Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks

Size: px
Start display at page:

Download "Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks"

Transcription

1 The Scentfc World Journal Volume 3, Artcle ID 43796, pages Research Artcle QoS and Energy Aware Cooperatve Routng Protocol for Wldfre Montorng Wreless Sensor Networks Mohamed Maalej, Sofane Cherf, and Hchem Besbes Engneerng School of Telecommuncatons of Tuns (Sup Com), Cty of Communcatons Technologes, El Ghazala 83, Arana, Tunsa Correspondence should be addressed to Sofane Cherf; Receved March 3; Accepted May 3 Academc Edtors: A. E. Cetn, I. Korpeoglu, B. U. Toreyn, and S. Verstockt Copyrght 3 Mohamed Maalej et al. Ths s an open access artcle dstrbuted under the Creatve Commons Attrbuton Lcense, whch permts unrestrcted use, dstrbuton, and reproducton n any medum, provded the orgnal work s properly cted. Wreless sensor networks (WSN) are presented as proper soluton for wldfre montorng. However, ths applcaton requres a desgn of WSN takng nto account the network lfetme and the shadowng effect generated by the trees n the forest envronment. Cooperatve communcaton s a promsng soluton for WSN whch uses, at each hop, the resources of multple nodes to transmt ts data. Thus, by sharng resources between nodes, the transmsson qualty s enhanced. In ths paper, we use the technque of renforcement learnng by opponent modelng, optmzng a cooperatve communcaton protocol based on RSSI and node energy consumpton n a compettve context (RSSI/energy-CC), that s, an energy and qualty-of-servce aware-based cooperatve communcaton routng protocol. Smulaton results show that the proposed algorthm performs well n terms of network lfetme, packet delay, and energy consumpton.. Introducton The automatc montorng of wldfre generally supports multmodal observatons. Ths s due to the extent of the areas to be covered and the dffculty of detectng fre. In fact, most fre detecton technques, for example, based on thevdeo,sufferfromfalsealarms.theuseofwrelesssensor networks (WSNs) can mprove the qualty of the detecton and consequently the reducton of the false alarm. WSN can be easly deployed and do not requre specal auxlary nstallaton. They are manly used to control buldngs, houses, or archaeologcal stes n the forest. However, the forest envronment presents the problem of wde covered areas requrng the transmsson of a large amount of nformaton through the network wth the rsk of sgnfcant energy consumpton and hence lmtng the lfetme of the network. Partcularly, energy parameter s crucal for the wldfre applcaton. Ths s due to the complexty of mantenance of the sensors and the substtuton of dead batteres due to the dffculty of access to these sensors placed generally n large covered areas. The second problem whch arses n ths type of envronment s the fadng effect due to the presence of trees leadng to an mportant shadowng phenomenon. To solve these problems, we propose a new methodology to desgn and optmze WSN based on both energy conservaton and consderaton of the qualty of transmsson for choosng the routng protocol. Cooperatve communcaton s a promsng soluton for enhancng WSN lfetme. In recent works, ths concept has been proposed to explot the spatal dversty gans n wreless networks [ 3]. Data aggregaton n WSN often uses multhop transmsson technques. At each hop, the network reles on only one sensor. Ths often results n a sgnfcant decrease n the energy of some sensors and thus lmts the lfetmeofthenetworkwhlealargenumberofsensors are stll n workng condton. The man dea of cooperatve communcaton conssts n relyng, at each hop, on the resources of multple nodes or relays (called cooperatve nodes) to transmt data from one sensor to another, nstead ofusngonlyonesensorasrelay.thus,bysharngresources between nodes, the transmsson qualty s enhanced. Itsalsoobvousthattheuseofacooperatvescheme mproves the relablty of communcaton n case of fre

