Adaptation of TDMA Parameters Based on Network Conditions

Size: px
Start display at page:

Download "Adaptation of TDMA Parameters Based on Network Conditions"

Transcription

1 Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY Tolga Numanoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY Wendi Heinzelman Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY Abstact Soft clusteing of the nodes combined with time division multiple access (TDMA) channel access within a cluste has been shown to povide an enegy-efficient solution fo Mobile Ad-Hoc Netwoks (MANET). Such channel access schemes use a paamete that is citical in detemining netwok pefomance: the numbe of fames pe supefame, which detemines the amount of spatial euse possible, simila to the fequency euse facto in cellula netwoks. When a smalle numbe of fames pe supefame is used, each fame will consist of a lage numbe of slots, enabling the fame (i.e., cluste) to suppot moe nodes, but also limiting the choices of fames fo clusteheads to select, causing highe co-channel intefeence and collisions. Convesely, when a lage numbe of fames pe supefame is used, the clusteheads will only be able to gant channel access to a limited numbe of nodes, which in tun inceases the numbe of dopped packets (i.e., blocked channel access). The optimum value of the numbe of fames is the one that minimizes the combined effect of both collisions and dopped packets. By analytically detemining the effects of dopped packets and collisions, we can find the optimal value fo any given scenaio. This pape develops a model to detemine the optimal TDMA stuctue unde vaious settings, showing the advantages that can be obtained by adapting potocol paametes as netwok conditions change. I. INTRODUCTION The MAC potocol is the key element in the potocol stack that detemines the ability of a wieless netwok to meet application equiements, since the MAC potocol has a diect impact on thoughput, Quality of Sevice (QoS), enegy dissipation, fainess, stability, and obustness [1], [2]. In paticula, coodinated channel access schemes povide suppot fo QoS, educe enegy dissipation and incease thoughput fo low-to-mid noise levels and fo dense netwoks [3]. MH-TRACE [4] and IEEE [5] ae examples of such coodinated potocols. The IEEE potocol is specifically designed fo high-ate and shot ange WPAN netwoks [6]. MH-TRACE is designed fo mid-ange mediumate tansmissions [4]. Both of those algoithms use a TDMA stuctue togethe with soft clusteing of the nodes fo channel access, as this appoach has been shown to povide satisfactoy pefomance in tems of QoS and enegy dissipation. Many of the potocol paametes in cluste-based potocols ae set a-pioi based on estimates of netwok conditions This wok was suppoted in pat by the Univesity of Rocheste Cente fo Electonic Imaging Systems and in pat by Hais Copoation, RF Communications Division. and based on a specific physical laye. TDMA paametes, which detemine the amount of spatial euse and intefeence, distibute the available bandwidth among clustes so as to educe the intefeence thoughout the netwok. Reducing the intefeence is a desiable goal since high intefeence leads to high eo ates, deceasing the thoughput as studied in [7]. Howeve, educing the available bandwidth pe cluste also deceases the capacity pe cluste. The non-unifom distibution and node mobility may incease the local load above the cluste capacity, esulting in dopped packets and deceasing the thoughput fo eal-time taffic [4]. The decision of how to set these paametes should thus be based on this tade-off and would be effected by vaious conditions such as node density and physical laye paametes. The elationship between the paametes can only be detemined by analytical analysis. Although simulation studies eveal the pefomance of a potocol fo a cetain set of conditions, the statistical accuacy of the simulation esults is questionable unless epeated extensively. Fo lage and dense netwoks, this appoach equies excessive amounts of pocessing powe. Moeove, esults obtained fom those studies ae only valid fo the selected paametes and do not eveal thei impact on the pefomance of the potocol. Theefoe, we have developed an analytical model that eflects the elationships between potocol paametes and the oveall pefomance of the potocol unde diffeent netwok conditions fo the TDMA-based clusteed potocol MH-TRACE. Specifically, we develop a model that elates the TDMA fame paametes (numbe of slots pe fame and numbe of fames pe supefame) and the node density to the expected numbe of dopped packets and the expected numbe of collisions. This model enables us to find the set of paametes that maximize oveall thoughput fo MH-TRACE, and, by extension, fo TDMA-based clusteed potocols such as IEEE The oganization of this pape is as follows. In section II, a bief summay of MH-TRACE is pesented. An analytical model that helps in identifying the pefomance of MH- TRACE fo a given set of paametes is pesented in section III. Section IV discusses the validity of the analytical model and potocol paamete decisions based on that model by compaing the analytical esults with those found via simulation. Section V concludes the discussion with final comments.

