COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS
|
|
- Sabrina Aleesha Sherman
- 5 years ago
- Views:
Transcription
1 International Journal of Coputer Science and Counication Vol. 3, No. 1, January-June 2012, pp COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS A.H. Karode 1, S.R. Suralkar 2, Manoj Bagde 3 1 Dept. of Electronics and Telecounication, SSBTCOET, Jalgaon, India, atul_karode@rediffail.co 2 Dept. of Electronics and Telecounication, SSBTCOET, Jalgaon, India, shekhar_srs@rediffail.co 3 Dept. of Electronics and Telecounication, SSBTCOET, Jalgaon, India, bagde.anoj7@gail.co ABSTRACT In this paper, we present collaborative/cooperative bea foring for wireless ad-hoc networks. Via collaborative beaforing, nodes in wireless network are able to transit a coon essage over a long distance in an energy efficient anner. To iprove the perforance, we have developed a cooperative beaforing algorith. The idea of cooperative beaforing is to take the help of neighboring nodes to for a bea of electroagnetic energy i.e. the idea of antenna array is used. Since, in this type of network the nodes cannot have antenna array to ipleent beaforing, we take the help of nearby node to participate in beaforing process. Source node in the network is allowed to transit. Collaborating nodes receives the transitted packets. Subsequently each collaborating node transits its received signal. One or ultiple beas are fored each focusing on one destination node and reinforcing the signal intended for a particular destination as copared to the other signals. The proposed work achieves higher throughput and iproved SNR in the ad-hoc network. Keywords: Beaforing, Collaborative, Throughput, Ad-hoc Networks. 1. INTRODUCTION In last few years, there has been treendous updation in wireless networks and a big interest has been developed in ad-hoc wireless networks. An Ad-hoc wireless network is a network, coprised of obile coputing devices that use wireless transission for counication, having no fixed infrastructure. The obile devices also serve as routers due to the liited range of wireless transission of these devices that is several devices ay need to route or relay a packet before it reaches its final destination. Ad-hoc wireless networks can be deployed quickly anywhere and anytie as they eliinate the coplexity of infrastructure setup. These networks find application in several areas; soe of the are ilitary, collaborative and distributed coputing wireless sensor networks and hybrid wireless networks. The special features of obile ad-hoc networks bring the technology great opportunities together with different challenges. A challenge in the area of wireless ad-hoc network is transission of signal over a long distance requires significant aount of energy in order to overcoe attenuation. Energy is usually a scarce coodity in wireless ad-hoc networks, as nodes typically operate on batteries, which in any cases are difficult to replace or recharge. Thus, energy-efficient schees for longdistance transission in wireless networks have recently been of uch interest. In soe such situations, ultihop ay be a preferred solution. However, there are several challenges in transitting real-tie services over ultiple hops. Also, ultihop networks require a high node density which akes routing difficult and affects the reliability of link [1]. Recently, a collaborative beaforing technique was proposed in [3], in which randoly distributed nodes in a network cluster for an antenna array and beafor data to a faraway destination without each node exceeding its power constraint. The destination receives data with high signal power. A challenge with ipleenting beaforing in ad-hoc networks is that the geoetry of the network ay change dynaically. In this paper we propose a schee that is based on the idea of collaborative beaforing, and reduces the tie required for inforation sharing. A preliinary version of the proposed schee appeared in [4]. The work in this paper contains error analysis that provides insight into the perforance of the proposed approach. The ain idea is as follows. Source node in the network is allowed to transit. Collaborating nodes receive the transitted packets. Subsequently, each collaborating node transits its received signal. One or ultiple beas are fored, each focusing on one destination node, and reinforcing the signal intended for a particular destination as copared to the other signals. The rest paper section II describes Beaforing Background. Section III describes the Proposed schee. Section IV presents Siulation. Finally section V Conclusions.