2 The Scentfc World Journal propagaton. Indeed, the presence of several relays for each possble hop ensures the further communcaton of nformaton and therefore the possblty of detecton and trackng of potental wldfre. Thus, cooperatve mechansm s the key to the performance of cooperatve communcaton protocols. However, t s challengng to fnd the optmal cooperatve polces n dynamc WSN, where renforcement learnng (RL) algorthmscanbeusedtofndtheoptmalcontrolpolcywthout the need of centralzed control. Recently, a cooperatve communcaton protocol for qualty-of-servce (QoS) provsonng has been proposed and named MRL-CC, a multagent renforcement learnngbased cooperatve communcaton routng algorthm []. The RL concept conssts n consderng the cooperatve nodes as multple agents learnng ther optmal polcy through experences and rewards. MRL-CC has been based on nternode dstance and packet delay to enhance the QoS metrcs. However, t does not care about energy consumpton and network lfetme whch are mportant components for energy effcency. In ths paper, we desgn cooperatve communcaton routng protocol based on both energy consumpton and QoS. The QoS s measured by the absolute receved sgnal strength ndcator (RSSI). To ntegrate these two parameters n the routng protocol, we use a compettve/opponent mechansm mplemented at each node by the multagent renforcement-learnng (MRL) algorthm. Our proposed algorthm (RSSI/energy-CC) s also an energy and QoS aware routng protocol snce t ensures better performance n terms of end-to-end delay and packet loss rate, takng nto account the consumed energy through the network. The rest of the paper s organzed as follows. Secton descrbes the RL algorthm and the desgn and mplementaton of MRL-CC algorthm and our algorthm, the RSSI/energy-CC. The performance analyss s presented n Secton 3. Fnally,Secton 4 concludes the paper and gves future research dscussons.. Cooperatve Communcaton n WSN Usng Renforcement Learnng In ths secton, the background nformaton on RL s provded. Then, we gve an overvew about the archtecture and desgn ssues of our concept of cooperatve communcaton n WSN. Then, we descrbe the archtecture and desgn ssues of MRL-CC, a cooperatve communcaton algorthm usng RL. After that, we explan the archtecture of new algorthm, RSSI/energy-CC, takng nto account both QoS and energy consumpton... Renforcement Learnng. RL provdes a framework n whch an agent can learn control polces based on experences and rewards. In the standard RL model, an agent s connected to ts envronment va percepton and acton, as shown n Fgure. On each step of nteracton, the agent receves as an nput,, some ndcaton of the current state, s, of the envronment; the agent then chooses an acton, a, to generate as an output. The acton changes the state Acton a A System envronment (State: S) Reward: R Agent: A Reward r R Fgure : Renforcement learnng model. State s S of the envronment, and the value of the state transton s communcated to the agent through a scalar RL sgnal, r. Dependng on ts behavor, the agent should choose actons that tend to ncrease the long-term sum of values of the renforcement sgnal [4]. The man dea of RL s to strengthen the good behavors of the agent whle weakenng the bad behavors through rewards gven by the envronment. The envronment of the agent s descrbed by a Markov decson process (MDP). An MDP models an agent actng n an envronment wth a tuple (S,A,P,R),whereS s a set of states and A denotes a set of actons. P(s s,a) s the transton model that descrbes the probablty of enterng state s S after executng acton a A at state s S. R(s, a, s ) s the reward obtaned when the agent executes a at s and enter s. The goal of solvng an MDP s to fnd an optmal polcy, π:s A,thatmapsstatestoactonssuch that the cumulatve reward s maxmzed [4]. Multagent systems (MASs) are systems showng that multpleagentsareconnectedtotheenvronmentandthat they may take actons to change the state of the envronment. The generalzaton of the Markov decson process to the multagentcasesthestochastcgame(sg)[5]. In MAS case, each agent assumes tself as the only one that can change the state of the envronment and does not consder the nteractons between tself and other agents. Therefore,thestatetranstonsaretheresultofthejontacton of all agents, a =[a,...,a n ],wherensthenumberofagents. Consequently, the rewards for each agent R, =,...,n,also depends on the jont acton. The polces π :S Aform together the jont polcy Π. If R = = R n,alltheagentshavethesamegoal (to maxmze the same expected return), and the SG s fully cooperatve. If n = and R = R,thetwoagentshave opposte goals, and the SG s fully compettve. Mxed games are stochastc games that are nether fully cooperatve nor fully compettve.

3 The Scentfc World Journal 3 () State: thecngroupsaremodeledtobetheenvronment states: s t s n = {k}, where k {...,V n,v n,v n+,...}. () () Acton:anagentcanoperateoneofthesetwoactons: Cooperatve nodes Fgure : Multhop mesh cooperatve structure for data dssemnaton n WSNs. Source V V n V n V n+ V M Snk Fgure 3: Cooperaton between adjacent groups of cooperatve nodes... Cooperatve Communcaton Concept n WSN... Adopted Archtecture. For relable data dssemnaton n WSNs, we use a multhop mesh cooperatve structure. It conssts n formng groups of cooperatve nodes (denoted as CN)betweenthesourcenodeandthesnknode.Thedata packets orgnated from a source node are forwarded towards the snk by these CN groups (Fgure ) usngamulthop transmsson. When a data packet s receved by a CN group, a node from that group wll be elected to broadcast the data packet to the adjacent CN group. The other nodes of that CN groupwllhelpnthepacketforwardngncasetheelected node fals n data packet transmsson or n case the packet s corrupted. Therefore, we can show the group of nodes connected to each other n a multhop mesh cooperatve structure n Fgure 3. In fact,the set of nth cooperatve group (denoted by V n )sconnectedwthv n and V n+,whchareonehop farther and closer towards the snk than V n,respectvely,that s, each node n V n s connected wth all nodes n V n and V n+. To construct a multhop mesh cooperatve structure, a set of nodes, termed as reference nodes (denoted as RN), between the source node and the snk node s frst selected. After that, a set of nodes around each RN wll be selected as CN, and thus a multhop mesh cooperatve structure s constructed n ths phase [6].... WSN Modelng wth RL. From the pont of vew of RL, we can consder a WSN as multagent system. In fact, sensor nodes can be consdered as agents nteractng wth the envronment whch can be represented for node V n as follows. a f : forwardng of the packet from V n to V n+, a m : montorng the forwarded packet; so: A={a f,a m }. In our study, we have consdered two approaches. The frst approach s proposed n [] where the RL strategy(polcy, behavors, and rewards) for the sensor nodes consders the packet delay and the packet loss rate. Ths technque has been called the MRL-CC algorthm. The goal of MRL-CC s to enhance packet delay and packet loss rate. The second approach s treated n our work n [7] wheretherlstrategy s based on the lnk qualty between sensor nodes and ther amount of energy consumpton. Our strategy goal s to enhance energy effcency and lfetme of the WSN, that s, to reduce network energy consumpton and to maxmze network lfetme..3. Multagent Renforcement Learnng-Based Cooperatve Communcaton Routng Algorthm (MRL-CC).3.. MRL-CC Implementaton. Node electon n the CN group s based on a multagent RL algorthm, performng a fully cooperatve task usng a Q-learnng algorthm. The strategy s descrbed as follows. () Behavor: each node mantans Q-valuesoftselfand ts cooperatve partners whch reflect the qualtes (transmsson delay, packet delvery rato) of the avalableroutestothesnk. () Polcy: when a packet s receved by the nodes n a CN group, each node wll compare ts own Q-value wth those of other nodes n the CN group; the node whch determnes that t has the hghest Q-value wll beelectedtoforwardthedatapackettotheadjacent CN group towards the snk. The other cooperatve nodes wll montor the packet transmsson at the next hop. () Reward: the reward functon s defned as follows: r = ((d V n,snk d Vn+,snk)/d Vn,snk), (a) ((T Vn+ T Vn )/T rmn ) r = T rf. (b) T rmn Equaton (a) susedtocalculatetherewardwhenthe packet forwardng s successful, where d Vn,snk s the average dstance between V n andthesnk,whchcanbecalculatedas d Vn,snk = N Vn V n d,snk (3)

