On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks
|
|
- Brice Baker
- 5 years ago
- Views:
Transcription
1 On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY Jing Deng Depatment of CS Univesity of New Oleans New Oleans, LA Pamod K. Vashney Depatment of EECS Syacuse Univesity Syacuse, NY Abstact Contention-based Geogaphic Fowading ) is a state-fee communication paadigm fo infomation delivey in multihop ad hoc and senso netwoks. A pioi selection of the fowading aea impacts its oveall netwok pefomance and the design of the potocol as well. In this wok, we study the fundamental poblem of defining the fowading aea apioifo and detemine its impact on the pefomance. We model without void i.e., absence of a next-hop node in the fowading aea) handling as a -step fowading stategy. Based on this model and given a andom distibution of netwok nodes, we develop a geneal mathematical analysis technique to evaluate the pefomance of with diffeent fowading aeas, in tems of the pefomance metic aveage single-hop packet pogess. Futhe, we intoduce two state-fee void handling schemes, i.e., active exploation and passive paticipation, fo and study thei pefomance in depth. Ou theoetical analysis and numeically evaluated esults, validated by extensive simulations, povide a guideline egading the selection of specific fowading aeas fo the design of a pactical potocol. It also seves as a geneal pefomance evaluation famewok fo the existing potocols. I. INTRODUCTION In ecent yeas, a communication paadigm, based on the distibuted selection of a next-hop node via contention, has been poposed fo infomation delivey in multi-hop wieless ad hoc and senso netwoks [] []. In this paadigm, the geogaphic location infomation of the nodes is assumed available, eithe by apioiconfiguation o by the use of the Global Positioning System GPS) eceive o though self-configuing localization mechanisms such as [], []. We call this paadigm Contention-based Geogaphic Fowading ). Diffeent fom the topology-based communication paadigm, which equies a outing potocol such as Dynamic Souce Routing DSR) [] to collect the topology infomation, takes advantage of the geogaphic infomation to allow the data packets to gadually appoach and eventually aive at the intended destination. Compaed with the taditional geogaphic communication paadigm, allows next-hop candidate nodes to contend fo the data fowading task and a specific next-hop node is decided at the tansmission time. The contention mechanism eliminates the need to peiodically tansmit beacons, which ae used to update the location infomation of neighbos, and the need to select a next-hop node in advance at the sende. Thus, nodes employing only need to know thei own locations and that of the packet destination in ode to communicate with each othe. Futhemoe, the centalized selection of a next-hop node at the sende is eplaced by the distibuted selection of a next-hop node among the potential eceives. Since equies neithe the topology infomation no the neighbo location infomation, it is egaded as a state-fee communication paadigm. Its state-fee natue makes obust to high netwok dynamics and fequent topology changes, scalable to lage-scale node deployment, adaptable to dense node densities, and applicable to data-centic applications and esouceconstained netwoks. Futhemoe, contention among the potential eceives does not equie significantly moe A souce node can obtain the location infomation of a data packet destination eithe fom a location sevice such as geogaphical location sevice GLS) [] o via apioiconfiguation. This infomation is encoded into the data packet heade. Any intemediate nodes can diectly access it late. ---//$. C) IEEE
2 ovehead than contention esolution at the MAC laye. Due to these benefits, has ecently attacted a significant inteest fom the eseach community as a favoed candidate fo infomation delivey in Vehicula Ad Hoc Netwoks VANETs) [], Mobile Ad Hoc Netwoks MANETs) [], Wieless Senso Netwoks WSNs) [], [], [], and Wieless Senso and Actuato Netwoks WSANs). While diffeent potocols adopt diffeent appoaches [] [], the basic idea emains the same given as follows: i) a pedefined fowading aea and nodes that eside in the aea become next-hop candidate nodes and contend with one anothe fo the data fowading task; ii) a distibuted contention abitation and esolution scheme in ode to effectively establish a single nexthop node in the fowading aea; iii) the establishment of next-hop node selection citeia in ode to attain the desied netwok pefomance in an efficient way; iv) an effective mechanism to handle a void. Except the GeRaF potocol that uses an aea-based and sende-assisted contention abitation and esolution mechanism [], all othe potocols employ a timebased and eceive-ovehead contention abitation and esolution mechanism [], [] []. One of the basic pocesses in the schemes poposed in [], [] [] is the following: fist, the sende boadcasts an RTS packet to all its neighbos. Second, the neighbos esiding in the fowading aea independently set up times in ode to contend fo the data fowading task. A candidate node that has the ealiest timeout is abitated to win the contention. Thid, the winning node etuns a CTS packet to establish itself as the only next-hop node, othe nodes in the fowading aea that ovehea the CTS packet dop out of the contention. Finally, a nomal DATA and ACK exchange between two specific nodes follows. The above pocess can be easily integated into a contention-based MAC potocol such as the IEEE. Distibuted Coodinato Function DCF) []. Such coss-laye design educes the potocol ovehead and the data fowading delay [], []. A fundamental poblem in is the definition of the fowading aea, since it influences how much pogess a packet makes towads a destination on a single hop and theeby has a significant impact on the oveall netwok pefomance of. The fowading aea also affects the design of the contention esolution mechanism and The absence of a next-hop node in the fowading aea. This poblem is also temed as holes o local minimum phenomenon in the liteatue []. the possibility of having a void, the event that no nexthop candidate nodes ae pesent in the fowading aea. In this wok, we appoach the poblem of defining the fowading aea fo analytically and though extensive simulations. We concentate on in wieless ad hoc netwoks with andomly distibuted nodes, whee any pai of nodes may communicate with each othe, eithe diectly o though multiple hops. To the best of ou knowledge, ou wok is the fist study of fom this pespective. The main contibutions of this wok include: A high-level model of without void handling is established as a -step fowading stategy. This model can be used to analyze diffeent geogaphybased potocols fom a numbe of pespectives such as evaluation of multi-hop pefomance and enegy efficiency; A geneal mathematical analysis famewok, in tems of aveage single-hop packet pogess, is developed fo the pefomance evaluation of with most egula fowading aeas of inteest; The conclusion that, maximum fowading aea, at the cost of moe complex potocol design and lowe spatial euse, always pefoms the best. Also, a -degee adian aea begins to achieve the same pefomance as maximum fowading aea with an aveage numbe of neighbos equal to while maximum communication aea equies much moe than neighbos on an aveage to do so. This esult is validated by extensive simulations and is useful fo the design of a pactical potocol; The intoduction of two state-fee void handling schemes fo and thei pefomance evaluation via extensive simulations. The est of the pape is oganized as follows. In Section II, we define and discuss thee typical fowading aeas fo that have been adopted in the liteatue [] []. A high-level abstaction of as a fowading stategy and a theoetical analysis fo the pefomance of ae pesented in Section III. Section IV povides numeical and simulation esults along with some discussion. In Section V, we intoduce two state-fee void handling schemes and investigate thei pefomance. We conclude ou wok in Section VI. While, in the est of this pape, we focus ou attention on wieless ad hoc netwoks, the esults obtained ae also applicable to wieless senso netwoks, whee the infomation sink may be at any location in the egion of inteest. Definitions fo these fowading aeas will be given in Section II.