2 182 International Journal of Coputer Science and Counication (IJCSC) 2. BEAMFORMING BACKGROUND For siplicity, let us assue that source and destination are coplanar. We index source nodes using a subscript t, with t i denoting the i-th node. At slot n, one source node t needs to transit the signal s (n) to a faraway destination node q. Suppose that set of N nodes, designated as collaborating nodes c 1,..., c N, have access to s (n). The locations of these collaborating nodes follow a unifor distribution over a disk of radius R. We denote the location of c i in polar coordinates with respect to the origin of the disk by (r i, Ψ i ). Let d i (ϕ ), or siply d i, represent the distance between c i and the destination q, where ϕ is the aziuthal angle of q with respect to the origin of the disk. d 0 ( ϕ ) or d 0 denotes the distance between the origin of the disk and q, so the polar coordinates of q are (d 0, ϕ ). Moreover, let d i (ϕ) denote the distance between c i and soe receiving point with polar coordinate ( d 0, ϕ). The initial phases at the collaborating nodes are set to 2π Ψi()(), φ = 1,..., din φ i = N λ This requires knowledge of distances (relative to wavelength λ) between nodes and destination, and applies to the closed loop case [3]. Alternatively, the initial phase of node i can be 2π Ψi() φ = cos() ri φ Ψi λ which requires knowledge of the node's position relative to soe coon reference point, and corresponds to the open loop case [3]. The path losses between collaborating nodes and destination are assued to be identical for all nodes. The corresponding array factor given the collaborating nodes at radial coordinates r = [r 1,..., r N ] and aziuthal coordinates Ψ = [Ψ 1,..., Ψ N ] at location with polar coordinate (d 0, ϕ) is Finally, the average beapattern can be expressed as [3] J1(( α ;)) φ φ Pav () φ = E{ ( z F ) φ } z = 1+ 2 N N α( φ;) φ When plotted as a function of ϕ, P av (ϕ) exhibits a ain lobe around ϕ, and side lobes away fro ϕ. It equals one in the target direction, and the side lobe level approaches 1/N as the angle oves away fro the target direction. The statistical properties of the beapattern were analyzed in [3], where it was shown that under ideal channel and syste assuptions, directivity of order N can be achieved asyptotically with N sparsely distributed nodes. As we have noted, all of the collaborating nodes ust have the sae inforation to (1) (2) 2 (3) ipleent beaforing. Thus, the source nodes need to share their inforation sybols with all collaborating nodes in advance. 3. THE PROPOSED SCHEME Here we refine the odel of [3], focusing ore directly on the physical odel for the signal, fading channel and noise. In addition to the above assuptions, we will further assue the following: 1. The network is divided into clusters, so that nodes in a cluster can hear each other. 2. A slotted packet syste is considered, in which each packet requires one slot for its transission. Perfect synchronization is assued between nodes in the sae cluster. 3. Nodes transit packets consisting of phase-shift keying (PSK) sybols each having the sae power. Also, nodes operate under half-duplex ode, i.e., they cannot receive while they are transitting. 4. Counication takes place over flat fading channels. The channel gain during slot n between source t i and collaborating node c j is denoted by a ij (n). It does not change within one slot, but can change between slots. 5. The distances between collaborating nodes and destinations are uch greater than the axiu distance between source and collaborating nodes. Suppose that cluster C contains J nodes. During slot n, source nodes t 1... t K need to counicate with nodes q 1,..., q K that belong to clusters C 1,..., C K, respectively. The aziuthal angle of destination q i is denoted by ϕ i. The packet transitted by node t i consists of L sybols s j (n). Due to the broadcast nature of the wireless channel, non-source nodes in cluster C hear a collision, i.e., a linear cobination of the transitted sybols. More specifically, node c i hears the signal x i (n) = a ji ()()() n s n w n j + i (4) where w i (n) represents noise at the receiving node c i. Let q denote the destination of s (n). In slot n +, = 1... K, each collaborating node c i transits the signal x ()() n + = *()() x n µ a n e Ψ ϕ (5) i i i i where µ is a scalar used to adjust the transit power and is the sae for all collaborating nodes. µ is of the order of 1/N. Collaborating nodes need to know which are source nodes and then estiate the channel between all source nodes and theselves. Also, collaborating nodes require the knowledge of their initial phases. To obtain initial phases, collaborating nodes also require knowledge of the aziuths of the destinations so that the beas can be steered toward desired directions. Given the