4 4 The Scentfc World Journal where N Vn s the number of cooperatve nodes n V n, T Vn+ and T Vn are the packet forwardng tme at V n+ and V n, respectvely; T rmn s the maxmum amount of tme that can be elapsed n the remanng path to the snk to meet the QoS requrements on end-to-end delay. The postve reward reflects the qualty of the packet forwardng. Equaton (b) susedtocalculatetherewardwhenthe packet forwardng fals; T rf s the packet reforwardng tmer used for faled forwardng packets. The negatve reward reflects the delay caused by the unsuccessful packet transmsson from V n to V n+. () Q-value update: n MRL-CC, for -hop forwardng, at teraton t, node V n forwards a packet to V n+, and then j V n+ selectedtocontnuepacket forwardng. Therefore, node updates ts Q-value as Q t+ (s t,at ) = ( α) Q t (st,at ) The average dstance between node and V n+, denoted by d,vn+,canbecalculatedas d,vn+ = N Vn+ d,j. (7) j V n+.3.. Interpretaton. We can conclude that MRL-CC algorthm s consderng each CN group as one sngle node because t s performng a fully cooperatve task. In fact, all nodes of one CN group get the same postve/negatve reward after each transmsson procedure. The value of that reward represents the qualty of packet forwardng n terms of delay and packet loss rate. Besdes, the Q-values of the cooperatve nodes are ntally based on average dstance. Therefore, by electng a node wth the hghest Q-value, we also understand that the polcy adopted n MRL-CC s based on node electon wth the shortest dstance and the lowest packet delay. Thus, MRL-CC ensures communcaton relablty. However, t has no nformaton about energy consumpton that can be a useful parameter to be consdered n RL. +α(r t+ (s t+ ) + γω(, j) max a j A Qt j (st j,at j ) +γ ω(, ) max a A Qt (st,at )), V n = where γ [,]s the dscount factor, α [,]s the learnng rate parameter and ω(, j) and ω(, ) are, respectvely, factors that wegh the maxmum Q-value for node j n V n+ and the maxmum Q-value of node (neghbor of node )n V n. Equaton (4) shows that the Q-value of node s a weghed sum of the Q-value of node at the prevous state, the acton smmedatereward,themaxmumq-value of j whch s elected as the forwardng node n V n+ at the next hop, and the Q-values of all of s cooperatve partners n V n. Note that n the ntalzaton phase, each node s assgned wth an ntal Q-value. For node V n, ts ntal Q-value (denoted as Q n )scalculatedbasedontherelatvedstance (comparedwthtscooperatvepartnersnv n )fromnode to the nodes n V n+, as shown n the followng: Q n (4) = d V n,v n+ d,vn+, (5) where d Vn,V n+ s the average dstance between V n and V n+, whch can be calculated as d Vn,V n+ = d N,Vn+, (6) Vn V n where N Vn s the number of cooperatve nodes n V n..4. WSN Modelng wth Renforcement Learnng n RSSI/Energy-CC Algorthm.4.. Man Idea. Nodes n a CN group wll be consdered as opponents to each other, so that, each node wll mantan a Qvalue whch reflects the payoff that would have been receved f that node selected the acton a f and the other nodes jontly selected the acton a m.afterthat,thenodewththehghest total payoff wll be elected to forward the data packet to the next CN group towards the snk. For the rewardng procedure, there are two cases. () Transmsson succeeded: the Q-values of each node wll be updated accordng to ts energy consumpton compared to ts neghbors n ts CN group. () Transmsson faled: the Q-valueofthenodethat faled to forward the data packet wll be updated wth a negatve reward, whereas for the other nodes, ther Q-value wll be updated accordng to an ndcaton about ther sgnal qualty. In our work, we have chosen to use the RSSI as an avalable ndcaton about sgnal qualty for each packet receved at a sensor node..4.. RSSI/Energy-CC Algorthm Strategy. Node electon n the CN group s based on a multagent RL algorthm, performng a fully compettve task usng an opponent modelng algorthm [8]. The strategy s descrbed as follows. () Polcy: nodeelecton,forpacketforwardng,forthe node wth the best lnk qualty and the lowest energy consumpton, or a tradeoff between the two crtera. () Behavor: each node mantans Q-values whch reflects the payoff that would have been receved f that node selected the forwardng acton a f and another node n ts CN group selected the montorng acton a m.