3 Fig.. S O P o E M W Thee Typical Fowading Aeas fo II. FORWARDING AREAS IN A. Fowading Aeas With a common equiement among all fowading aeas that a packet should make a positive pogess towad the destination at evey hop and an assumption that each node has a tansmission ange in the fom of a cicle, we define thee typical fowading aeas, as shown in Fig., fo as follows: Maximum Fowading Aea ): is the ovelap egion of two cicula aeas: the tansmission cicle of the sende and the cicle that is centeed at the destination with a adius equal to the distance between the sende and the destination. It is the egion OSPW shown in Fig.. The size of this aea is vaiable and dependent on the distance between the sende and the destination. Note that this fowading aea has been adopted in the GeRaF [] and SIF [] potocols. Maximum Communication Aea ): is defined as the lagest egion within which any pai of nodes can hea each othe []. Thus, it is a cicle with a diamete equal to the tansmission ange of a node. It is the cicle with SW as its diamete shown in Fig.. The beauty of is that, as suggested by its name, this is the maximum aea within which evey pai of nodes can hea each othe, eliminating potential CTS esponse collisions unless the esponses ae sent at the same time. Note that SW should be co-linea with SD in ode to maximize the possible aea within the cicle. The size of is a constant no matte whee the destination is located. D -Degee Radian Aea ): is a adial egion that includes a -degee adian aea aound the line connecting the sende and the destination on both sides. It is the egion SEWM shown in Fig.. Note that SD is the angle bisecto fo this egion. Thesizeofisalsoaconstant.wasused in the IGF potocol []. As we mentioned ealie, a time-based and eceiveovehead potocol equies that any pai of nodes in a fowading aea should be able to hea each othe in ode to avoid multiple esponses. The and aeas satisfy such a equiement as all points in these egions ae within the communication ange of each othe. The aea, howeve, may have two nodes that ae out of thei communication anges. Thus, it is possible fo two o moe next-hop candidate nodes to collide duing the contention pocess. This issue was addessed by a technique that exploits the diffeence between caie sensing ange and tansmission ange in []. We do not conside the collisions fom the nexthop candidate nodes and the associated additional cost fo in this wok. Since the size of is lage than those of and, the pobability of void in is smallest among the thee aeas, based on the assumption of andom deployment of netwok nodes. These pobabilities ae calculated in the following subsection. B. Pobability of void We model the node distibution in the egion of inteest as a two-dimensional Poisson point pocess. Thus, the pobability that k nodes ae located within an aea of size A is given by []: P {k} λa)k e λa, ) k! whee λ is the expected numbe of nodes within a unit aea. Since the fowading aeas of and ae, π / and π /, espectively, the pobabilities of void P {k }) fo and ae P {void in } e ρ, ) P {void in } e ρ, ) whee ρ is the aveage numbe of neighbos within the tansmission ange of the sende and is given by ρ π λ. ) Note that, such a technique equies a moe complex potocol design and educes the spatial euse at the MAC laye as well.
4 Pobability of Void uppe bound) Aveage Numbe of Neighbos, ρ Fig.. Pobability of Void fo Fowading Aeas The calculation of the pobability of void fo the aea is moe complicated. Howeve, an uppe bound has been deived in [] as P {void in } e π )ρ e ρ.. ) The esults fom ), ), and ) ae plotted in Fig.. Fom the figue, it is obseved that the uppe bound on the pobability of void of is lowe than the pobability of void of and. Note that, when ρ is highe than, pobabilities of void fo all thee aeas ae close to zeo. This suggests that at least one next-hop node will be found in all thee fowading aeas. Although has a lowe pobability of void than and, a moe inteesting and challenging issue is: does that employs pefom bette than that uses o, in a andomly deployed netwok? What metics can be used to evaluate them? In the next section, we will popose a pefomance metic and pesent a theoetical analysis. III. PERFORMANCE ANALYSIS A. Pefomance Metic In ode to evaluate diffeent potocols, we popose to use the metic aveage single-hop packet pogess, which is defined as the expected value of the diffeence between the befoe-hop distance between the sende and the destination) and the afte-hop distance between the next-hop node and the destination). Such The definition of pogess in this pape is the same as that of advance in []. Howeve, note that pogess is oiginally defined, in the liteatue [], as the othogonal pojection of the line connecting the sende and the next-hop node onto the line connecting the sende and the destination. It diffes fom ou definition. a metic eflects the pogess towad the intended destination at each hop and has a diect connection with the end-to-end packet delay pefomance of in the long tem. In the following subsections, we will deive aveage single-hop packet pogess fo andomly deployed netwoks that employ with the,, and fowading aeas, espectively. B. Netwok Assumptions and Abstact Stategy We assume that a homogeneous wieless ad hoc netwok is deployed with andomly distibuted nodes, whee all nodes have the common tansmission ange in the fom of a cicle of adius. Nodes adopt the potocol to communicate with each othe and the fowading aea in is specified apioi. The node distibution can be modeled as in Equation ) and the appeaance of nodes in any two non-ovelapping aeas is independent. Due to the limited adio ange, a data packet has to be fowaded by a cetain numbe of hops via intemediate nodes befoe eaching its destination. Fo any single hop, a node within the fowading aea of a sende is called a next-hop candidate node fo the sende. We assume a pefect contention abitation and esolution scheme fo, which makes a candidate node closest to the destination in the fowading aea always win the contention and become the only next-hop node fo the sende. We also assume the availability of a collision-fee media access scheme and that each node can detemine its own location and the location of packet destination. Futhe, we conside the snapshot at the time of the fist-hop packet fowading, even if a multihop fowading is equied fo most data packets to aive at thei destinations. Given a andom node deployment, any intemediate-hop fowading can be viewed as a new fist-hop packet fowading. Thus, the fist-hop aveage packet pogess is close to the oveall aveage singlehop packet pogess in a homogeneous envionment. We assume that a souce node, S, is located at the cente of a cicle of adius x, wheex is temed the netwok ange and is the lagest possible distance between S and any destination. In othe wods, the souce node will not send any packet to nodes outside the cicle. The destination node D, to which S intends to delive a data packet, is assumed to be andomly distibuted ove the entie cicle. Note that othe citeia fo a distibuted selection of a next-hop node may be used, such as enegy [], [] and link eliability. In this wok, we focus on a distance-only citeion.