3 Collaborative Beaforing for Wireless Ad-hoc Networks 183 collaborating nodes at radial coordinates r and aziuthal coordinates Ψ, the received signal at an arbitrary location with polar coordinates (d 0, ϕ), is j2 π /() λ di ϕ y( ϕ; r,)()() Ψ = bxi n + e + v n + (6) where v ( n + ) represents noise at the receiver during slot n SIMULATIONS AND RESULTS In this section we study the BER perfors of the proposed ethod via siulation. We assue a playground area of network as 8 8. This area is two diensional. Then 400 nodes with unifor distribution populate this area. Then this area is divided into four clusters. The siulation is perfored using 8, 16 and 32 nodes along with 2 and 4 nodes as a collaborating node. Figure 1 and figure 2 shows the BER versus SINR. It shows that BER for 32 nodes is better than other two i.e. 16 and 8 nodes. Figure 3 and figure 4 shows for different nubers of collaborating nodes. Also BER is better for 16 nodes as copared to 8 nodes. Hence we can say that BER depends on the nuber of collaborating nodes. Figure 3: BER vs. SNR; N= 2,4,8, 16, 32 Figure 4: BER vs. SNR; N= 8, 16, 32 Figure 1: BER vs. SNR; N = 8, 16,32 Figure 2: BER vs. SNR; N = 8, 16, 32; 2 8 Sybols It was assued that the network is randoly generated and during this case this generated network the position of network nodes is not changing and even the source and destination fixed. In this case the different collaborating nodes are considered and siulation was perfored for above case. Figure 5(a) to 5(e) shows the result for above case. Figure 5(a) shows for 2 nodes as a collaborating nodes. Siilarly figure fro 5 ( b) to 5 (e) shows for 6, 8, 16 and 32 as collaborating nodes. One can see that as collaborating nodes increase we get good bea pattern as in above case. If bea pattern obtained in the case of 2 nodes as collaborating with the case 6 nodes as collaborating it is observed that good bea are obtain in case of 6 nodes as collaborating nodes. Good bea pattern and ore directivity in desired direction are observed if nuber of collaborating nodes increases. The ain lobe is of interest which is in desired direction and other are the side lobe in any undesired direction. Side lobes are unwanted because they waste power.
4 184 International Journal of Coputer Science and Counication (IJCSC) Figure 5(d): Nodes=400,Collaborating Nodes=8 Figure 5(a): Nodes=400,Collaborating Nodes=2 Figure 5(e): Nodes=400,Collaborating Nodes=16 Figure 5(b): Nodes=400,Collaborating Nodes=4 Figure 5(c): Nodes=400,Collaborating Nodes=6 Figure 5(f): Nodes=400,Collaborating Nodes=32
5 Collaborative Beaforing for Wireless Ad-hoc Networks CONCLUSION We have proposed a schee for wireless ad-hoc networks that uses idea of collaborative beaforing. We have provided analysis of SEP(Sybol error probability), which shows how perforance depends on the nuber of collaborating nodes. Hence we conclude that the beaforing enhances the capacity and the power consuption reduction for retransission. On the other hand if a single source can already counicate with intend destination at the desired rate and range then beaforing can be eployed to reduce the transit power per source and to reduce the energy radiated in undesired directions, which can be exploited for energy efficient in any applications. REFERENCES [1] H. Gharavi and K. Ban, Multihop Sensor Network Design for Wide-band Counications, Proc. IEEE, 91(8), pp , Aug [2] R. Lin and A.P. Petropulu, New Wireless Mediu Access Protocol Based on Cooperation, IEEE Trans. Signal Process., 53(12), pp , Dec [3] H. Ochiai, P. Mitran, H.V. Poor and V. Tarokh, Collaborative Beaforing for Distributed Wireless ad-hoc Sensor Networks, IEEE Trans. Signal Process., 53(11), pp , Nov [4] A.P. Petropulu, L. Dong and H.V. Poor, A Highthroughput Cross-layer Schee for Distributed Wireless ad-hoc Networks, Proc. Conference on Inforation Sciences and Systes, Baltiore MD, Mar [5] Lun Dong Petropulu, A.P. Poor, H.V., Cooperative Bea Foring for Wireless ad-hoc Networks, IEEE Trans. 6 Aug [6] Andy Ganse, An Introduction to Bea Foring, Applied Physics Laboratory University of Washington Seattle. [7] Hsi-Lu Chao An Introduction to Cooperative Networks. Departent of Coputer Science National Chiao Tung University. [8] Tiago Cailo, Jorge Sá Silva, André Rodrigues, Fernando Boavida, A Topology Generator For Real Wireless Sensor Networks Deployent, Departent of Inforatics Engineering, University of Coibra. [9] R. Hekat, Fundaentals Properties of Wireless Mobile Ad-hoc Networks. Netherlands, [10] X. Zhou, Haley M. Jones, Salan Durrani and Adle Scott, Effects of Beaforing on the Connectivity of Ad Hoc Networks, IEEE Trans., 2007, pp [11] R. Mudubai, D.R. Brown III, U. Madhow and H.V. Poor Distributed Transit Beaforing Challenges and Recent Progress, Counications Magazine, IEEE Publication, February 2009, 47(2), on pp [12] Martin Haenggi, Analysis and Design of Diversity Schees for ad hoc Wireless Networks, Counications, IEEE Journal, on 23, Jan pp
Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals
Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract
More informationThe optimization design of microphone array layout for wideband noise sources
PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun
More informationUtility-Based Resource Allocation for Mixed Traffic in Wireless Networks
IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng
More informationMultipath Selection and Channel Assignment in Wireless Mesh Networks
Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,
More informationAdaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN
Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan
More informationDYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION
www.arpnjournals.co DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION N. Snehalatha 1 and Paul Rodrigues 2 1 School of Coputing, SRM University, Chennai, Tail Nadu, India 2 Departent
More informationInvestigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks
Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,
More informationMulti Packet Reception and Network Coding
The 2010 Military Counications Conference - Unclassified Progra - etworking Protocols and Perforance Track Multi Packet Reception and etwork Coding Aran Rezaee Research Laboratory of Electronics Massachusetts
More informationControl Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols
Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Navodaya Garepalli Kartik Gopalan Ping Yang Coputer Science, Binghaton University (State University of New York) Contact:
More informationLighting Control System with Low Rate Network Green Computing System. Abstract
The 2 nd RMUTP International Conference 2010 Page 24 Lighting Control Syste with Low Rate Network Green Coputing Syste Wanapun Waiyawut Departent of Coputer Engineering, Faculty of Engineering, Rajaangala
More informationIntegrating fast mobility in the OLSR routing protocol
Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr
More informationEnergy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks
Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr
More informationAGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM
International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.5, Septeber 205 AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM Xie Yang and Cheng Wushan College of Mechanical Engineering,
More informationRelocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction
Relocation of ateway for Enhanced Tieliness in Wireless Sensor Networks Keal Akkaya and Mohaed Younis Departent of oputer Science and Electrical Engineering University of Maryland, altiore ounty altiore,
More informationEquation Based Congestion Control for Video Transmission over WCDMA Networks
Equation Based Congestion Control for Video Transission over WCDMA Networks Antonios Alexiou, Diitrios Antonellis and Christos Bouras Research Acadeic Coputer Technology Institute, Greece and Coputer Engineering
More informationPERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL
IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant
More informationDistributed Multicast Tree Construction in Wireless Sensor Networks
Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,
More informationDifferent criteria of dynamic routing
Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich
More informationQUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS
QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755
More informationAdaptive Holistic Scheduling for In-Network Sensor Query Processing
Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,
More informationBP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks
BP-MAC: A High Reliable Backoff Preable MAC Protocol for Wireless Sensor Networks Alexander Klein* Jirka Klaue Josef Schalk EADS Innovation Works, Gerany *Eail: klein@inforatik.uni-wuerzburg.de ABSTRACT:
