective Particle Swarm Optimizers: A Survey of te State-of-te-Art Margarita Reyes-Sierra and Carlos A. Coello Coello CINVESTAV-IPN (Evolutionary Computation Group) Electrical Engineering Department,

More information

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry Our Calibrated Model as No Predictive Value: An Example from te Petroleum Industry J.N. Carter a, P.J. Ballester a, Z. Tavassoli a and P.R. King a a Department of Eart Sciences and Engineering, Imperial

More information

MULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS

MULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS ULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS Nimmagadda Calamaia æ Dept. of CSE JNTU College of Engineering Kakinada, India 533 003. calm@cse.iitkgp.ernet.in Badrinat Ramamurty y Dept.

More information

An experimental framework to investigate context-aware schemes for content delivery

An experimental framework to investigate context-aware schemes for content delivery An experimental framework to investigate context-aware scemes for content delivery Pietro Lungaro +, Cristobal Viedma +, Zary Segall + and Pavan Kumar + Mobile Service Lab, Royal Institute of Tecnology

More information

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result RT. Complex Fractions Wen working wit algebraic expressions, sometimes we come across needing to simplify expressions like tese: xx 9 xx +, xx + xx + xx, yy xx + xx + +, aa Simplifying Complex Fractions

More information

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation P R E P R N T CPWS XV Berlin, September 8, 008 Fast Calculation of Termodynamic Properties of Water and Steam in Process Modelling using Spline nterpolation Mattias Kunick a, Hans-Joacim Kretzscmar a,

More information

Unsupervised Learning for Hierarchical Clustering Using Statistical Information

Unsupervised Learning for Hierarchical Clustering Using Statistical Information Unsupervised Learning for Hierarcical Clustering Using Statistical Information Masaru Okamoto, Nan Bu, and Tosio Tsuji Department of Artificial Complex System Engineering Hirosima University Kagamiyama

More information

A Statistical Approach for Target Counting in Sensor-Based Surveillance Systems

A Statistical Approach for Target Counting in Sensor-Based Surveillance Systems Proceedings IEEE INFOCOM A Statistical Approac for Target Counting in Sensor-Based Surveillance Systems Dengyuan Wu, Decang Cen,aiXing, Xiuzen Ceng Department of Computer Science, Te George Wasington University,

More information

A Novel QC-LDPC Code with Flexible Construction and Low Error Floor

A Novel QC-LDPC Code with Flexible Construction and Low Error Floor A Novel QC-LDPC Code wit Flexile Construction and Low Error Floor Hanxin WANG,2, Saoping CHEN,2,CuitaoZHU,2 and Kaiyou SU Department of Electronics and Information Engineering, Sout-Central University

More information

Computer Physics Communications. Multi-GPU acceleration of direct pore-scale modeling of fluid flow in natural porous media

Computer Physics Communications. Multi-GPU acceleration of direct pore-scale modeling of fluid flow in natural porous media Computer Pysics Communications 183 (2012) 1890 1898 Contents lists available at SciVerse ScienceDirect Computer Pysics Communications ournal omepage: www.elsevier.com/locate/cpc Multi-GPU acceleration

More information

Minimizing Memory Access By Improving Register Usage Through High-level Transformations

Minimizing Memory Access By Improving Register Usage Through High-level Transformations Minimizing Memory Access By Improving Register Usage Troug Hig-level Transformations San Li Scool of Computer Engineering anyang Tecnological University anyang Avenue, SIGAPORE 639798 Email: p144102711@ntu.edu.sg

More information

Section 2.3: Calculating Limits using the Limit Laws

Section 2.3: Calculating Limits using the Limit Laws Section 2.3: Calculating Limits using te Limit Laws In previous sections, we used graps and numerics to approimate te value of a it if it eists. Te problem wit tis owever is tat it does not always give

More information

3.6 Directional Derivatives and the Gradient Vector

3.6 Directional Derivatives and the Gradient Vector 288 CHAPTER 3. FUNCTIONS OF SEVERAL VARIABLES 3.6 Directional Derivatives and te Gradient Vector 3.6.1 Functions of two Variables Directional Derivatives Let us first quickly review, one more time, te