5 Based on the above assumptions, can be modeled as a -step fowading stategy given below: i) If the destination node D is located within distance fom the souce node S, D always wins the contention and the souce node S delives a data packet to D diectly. ii) If the destination node D is outside the tansmission ange of the souce node S, the data packet is always fowaded by a next-hop node that is closest to the destination D in the fowading aea. iii) If thee ae no next-hop candidate nodes in the fowading aea, the souce node S does not fowad the data packet and discads it afte a pe-detemined peiod of time duing which no candidate nodes appea in the fowading aea. Fig.. A A S v D n F Illustation of Maximum Fowading Aea ) C. Aveage Single-hop Packet Pogess Fist of all, we deive a geneal expession fo aveage fist-hop packet pogess, which has been assumed to be appoximately equal to the aveage single-hop packet pogess unde ou assumptions, fo. Let v denote the distance between the souce node S and the destination node D. Whenv, diect data delivey to the destination node D can be completed, accoding to step i) in the fowading stategy; hence, the data packet pogess towad the destination node D is v. Ifv >,an appopiate i.e., neaest to the destination in this context, accoding to step ii) in the fowading stategy) nexthop node in its fowading aea is selected fo futhe packet fowading. The data packet pogess towad the destination node D is theeby equal to v n), whee n is the distance between the next-hop node F and the destination node D coesponding to the fist hop. Denote by P the andom vaiable coesponding to the data packet pogess in a single hop. Let V and N, espectively, be the andom vaiables coesponding to v and n discussed above. I is an index andom vaiable defined as below: {, at least one node in the fowading aea; I, othewise. With the above notations, the poblem of finding the aveage single-hop packet pogess is equivalent to the In this wok, we fist conside without void handling since void handling complicates and hides the pefomance of a potocol. We will investigate void handling schemes in Section V. deivation of the expected value of P,whee V, if V ; P V N, if V > I ;, if V > I. Note that, if V > I ) is tue, no packet fowading will occu. In this case, the actual packet pogess is zeo. It can, theefoe, be veified that ) E[P ]E[P V ) V > I )] P {V ) V > I )}. ) We now poceed to deive the expectation of P given that V ) V > I )is tue. Fom [], we have: P {P >p V ) V > I )} P {p <V } +P{V N >p V > I }. P {V } +P{V > I } ) We theefoe need to detemine fou pobability expessions in ). Among them, P {p <V } and P{V } can be easily detemined below: P {p <V } p ) x U p), ) P{V } x, ) The deivation of this conditional expectation fom ) to ) is simila to that given in [], whee the authos used such a pogess to deive an optimum node tansmission ange fo ad hoc netwoks. In this wok, we futhe develop it as a pat of ou genealized evaluation famewok fo, independent of any fowading aeas.
6 whee U function is defined as: {, if p; U p), if <p. It emains to detemine P {V > I } and P {V N >p V > I }. Next, we poceed to detemine P {V > I }. Let A SD denote a geneal fowading aea. Futhe, we can divide A SD into two egions by the cicle centeed at D with adius n. The aeas of these two egions ae espectively denoted as A and A, as the shaded egions showninfig.,fig.,andfig.. P{V > I } x x P{V > I V v}dp V v) P{at least one node in A SD }dp V v) ) e λasd ) v x dv x x ve λasd dv, ) whee the lowe integation limit is eplaced with in ) due to V >. So fa, we have completed the detemination of P{V > I }. Futhe, obseve that: P{N n I V v} P{I V v}, if n v ; P{Q}, if v <n<v;, if n v, whee Q epesents the event in which no neighbos exist in A and at least one exists in A. By the assumption of independence of node appeaance in non-ovelapping egions, the above expession fo v < n < v can be futhe deived as: P{Q} P{no neighbos in A and at least one in A } P{no neighbos in A } P{at least one in A } e λa e ρa ) e λa e λasd. Asaesult, P {N <n I V v} P{I V v} P {N n I V v}, if n v ; e λa, if v <n<v; ) e λasd, if n v, whee P {I V v} e λasd has been used. Using ), we obtain: P {V N >p V > I } P {N <v p I V v} dp V v) x P {N <v p I V v} v x dv x ) x ve λa dv U p). ) This detemines P {V N >p V > I }. Note that n in ) has been substituted by v p duing the above deivation. Thus, any n associated with the expession of the A aea should be eplaced with v p wheneve necessay late. Finally, substituting ), ), ), and ) into ), we have, fo p>, P {P >p V ) V > I )} x p ve λa dv U p). x ve λasd dv The expected value of P given the validity of V ) V > I )is then equal to [, Eq..)]: E [ P V ) V > I ) ] P {P >p V ) V > I )} dp [ ] x p ve λa dv dp x x x ve λasd dv ve λa dvdp ). ) ve λasd dv Substituting ), ), and ) into ), we attain a geneal expession fo aveage single-hop data packet pogess, independent of any fowading aeas, fo netwoks with below: x ve λa dvdp E[P ] x, ) whee we have used P {V ) V > I )} P{V } +P{V > I }
7 In the case of, A ) is A ) { A ) if <p<c ; A ) if c <p<, Fig.. S A F A v n Illustation of Maximum Communication Aea ) D whee c v v ) + ) and n A )n cos +v ) ) ) nv ) n n sin cos +v ) )) ) nv ) + π π cos ) +v ) n )) v ) + sin π cos ) +v ) n ))) v ), Fig.. S A F A v n Illustation of -Degee Radian Aea ) since these two events ae mutually exclusive. Now we poceed to deive the aveage single-hop pogess of thee diffeent fowading aeas: as shown in Fig., as shown Fig., and as shown in Fig., since A is diffeent fo, and. In the case of, A ) is A ) cos + v n ) D v +n cos n + v vn + v + n)v + n ) + v n) + n v). Thus, aveage single-hop packet pogess fo can be finally detemined as: [ ] E P x whee ρ is given by ). ve ρa ) π dvdp ) x. ) n A )n cos +v ) ) ) nv ) n n sin cos +v ) )) ) nv ) + cos ) +v ) n ) v ) cos sin ) +v ) n )) v ). Theefoe, aveage single-hop packet pogess fo is [ ] E P x x c ) vdv e ρa ) π dp + e ρa ) π dp c x. In the case of, A ) is { A) if <p<c ; A ) A ) if c <p<, whee c v + v v and A) n sin v n π ) ) + π n sin sin v n π ) ) n sin sin v n π ) ). )