More informationAn Efficient Approach for Content Delivery in Overlay Networks
An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr
More informationThe Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network
The Flaw Attack to the RTS/CTS Handshake Mechanis in Cluster-based Battlefield Self-organizing Network Zeao Zhao College of Counication Engineering, Hangzhou Dianzi University, Hangzhou 310018, China National
More informationA novel configuration method of the acoustic random beamforming array for multiple wideband moving sound source localization
INTER-NOISE 6 A novel configuration ethod of the acoustic rando beaforing array for ultiple wideband oving sound source localization Zhihong LIU ; Huichao LI ;Chujie YI 3 Qingdao Technological University,
More informationMAC schemes - Fixed-assignment schemes
MAC schees - Fixed-assignent schees M. Veeraraghavan, April 6, 04 Mediu Access Control (MAC) schees are echaniss for sharing a single link. MAC schees are essentially ultiplexing schees. For exaple, on
More informationPERFORMANCE ANALYSIS OF THE UMTS SYSTEM FOR PACKET DATA TRANSFER OVER DEDICATED CHANNELS
PERFORMACE AALSIS OF THE MTS SSTEM FOR PACKET DATA TRASFER OVER DEDICATED CHAELS Manju Sarvagya, Ratna V. Raja Kuar Departent of Electronics and Electrical Counication Engineering Indian Institute of Technology,
More informationImage Filter Using with Gaussian Curvature and Total Variation Model
IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.
More informationA Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction
MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao
More informationDetection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm
Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,
More informationRedundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network
(IJACSA) International Journal of Advanced Coputer Science and Applications Vol. 8, No. 1, 217 Redundancy Level Ipact of the Mean Tie to Failure on Wireless Sensor Network Alaa E. S. Ahed 1 College of
More informationContent-Centric Multicast Beamforming in Cache-Enabled Cloud Radio Access Networks
Content-Centric Multicast Beaforing in Cache-Enabled Cloud Radio Access Networks Hao Zhou, Meixia Tao, Erkai Chen, Wei Yu *Dept. of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, China
More informationA Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium
1 A Distributed Multi-service Resource Allocation Algorith in Heterogeneous Wireless Access Mediu Muhaad Isail, Student Meber, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract In this paper, radio resource
More informationImprove Peer Cooperation using Social Networks
Iprove Peer Cooperation using Social Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Noveber 5, 2007 Corresponding
More informationCollaborative Web Caching Based on Proxy Affinities
Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA
More informationEnergy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks
Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networs F. Mousavi Madani Departent of coputer engineering Alzahra University Tehran, Iran, osavif@alzahra.ac.ir Received:
More informationQoS and Sensible Routing Decisions
QoS and Sensible Routing Decisions Erol Gelenbe Dept. of Electrical & Electronic Engineering Iperial College London SW7 2BT e.gelenbe@iperial.ac.uk Abstract Network Quality of Service (QoS) criteria of
More informationOblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands
Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu
More informationAn Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks
An Adaptive Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent
More informationComputer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13
Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical
More informationDesign Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems
Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se
More informationA Hybrid Network Architecture for File Transfers
JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,
More informationPrivacy-preserving String-Matching With PRAM Algorithms
Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,
More informationNON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH
NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH V. Atienza; J.M. Valiente and G. Andreu Departaento de Ingeniería de Sisteas, Coputadores y Autoática Universidad Politécnica de Valencia.