2 Fame 1 Fame 2 Fame 3 Fame 4 Fame 5 Fame 6 CA Slot Beacon Contention Slots Contol sub-fame Heade IS Slots Data sub-fame Data Slots Supefame N - 1 Supefame N Supefame N + 1 Fig. 1. A snapshot of MH-TRACE clusteing and medium access. Diamonds epesent selected clusteheads and dots epesent the nodes in the netwok. CH-fame matching togethe with the contents of each fame is depicted. II. BACKGROUND: MH-TRACE In ode to undestand the esults of the study, it is impotant to undestand how the MH-TRACE potocol woks. This section biefly explains the potocol s cucial mechanisms and aims to give the eade a bief undestanding of the potocol. The complete potocol desciption is available in [4]. In MH-TRACE, time is divided into supefames of equal length, as shown in Fig. 1, whee the supefame is epeated in time and futhe divided into fames. Each cluste opeates in one of the fames, and the clustehead (CH) manages the channel access scheme of that fame. Thee is a spatial euse mechanism that allows moe than one cluste to opeate in the same time fame povided that the intefeence is low enough. Each fame in the supefame is futhe divided into subfames. The contol sub-fame is used fo management ovehead. The CH selection and maintenance as well as intefeence minimization algoithms use the CH announcement and beacon slots of the contol sub-fame. The est of the contol sub-fame is devoted to the pope collection of channel access equests and announcement of channel access gants as well as data summaization. The data subfame contains data slots whee nodes that ae successful in secuing channel access tansmit thei data in the ode announced by the CH. III. ANALYTICAL ANALYSIS In TDMA-based clusteed potocols such as MH-TRACE, thee ae two main factos limiting the pefomance (in tems of thoughput); dopped packets and collisions. Thus, ou goal is to model the effect of the potocol paametes on both the expected numbe of dopped packets and the expected numbe of collisions in ode to estimate the thoughput. MH-TRACE is an ideal potocol fo suppoting eal-time taffic, such as voice steaming, whee a data steam is divided into seveal packets of fixed length. In ode to maintain continuity of the steam, data slots should be assigned peiodically to nodes that have data to send, and this peiod must be matched to the length of each packet and the data fequency (e.g., voice sampling ate). This povides bounds on some of the TDMA paametes, such as slot size and supefame time, in ode to guaantee that the taffic meets its delay bounds. In MH-TRACE, the nodes within a cluste equest channel access fom the CH, and the CH gants the channel access by assigning available data slots to the nodes that equest channel access. Howeve, the numbe of data slots is limited and mainly detemined by the length of the fame. If the CH gants channel access and assigns a data slot to a node, it continues to eseve the same data slot in consecutive supefames as long as the node s tansmission continues. Thus, the time inteval between the data slots in two consecutive supefames, which is equal to the supefame duation, is fixed and detemined by the length of each packet and the sampling ate. Given that the length of the supefame must be matched to the eal-time data fequency, as the numbe of fames in the supefame (N f ) is inceased, each fame must be shote and thus has fewe data slots. This inceases the pobability of having no available data slot when a node equests channel access fom the CH. The packet must be dopped due to eal time taffic equiements. On the othe hand, as N f is deceased, spatial euse is inceased which inceases capacity pe cluste but also inceases the intefeence and collisions. Thus, thee is a tade-off in tems of thoughput between dopped packets and collisions, and ou goal is to model both of these souces of thoughput loss in ode to analytically examine this tade-off. Fo a fixed physical laye and voice model, ou model povides an estimate of the expected numbe of dopped packets and the expected numbe of collisions based on the values of the following paametes: N f, the netwok aea, and the numbe of nodes in the netwok. Thoughput is estimated based on the numbe of dopped packets and the expected numbe of collisions, as descibed in the following sections. A. Dopped Packets The pobability of dopped packets can be calculated as ( ) Load Capacity P dp = max, 0, (1) Load whee Load epesents the numbe of nodes that equie channel access within a cluste pe supefame and Capacity is the total numbe of data slots available fo the cluste (i.e., the numbe of data slots pe fame). Each cluste is capable of supplying channel access only to a limited numbe of nodes pe supefame that is equal to the numbe of data slots in the fame. The load in the cluste is mainly detemined by thee pobabilities: p s : Pobability of a node to be in sput duation, p A : Pobability of a node to be in the communication ange of a CH.