8 Aveage Single hop Packet Pogess m) Aveage Numbe of Neighbos, ρ Fig.. Numeical esults fo aveage single-hop packet pogess vs aveage numbe of neighbos m and x m) Hence, aveage single-hop packet pogess fo can be finally deived as: [ ] x E P x c ) vdv e ρa) π dp + e ρa ) π dp c x. IV. NUMERICAL AND SIMULATION RESULTS ) A. Numeical Results As shown in ), ), and ), the aveage singlehop packet pogess is a function of node tansmission ange, netwok ange x, and aveage numbe of neighbos ρ o nodal density λ). We pesent two sets of numeical esults as shown in Figs. and. Figue compaes the analytically obtained aveage single-hop packet pogess fo,, and, with espect to diffeent aveage numbe of neighbos. The netwok ange is fixed to be a cicle with adius metes i.e., x m) while node tansmission ange is set at m i.e., m). Note that simila esults have been obseved fo othe values of and ae not pesented hee. It can be obseved fom Fig that the aveage singlehop packet pogess appoaches with an incease in ρ, fo all thee techniques. Howeve, it does not become equal to o. This is expected: when ρ is vey small, i.e., close to, it is unlikely that the sende will find any next-hop candidate to fowad its data packets. Howeve, it is still possible that the sende and the destination ae within the communication ange of each othe. Thus, the aveage single-hop packet pogess is positive. When ρ inceases, the pobability of void deceases and the sende is able to locate a next-hop node in its fowading aea in most situations. The aveage single-hop packet pogess, theefoe, ises. As ρ becomes lage and lage, it is moe and moe likely fo the sende to locate a next-hop node neaest to the destination and fathest away fom the sende as well, i.e., the data packet pogess duing this hop is equal to node tansmission ange. As a esult, we can expect that, when ρ goes to infinity, aveage single-hop packet pogess will appoach asymptotically. Howeve, it is still possible fo a destination node to be within the ange of the sende, then the packet pogess is less than o equal to. Theefoe, the aveage single-hop packet pogess will not become equal to. Anothe inteesting obsevation fom Fig. is that the aveage single-hop packet pogess inceases quickly fo small ρ andthenslowlyafteρ exceeds a cetain theshold value, i.e., thee exists a knee in the cuves aound ρ. The explanation of this phenomenon lies in the pobability of void as shown in Fig.. Fom Fig., we can see that the pobability of void deceases quickly as ρ inceases fom to the above theshold value of ρ. This obsevation suggests that the pobability of void dominates the aveage single-hop packet pogess, especially when ρ is small and the netwok is spase. As a esult, the tend of the cuves in Fig. is invese of that of the cuves in Fig.. Ou final but most impotant obsevation fom Fig, as one of the conclusions fom this wok as well, is that, in tems of aveage single-hop packet pogess, when ρ is small, i.e., fom to aound nodes, pefoms the best, then, followed by ; when ρ is medium, i.e., between and nodes, still pefoms the best, is the second and both outpefom ; when ρ is lage, i.e., nodes up to infinity, conveges to the pefomance of and both ae bette than. It is expected that the pefomance of will also convege to that of as ρ goes up to a vey lage value i.e., much lage than ) o moe. Note that and neve out-pefom. The above obsevation can be explained as follows: when ρ is small, the size of the fowading aea dominates the aveage single-hop packet pogess since it detemines the pobability of void fo that aea; when ρ is lage enough to counteact the effect of voids, the
9 Aveage Single hop Packet Pogess m) Netwok Range m) Aveage Single hop Packet Pogess m) Netwok Range m) Aveage Single hop Packet Pogess m) Netwok Range m) a) m and ρ nodes b) m and ρ nodes c) m and ρ nodes Fig.. Numeical esults fo aveage single-hop packet pogess vs netwok ange Packet Pogess m) Packet Pogess m) Packet Pogess m) Aveage fist hop analytical) Aveage fist hop simulation) Aveage single hop simulation) Aveage Numbe of Neighbos, ρ Aveage fist hop analytical) Aveage fist hop simulation) Aveage single hop simulation) Aveage Numbe of Neighbos, ρ Aveage fist hop analytical) Aveage fist hop simulation) Aveage single hop simulation) Aveage Numbe of Neighbos, ρ a) b) c) Fig.. Simulations esults fo the validation of ou analysis m and x m) location of the fowading aea dominates the calculation of aveage single-hop packet pogess since a fowading aea which coves moe aea that is fathe away fom the sende and is neae to the destination will have bette next-hop candidate nodes and theeby attain a lage aveage single-hop packet pogess. Simila conclusions can be dawn fom Fig., which suggests that ou obsevation holds fo diffeent values of netwok ange. The above esults povide a theoetical basis fo the design of a pactical potocol based on time and eceive-ovehead capability in a andomly distibuted wieless ad hoc netwok. That is, without void handling, if ρ is known apioito be small o medium, we should select as the fowading aea; if ρ is o moe, should be selected since it has the same netwok pefomance as, and moe impotantly, a simple MAC design and a less expensive adio capability. should only be chosen when ρ is extemely high i.e., much lage than ). In Fig., we compae the aveage single-hop packet pogess with espect to diffeent values of netwok ange x. Node tansmission ange is fixed at m while ρ is set to nodes in Fig. a), nodes in Fig. b), and nodes in Fig. c). Fom Fig., we obseve that, attains an aveage single-hop packet pogess that is almost m, i.e., %, highe than and, fo ρ o ρ. Fo ρ, and achieve a.m, i.e., %, highe aveage single-hop packet pogess than. In the case of ρ, when netwok ange is small and is compaable to node tansmission ange, aveage single-hop packet pogess plummets quickly and then maintains a elatively constant value as netwok ange inceases. In the case of ρ o ρ, this tend is
10 Oveall Aveage Single hop Packet Pogess m) Aveage Numbe of Neighbos, ρ Fig.. Simulation esults fo the compaison of oveall aveage single-hop packet pogess m and x m) evesed and aveage single-hop packet pogess jumps to a highe level and stays at that level as x inceases. This esult is elated to ou -step fowading stategy and can be explained as follows: when netwok ange is small, only step i) affects the esult; howeve, when netwok ange is much lage than the node tansmission ange, step ii) and step iii) also impact the esult. When ρ, step iii) has a lage impact than step ii), so the initial value is lage than the stable value. In the case of ρ o ρ, step ii) has a lage impact than step iii) and the initial value is theeby lowe than the stable value. B. Simulation Results Simulations pogams witten in C language and un in Micosoft Visual C++.) have been pefomed to veify ou analysis. In ou simulations, the netwok nodes ae distibuted in a cicula egion accoding to a two-dimensional Poisson distibution. The cicle is centeed at, ) with adius metes while the node tansmission ange is set to metes. The souce node is fixed at, ) while destination nodes ae andomly chosen in the cicle. The souce node tansmits packets to the selected destination node in accodance with ou -step fowading stategy while specifying a fowading aea as,, o. We