More informationAn Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks
An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San
More informationEnergy-Efficient Cooperative Communication In Clustered Wireless Sensor Networks
Energy-Efficient Cooperative Communication In Clustered Wireless Sensor Networks Reza Aminzadeh Electrical Engineering Department Khavaran Higher Education Institute Mashhad, Iran. reza.aminzadeh@ieee.com
More informationIN many interactive multimedia streaming applications, such
840 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 5, MAY 06 A Geoetric Approach to Server Selection for Interactive Video Streaing Yaochen Hu, Student Meber, IEEE, DiNiu, Meber, IEEE, and Zongpeng Li, Senior
More informationA Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network
A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University
More informationEnhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue
Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade
More informationResearch Article A Game Theory Based Congestion Control Protocol for Wireless Personal Area Networks
Journal of Sensors Volue 216, Article ID 61683, 13 pages http://dx.doi.org/1.11/216/61683 Research Article A Gae Theory Based Congestion Control Protocol for Wireless Personal Area Networks Chuang Ma,
More informationAn Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks
An Adaptive and Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent
More informationDefining and Surveying Wireless Link Virtualization and Wireless Network Virtualization
1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,
More informationA wireless sensor network for visual detection and classification of intrusions
A wireless sensor network for visual detection and classification of intrusions ANDRZEJ SLUZEK 1,3, PALANIAPPAN ANNAMALAI 2, MD SAIFUL ISLAM 1 1 School of Coputer Engineering, 2 IntelliSys Centre Nanyang
More informationAnalysing Real-Time Communications: Controller Area Network (CAN) *
Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination
More informationSolving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification
Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural
More informationMinimax Sensor Location to Monitor a Piecewise Linear Curve
NSF GRANT #040040 NSF PROGRAM NAME: Operations Research Miniax Sensor Location to Monitor a Piecewise Linear Curve To M. Cavalier The Pennsylvania State University University Par, PA 680 Whitney A. Conner
More informationGenerating Mechanisms for Evolving Software Mirror Graph
Journal of Modern Physics, 2012, 3, 1050-1059 http://dx.doi.org/10.4236/jp.2012.39139 Published Online Septeber 2012 (http://www.scirp.org/journal/jp) Generating Mechaniss for Evolving Software Mirror
More informationA Trajectory Splitting Model for Efficient Spatio-Temporal Indexing
A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada
More informationCOLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL
COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute
More informationResearch Article Design and Analysis of an Energy-Saving Distributed MAC Mechanism for Wireless Body Sensor Networks
Hindawi Publishing Corporation EURASIP Journal on Wireless Counications and Networking Volue 2010, Article ID 571407, 13 pages doi:10.1155/2010/571407 Research Article Design and Analysis of an Energy-Saving
More informationJoint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points
Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University
More informationDynamical Topology Analysis of VANET Based on Complex Networks Theory
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 14, Special Issue Sofia 014 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.478/cait-014-0053 Dynaical Topology Analysis
More informationRESEARCH ON PRECISE GEOMETRY MODEL OF SYNTHETIC APERTURE RADAR INTERFEROMETRY
ESEACH ON PECISE GEOMETY MODEL OF SYNTHETIC APETUE ADA INTEFEOMETY Song Shuing, Liu Yihua, Jiao Jian, Zeng Qiing GIS and eote Sensing Institute of Peking University, Beiing, China qzeng@pku.edu.cn, enorlae@gail.co
More informationMapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues
Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu
More informationTHE problem of transferring a data file or data stream. Reliable Point-to-point Underwater Acoustic Data Transfer: To Juggle or Not to Juggle?