3 p d : Pobability of a node that is in the communication ange of a CH to choose that CH as its channel access povide. We assume a voice model whee nodes ae eithe in sput o gap, with voice data being geneated in the sput duation and no data being geneated in the gap duation. Hence, p s accounts fo the fact that not all nodes will have data to send at a given time. Futhemoe, MH-TRACE allows nodes to access the channel fom any CH within ange. Theefoe, if one CH has no data slots available, a node can equest channel access fom anothe CH in ange. Hence, p d takes into account the fact that a node s expected load to a cluste is distibuted among those CHs in the communication ange of that node. Given those distibutions, the load pe cluste pe supefame fo a given CH (and its location, CH loc ) is a binomial distibution with a success pobability of p dn = p s p A p d as given in (2). ( ) Nnodes P(Load = k CH loc )= p k dn (1 p dn ) (N nodes k) k (2) 1) Pobability of a node to be in sput duation(p s ): The voice model we use incopoates exponentially distibuted sput and gap duations (T sput and T gap, espectively) followed by each othe. The pobability of finding a node in sput state can be calculated as given in (3). E[T sput ] P(Node i in sput) = E[T sput + T gap ] = p s (3) 2) Pobability of a node to be in the communication ange of a CH (p A ): Nodes ae assumed to be i.i.d. distibuted accoding to a unifom distibution. Thus, the pobability of a node to be in any given egion is the aea of that egion divided by the whole simulation aea. Aea of Region A P(Node in Region A) = Simulation Aea = p A (4) The coveage egion of a cluste is a cicle centeed at the CH s location having a adius equal to the maximum eliable communication distance at the selected powe level. Pat of a CH s coveage egion may lie outside the netwok aea depending on the CH s location, CH loc. The netwok aea can be divided into 3 egions, as in Fig. 2. The coveage aea that lies within the simulation aea, α 1, α 2, and α 3 fo a CH in egion 1, 2 and 3, espectively, ae calculated in [7] and epeated hee fo efeence. α 1 = π 2, α 2 = π 2 2I(d 0 ), α 3 = 3 4 π2 I(x 0 ) I(y 0 )+x 0 y 0, (5a) (5b) (5c) whee x 0 and y 0 ae the distances to the closest vetical (fo x 0 ) and hoizontal (fo y 0 ) limits of the netwok aea, d 0 = min(x 0,y 0 ) and the function I(x) is as given in I(x) = π 4 2 x 2 x acsin(x/). (6) 2 H n 3 L-2 n 2 H-2 H-2 H n 1 L L-2 L Region 1 Region 2 Region 3 Fig. 2. Patitioning of the simulation egion. Pat of the coveage egion lies outside the netwok egion fo CHs located in egions 2 and 3. Fig. 3. Alignment of CHs unde maximum packing conditions. Replacing RegionA with the appopiate tem fom (5), leads to desied p A fo a given CH. 3) Pobability of a node to be in the communication ange of a CH (p d ): The entie simulation aea will be fully coveed fo sufficiently lage node densities. Afte that point, vaiations in the node density do not alte the expected numbe of cluste head nodes in the netwok and thei positions. Thus, the numbe of CHs in the communication ange of each node is independent of node density fo sufficiently lage node densities. Simulations indicate that 35% of the nodes ae in the communication ange of only one CH wheeas 48% and 17% of the nodes ae in the communication ange of two and thee CHs, espectively fo a communication ange of 250m. Nodes can select thei channel access povide, unifomly among the CHs that ae in thei communication ange. Using the afoementioned values p d can be calculated as Substituting (5a)-(5c) into (4) and (2), p A and the statistical distibution of load can be obtained fo a given CH. Taking a weighted aveage, using the pobability of CH s locations as the weights, gives the distibution of load fo a geneic CH as P(Load = k) = P(Load = k CH loc )P(CH loc )ds, S (7) whee S is the simulation aea and CH loc is a CH s location. The integal in (7) can be taken numeically fo all k values. 4) Effect of dopped packets on thoughput: Using the distibutions of Load, the distibution of P dp is calculated by (1). If a dopped packet was tansmitted successfully, that packet would have been eceived by all the nodes that ae in the tansmission ange of the tansmitting node. Thus, each dopped packet deceases the thoughput by the numbe of neighboing nodes. The total decease in thoughput pe supefame due to dopped packets, f dop, is anothe andom vaiable and is elated to P dp by f dop = P dp (P s N nodes ) E[N neighbos ]. (8) The expected numbe of neighbos, E[N neighbos ], can be calculated as E[N neighbos ]=p a N nodes, (9) whee p a, the pobability of a node to be in the communication ange of anothe node, is calculated in a manne simila to the calculation of p A.

4 y d- d 2 d x (a) (b) Fig. 4. (a) Intesection egion fo two cicles with adius sepaated by d. (b) A typical alignment of co-fame clustes togethe with thei vulneable egion (lightly shaded egion) and a node in vulneable egion epesented by the disk. The dak shaded egion is the egion of membe nodes whose packets could collide at the node epesented by the disk. B. Collisions CHs manage the channel access within the cluste so as to pevent simultaneous tansmissions of the nodes in the cluste. Hence, collisions within the cluste ae completely eliminated. Clustes opeating in sepaate fames access the channel in distinct time instances, and hence collisions among nodes in these clustes ae also not possible. The only emaining souce of collisions is co-fame clustes. Ou appoach fo calculating the numbe of collisions pe supefame includes two steps. The fist step is to elate the numbe of fames pe supefame (N f ) to the co-fame CH sepaation, and the second step is to elate the co-fame CH sepaation to the numbe of collisions pe supefame. 1) Relation between N f and co-fame CH sepaation: The numbe of collisions inceases as the sepaation between cofame CHs deceases. Due to the CH ceation mechanism, the minimum sepaation between two CHs is equal to the communication distance,, in the wost case scenaio. Unde maximum packing conditions, a thid CH is also sepaated by fom both of the pevious CHs as in Fig. 3. The lines connecting the 3 CHs foms an equilateal tiangle. At most 6 CHs can be located aound the fist CH as in Fig. 3. Consideing an imaginay cell bounday passing pependicula to the lines connecting the neighboing CHs, a hexagonal cellula stuctue can be constucted in the fom of the standad stuctue used in cellula systems [8]. The labeling stuctue that is used in cellula systems is applicable fo the clusteing stuctue unde concen. Distinct labels coespond to clustes opeating in distinct fames in the supefame stuctue. The sepaation between co-labeled cells and hence co-fame CHs is given as d ch = N f. (10) We use this sepaation as a basis to calculate the collisions, although a egula stuctue that maximizes the distance between co-fame CHs exists only fo a cetain set of N f values. 2) Relation between CH sepaation and numbe of collisions: The fist step in detemining the elation between the numbe of collisions and the CH sepaation, d ch, is to find a function, f(d, ), that calculates the intesection aea of two cicles having adii, and whose cente points ae sepaated by d. This function will be used fequently late on. Fig. 4a shows two such cicles. Fom symmety, the total intesection y d ch x aea is fou times the shaded aea and can be calculated as f(d, ) =4 d 2 d 2 (x d) 2 0 dydx ( sin(2θ) =4 2 + θ ) θ= acsin( d 2 ). (11) 4 2 θ= π 2 Nodes vulneable to collisions should be located at most 2 times the communication adius,, fom a CH. Futhemoe, those nodes should also be located within 2 times the communication adius of a co-fame CH. Thus, the vulneable egion fo two co-fame CHs is the aea of intesection of two cicles with adii 2 and centes located at the co-fame CH positions. The lightly shaded aea in Fig. 4b depicts the vulneable egion fo two CHs epesented by two diamonds. The nodes in the vulneable egion ae called vulneable nodes. As the co-fame CH sepaation is deceased, the vulneable egion and hence the numbe of vulneable nodes inceases. The nodes whose packets may collide at a node in the vulneable egion should be in the communication ange of that node. In Fig. 4b, the little disk located at (x, y) epesents an abitaily selected node among the vulneable nodes. Packets tansmitted by the nodes in the dak shaded egions will collide at the selected node when these packets ae scheduled at the same data slot. As the co-fame CH sepaation is deceased, the aea of the dak shaded egions and hence the numbe of nodes in those egions inceases, which in tun leads to an inceased pobability of collision at the selected node. The numbe of nodes whose packets may collide at a selected node in the vulneable egion, N nodes2coll, is a function of the elative position of the selected node with espect to the CH locations and the distance between the CHs. The sum of N nodes2coll fo all the nodes in the vulneable aea leads to TN nodes2coll, which is a function of CH sepaation. N nodes2coll, fo the disk located at (x, y) in Fig. 4b, is the sum of the numbe of nodes in the dak shaded egions and can be calculated by multiplying the node density with the aea of these egions as in (12) since nodes ae i.i.d. and unifomly distibuted. N nodes2coll = d n [ f( x 2 + y 2,)+f( ] (d ch x) 2 + y 2,), (12) whee d n is the node density and d ch is the CH sepaation. Integating (12) fo all nodes in the vulneable egion, V, (lightly shaded aea in Fig. 4b) yields TN nodes2coll = [ f( x 2 + y 2,)+f( ] (d ch x) 2 + y 2,) dxdy. d 2 n V (13) Assuming the CHs ae well sepaated (making the egion of integation small), (13) can be appoximated by [ TN nodes2coll = d 2 n f (d ch, 2) 2 f( d ] ch 2,). (14)