5 The Scentfc World Journal 5 () Reward: Each tme a packet s forwarded, all the nodes wll receve mmedate rewards from the envronment, whch represent a tradeoff about energy consumpton and qualty of the receved sgnal Algorthm Intalzaton Phase. In the ntalzaton phase, each node s assgned wth an ntal value regardng ts opponents n V n.thentalpayoffofnode V n compared to ts neghbor s the Q-value calculated based on ts absolute RSSI n dbm measured from the next cooperatve group V n+. The Q-value s defned as follows: Q n, = RSSI,V n+ RSSI,V n+ RSSI Vn,V n+, (8) where RSSI Vn,V n+ s the average RSSI between V n and V n+, whch can be calculated as RSSI Vn,V n+ = RSSI N,Vn+, (9) Vn V n where N Vn s the number of cooperatve nodes n V n. The average RSSI between node and V n+, RSSI,Vn+,can be calculated as RSSI,Vn+ = N Vn+ RSSI,j. () j V n Data Dssemnaton Phase. When a data packet s receved by a CN group V n,eachnodewllcomparetsown total payoff, regardng all ts opponents, wth those of other cooperatve nodes. The node whch determnes that t has the hghest total payoff wll forward the data packet to V n+, and other nodes n V n wll deduce whether the packet forwardng s successful or not, by overhearng the packet transmsson from V n+ to V n+. () Q-value update: the updatng of Q-value terates at each node n each forwardng procedure. For -hop forwardng, at teraton t, node V n forwards a packet to V n+ and nodes ;neghborsof n V n montor the packet forwardng. Then, j V n+ s elected to contnue packet forwardng. Therefore, node updates ts Q-values as Q t+, (s t,at f,at m ) = ( α) Q t, (st,at f,at m ) +α(r t+ (s t+ )+γ ω s t V(s t )+γω sj t V(st j )), () where ω s t and ω s t j are, respectvely, factors that wegh the total payoff n V n and V n+ and V(s t ) s the maxmum payoff expressed by V (s t ) = max a t f C t (st,a t m ) Q t N (s), (st,a t f,at m ), () a t m where C t (st,a t m ) counts the number of tmes agent observed agent takng acton a m n state s at packet t and N(s) s the total counts for all agents takng acton a m n state s. Therefore, C t (st,a t m )/N(s) s the probablty n whch the nodes other than wll select jont acton a m for packet t based on past experence. So, for V n f agent chooses a m acton, then C t+ (st,a t m )=Ct (st,a t m )+, N(s) =N(s) +. (3) Equaton () shows that the Q-value of node s a weghed sum of the Q-value of node at the prevous state, the acton s mmedate reward and the maxmum payoff of the group V n+ and the maxmum payoff of the group V n. () Reward functon: the reward functon s defned as follows: r = (( j Vn E j /N Vn ) E ) (( j Vn E j /N Vn ) mn j Vn E j ), (4a) r = RSSI,V n+ RSSI Vn,V n+ σ N Vn. (4b) Equaton (4a) susedtocalculatetherewardwhen the packet forwardng s successful, where E represents the consumed energy for node of the group V n. So, nodes wth less energy consumpton wll receve postve rewards, and nodes wth more energy consumpton wll receve negatve rewards. Equaton (4b) susedtocalculatetherewardwhenthe packet forwardng fals. The parameter σ takes for the node that faled to forward data packet, whereas for the other nodes, t takes. So, the forwardng-node wll receve a negatve reward. The other nodes n V n wll receve postve reward accordng to ther RSSI values. In the opponent modelng case, all nodes n V n are actng n a fully compettve task. So, the total sum of the attrbuted rewards to all cooperatve nodes s zero. After a certan number of teratons, nodes n V n are able tousethelearnedpolcytotakeapproprateactons..5. Complexty Analyss. As notced n the prevous subsectons, RL algorthms are composed of two man phases: () updatng phase of the Q-values for each agent; () node electon for data forwardng. For the Q-learnng algorthm, the updatng phase s realzed through (4). The algorthm complexty concernng the QvalueupdatngsthenequaltoN. Forthenodeelectonphase,thenodewththehghestQvalue s elected for data forwardng: a f = arg maxq. (5)