More information

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring Has-Based Indexes Capter 11 Comp 521 Files and Databases Spring 2010 1 Introduction As for any index, 3 alternatives for data entries k*: Data record wit key value k

More information

Fault Localization Using Tarantula

Fault Localization Using Tarantula Class 20 Fault localization (cont d) Test-data generation Exam review: Nov 3, after class to :30 Responsible for all material up troug Nov 3 (troug test-data generation) Send questions beforeand so all

More information

Efficient Content-Based Indexing of Large Image Databases

Efficient Content-Based Indexing of Large Image Databases Efficient Content-Based Indexing of Large Image Databases ESSAM A. EL-KWAE University of Nort Carolina at Carlotte and MANSUR R. KABUKA University of Miami Large image databases ave emerged in various

More information

Haar Transform CS 430 Denbigh Starkey

Haar Transform CS 430 Denbigh Starkey Haar Transform CS Denbig Starkey. Background. Computing te transform. Restoring te original image from te transform 7. Producing te transform matrix 8 5. Using Haar for lossless compression 6. Using Haar

More information

Tilings of rectangles with T-tetrominoes

Tilings of rectangles with T-tetrominoes Tilings of rectangles wit T-tetrominoes Micael Korn and Igor Pak Department of Matematics Massacusetts Institute of Tecnology Cambridge, MA, 2139 mikekorn@mit.edu, pak@mat.mit.edu August 26, 23 Abstract

More information

Interference Mitigation Using Dynamic Frequency Re-use for Dense Femtocell Network Architectures

Interference Mitigation Using Dynamic Frequency Re-use for Dense Femtocell Network Architectures Interference Mitigation Using Dynamic Frequency Re-use for Dense Femtocell Network Architectures Mostafa Zaman Chowdhury, Yeong Min Jang, and Zygmunt J. Haas * Department of Electronics Engineering, Kookmin

More information

Two-Level Iterative Queuing Modeling of Software Contention

Two-Level Iterative Queuing Modeling of Software Contention Two-Level Iterative Queuing Modeling of Software Contention Daniel A. Menascé Dept. of Computer Science George Mason University www.cs.gmu.edu/faculty/menasce.tml 2002 D. Menascé. All Rigts Reserved. 1

More information

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall Has-Based Indexes Capter 11 Comp 521 Files and Databases Fall 2012 1 Introduction Hasing maps a searc key directly to te pid of te containing page/page-overflow cain Doesn t require intermediate page fetces

More information

SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS. Hewlett-Packard Company East Mission Avenue. Bogazici University

SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS. Hewlett-Packard Company East Mission Avenue. Bogazici University SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS Sanuj V. Sarin 1, Hakan Delic 2 and Jung H. Kim 3 1 Hewlett-Packard Company 24001 East Mission Avenue Spokane, Wasington 99109, USA 2 Signal

More information

CS 234. Module 6. October 16, CS 234 Module 6 ADT Dictionary 1 / 33

CS 234. Module 6. October 16, CS 234 Module 6 ADT Dictionary 1 / 33 CS 234 Module 6 October 16, 2018 CS 234 Module 6 ADT Dictionary 1 / 33 Idea for an ADT Te ADT Dictionary stores pairs (key, element), were keys are distinct and elements can be any data. Notes: Tis is

More information

Sensor Data Collection with Expected Reliability Guarantees

Sensor Data Collection with Expected Reliability Guarantees Sensor Data Collection wit Expected Reliability Guarantees Qi Han, Iosif Lazaridis, Sarad Merotra, Nalini Venkatasubramanian Department of Computer Science, University of California, Irvine, CA 9697 qan,iosif,sarad,nalini

More information

Alternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method

Alternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method Te Open Plasma Pysics Journal, 2010, 3, 29-35 29 Open Access Alternating Direction Implicit Metods for FDTD Using te Dey-Mittra Embedded Boundary Metod T.M. Austin *, J.R. Cary, D.N. Smite C. Nieter Tec-X

More information

12.2 TECHNIQUES FOR EVALUATING LIMITS

12.2 TECHNIQUES FOR EVALUATING LIMITS Section Tecniques for Evaluating Limits 86 TECHNIQUES FOR EVALUATING LIMITS Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing tecnique to evaluate its of

More information

Interference in Femtocell Networks. Roger Piqueras Jover ELEN E6951 Wireless & Mobile Networking II April 13th 2009