5 TABLE I SUPERFRAME PARAMETERS Numbe of Fames Numbe of Data Numbe of Contention Supefame N f Slots,N d Slots,N c Time T sf , , , , ,992 Numbe of Packets Lost pe Supefame f dop Simulated (Stationay) f Simulated (Stationay) coll f Theoetical dop f Theoetical coll f dop Simulated (Mobile) f Simulated (Mobile) coll The exact elationship between TN nodes2coll and the numbe of collisions pe supefame, f coll, is complex in natue. We use a fist ode simplification, and assume that they ae linealy elated. Unde this assumption, the numbe of collisions can be obtained by scaling TN nodes2coll with a constant, C, as in (15). The constant is independent of N nodes and N f since those effects ae aleady taken into account in TN nodes2coll though density and co-fame CH sepaation. The constant can be detemined by compaing the analytical esults with simulation esults fo spase netwoks whee the simulation is possible. Using the same constant, f coll can be detemined fo any node density and any N f value. f coll = C TN nodes2coll (15) IV. PROOF OF CONCEPT The aim of the analytical study is to ceate a model that will enable us to examine the pefomance of the MH-TRACE potocol fo any given values of N f, netwok size and numbe of nodes. Using this model, fo example, we can detemine a good N f value that maximizes the thoughput in the system fo any given node density. The analytical model given above is a fist ode appoximation fo a complex system. Thus, the appoximation eos may effect the decision about the optimal N f value and may lead to suboptimal solutions. In this section we evaluate the pefomance of ou analytical model in detemining the optimal N f value. A. Simulation Envionment Fo compaison puposes, we conduct ns-2 simulations of MH-TRACE unde diffeent netwok scenaios and fo vaious N f values. Voice communications is simulated with sputs and gaps whose lengths ae exponentially distibuted and statistically independent with mean duations of 1.0s and 1.35s, espectively[9][10]. The souce application is the convesational voice, coded at 32Kbps. 100 byte long packets ae geneated fom that application fo all nodes. The channel ate is set to 2Mbps. Given these values, in ode to maintain data packet timing, the supefame time is adjusted to be as close as possible to 25ms, which is the voice packet geneation peiod. Table I shows details fo each value of N f. Beacon, CA, contention, and IS packets ae all 4 bytes long. The heade packet has a vaiable length of (4 +2N d ) bytes depending on the numbe of data slots. Thee is a 4 byte heade and 100 byte data packet associated with each data slot. Details of the vaious heade packet lengths can be found in [4]. Numbe of Packets Lost pe Supefame Numbe of Nodes f dop Simulated (Stationay) f coll Simulated (Stationay) f dop Theoetical f coll Theoetical f dop Simulated (Mobile) f coll Simulated (Mobile) (a) N f = Numbe of Nodes (b) N f =8 Fig. 5. Packet loss functions fo dopped packets and collisions fo both stationay and mobile nodes. The andom way-point mobility model [11][12] is used in mobile scenaios whee the node speeds ae chosen fom a unifom andom distibution between 0.0 m/s and 5.0 m/s with zeo pause time. The enegy model discussed in [13] and the default popagation model that is available in ns-2 [14] ae used. We used a constant tansmit powe that esults in a constant eceiving ange of 250m. All simulations ae un in an aea of 1km x 1km fo 100 seconds. The simulations ae epeated with the same paametes 5 times. All esults ae based on sample aveage of those 5 iteations. B. Results and Compaison The loss in thoughput due to collisions and dopped packets ae depicted in Fig. 5 fo N f equal to 6 and 8, espectively. Fo stationay case, the analytical estimations that ae obtained with the method descibed in the pevious section tightly follow the simulation esults fo all node densities and all N f values, veifying the model. The simulation esults fo mobile case follows the same tend as the theoetical esults but ae not as close as the stationay case. The fist eason fo this is that the andom way-point model esults in a non-unifom node distibution by binging the nodes togethe[11][12]. The assumption of unifom node density used thoughout the theoetical analysis fails as time evolves unde the andom way-point model. The second eason is that mobility causes CHs that come nea each othe to esign and let othe nodes fom new clustes. Duing the CH fomation pocess, the local capacity aound esigned CHs deceases, which in tun leads to a highe numbe of dopped packets. Anothe obsevation is that as N f is inceased, the collisions decease, wheeas the dopped packets incease. Inceasing