6 6 The Scentfc World Journal So, the algorthm complexty concernng node electon equals N. Therefore, the algorthm complexty of the Qlearnng algorthm equals to N+N. For the opponent modelng algorthm, the updatng phase s realzed through (). The algorthm complexty concernng the Q-value updatng s then equal to N (N ). Forthenodeelectonphase,thenodewththehghest payoff s elected for data forwardng: a f = arg max a t m C (s t,a t m ) Q t N (s), (st,a t f,at m ). (6) So, the algorthm complexty concernng node electon equals N. Therefore, the algorthm complexty of the Qlearnng algorthm equals N N. 3. Performance Evaluaton 3.. Smulaton Envronment. For performance evaluaton, we use TOSSIM smulaton platform n order to evaluate parameters of nterest such as energy consumpton. TOSSIM s a dscrete event smulator for TnyOS sensor networks that bulds drectly from the same TnyOS code wrtten for the actual motes. We smulate dfferent topologes, szes of WSN, and channel envronment parameters (path loss and shadowng effects). The snk node s also placed n dfferent postons. Smulaton results concern network lfetme, packet delay (average delay to the snk, percentage of delayed packets, and percentage of lost packets), and energy consumpton (network energy consumpton and maxmal energy consumpton per node). Performance of RSSI/energy-CC algorthm s compared each tme to MRL-CC algorthm. The applcaton of wldfre requres specal measurement and transmsson of temperature. Other parameters may be useful as mosture but are not consdered n ths paper. The amount of nformaton transmtted s therefore lkely to be low data rate. The area to cover, the forest, can be of dfferent shapes. It can even be sparse. In ths paper, we consder two dfferent deployment archtectures: unform deployment and crcular deployment. In the forest envronment, the transmsson of nformaton between dfferent sensors can be sgnfcantly affected by thepresenceoftrees.toevaluatetheeffectofthsdstorton on the qualty of the proposed approach, we have also smulated the network n the presence of shadowng effect modelng ths type of fadng. In Table, we gve the parameters fxed for smulatng the dfferent versons of the algorthms. 3.. Smulaton Results 3... Unform Deployment. We smulate a WSN where 8 sensor nodes are unformly dstrbuted n a 8 m 8 m area (dstance between successve nodes s m). The snk node s placed accordng to three dfferent topologes (Fgure 4). Table : Smulaton parameters. Packet delvery every mllseconds Packet sze 7 Bytes Reforwardng tme ms Communcaton range 3 m Intal battery energy L-on AA batteres Path-loss exponent Shadowng standard devaton db MAC object CSMA protocol Node used for smulaton Mca platform Table : Network lfetme (n days) tll the frst node des. Network archtecture A B C MRL-CC RSSI/energy CC (a) Packet Delay Analyss. We compute n Fgure 5 the average delay to the snk, percentage of delayed packets, and percentage of lost packets. The smulaton results show that for noncooperatve algorthm, the percentage of lost packets s huge compared to the MRL-CC algorthm and the RSSI/energy CC algorthm. However,ntermsofpercentageofdelayedpacketsand average delay to the snk, the RSSI/energy-CC algorthm s lower than the MRL-CC algorthm. Ths s due to the fact that RSSI/energy-CC algorthm reles on the average lnk qualty between the CN groups, whch s performng at the same tme n a compettve context. Ths compettve task allows a CN group to elect the node wth the best RSSI for packet transmsson. (b) Energy Consumpton n a Cooperatve Node Group. Fgure 6 presents the selected CN groups for data transmsson from node 4 to the snk node (topology B s consdered). We dsplay the resdual battery energy for each selected CN group n Fgure 7, and we compare energy consumpton behavor between the MRL-CC algorthm and the RSSI/energy-CC algorthm. Fgure 7 shows that the behavor of energy consumpton for each CN group s dfferent when comparng MRL-CC algorthm and RSSI/energy-CC algorthm. For nodes whch belong to the same CN group, the resdual energy s more balanced for the RSSI/energy-CC algorthm. Thus, energy consumpton s saved for each node n each CN group. (c) WSN Lfetme. Network lfetme s defned as the tme when the frst node s battery s out of energy. For our case, we have compared the MRL-CC algorthm to the RSSI/energy- CC algorthm, computng at the same tme the total energy consumednthewsn(nj).resultsaregvenntable. We also present n Table 3 the maxmal lfetme durng whch all sensors can transmt to the snk node. We can notce from Tables and 3 that network lfetme s enhanced when comparng MRL-CC algorthm to

7 The Scentfc World Journal 7 (A) (B) (C) Fgure 4: Snk node (n black) placement for topologes (A), (B), and (C). Average packet delay to reach the snk node (ms) Number of hops from the snk node Delayed packets (%) Number of hops from the snk node RSSI/energy algorthm MRLCC algorthm Noncooperatve RSSI/energy algorthm MRLCC algorthm Noncooperatve (a) (b) Lost packets (%) Number of hops from the snk node RSSI/energy algorthm MRLCC algorthm Noncooperatve (c) Fgure 5: Average delay to the snk, percentage of delayed packets, and percentage of lost packets by averagng on the number of nodes beng away wth the same number of hops from the snk node. Table 3: Network lfetme (n days) tll the WSN cannot transmt to the snk node. Network archtecture A B C MRL-CC 78 5 RSSI/energy CC RSSI/energy-CC algorthm. Ths enhancement s certanly duetosomeenergysavngsnthenetwork. (d) WSN Energy Consumpton. We frst nvestgate energy consumpton n the whole network. A comparson between the dfferent network archtectures for the two algorthms s presented n Fgure8. Comparng network archtectures, we conclude that C has the lowest energy consumpton compared to A and B. So, network lfetme for C s the longest. Smulatonresultsalsoshowthatwhencomparngnetwork energy consumpton between the two algorthms for the same network archtecture, network energy consumpton s saved for the RSSI/energy CC algorthm compared to the MRL-CCalgorthm.ThssbecausetheRSSIsconsdered for the decson of the node electon for packet forwardng.