Interference in Femtocell Networks. Roger Piqueras Jover ELEN E6951 Wireless & Mobile Networking II April 13th 2009 Interference in Femtocell Networks Roger Piqueras Jover ELEN E6951 Wireless & Mobile Networking II April 13th 2009 Overview Wireless cellular networks Current challenges in cellular networks Femtocell

More information

An Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks

An Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks Tis paper was presented as part of te main tecnical program at IEEE INFOCOM 20 An Analytical Approac to Real-Time Misbeavior Detection in IEEE 802. Based Wireless Networks Jin Tang, Yu Ceng Electrical

More information

CE 221 Data Structures and Algorithms

CE 221 Data Structures and Algorithms CE Data Structures and Algoritms Capter 4: Trees (AVL Trees) Text: Read Weiss, 4.4 Izmir University of Economics AVL Trees An AVL (Adelson-Velskii and Landis) tree is a binary searc tree wit a balance

More information

Redundancy Awareness in SQL Queries

Redundancy Awareness in SQL Queries Redundancy Awareness in QL Queries Bin ao and Antonio Badia omputer Engineering and omputer cience Department University of Louisville bin.cao,abadia @louisville.edu Abstract In tis paper, we study QL

More information

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes Coarticulation: An Approac for Generating Concurrent Plans in Markov Decision Processes Kasayar Roanimanes kas@cs.umass.edu Sridar Maadevan maadeva@cs.umass.edu Department of Computer Science, University

More information

UNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING

UNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING UNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING Raffaele Gaetano, Giuseppe Scarpa, Giovanni Poggi, and Josiane Zerubia Dip. Ing. Elettronica e Telecomunicazioni,

More information

Piecewise Polynomial Interpolation, cont d

Piecewise Polynomial Interpolation, cont d Jim Lambers MAT 460/560 Fall Semester 2009-0 Lecture 2 Notes Tese notes correspond to Section 4 in te text Piecewise Polynomial Interpolation, cont d Constructing Cubic Splines, cont d Having determined

More information

CHAPTER 7: TRANSCENDENTAL FUNCTIONS

CHAPTER 7: TRANSCENDENTAL FUNCTIONS 7.0 Introduction and One to one Functions Contemporary Calculus 1 CHAPTER 7: TRANSCENDENTAL FUNCTIONS Introduction In te previous capters we saw ow to calculate and use te derivatives and integrals of

More information

MAPI Computer Vision

MAPI Computer Vision MAPI Computer Vision Multiple View Geometry In tis module we intend to present several tecniques in te domain of te 3D vision Manuel Joao University of Mino Dep Industrial Electronics - Applications -

More information

An Efficient Fault-Tolerant Multicast Routing Protocol with Core-Based Tree Techniques

An Efficient Fault-Tolerant Multicast Routing Protocol with Core-Based Tree Techniques An Eicient Fault-Tolerant Multicast outing Protocol wit Core-Based Tree Tecniques Weijia Jia + Wei Zao * + Department o Computer Science City University o Hong Kong Kowloon, Hong Kong Email: {wjia, gxu}@cs.cityu.edu.k

More information

CSCE476/876 Spring Homework 5

CSCE476/876 Spring Homework 5 CSCE476/876 Spring 2016 Assigned on: Friday, Marc 11, 2016 Due: Monday, Marc 28, 2016 Homework 5 Programming assignment sould be submitted wit andin Te report can eiter be submitted wit andin as a PDF,

More information

SEATTLE: A Scalable Ethernet Architecture for Large Enterprises

SEATTLE: A Scalable Ethernet Architecture for Large Enterprises TRC00349 ACM (Typeset by SPi, Manila, Pilippines) 1 of 35 February 23, 2011 14:31 SEATTLE: A Scalable Eternet Arcitecture for Large Enterprises 1 CHANGHOON KIM, Microsoft MATTHEW CAESAR, University of

More information

A Bidirectional Subsethood Based Similarity Measure for Fuzzy Sets

A Bidirectional Subsethood Based Similarity Measure for Fuzzy Sets A Bidirectional Subsetood Based Similarity Measure for Fuzzy Sets Saily Kabir Cristian Wagner Timoty C. Havens and Derek T. Anderson Intelligent Modelling and Analysis (IMA) Group and Lab for Uncertainty