6 N f inceases the sepaation between co-fame clustes which in tun deceases collisions. On the othe hand, since the supefame length is fixed, inceasing N f deceases the fame length and hence the numbe of data slots pe fame and the capacity pe CH. Thus, thee is a highe numbe of dopped packets as N f is inceased. Theoetically, the maximum thoughput should be ealizable at the N f value that minimizes the combined effects of collisions and dopped packets. Thus, the optimal N f paamete of the analytical model is the value that minimizes the analytical estimate of collisions and dopped packets fo a given node density. In ode to detemine the applicability of using the analytical model fo selecting the optimal N f value, we measue the simulated thoughput fo all N f values as a pecentage of the maximum ealizable thoughput at a given node density. Fig. 6 depicts the pefomance of the decisions obtained though the analytical estimations togethe with the wost decision fo N f {4, 5, 6, 7, 8} fo all node densities and fo both the mobile and stationay cases. All decisions obtained though analytical analysis lie within 4% and 9% of the maximum ealizable thoughput fo the stationay and mobile cases, espectively. Analytical analysis is successful in detemining the optimal N f value fo dense netwoks, in both the mobile and stationay cases, although in the mobile case, individual estimations fo dopped packets and collisions obtained fom the analytical analysis ae not as close to the simulated values as they ae in the stationay case. Fo low node densities, the demand fo channel access is faily low and the capacity is sufficient. The dopped packets ae meely the esults of non unifomities in node distibution. Thus, inceasing capacity pe cluste has elatively less impact on thoughput. Also the impact of collisions on thoughput is less fo spase netwoks since collisions ae popotional to the squae of the node density. Hence, the decision on which N f value to use is elatively less impotant fo spase netwoks as can be obseved in Fig. 6 by the deceasing pefomance diffeence between the wost and best decisions as node density is deceased. On the othe hand, the decision about which N f value to use is quite impotant fo dense netwoks. Fo 300 node stationay and mobile netwoks, choosing the wost N f value achieves only 65% and 64% of the optimum thoughput, espectively. Thus, appopiate setting of the N f paamete is extemely impotant, and the analytical model povided in this pape can be used to optimally set this value fo abitay netwoks. V. CONCLUSION The analysis made in this pape eveals the impotance of pope selection of TDMA paametes accoding to netwok conditions. It has been shown that impope selection of these paametes may esult in seious thoughput loses (up to 35% fo stationay and 36% fo mobile scenaios) in dense netwoks, while the decision has smalle impact fo spase netwoks. The pimay detemining facto in the decision is the node density. Othe factos such as tansmitting powe and noise levels as well as mobility pattens also have an impact % Est. N f =7 Est. N f =6 Est. N f =5 Est. N f =4 70 Pefomance of Theoetical Analysis (Stationay) Pefomance of Wost Decision (Stationay) Pefomance of Theoetical Analysis (Mobile) 65 Pefomance of Wost Decision (Mobile) Numbe of Nodes Fig. 6. Pefomance of the N f decision of the analytical analysis togethe with the wost decision as a pecentage of the best decision fo all node densities. Selected N f values though analytical analysis is displayed on the top of the gaph. but they ae out of the scope of this pape and ae the subjects fo futue wok. The analytical analysis pesented in this pape not only makes the analysis possible fo vey dense netwoks whee the simulation of the netwok is impactical but also eveals the impact of paametes on system pefomance. It should be emphasized that, although the analytical model developed in this pape is specifically designed fo MH-TRACE, it can be easily adapted to any potocol whee the bandwidth is shaed among clustes. REFERENCES [1] A. Chanda, V. Gummalla, and J. O. Limb. Wieless medium access contol potocols. IEEE Communications Suveys and Tutoials, 3:2 15, [2] P. Mohapata, J. Li, and C. Gui. Qos in mobile ad hoc netwoks. IEEE Wieless Communications Magazine, 10:44 52, [3] T. Numanoglu, B. Tavli, and W. Heinzelman. An analysis of coodinated and non-coodinated medium access contol potocols unde channel noise. Militay Communications Confeence, MILCOM IEEE, pages Vol. 4, Oct [4] B. Tavli and W. B. Heinzelman. MH-TRACE: Multi hop time esevation using adaptive contol fo enegy efficiency. IEEE Jounal on Selected Aeas of Communications, 22(5): , June [5] T. Cooklev. Wieless Communication Standats. IEEE Pess, [6] J. Kaaoguz. High-ate wieless pesonal aea netwoks. Communications Magazine, IEEE, 39(12):96 102, Dec [7] T. Numanoglu, B. Tavli, and W. B. Heinzelman. The effects of channel eos on coodinated and non-coodinated medium access contol potocols. In Poceedings of IEEE Intenational Confeence on Wieless and Mobile Computing, volume 1, pages 58 65, Aug [8] V. H. MacDonald. Advanced mobile phone sevice: The cellula concept. Bell Syst. Tech. J., 58:15 41, [9] D. J. Goodman, R. A. Valenzuela, K. T. Gayliad, and B. Ramamuthi. Packet esevation multiple access fo local wieless communications. IEEE Tans. Commun., 37: , Aug [10] D. J. Goodman and S. X. Wei. Efficiency of packet esevation multiple access. IEEE Tans. Vehic. Tech., 40(1): , Feb [11] T. Camp, J. Boleng, and V. Davies. A suvey of mobility models fo ad hoc netwok eseach. Wieless Communications and Mobile Computing (WCMC), 2(5): , [12] C. Bettstette and C. Wagne. The spatial node distibution of the andom waypoint mobility model. In Mobile Ad-Hoc Netzweke, WMAN 2002, pages GI, [13] W. B. Heinzelman, A. Chandakasan, and H. Balakishnan. An application-specific potocol achitectue fo wieless micosenso netwoks. IEEE Tansactions on Wieless Communications, 1: , [14] Netwok simulato (ns-2).