1 Reliable Point-to-point Underwater Acoustic Data Transfer: To Juggle or Not to Juggle? Mandar Chitre, Senior Meber, IEEE, and Wee-Seng Soh, Meber, IEEE Abstract Reliable data transfer speeds using underwater
More informationRavine Streams: Persistent Data Streams in Disruptive Sensor Networks
Ravine Streas: Persistent Data Streas in Disruptive Sensor Networks Mingsen Xu, Wen-Zhan Song Departent of Coputer Science, Georgia State University Atlanta, Georgia 333, USA Eail: {xu4@student.gsu.edu,
More informationShortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm
International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University
More informationGromov-Hausdorff Distance Between Metric Graphs
Groov-Hausdorff Distance Between Metric Graphs Jiwon Choi St Mark s School January, 019 Abstract In this paper we study the Groov-Hausdorff distance between two etric graphs We copute the precise value
More informationClustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering
Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into
More informationCalculation of the blocking factor in heliostat fields
Available online at www.sciencedirect.co ScienceDirect Energy Procedia 57 (014 ) 91 300 013 ISES Solar World Congress Calculation of the blocking factor in heliostat fields Mustafa E. Elayeb a *, Rajab
More informationIMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE. Rafael García, Xevi Cufí and Lluís Pacheco
IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE Rafael García, Xevi Cufí and Lluís Pacheco Coputer Vision and Robotics Group Institute of Inforatics and Applications, University of
More informationA Periodic Dynamic Load Balancing Method
2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation
More informationTensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3
2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition
More informationEffects of Interleaving on RTP Header Compression
Effects of Interleaving on RTP Header Copression Colin Perkins Jon Crowcroft Departent of Coputer Science University College London Gower Street London WCE 6BT Abstract We discuss the use of interleaving
More informationEfficient and Strategyproof Spectrum Allocations in Multi-Channel Wireless Networks
Efficient and Strategyproof Spectru Allocations in Multi-Channel Wireless Networks Ping Xu, Xiang-Yang Li, Senior Meber, IEEE, ShaoJie Tang, and JiZhong Zhao Abstract In this paper, we study the spectru
More informationData Acquisition of Obstacle Shapes for Fish Robots
Proceedings of the 2nd WEA International Conference on Dynaical ystes and Control, Bucharest, oania, October -17, 6 Data Acquisition of Obstacle hapes for Fish obots EUNG Y. NA, DAEJUNG HIN, JIN Y. KIM,
More informationPerformance Analysis of Exposed Terminal Effect in IEEE Ad Hoc Networks in Finite Load Conditions
Perforance Analysis of Exposed Terinal Effect in IEEE 80.11 Ad Hoc Networks in Finite Load Conditions Diitris Vassis 1, Georgios Korentzas 1 1 Dept. of Inforation and Counication Systes Engineering University
More informationGlobal Optimization of Transmitter Placement in Wireless Communication Systems
Global Optiization of Transitter Placeent in Wireless Counication Systes J. He, A. Verstak, L. T. Watson, T. S. Rappaport, C. R. Anderson, N. Raakrishnan, C. A. Shaffer, W. H. Tranter, K. Bae, J. Jiang
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN
International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI
More informationDeterministic Voting in Distributed Systems Using Error-Correcting Codes
IEEE TRASACTIOS O PARALLEL AD DISTRIBUTED SYSTEMS, VOL. 9, O. 8, AUGUST 1998 813 Deterinistic Voting in Distributed Systes Using Error-Correcting Codes Lihao Xu and Jehoshua Bruck, Senior Meber, IEEE Abstract
More informationUtility-based Scheduling Frameworks for Efficient Quality-of- Service Differentiation in a Mixture of Real-time and Nonreal-time
Journal of Coputer Science Original Research Paper Utility-based Scheduling Fraeworks for Efficient Quality-of- Service Differentiation in a Mixture of Real-tie and Nonreal-tie Traffics 1 Olalekan Bello,
More informationBlock-LDPC Codes Vs Duo-Binary Turbo-Codes for European Next Generation Wireless Systems
Block-LDPC Codes Vs Duo-Binary Turbo-Codes for European Next Generation Wireless Systes Thierry Lestable* Ernesto Zieran # Marie-Helene Haon + and Stephan Stiglayr & (*) Advanced Technology & Standards