measued aveage fisthop packet pogess, aveage single-hop packet pogess not only the fist-hop, but also the aveage of all the hops fom the souce node to the destination) of each pai of souce and destination. All the esults pesented in Figs. and ae the aveage of uns, each of which selects destinations andomly. As shown in Fig., simulation esults match well with ou analytical esults fo aveage fist-hop packet pogess in,, and. Howeve, ou actual desied pefomance measue, namely the oveall aveage single-hop packet pogess, is slightly lowe than ou analytically deived aveage fist-hop packet pogess, as expected. The main eason is that the last-hop packet pogess, whee a packet is diectly deliveed to a destination, is often less than the packet pogess in the pevious hops, whee a packet is fowaded using a geedy appoach. Figue confims ou obsevations made using analytical esults. In fact, the effect of last-hop packet pogess is simila fo diffeent fowading aeas. Extensive simulations have been pefomed and all the esults showed the same tendency. Theefoe, ou esults on fist-hop packet pogess can be employed as the oveall single-hop packet pogess to evaluate with diffeent fowading aeas. V. THE EFFECT OF VOID HANDLING SCHEMES Thus fa, we have studied the aveage single-hop packet pogess pefomance of without any void handling schemes fo diffeent fowading aeas. We futhe investigate the effect of void handling schemes on ou pevious esults in this section. A void occus when a packet is at a node which has no immediate neighbos in the fowading aea. This may lead to the data packet being dopped by this node, even though the oiginal souce and the intended destination ae topologically connected. A void handling scheme is necessay to somehow bypass the void. Befoe a node initiates a void handling pocedue, it should fist detemine whethe the void is tempoay due to packet collisions o tempoay unavailability of next-hop nodes. Tempoay voids will disappea as nodes wake-up, collisions esolved, and mobile nodes move in. Such tempoay voids only affect the end-to-end packet delay. Note that voids can be handled by state-based void handling schemes such as peimete outing in GPSR [] and BOUNDHOLE in [], but these techniques equie nodes to collect the local topology infomation eithe poactively o on demand. Thus, we focus on appoaches that have the state-fee featue by intoducing two state-fee void handling schemes fo hee and study thei pefomance via extensive simulations. The fist state-fee void handling scheme is temed active exploation. In this scheme, when a node cannot
11 Aveage Single hop Packet Pogess m) Active Exploation + Active Exploat + Passive + Paticipation Passive Patici. Aveage Numbe of Neighbos, ρ Aveage Single hop Packet Pogess m) + Active Exploation + Active Exploat + Passive + Paticipation Passive Patici Aveage Numbe of Neighbos, ρ Aveage Single hop Packet Pogess m) + Active Exploation + Passive Paticipation Aveage Numbe of Neighbos, ρ a) b) c) Fig.. Simulation esults fo with diffeent fowading aeas m and x m) locate a next-hop node in its fowading aea, it gadually inceases its tansmission ange until a next-hop node is found in its updated fowading aea. Note that we still use location instead of topology infomation. Thus, it is a state-fee scheme. The exta costs of this scheme ae the additional delay and the equiement of inceasing a node s tansmission powe hence the tansmission ange). In this wok, we assume that a node can incease its ange as much as it needs to. This assumption may not be pactical. In pactice, howeve, if a node still does not find any next-hop candidate nodes afte extending its tansmission ange to the maximum value, the following second scheme can be employed to avoid futhe loss of data packets. The second state-fee scheme is temed passive paticipation. The main idea is that once a node cannot locate a next-hop node, it simply discads the data packet and discouages itself fom picking up any following data packets fo that destination. The node may go back to check if thee exist any next-hop nodes at a futue time. This simple stategy has a evese-popagation effect which eventually infoms othe intemediate next-hop nodes to avoid those nodes with voids fo that destination. The disadvantage of this scheme is that it cannot be well exploited unde low nodal density since most nodes and even the souce node may be discouaged, which causes moe seious netwok patition and moe packet losses than befoe. Futhe analysis of these two schemes is not pesented hee due to page limitations. The simulation expeiment has the same configuation as in the last section and simulation esults ae shown in Figs.,, and. Fom Fig., we can obseve that,, and have the same tend. That is, Aveage Single hop Packet Pogess m).... Aveage Numbe of Neighbos, ρ Fig.. Simulation esults fo plus active exploation m and x m) when ρ is small, plus active exploation pefoms the best, then without void handling, followed by plus passive exploation. As ρ inceases, the pefomance of the thee cases begins to convege. Howeve, the point of thei convegence is diffeent. Fo, it is aound nodes; fo, it is aound nodes; while fo, it is aound nodes. This can be explained as follows: with a smalle ρ, the pobability of void is lage, and in this case the void handling schemes will contibute moe to aveage packet pogess and vice vesa. Thus, diffeent pobabilities of void with espect to ρ in these thee schemes, as shown in Fig., induce diffeent convegence points. Based on Fig., we can see that active exploation is vey effective fo small values of ρ. Howeve, we want to point out that this impovement is at the cost
12 Aveage Single hop Packet Pogess m) Aveage Numbe of Neighbos, ρ Fig.. Simulation esults fo plus passive paticipation m and x m) of exta enegy consumption. In the exteme case, i.e., ρ, plus active exploation becomes a diect instead of multi-hop communication between the souce and the destination, which has the lagest aveage packet pogess but also the most enegy consumption. In Fig., we can see that that uses passive paticipation is vey ineffective and even wose than without void handling fo small values of ρ, since it can discouage most nodes and even cause moe seious netwok patitioning. Howeve, when ρ is modeate, it begins to function well. The advantage of this scheme is that it is simple, efficient, and easy to implement. Note that although handling voids cannot impove aveage single-hop packet pogess afte ρ passes a theshold value, a state-fee void handling scheme is still desiable fo highe values of ρ, since it can impove packet delivey atio and potect the netwok fom any unexpected loss of impotant data at nodes with voids. VI. CONCLUSIONS