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

Dynamic Topology Control to Reduce Interference in MANETs

Dynamic Topology Control to Reduce Interference in MANETs Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

Event-based Location Dependent Data Services in Mobile WSNs

Event-based Location Dependent Data Services in Mobile WSNs Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,

More information

Analysis of Wired Short Cuts in Wireless Sensor Networks

Analysis of Wired Short Cuts in Wireless Sensor Networks Analysis of Wied Shot Cuts in Wieless Senso Netwos ohan Chitaduga Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles 90089, USA Email: chitadu@usc.edu Ahmed Helmy Depatment

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2 Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

Image Enhancement in the Spatial Domain. Spatial Domain

Image Enhancement in the Spatial Domain. Spatial Domain 8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along

More information

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300

More information

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

Separability and Topology Control of Quasi Unit Disk Graphs

Separability and Topology Control of Quasi Unit Disk Graphs Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Mobility Pattern Recognition in Mobile Ad-Hoc Networks

Mobility Pattern Recognition in Mobile Ad-Hoc Networks Mobility Patten Recognition in Mobile Ad-Hoc Netwoks S. M. Mousavi Depatment of Compute Engineeing, Shaif Univesity of Technology sm_mousavi@ce.shaif.edu H. R. Rabiee Depatment of Compute Engineeing, Shaif

More information

The Dual Round Robin Matching Switch with Exhaustive Service

The Dual Round Robin Matching Switch with Exhaustive Service The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

UCLA Papers. Title. Permalink. Authors. Publication Date. Localized Edge Detection in Sensor Fields. https://escholarship.org/uc/item/3fj6g58j

UCLA Papers. Title. Permalink. Authors. Publication Date. Localized Edge Detection in Sensor Fields. https://escholarship.org/uc/item/3fj6g58j UCLA Papes Title Localized Edge Detection in Senso Fields Pemalink https://escholashipog/uc/item/3fj6g58j Authos K Chintalapudi Govindan Publication Date 3-- Pee eviewed escholashipog Poweed by the Califonia

More information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220

More information

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

Analysis of Coexistence between IEEE , BLE and IEEE in the 2.4 GHz ISM Band

Analysis of Coexistence between IEEE , BLE and IEEE in the 2.4 GHz ISM Band Analysis of Coexistence between IEEE 82.5.4, BLE and IEEE 82. in the 2.4 GHz ISM Band Radhakishnan Nataajan, Pouia Zand, Majid Nabi Holst I. I NTRODUCTION In ecent yeas, the emegence of IoT has led to

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

Lecture # 04. Image Enhancement in Spatial Domain

Lecture # 04. Image Enhancement in Spatial Domain Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency

More information

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks Available online at www.sciencediect.com Ad Hoc Netwoks 7 (29) 23 247 www.elsevie.com/locate/adhoc Minimizing spatial and time esevation with Collision-Awae DCF in mobile ad hoc netwoks Lubo Song a, Chansu

More information

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver 1 RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Dive Amit Jain Daji Qiao Kang G. Shin The Univesity of Michigan Ann Abo, MI 4819, USA {amitj,dqiao,kgshin@eecs.umich.edu Abstact The cuent

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

High Performance Computing on GPU for Electromagnetic Logging

High Performance Computing on GPU for Electromagnetic Logging Intenational Confeence "Paallel and Distiuted Computing Systems" High Pefomance Computing on GPU fo lectomagnetic Logging Glinskikh V.N. Kontoovich A.. pov M.I. Tofimuk Institute of Petoleum Geology and

More information

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok 14260 Email:

More information

4.2. Co-terminal and Related Angles. Investigate

4.2. Co-terminal and Related Angles. Investigate .2 Co-teminal and Related Angles Tigonometic atios can be used to model quantities such as

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

Bo Gu and Xiaoyan Hong*

Bo Gu and Xiaoyan Hong* Int. J. Ad Hoc and Ubiquitous Computing, Vol. 11, Nos. /3, 1 169 Tansition phase of connectivity fo wieless netwoks with gowing pocess Bo Gu and Xiaoyan Hong* Depatment of Compute Science, Univesity of

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

Interference-Aware Multicast for Wireless Multihop Networks

Interference-Aware Multicast for Wireless Multihop Networks Intefeence-Awae Multicast fo Wieless Multihop Netwoks Daniel Letpatchya School of Electical and Compute Engineeing Geogia Institute of Technology Atlanta, Geogia 30332 0250 Douglas M. Blough School of