8 8 The Scentfc World Journal Network energy consumpton (J) % 3.33%.8% 8.96%.8% 8.34% 4.% 8.7% 9% 5.43% Fgure 6: Selected CN groups for data transmsson from source node 4 (n red) to snk node 76 (n black). Node resdual energy (J) MRL-CC RSSI/energy- CC MRL-CC RSSI/energy- RSSI/energy- CC MRL-CC CC Tme (days) MRL-CC algorthm for network A MRL-CC algorthm for network B MRL-CC algorthm for network C RSSI/energy CC algorthm for network A RSSI/energy CC algorthm for network B RSSI/energy CC algorthm for network C Fgure 8: Network energy consumpton, comparson between network archtectures for MRL-CC and E/RSSI CC algorthm. Table 4: Network lfetme (n days) tll the frst node des. Network archtecture MRL-CC RSSI/energy CC Node ID After 6 days After 4 days After days Intal battery energy Table 5: Network lfetme (n days) tll the WSN can not transmt to the snk node. Network archtecture MRL-CC RSSI/energy CC Fgure 7: Energy consumpton comparson for each selected CN group between MRL-CC algorthm and RSSI/energy-CC algorthm. Network energy consumpton s saved from 3.33% to 5.9% for network A, from.8% to 6.3% for network B, and from 5.38% to 9.76% for network C. Atthesametme,wecomparethemaxmumenergy consumpton per node n the network, for the two algorthms. For each archtecture, we obtan the charts presented n Fgure 9. Thesmulatonresultsshowthatthemaxmumenergy consumpton per node s reduced for the RSSI/energy CC algorthm compared to MRL-CC algorthm. Ths s due to takng nto account the energy consumpton for the cooperatve group before makng the decson for node electon. The maxmal energy consumpton s saved from 9.56% to.6% for network A, from.5% to 3.3% for network B, and from.79% to 4.76% for network C. So, we can conclude that network lfetme enhancement s due to the enhancement of node s lfetme wth maxmal energy consumpton. In a second analyss of energy consumpton, we propose to show results for extended grd networks where the snk s placed n the center (alke to topology C). Results about lfetme are shown n Tables 4 and 5. We can notce from those tables that network lfetme s also enhanced for the RSSI/energy-CC algorthm. We also dsplay results about network energy consumpton n Fgure, and the maxmum energy consumpton per node n the network n Fgure. Comparng network archtecture, we conclude that 9 9 network has the lowest energy consumpton compared to 3 3 and networks. So, network lfetme for 9 9network s the longest. Smulaton results, n Fgure, also show that when comparng network energy consumpton between the two algorthms for the same network archtecture, the

9 The Scentfc World Journal 9 Maxmal energy consumpton (J) %.97%.89% 9.63%.%.57%.9%.47% 9.4% 4.4% 4.5% 4.37% 3.3% %.87%.79% Tme (days) MRL-CC algorthm for network A MRL-CC algorthm for network B MRL-CC algorthm for network C RSSI/energy CC algorthm for network A RSSI/energy CC algorthm for network B RSSI/energy CC algorthm for network C Fgure 9: Maxmal energy consumpton n the whole WSN, comparson between MRL-CC and E/RSSI-CC algorthms for dfferent network archtectures. Maxmal energy consumpton (J) Tme (days) MRL-CC algorthm for a 9 9network MRL-CC algorthm for a 3 3 network MRL-CC algorthm for a network RSSI/energy-CC algorthm for a 9 9network RSSI/energy-CC algorthm for a 3 3 network RSSI/energy-CC algorthm for a network Fgure : Maxmal energy consumpton n the whole WSN, comparson between MRL-CC and E/RSSI CC algorthms for dfferent network archtectures. 8 Network energy consumpton (J) Tme (days) MRL-CC algorthm for a 9 9network MRL-CC algorthm for a 3 3 network MRL-CC algorthm for a network RSSI/energy-CC algorthm for a 9 9network RSSI/energy-CC algorthm for a 3 3 network RSSI/energy-CC algorthm for a network Fgure : Network energy consumpton, comparson between network archtectures for MRL-CC and E/RSSI CC algorthms Fgure : WSN topology n crcles; snk node s at the center. network energy consumpton s saved for the RSSI/energy CC algorthm compared to the MRL-CC algorthm. Network energy consumpton s saved up to 9.49% for 9 9network, up to 6.78% for 3 3 network, and up to 6.8% for network. In Fgure, the smulaton results show that the maxmum energy per node s reduced for the RSSI/energy CC algorthm compared to MRL-CC algorthm. Thus, the maxmal energy consumpton s saved up to 7.7% for 9 9 network, up to 4.% for 3 3 network, and up to 4.% for network.

10 The Scentfc World Journal Network energy consumpton (J) Network energy consumpton for network n crcles for 5 MRL-CC and RSSI/energy CC algorthms 8 7.7% 5.9% % 7.36% 4.89% 4 8.4% 9.89% 3.69% 34.36% 39.4% Tme (days) MRL-CC algorthm RSSI/energy CC algorthm (a) Maxmal energy consumpton (J) Maxmal energy consumpton for network n crcles for 4 MRL-CC and RSSI/energy CC algorthms.5 8.7% %3.57%3.4% 3.57% 3.9% 8.7%8.6% % 33.35% Tme (days) MRL-CC algorthm RSSI/energy CC algorthm (b) Fgure 3: Network energy consumpton and maxmal energy consumpton for network n form of crcles, for MRL-CC algorthm and RSSI/energy CC algorthm Network lfetme (days) Shadowng standard devaton (db) MRL-CC n=3 MRL-CC n=4 RSSI/energy CC n=3 RSSI/energy CC n=4 Fgure 4: Network lfetme (archtecture C) for dfferent number of path losses, n, and dfferent shadowng standard devaton, for the MRL-CC and the RSSI/energy algorthms Energy Consumpton for Crcular Topology. We also smulated our algorthms n the form of crcles presented n Fgure. The dstance between crcles s meters. Energy smulatons for the network n crcles for the two algorthms are presented n Fgure 3. The network lfetme for MRL-CC algorthm s 8 days. However, for the RSSI/energy CC algorthm, the network lfetme s 47 days. The gan n network lfetme s very valuable due to the specal network topology. Network energy consumpton savngs go from 4.69% up to 39.4%. Also, for maxmal energy consumpton, savngs are gong from 8.6% up to 35.53% Shadowng and Path-Loss Effect. We propose to use the network archtecture C (unform deployment) to smulate the network lfetme when path-loss number takes the values: n= 3 and 4, and shadowng devaton takes the values: σ=,4 and 6 db. Smulaton results are shown n Fgure 4. It s obvously clear that the network lfetme s reduced when the path-loss value ncreases and when the shadowng devaton ncreases. Ths result s both for the MRL-CC and the RSSI/energy CC algorthms. From that fgure, we can also conclude that the RSSI/energy CC algorthm performs better than the MRL-CC algorthm n terms of network lfetme.