In this pape, we have modeled Contention-based Geogaphic Fowading ) without void handling as a -step fowading stategy and then constucted a geneal analytical famewok. Ou famewok povides a theoetical basis fo the selection of an effective fowading aea fo the design of a pactical potocol, in tems of aveage single-hop packet pogess. The famewok, validated by numeical esults and extensive simulations, can also seve as a pefomance evaluation technique fo the potocols that have been designed peviously. Futhemoe, we have also intoduced two state-fee void handling schemes and studied thei pefomance when employed in conjunction with via extensive simulations. In ou futue wok, it would be of inteest to execute packet-level simulations to obseve how ou analysis matches with the esults obtained fom the existing potocols. We also plan to obtain moe analytical esults in tems of othe node distibution models as well as othe pefomance metics than those used in this wok. REFERENCES [] H. Füssle, J. Widme, M. Käsemann, M. Mauve, and H. Hatenstein, Contention-Based Fowading fo Mobile Ad-Hoc Netwoks, in Ad Hoc Netwoks Jounal Elsevie), Vol.,No., Novembe. [] M. Zozi, R. R. Rao, Geogaphic Random Fowading GeRaF) fo Ad Hoc and Senso Netwoks: Multihop Pefomance, in IEEE Tansactions on Mobile Computing, vol., Oct.-Dec.. [] B. M. Blum, T. He, S. Son, and J. A. Stankovic, IGF: A Robust State-Fee Communication Potocol fo Senso Netwoks, in Technical epot CS--, CS Depatment, Univesity of Viginia,. [] H. Füssle, H. hatenstein, J. Widme, M. Mauve, and W. Effelsbeg, Contention-Based Fowading fo Steet Scenaios, in poc. of the st intenational wokshop on intelligent tanspotation WIT), Hambug, Gemany, Ma. [] D. Chen, J. Deng, and P. K. Vashney, A State-Fee Data Delivey Potocol fo Wieless Senso Netwoks, in poc. of IEEE WCNC, New Oleans, LA, USA, Mach. [] A. Savvides, C. Han, and M. B. Stivastava, Dynamic Finegained Localization in Ad-Hoc Netwoks of Sensos, in Poc. of ACM MobiCom, Rome, Italy, July. [] N. Bulusu, J. Heidemann, and D. Estin, GPS-less Low Cost Outdoo Localization Fo Vey Small Devices, IEEE Pesonal Communications Magazine, ), pp. -, Oct.. [] D. B. Johnson and D. A. Maltz, Dynamic Souce Routing in Ad Hoc Wieless Netwoks, in Mobile Computing,. [] J. Li, J. Jannotti, D. S. J. De Couto, D. R. Kage, and R. Mois, A Scalable Location Sevice fo Geogaphical Ad Hoc Routing, in Poc. of ACM MobiCom, August. [] Q. Fang, J. Gao, and L. J. Guibas, Locating and Bypassing Routing Holes in Senso Netwoks, in Poc. of IEEE Infocom, Hong Kong, Mach. [] IEEE Standad fo Wieless LAN - Medium Access Contol and Physical Laye Specification, P.,. [] J. L. Gao, Analysis of Enegy Consumption fo Ad Hoc Wieless Senso Netwoks Using a Bit-mete-pe-joule Metic, in IPN Pogess Repot, -, August. [] T. Melodia, D. Pompili, and Ian F. Akyildiz, Optimal Local Topology Knowledge fo Enegy Efficient Geogaphical Routing in Senso Netwoks, in poc. of IEEE INFOCOM, -, Hong Kong, Mach. [] J. Deng, Y. S. Han, P.-N. Chen, and P. K. Vashney, Optimum Tansmission Range fo Wieless Ad Hoc Netwoks, in poc. of IEEE WCNC, Atlanta, GA, USA, Mach. [] P. Billingsley, Pobability and Measue, New Yok, NY: John Wiley and Sons,. [] B. Kap and H. T. Kung, Geedy Peimete Stateless Routing fo Wieless Netwoks, in Poc. of ACM MobiCom, Boston, MA, August.
IP Network Design by Modified Branch Exchange Method
Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management
More informationAnalysis of Wired Short Cuts in Wireless Sensor Networks
Analysis of Wied Shot Cuts in Wieless Senso Netwos ohan Chitaduga Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles 90089, USA Email: chitadu@usc.edu Ahmed Helmy Depatment
More informationTopological Characteristic of Wireless Network
Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences
More informationSlotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System
Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet
More informationPerformance Optimization in Structured Wireless Sensor Networks
5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame
More informationAN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE
AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity
More informationCommunication vs Distributed Computation: an alternative trade-off curve
Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,
More information= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2
Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used
More informationEvent-based Location Dependent Data Services in Mobile WSNs
Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,
More informationPoint-Biserial Correlation Analysis of Fuzzy Attributes
Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh
More informationJournal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012
2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo
More informationA modal estimation based multitype sensor placement method
A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;
More informationINFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM
INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300
More informationThe Internet Ecosystem and Evolution
The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee
More informationWIRELESS sensor networks (WSNs), which are capable
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan
More informationSCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS
SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),
More informationAn Unsupervised Segmentation Framework For Texture Image Queries
An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu
More informationAdaptation of TDMA Parameters Based on Network Conditions
Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.
More informationTier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints
Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok 14260 Email:
More informationNumber of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks
Numbe of Paths and Neighbous Effect on Multipath Routing in Mobile Ad Hoc Netwoks Oday Jeew School of Infomation Systems and Accounting Univesity of Canbea Canbea ACT 2617, Austalia oday.jeew@canbea.edu.au
More informationIP Multicast Simulation in OPNET
IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok
More informationLecture # 04. Image Enhancement in Spatial Domain
Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency
More informationOptical Flow for Large Motion Using Gradient Technique
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this
More informationHierarchically Clustered P2P Streaming System
Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.
More informationLifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks
788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,
More informationControlled Information Maximization for SOM Knowledge Induced Learning
3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity
More informationSeparability and Topology Control of Quasi Unit Disk Graphs
Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,
More informationErasure-Coding Based Routing for Opportunistic Networks
Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant
More informationBo Gu and Xiaoyan Hong*
Int. J. Ad Hoc and Ubiquitous Computing, Vol. 11, Nos. /3, 1 169 Tansition phase of connectivity fo wieless netwoks with gowing pocess Bo Gu and Xiaoyan Hong* Depatment of Compute Science, Univesity of
More informationCharacterizing Data Deliverability of Greedy Routing in Wireless Sensor Networks
Chaacteizing Data Deliveability of Geedy Routing in Wieless Senso Netwoks Jinwei Liu, Lei Yu, Haiying Shen, Yangyang He and Jason Hallstom Depatment of Electical and Compute Engineeing, Clemson Univesity,
More informationDynamic Topology Control to Reduce Interference in MANETs
Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity
More informationTowards Adaptive Information Merging Using Selected XML Fragments
Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,
More informationSegmentation of Casting Defects in X-Ray Images Based on Fractal Dimension
17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach
More informationUCLA Papers. Title. Permalink. Authors. Publication Date. Localized Edge Detection in Sensor Fields. https://escholarship.org/uc/item/3fj6g58j
UCLA Papes Title Localized Edge Detection in Senso Fields Pemalink https://escholashipog/uc/item/3fj6g58j Authos K Chintalapudi Govindan Publication Date 3-- Pee eviewed escholashipog Poweed by the Califonia
More informationDetection and Recognition of Alert Traffic Signs
Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives
More informationConservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery
Poceedings of the 4th WSEAS Intenational Confeence on luid Mechanics and Aeodynamics, Elounda, Geece, August 1-3, 006 (pp337-34) Consevation Law of Centifugal oce and Mechanism of Enegy Tansfe Caused in
More informationModelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set
Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;
More informationRT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver
1 RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Dive Amit Jain Daji Qiao Kang G. Shin The Univesity of Michigan Ann Abo, MI 4819, USA {amitj,dqiao,kgshin@eecs.umich.edu Abstact The cuent
More informationGravitational Shift for Beginners
Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational
More informationInterference-Aware Multicast for Wireless Multihop Networks
Intefeence-Awae Multicast fo Wieless Multihop Netwoks Daniel Letpatchya School of Electical and Compute Engineeing Geogia Institute of Technology Atlanta, Geogia 30332 0250 Douglas M. Blough School of
More informationModule 6 STILL IMAGE COMPRESSION STANDARDS
Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.
More informationA New Finite Word-length Optimization Method Design for LDPC Decoder
A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology
More informationANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS
ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth
More informationIllumination methods for optical wear detection
Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical
More informationSpiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks
Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition
More informationA Memory Efficient Array Architecture for Real-Time Motion Estimation
A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN
More informationAn Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network
An Efficient andove Mechanism Using the Geneal Switch Management Potocol on a Multi-Potocol abel Switching Netwok Seong Gon hoi, yun Joo Kang, and Jun Kyun hoi Using the geneal switch management potocol
More informationMinimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks
Available online at www.sciencediect.com Ad Hoc Netwoks 7 (29) 23 247 www.elsevie.com/locate/adhoc Minimizing spatial and time esevation with Collision-Awae DCF in mobile ad hoc netwoks Lubo Song a, Chansu
More informationHISTOGRAMS are an important statistic reflecting the
JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe
More informationFrequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters
Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using
More informationAssessment of Track Sequence Optimization based on Recorded Field Operations
Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment
More informationAn Improved Resource Reservation Protocol
Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing
More informationarxiv: v2 [physics.soc-ph] 30 Nov 2016
Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity
More informationA Two-stage and Parameter-free Binarization Method for Degraded Document Images
A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and
More informationGeneralized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences
Ameican Jounal of ata ining and Knowledge iscovey 27; 2(4): 2-8 http://www.sciencepublishinggoup.com//admkd doi:.648/.admkd.2724.2 Genealized Gey Taget ecision ethod Based on ecision akes Indiffeence Attibute
More informationHow to outperform IEEE802.11: Interference Aware (IA) MAC
How to outpefom IEEE802.11: Intefeence Awae (IA) MAC Daniela Maniezzo, Piepaolo egamo, Matteo Cesana, Maio Gela CS Dept. - Univesity of Califonia Los Angeles - UCLA, Califonia, USA Engineeing Dept., Feaa
More informationPrioritized Traffic Recovery over GMPLS Networks
Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing
More informationMulti-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples
Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits
More informationSYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH
I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,
More informationOn Error Estimation in Runge-Kutta Methods
Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment
More informationOn using circuit-switched networks for file transfers
On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed
More informationCombinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments
Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile
More informationScaling Location-based Services with Dynamically Composed Location Index
Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute
More informationAn Energy-Efficient Approach for Provenance Transmission in Wireless Sensor Networks
An Enegy-Efficient Appoach fo Povenance Tansmission in Wieless Senso Netwoks S. M. Iftekhaul Alam Pudue Univesity alams@pudue.edu Sonia Fahmy Pudue Univesity fahmy@cs.pudue.edu Abstact Assessing the tustwothiness
More informationTHE THETA BLOCKCHAIN
THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent
More informationA Novel Automatic White Balance Method For Digital Still Cameras
A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing
More informationInformation Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes
CS630 Repesenting and Accessing Digital Infomation Infomation Retieval: Basics Thosten Joachims Conell Univesity Infomation Retieval Basics Retieval Models Indexing and Pepocessing Data Stuctues ~ 4 lectues