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

MANET QoS support without reservations

MANET QoS support without reservations SECURITY AND COMMUNICATION NETWORKS Secuity Comm. Netwoks (2010) Published online in Wiley InteScience (www.intescience.wiley.com)..183 SPECIAL ISSUE PAPER MANET QoS suppot without esevations Soon Y. Oh,

More information

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE 1 YAROSLAVTSEV A.F., 2 Al-THUNEIBAT S.A., 3 AL TAWALBEH N.A 1 Depatment of Netwoking, SSUTI, Novosibisk, Russia

More information

Modeling spatially-correlated data of sensor networks with irregular topologies

Modeling spatially-correlated data of sensor networks with irregular topologies This full text pape was pee eviewed at the diection of IEEE Communications Society subject matte expets fo publication in the IEEE SECON 25 poceedings Modeling spatially-coelated data of senso netwoks

More information

Erasure-Coding Based Routing for Opportunistic Networks

Erasure-Coding Based Routing for Opportunistic Networks Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

On using circuit-switched networks for file transfers

On using circuit-switched networks for file transfers On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed

More information

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks Numbe of Paths and Neighbous Effect on Multipath Routing in Mobile Ad Hoc Netwoks Oday Jeew School of Infomation Systems and Accounting Univesity of Canbea Canbea ACT 2617, Austalia oday.jeew@canbea.edu.au

More information

On Adaptive Bandwidth Sharing with Rate Guarantees

On Adaptive Bandwidth Sharing with Rate Guarantees On Adaptive Bandwidth Shaing with Rate Guaantees N.G. Duffield y T. V. Lakshman D. Stiliadis y AT&T Laboatoies Bell Labs Rm A175, 180 Pak Avenue Lucent Technologies Floham Pak, 101 Cawfods Cone Road NJ

More information

An Optimised Density Based Clustering Algorithm

An Optimised Density Based Clustering Algorithm Intenational Jounal of Compute Applications (0975 8887) Volume 6 No.9, Septembe 010 An Optimised Density Based Clusteing Algoithm J. Hencil Pete Depatment of Compute Science St. Xavie s College, Palayamkottai,

More information

Any modern computer system will incorporate (at least) two levels of storage:

Any modern computer system will incorporate (at least) two levels of storage: 1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe

More information

A Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks

A Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks A Coss-Laye Famewok of QoS Routing and Distibuted Scheduling fo Mesh Netwoks Chi Haold Liu, Athanasios Gkelias, and Kin K. Leung Depatment of Electical and Electonic Engineeing, Impeial College London

More information

An Extension to the Local Binary Patterns for Image Retrieval

An Extension to the Local Binary Patterns for Image Retrieval , pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

Modeling a shared medium access node with QoS distinction

Modeling a shared medium access node with QoS distinction Modeling a shaed medium access node with QoS distinction Matthias Gies, Jonas Geutet Compute Engineeing and Netwoks Laboatoy (TIK) Swiss Fedeal Institute of Technology Züich CH-8092 Züich, Switzeland email:

More information

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes On the Convesion between Binay Code and BinayReflected Gay Code on Boolean Cubes The Havad community has made this aticle openly available. Please shae how this access benefits you. You stoy mattes Citation

More information

Quality Aware Privacy Protection for Location-based Services

Quality Aware Privacy Protection for Location-based Services In Poceedings of the th Intenational Confeence on Database Systems fo Advanced Applications (DASFAA 007), Bangkok, Thailand, Apil 9-, 007. Quality Awae Pivacy Potection fo Location-based Sevices Zhen Xiao,,

More information

Fifth Wheel Modelling and Testing

Fifth Wheel Modelling and Testing Fifth heel Modelling and Testing en Masoy Mechanical Engineeing Depatment Floida Atlantic Univesity Boca aton, FL 4 Lois Malaptias IFMA Institut Fancais De Mechanique Advancee ampus De lemont Feand Les

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

Effects of Model Complexity on Generalization Performance of Convolutional Neural Networks

Effects of Model Complexity on Generalization Performance of Convolutional Neural Networks Effects of Model Complexity on Genealization Pefomance of Convolutional Neual Netwoks Tae-Jun Kim 1, Dongsu Zhang 2, and Joon Shik Kim 3 1 Seoul National Univesity, Seoul 151-742, Koea, E-mail: tjkim@bi.snu.ac.k

More information

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,

More information

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),

More information

On the throughput-cost tradeoff of multi-tiered optical network architectures

On the throughput-cost tradeoff of multi-tiered optical network architectures 1 On the thoughput-cost tadeoff of multi-tieed optical netwok achitectues Guy Weichenbeg, Vincent W. S. Chan, and Muiel Médad Laboatoy fo Infomation and Decision Systems Massachusetts Institute of Technology

More information

High performance CUDA based CNN image processor

High performance CUDA based CNN image processor High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu

More information

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery Poceedings of the 4th WSEAS Intenational Confeence on luid Mechanics and Aeodynamics, Elounda, Geece, August 1-3, 006 (pp337-34) Consevation Law of Centifugal oce and Mechanism of Enegy Tansfe Caused in

More information

Positioning of a robot based on binocular vision for hand / foot fusion Long Han

Positioning of a robot based on binocular vision for hand / foot fusion Long Han 2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

Desired Attitude Angles Design Based on Optimization for Side Window Detection of Kinetic Interceptor *