11 The Scentfc World Journal 4. Conclusons To help automatc montorng of wldfre, we propose n ths paper to deploy WSN. To desgn and optmze the routng protocol used for data aggregaton n ths network, we propose a new algorthm: the RSSI/energy-CC. Ths algorthm corresponds to the renforcement learnng optmzaton approach takng nto account energy consumpton and lnk qualty measured by the RSSI, performng n a compettve task. Smulatons had shown that ths algorthm s effcent n terms of percentage of lost packets, network energy consumpton, maxmal energy consumpton per node, and network lfetme. In future research, we wll consder both the case of multple snks n the WSN n order to better process network energy consumpton and better enhance the network lfetme and sparse deployment whch descrbes better the forest envronment. [8] W. Uther and M. Veloso, Adversaral renforcement learnng, n Proceedngs of the AAAI Fall Symposum on Model Drected Autonomous Systems,997. Acknowledgment The research leadng to these results has receved fundng from the European Communty s Seventh Framework Programme (FP7-ENV-9-) under Grant agreement no. FP7-ENV-4488 FIRESENSE Fre Detecton and Management through a Mult-Sensor Network for the Protecton of Cultural Hertage Areas from the Rsk of Fre and Extreme Weather. References [] X. Lang, M. Chen, Y. Xao, I. Balasngham, and V. C. M. Leung, MRL-CC: a novel cooperatve communcaton protocol for QoS provsonng n wreless sensor networks, Internatonal Journal of Sensor Networks,vol.8,no.,pp.98 8,. [] C.-K. Tham and J.-C. Renaud, Mult-agent systems on sensor networks: a dstrbuted renforcement learnng approach, n Proceedngs of the Intellgent Sensors, Sensor Networks and Informaton Processng Conference, pp , Melbourne, Australa, December 5. [3] A. Nosratna, T. E. Hunter, and A. Hedayat, Cooperatve communcaton n wreless networks, IEEE Communcatons Magazne,vol.4,no.,pp.74 8,4. [4] L.P.Kaelblng,M.L.Lttman,andA.W.Moore, Renforcement learnng: a survey, Journal of Artfcal Intellgence Research,vol. 4, pp , 996. [5] L. Buşonu, R. Babuška, and B. De Schutter, A comprehensve survey of multagent renforcement learnng, IEEE Transactons on Systems, Man and Cybernetcs C,vol.38,no.,pp.56 7, 8. [6]M.Chen,T.Kwon,S.Mao,Y.Yuan,andV.Leung, Relable and energy-effcent routng protocol n dense wreless sensor networks, Internatonal Journal on Sensor Networks,vol.4,no., pp. 4 7, 8. [7] M. Maalej, H. Besbes, and S. Cherf, A cooperatve communcaton protocol for savng energy consumpton n WSNs, n Proceedngs of the IEEE 3rd Internatonal Conference on Communcatons and Networkng (ComNet ), pp. 5, Hammamet, Tunsa,.

12 Internatonal Journal of Rotatng Machnery Engneerng Journal of The Scentfc World Journal Internatonal Journal of Dstrbuted Sensor Networks Journal of Sensors Journal of Control Scence and Engneerng Advances n Cvl Engneerng Submt your manuscrpts at Journal of Journal of Electrcal and Computer Engneerng Robotcs VLSI Desgn Advances n OptoElectroncs Internatonal Journal of Navgaton and Observaton Chemcal Engneerng Actve and Passve Electronc Components Antennas and Propagaton Aerospace Engneerng Internatonal Journal of Internatonal Journal of Internatonal Journal of Modellng & Smulaton n Engneerng Shock and Vbraton Advances n Acoustcs and Vbraton

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks 2007 Internatonal Conference on Convergence Informaton Technology An Adaptve and Dstrbuted Clusterng Scheme for Wreless Sensor Networs Xnguo Wang, Xnmng Zhang, Guolang Chen, Shuang Tan Department of Computer

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;

More information

Energy Conserving Routing in Wireless Ad-hoc Networks

Energy Conserving Routing in Wireless Ad-hoc Networks Energy Conservng Routng n Wreless Ad-hoc Networks Jae-Hwan Chang and Leandros Tassulas Department of Electrcal and Computer Engneerng & Insttute for Systems Research Unversty of Maryland at College ark

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11

MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11 Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 MAC Layer Servce Tme Dstrbuton of a Fxed Prorty Real Tme Scheduler over 80. Inès El Korb Ecole Natonale des Scences de

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

LAMOR: Lifetime-Aware Multipath Optimized Routing Algorithm for Video Transmission over Ad Hoc Networks