More informationQuality Aware Privacy Protection for Location-based Services
In Poceedings of the th Intenational Confeence on Database Systems fo Advanced Applications (DASFAA 007), Bangkok, Thailand, Apil 9-, 007. Quality Awae Pivacy Potection fo Location-based Sevices Zhen Xiao,,
More informationGeophysical inversion with a neighbourhood algorithm I. Searching a parameter space
Geophys. J. Int. (1999) 138, 479 494 Geophysical invesion with a neighbouhood algoithm I. Seaching a paamete space Malcolm Sambidge Reseach School of Eath Sciences, Institute of Advanced studies, Austalian
More informationHeterogeneous V2V Communications in Multi-Link and Multi-RAT Vehicular Networks
1 Heteogeneous V2V Communications in Multi-Link and Multi-RAT Vehicula Netwoks Miguel Sepulce and Javie Gozalvez Abstact Connected and automated vehicles will enable advanced taffic safety and efficiency
More informationDrag Optimization on Rear Box of a Simplified Car Model by Robust Parameter Design
Vol.2, Issue.3, May-June 2012 pp-1253-1259 ISSN: 2249-6645 Dag Optimization on Rea Box of a Simplified Ca Model by Robust Paamete Design Sajjad Beigmoadi 1, Asgha Ramezani 2 *(Automotive Engineeing Depatment,
More informationModeling Spatially Correlated Data in Sensor Networks
Modeling Spatially Coelated Data in Senso Netwoks Apoova Jindal and Konstantinos Psounis Univesity of Southen Califonia The physical phenomena monitoed by senso netwoks, e.g. foest tempeatue, wate contamination,
More informationRANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES
RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class
More informationWormhole Detection and Prevention in MANETs
Womhole Detection and Pevention in MANETs Lija Joy Compute Science and Engineeing KMEA Engineeing College Enakulum, Keala, India lijavj@gmail.com Sheena Kuian K Compute Science and Engineeing KMEA Engineeing
More informationTransmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design
Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced
More informationTitle. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information
Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220
More informationColor Correction Using 3D Multiview Geometry
Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,
More informationImage Registration among UAV Image Sequence and Google Satellite Image Under Quality Mismatch
0 th Intenational Confeence on ITS Telecommunications Image Registation among UAV Image Sequence and Google Satellite Image Unde Quality Mismatch Shih-Ming Huang and Ching-Chun Huang Depatment of Electical
More informationMANET QoS support without reservations
SECURITY AND COMMUNICATION NETWORKS Secuity Comm. Netwoks (2010) Published online in Wiley InteScience (www.intescience.wiley.com)..183 SPECIAL ISSUE PAPER MANET QoS suppot without esevations Soon Y. Oh,
More information2. PROPELLER GEOMETRY
a) Fames of Refeence 2. PROPELLER GEOMETRY 10 th Intenational Towing Tank Committee (ITTC) initiated the pepaation of a dictionay and nomenclatue of ship hydodynamic tems and this wok was completed in
More informationInput Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer
Using the Gow-And-Pune Netwok to Solve Poblems of Lage Dimensionality B.J. Biedis and T.D. Gedeon School of Compute Science & Engineeing The Univesity of New South Wales Sydney NSW 2052 AUSTRALIA bbiedis@cse.unsw.edu.au
More informationObstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor
Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,
More informationA Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform
A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad
More informationEffective Missing Data Prediction for Collaborative Filtering
Effective Missing Data Pediction fo Collaboative Filteing Hao Ma, Iwin King and Michael R. Lyu Dept. of Compute Science and Engineeing The Chinese Univesity of Hong Kong Shatin, N.T., Hong Kong { hma,
More informationModeling spatially-correlated data of sensor networks with irregular topologies
This full text pape was pee eviewed at the diection of IEEE Communications Society subject matte expets fo publication in the IEEE SECON 25 poceedings Modeling spatially-coelated data of senso netwoks
More informationMobility Pattern Recognition in Mobile Ad-Hoc Networks
Mobility Patten Recognition in Mobile Ad-Hoc Netwoks S. M. Mousavi Depatment of Compute Engineeing, Shaif Univesity of Technology sm_mousavi@ce.shaif.edu H. R. Rabiee Depatment of Compute Engineeing, Shaif
More informationEE 6900: Interconnection Networks for HPC Systems Fall 2016
EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection
More informationExploring non-typical memcache architectures for decreased latency and distributed network usage.
Syacuse Univesity SURFACE Electical Engineeing and Compute Science Technical Repots College of Engineeing and Compute Science 9-5-20 Exploing non-typical memcache achitectues fo deceased latency and distibuted
More informationLecture 27: Voronoi Diagrams
We say that two points u, v Y ae in the same connected component of Y if thee is a path in R N fom u to v such that all the points along the path ae in the set Y. (Thee ae two connected components in the
More informationAnalysis of uniform illumination system with imperfect Lambertian LEDs
Optica Applicata, Vol. XLI, No. 3, 2011 Analysis of unifom illumination system with impefect Lambetian LEDs JIAJIE TAN 1, 2, KECHENG YANG 1*, MIN XIA 1, YING YANG 1 1 Wuhan National Laboatoy fo Optoelectonics,
More informationEfficient protection of many-to-one. communications
Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok
More informationThe Dual Round Robin Matching Switch with Exhaustive Service
The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line
More informationA ROI Focusing Mechanism for Digital Cameras
A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula
More informationThe concept of PARPS - Packet And Resource Plan Scheduling
The concept of PARPS - Packet And Resouce Plan Scheduling Magnus Eiksson 1 and Håkan Sätebeg 2 1) Dept. of Signals, Sensos and Systems, Royal Inst. of Technology, Sweden. E-mail: magnus.eiksson@ite.mh.se.
More informationFifth Wheel Modelling and Testing
Fifth heel Modelling and Testing en Masoy Mechanical Engineeing Depatment Floida Atlantic Univesity Boca aton, FL 4 Lois Malaptias IFMA Institut Fancais De Mechanique Advancee ampus De lemont Feand Les
More informationHigh performance CUDA based CNN image processor
High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu
More informationADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM
ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,
More informationEFFICIENT ENERGY BASED CONGESTION CONTROL SCHEME FOR MOBILE AD HOC NETWORKS
FFICINT NRGY BASD CONGSTION CONTROL SCHM FOR MOBIL AD HOC NTWORKS 1 S.SHJA, 2 DR.RAMACHANDRA V PUJRI 1 Reseach Schola, Bhaathia Univesity, Coimbatoe. 2 Vice-Pincipal, KGiSL Institute of Technology, Saavanampatti,
More information(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number.
Illustative G-C Simila cicles Alignments to Content Standads: G-C.A. Task (a, b) x y Fo this poblem, is a point in the - coodinate plane and is a positive numbe. a. Using a tanslation and a dilation, show
More informationImage Enhancement in the Spatial Domain. Spatial Domain
8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along
More information