More information

Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks

Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks Peyman Faizian, Md Safayat Raman, Md Atiqul Molla, Xin Yuan Department of Computer Science Florida State University

More information

wrobot k wwrobot hrobot (a) Observation area Horopter h(θ) (Virtual) horopters h(θ+ θ lim) U r U l h(θ+ θ) Base line Left camera Optical axis

wrobot k wwrobot hrobot (a) Observation area Horopter h(θ) (Virtual) horopters h(θ+ θ lim) U r U l h(θ+ θ) Base line Left camera Optical axis Selective Acquisition of 3-D Information Enoug for Finding Passable Free Spaces Using an Active Stereo Vision System Atsusi Nisikawa, Atsusi Okubo, and Fumio Miyazaki Department of Systems and Human Science

More information

The Euler and trapezoidal stencils to solve d d x y x = f x, y x

The Euler and trapezoidal stencils to solve d d x y x = f x, y x restart; Te Euler and trapezoidal stencils to solve d d x y x = y x Te purpose of tis workseet is to derive te tree simplest numerical stencils to solve te first order d equation y x d x = y x, and study

More information

h,k 2 Following the poison-antidote terminology of [4], we call antidotes the packets of

h,k 2 Following the poison-antidote terminology of [4], we call antidotes the packets of I 2 NC: Intra- and Inter-Session Network Coding for Unicast Flows in Wireless Networks Hulya Seferoglu, Atina Markopoulou Dept. of EECS, University of California, Irvine {seferog, atina}@uci.edu K. K.

More information

2.8 The derivative as a function

2.8 The derivative as a function CHAPTER 2. LIMITS 56 2.8 Te derivative as a function Definition. Te derivative of f(x) istefunction f (x) defined as follows f f(x + ) f(x) (x). 0 Note: tis differs from te definition in section 2.7 in

More information

A Review on Soft Handover Schemes in LTE Cellular Networks

A Review on Soft Handover Schemes in LTE Cellular Networks http:// A Review on Soft Handover Schemes in LTE Cellular Networks Shreedhar K V M Department of Computer Science and Engineering R V College of Engineering Bengaluru, India - 560095 Abstract - Long Term

More information

each node in the tree, the difference in height of its two subtrees is at the most p. AVL tree is a BST that is height-balanced-1-tree.

each node in the tree, the difference in height of its two subtrees is at the most p. AVL tree is a BST that is height-balanced-1-tree. Data Structures CSC212 1 AVL Trees A binary tree is a eigt-balanced-p-tree if for eac node in te tree, te difference in eigt of its two subtrees is at te most p. AVL tree is a BST tat is eigt-balanced-tree.

More information

Density Estimation Over Data Stream

Density Estimation Over Data Stream Density Estimation Over Data Stream Aoying Zou Dept. of Computer Science, Fudan University 22 Handan Rd. Sangai, 2433, P.R. Cina ayzou@fudan.edu.cn Ziyuan Cai Dept. of Computer Science, Fudan University

More information

12.2 Techniques for Evaluating Limits

12.2 Techniques for Evaluating Limits 335_qd /4/5 :5 PM Page 863 Section Tecniques for Evaluating Limits 863 Tecniques for Evaluating Limits Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing

More information

Software Fault Prediction using Machine Learning Algorithm Pooja Garg 1 Mr. Bhushan Dua 2

Software Fault Prediction using Machine Learning Algorithm Pooja Garg 1 Mr. Bhushan Dua 2 IJSRD - International Journal for Scientific Researc & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Software Fault Prediction using Macine Learning Algoritm Pooja Garg 1 Mr. Busan Dua 2

More information

Numerical Derivatives

Numerical Derivatives Lab 15 Numerical Derivatives Lab Objective: Understand and implement finite difference approximations of te derivative in single and multiple dimensions. Evaluate te accuracy of tese approximations. Ten

More information

ITERNET of Things (IoT) envisages a future in which a large

ITERNET of Things (IoT) envisages a future in which a large IEEE TANSACTIONS ON VEHICULA TECHNOLOGY, VOL. 66, NO. 10, OCTOBE 2017 9381 An Accurate Security Game for Low-esource IoT Devices Hicem Sedjelmaci, Member, IEEE, Sidi Moamed Senouci, Member, IEEE, and Tarik