Desired Attitude Angles Design Based on Optimization for Side Window Detection of Kinetic Interceptor * Poceedings of the 7 th Chinese Contol Confeence July 6-8, 008, Kunming,Yunnan, China Desied Attitude Angles Design Based on Optimization fo Side Window Detection of Kinetic Intecepto * Zhu Bo, Quan Quan,

More information

Heterogeneous V2V Communications in Multi-Link and Multi-RAT Vehicular Networks

Heterogeneous V2V Communications in Multi-Link and Multi-RAT Vehicular Networks 1 Heteogeneous V2V Communications in Multi-Link and Multi-RAT Vehicula Netwoks Miguel Sepulce and Javie Gozalvez Abstact Connected and automated vehicles will enable advanced taffic safety and efficiency

More information

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1)

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1) 1 Multi Path PERT Ankit Singh and A. L. Naasimha Reddy Electical and Compute Engineeing Depatment, Texas A&M Univesity; email: eddy@ece.tamu.edu. Abstact This pape pesents a new multipath delay based algoithm,

More information

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,

More information

EYE DIRECTION BY STEREO IMAGE PROCESSING USING CORNEAL REFLECTION ON AN IRIS

EYE DIRECTION BY STEREO IMAGE PROCESSING USING CORNEAL REFLECTION ON AN IRIS EYE DIRECTION BY STEREO IMAGE PROCESSING USING CORNEAL REFLECTION ON AN IRIS Kumiko Tsuji Fukuoka Medical technology Teikyo Univesity 4-3-14 Shin-Katsutachi-Machi Ohmuta Fukuoka 836 Japan email: c746g@wisdomcckyushu-uacjp

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer Using the Gow-And-Pune Netwok to Solve Poblems of Lage Dimensionality B.J. Biedis and T.D. Gedeon School of Compute Science & Engineeing The Univesity of New South Wales Sydney NSW 2052 AUSTRALIA bbiedis@cse.unsw.edu.au

More information

Gravitational Shift for Beginners

Gravitational Shift for Beginners Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational

More information

FACE VECTORS OF FLAG COMPLEXES

FACE VECTORS OF FLAG COMPLEXES FACE VECTORS OF FLAG COMPLEXES ANDY FROHMADER Abstact. A conjectue of Kalai and Eckhoff that the face vecto of an abitay flag complex is also the face vecto of some paticula balanced complex is veified.

More information

Quality-of-Content (QoC)-Driven Rate Allocation for Video Analysis in Mobile Surveillance Networks

Quality-of-Content (QoC)-Driven Rate Allocation for Video Analysis in Mobile Surveillance Networks Quality-of-Content (QoC)-Diven Rate Allocation fo Video Analysis in Mobile Suveillance Netwoks Xiang Chen, Jenq-Neng Hwang, Kuan-Hui Lee, Ricado L. de Queioz Depatment of Electical Engineeing, Univesity

More information

Configuring RSVP-ATM QoS Interworking

Configuring RSVP-ATM QoS Interworking Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP

More information

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE 5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai

More information

A Consistent, User Friendly Interface for Running a Variety of Underwater Acoustic Propagation Codes

A Consistent, User Friendly Interface for Running a Variety of Underwater Acoustic Propagation Codes Poceedings of ACOUSTICS 6 - Novembe 6, Chistchuch, New Zealand A Consistent, Use Fiendly Inteface fo Running a Vaiety of Undewate Acoustic Popagation Codes Alec J Duncan, Amos L Maggi Cente fo Maine Science

More information

Topic 7 Random Variables and Distribution Functions

Topic 7 Random Variables and Distribution Functions Definition of a Random Vaiable Distibution Functions Popeties of Distibution Functions Topic 7 Random Vaiables and Distibution Functions Distibution Functions 1 / 11 Definition of a Random Vaiable Distibution

More information

Lecture 27: Voronoi Diagrams

Lecture 27: Voronoi Diagrams We say that two points u, v Y ae in the same connected component of Y if thee is a path in R N fom u to v such that all the points along the path ae in the set Y. (Thee ae two connected components in the

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

1.3 Multiplexing, Time-Switching, Point-to-Point versus Buses

1.3 Multiplexing, Time-Switching, Point-to-Point versus Buses http://achvlsi.ics.foth.g/~kateveni/534 1.3 Multiplexing, Time-Switching, Point-to-Point vesus Buses n R m Aggegation (multiplexing) Distibution (demultiplexing) Simplest Netwoking, like simplest pogamming:

More information

Multidimensional Testing

Multidimensional Testing Multidimensional Testing QA appoach fo Stoage netwoking Yohay Lasi Visuality Systems 1 Intoduction Who I am Yohay Lasi, QA Manage at Visuality Systems Visuality Systems the leading commecial povide of

More information

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Decentalized Tust Management fo Ad-Hoc Pee-to-Pee Netwoks Thomas Repantis Vana Kalogeaki Depatment of Compute Science & Engineeing Univesity of Califonia, Riveside Riveside, CA 92521 {tep,vana}@cs.uc.edu

More information

Using SPEC SFS with the SNIA Emerald Program for EPA Energy Star Data Center Storage Program Vernon Miller IBM Nick Principe Dell EMC

Using SPEC SFS with the SNIA Emerald Program for EPA Energy Star Data Center Storage Program Vernon Miller IBM Nick Principe Dell EMC Using SPEC SFS with the SNIA Emeald Pogam fo EPA Enegy Sta Data Cente Stoage Pogam Venon Mille IBM Nick Pincipe Dell EMC v6 Agenda Backgound on SNIA Emeald/Enegy Sta fo block Intoduce NAS/File test addition;

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information