More informationSimulated Sensor Reading. Heading. Y [m] local minimum ; m. local maximum ; M. discontinuity ; D. connection ; c X [m]
Localization based on Visibility Sectors using Range Sensors Sooyong Lee y Nancy. Aato Jaes Fellers Departent of Coputer Science Texas A& University College Station, TX 7784 fsooyong,aato,jpf938g@cs.tau.edu
More informationOPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS
Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented
More informationScheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We
More informationMAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer
MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer Departent of Coputer Science and Engineering University of South Florida Tapa, FL 33620 Abstract -- The
More informationA Network-based Seamless Handover Scheme for Multi-homed Devices
A Network-based Sealess Handover Schee for Multi-hoed Devices Md. Shohrab Hossain and Mohaed Atiquzzaan School of Coputer Science, University of Oklahoa, Noran, OK 7319 Eail: {shohrab, atiq}@ou.edu Abstract
More informationPerformance Analysis of RAID in Different Workload
Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,
More informationOn the Accuracy of MANET Simulators
On the ccuracy of MNT Siulators avid avin david.cavin@epfl.ch Yoav Sasson yoav.sasson@epfl.ch istributed Systes Laboratory cole Polytechnique Fédérale de Lausanne (PFL) H-115 Lausanne ndré Schiper andre.schiper@epfl.ch
More informationTHE rounding operation is performed in almost all arithmetic
This is the author's version of an article that has been published in this journal. Changes were ade to this version by the publisher prior to publication. The final version of record is available at http://dx.doi.org/.9/tvlsi.5.538
More informationA Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage
216 IEEE 23rd International Conference on High Perforance Coputing A Low-Cost Multi-Failure Resilient Replication Schee for High Data Availability in Cloud Storage Jinwei Liu* and Haiying Shen *Departent
More informationA Novel Fast Constructive Algorithm for Neural Classifier
A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore
More informationData & Knowledge Engineering
Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID
More informationDerivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router
Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of
More informationVirtual source-based minimum interference path multicast routing in optical virtual private networks
Photon Netw Coun (2007) 13:19 30 DOI 10.1007/s11107-006-0012-7 ORIGINAL ARTICLE Virtual source-based iniu interference path ulticast routing in optical virtual private networks Jun-Mo Jo Suk-Jin Lee Kyung-Dong
More informationEvaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds
Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles
More informationNEW APPROACHES FOR REAL TIME TRAFFIC DATA ACQUISITION WITH AIRBORNE SYSTEMS
NEW APPROACHES FOR REAL TIME TRAFFIC DATA ACQUISITION WITH AIRBORNE SYSTEMS I. Ernst a *, M. Hetscher a, K. Thiessenhusen a, M. Ruhé a, A. Börner b, S. Zuev a a DLR, Institute of Transportation Research,
More informationModeling epidemic data diffusion for wireless mobile networks
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Coun. Mob. Coput. (212) Published online in Wiley Online Library (wileyonlinelibrary.co)..2233 RESEARCH ARTICLE Modeling epideic data diffusion for wireless
More informationFeature Selection to Relate Words and Images
The Open Inforation Systes Journal, 2009, 3, 9-13 9 Feature Selection to Relate Words and Iages Wei-Chao Lin 1 and Chih-Fong Tsai*,2 Open Access 1 Departent of Coputing, Engineering and Technology, University
More informationRECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS
RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS AWNI ITRADAT Assistant Professor, Departent of Coputer Engineering, Faculty of Engineering, Hasheite University, P.O. Box 15459,
More informationA Measurement-Based Model for Parallel Real-Time Tasks
A Measureent-Based Model for Parallel Real-Tie Tasks Kunal Agrawal 1 Washington University in St. Louis St. Louis, MO, USA kunal@wustl.edu https://orcid.org/0000-0001-5882-6647 Sanjoy Baruah 2 Washington
More information