More information

15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes

15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes 15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes William Lovas (wlovas@cs) Karl Naden Out: Tuesday, Friday, June 10, 2011 Due: Monday, June 13, 2011 (Written

More information

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method International Journal of Statistics and Applications 0, (): -0 DOI: 0.9/j.statistics.000.0 Comparison of te Efficiency of te Various Algoritms in Stratified Sampling wen te Initial Solutions are Determined

More information

FORWARD AWARE FACTOR METHOD USING ENERGY BALANCED PROTOCOL FOR WIRELESS SENSOR NETWORKS

FORWARD AWARE FACTOR METHOD USING ENERGY BALANCED PROTOCOL FOR WIRELESS SENSOR NETWORKS International Journal of Emerging Tecnology in Computer Science & Electronics (IJETCSE) FORWARD AWARE FACTOR METHOD USIG EERGY BALACED PROTOCOL FOR WIRELESS SESOR ETWORKS P. janaki #1, C.Sentilraja *2,And

More information

DYNAMIC POWER TUNING FOR DOWNLINK INTERFERENCE MITIGATION IN HETEROGENEOUS LTE NETWORK

DYNAMIC POWER TUNING FOR DOWNLINK INTERFERENCE MITIGATION IN HETEROGENEOUS LTE NETWORK DYNAMIC POWER TUNING FOR DOWNLINK INTERFERENCE MITIGATION IN HETEROGENEOUS LTE NETWORK R. Sharanya, R. Gunasundari and K. Jayanthi Department of ECE, Pondicherry Engineering College, Puducherry, India

More information

CS211 Spring 2004 Lecture 06 Loops and their invariants. Software engineering reason for using loop invariants

CS211 Spring 2004 Lecture 06 Loops and their invariants. Software engineering reason for using loop invariants CS211 Spring 2004 Lecture 06 Loops and teir invariants Reading material: Tese notes. Weiss: Noting on invariants. ProgramLive: Capter 7 and 8 O! Tou ast damnale iteration and art, indeed, ale to corrupt

More information

Communicator for Mac Quick Start Guide

Communicator for Mac Quick Start Guide Communicator for Mac Quick Start Guide 503-968-8908 sterling.net training@sterling.net Pone Support 503.968.8908, option 2 pone-support@sterling.net For te most effective support, please provide your main

More information

Computing geodesic paths on manifolds

Computing geodesic paths on manifolds Proc. Natl. Acad. Sci. USA Vol. 95, pp. 8431 8435, July 1998 Applied Matematics Computing geodesic pats on manifolds R. Kimmel* and J. A. Setian Department of Matematics and Lawrence Berkeley National

More information

Issues in Femtocell Deployment in Broadband OFDMA Networks : 3GPP LTE a case study

Issues in Femtocell Deployment in Broadband OFDMA Networks : 3GPP LTE a case study Issues in Femtocell Deployment in Broadband OFDMA Networks : 3GPP LTE a case study Suvra Sekhar Das 1,2, Prabhu Chandhar 1, Soumen Mitra 1, Priyangshu Ghosh 1 1 G.S.Sanyal School of Telecommunications,

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April ISSN

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April ISSN International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 213 SSR Improvement in OFDMA Femtocell Networks Sandhya Y. A. M.Tech Student, KU Mar Baselios College of Engineering

More information

Frequency and Time Resource Allocation for Enhanced Interference Management in a Heterogeneous Network based on the LTE-Advanced

Frequency and Time Resource Allocation for Enhanced Interference Management in a Heterogeneous Network based on the LTE-Advanced ICWMC 23 : The Ninth International Conference on Wireless and Mobile Communications Frequency and Time Resource Allocation for Enhanced Interference Management in a Heterogeneous Network based on the LTE-Advanced

More information

POWER-ON AND POWER-OFF PROCEDURES

POWER-ON AND POWER-OFF PROCEDURES POWER-ON AND POWER-OFF PROCEDURES TABLE OF CONTENTS 1. Power-On Sequence 2. Network and Cell Selection 3. RRC Connection Establishment 4. Attach Procedure 5. Detach Procedure 1. POWER-ON SEQUENCE The following

More information