LAMOR: Lifetime-Aware Multipath Optimized Routing Algorithm for Video Transmission over Ad Hoc Networks LAMOR: Lfetme-Aware Multpath Optmzed Routng Algorthm for Vdeo ransmsson over Ad Hoc Networks 1 Lansheng an, Lng Xe, Kng-m Ko, Mng Le and Moshe Zukerman Abstract Multpath routng s a key technque to support

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Improved SVM in Cloud Computing Information Mining

Improved SVM in Cloud Computing Information Mining Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu

More information

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks Master s Thess Ttle Confgurng robust vrtual wreless sensor networks for Internet of Thngs nspred by bran functonal networks Supervsor Professor Masayuk Murata Author Shnya Toyonaga February 10th, 2014

More information

An Efficient Recovery Algorithm for Coverage Hole in WSNs

An Efficient Recovery Algorithm for Coverage Hole in WSNs An Effcent Recover Algorthm for Coverage Hole n WSNs Song Ja 1,*, Wang Balng 1, Peng Xuan 1 School of Informaton an Electrcal Engneerng Harbn Insttute of Technolog at Weha, Shanong, Chna Automatc Test

More information

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks Fuzzy Set Approach To Asymmetrcal Load Balancng n Dstrbuton Networks Goran Majstrovc Energy nsttute Hrvoje Por Zagreb, Croata goran.majstrovc@ehp.hr Slavko Krajcar Faculty of electrcal engneerng and computng

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

Ants Can Schedule Software Projects

Ants Can Schedule Software Projects Ants Can Schedule Software Proects Broderck Crawford 1,2, Rcardo Soto 1,3, Frankln Johnson 4, and Erc Monfroy 5 1 Pontfca Unversdad Católca de Valparaíso, Chle FrstName.Name@ucv.cl 2 Unversdad Fns Terrae,

More information

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton

More information

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com G. G. Md. Nawaz Al 1,2, Rajb Chakraborty 2, Md. Shhabul Alam 2 and Edward Chan 1 1 Cty Unversty of Hong Kong, Hong Kong, Chna taposh_kuet20@yahoo.comcsedchan@ctyu.edu.hk 2 Khulna Unversty of Engneerng

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

Distributed Multi-Target Tracking In A Self-Configuring Camera Network

Distributed Multi-Target Tracking In A Self-Configuring Camera Network Dstrbuted Mult-Target Trackng In A Self-Confgurng Camera Network Crstan Soto, B Song, Amt K. Roy-Chowdhury Department of Electrcal Engneerng Unversty of Calforna, Rversde {cwlder,bsong,amtrc}@ee.ucr.edu

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET)

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET) Renforcement Learnng for Qualty of Servce n Moble Ad Hoc Network (MANET) *T.KUMANAN AND **K.DURAISWAMY *Meenaksh College of Engneerng West K.K Nagar, Cheena-78 **Dean/academc,K.S.R College of Technology,Truchengode

More information

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

A Dynamic Load Balancing for Massive Multiplayer Online Game Server A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu

More information

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr Proceedngs of the 41st Internatonal Conference on Computers & Industral Engneerng BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK Yeong-bn Mn 1, Yongwoo Shn 2, Km Jeehong 1, Dongsoo

More information

A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS

A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS Bamasak & Zhang: A Dstrbuted Reputaton Management Scheme for Moble Agent-Based Applcatons A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS Omama Bamasak School of Computer

More information

Inter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007.

Inter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. Inter-Ing 2007 INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. UNCERTAINTY REGION SIMULATION FOR A SERIAL ROBOT STRUCTURE MARIUS SEBASTIAN

More information

Ad-Hoc Games and Packet Forwardng Networks

Ad-Hoc Games and Packet Forwardng Networks On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang

More information

ECE544NA Final Project: Robust Machine Learning Hardware via Classifier Ensemble

ECE544NA Final Project: Robust Machine Learning Hardware via Classifier Ensemble 1 ECE544NA Fnal Project: Robust Machne Learnng Hardware va Classfer Ensemble Sa Zhang, szhang12@llnos.edu Dept. of Electr. & Comput. Eng., Unv. of Illnos at Urbana-Champagn, Urbana, IL, USA Abstract In

More information

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks : An Adaptve, Anycast MAC Protocol for Wreless Sensor Networks Hwee-Xan Tan and Mun Choon Chan Department of Computer Scence, School of Computng, Natonal Unversty of Sngapore {hweexan, chanmc}@comp.nus.edu.sg

More information

Energy Efficient Coverage Optimization in Wireless Sensor Networks based on Genetic Algorithm

Energy Efficient Coverage Optimization in Wireless Sensor Networks based on Genetic Algorithm Unversal Journal of Communcatons and Network 3(4): 82-88, 2015 DOI: 10.13189/ujcn.2015.030402 http://www.hrpub.org Energy Effcent Coverage Optmzaton n Wreless Sensor Networks based on Genetc Algorthm Al

More information

Learning the Best K-th Channel for QoS Provisioning in Cognitive Networks

Learning the Best K-th Channel for QoS Provisioning in Cognitive Networks 000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

Resource Scheduling in Desktop Grid by Grid-JQA

Resource Scheduling in Desktop Grid by Grid-JQA The 3rd Internatonal Conference on Grd and Pervasve Computng - Worshops esource Schedulng n Destop Grd by Grd-JQA L. Mohammad Khanl M. Analou Assstant professor Assstant professor C.S. Dept.Tabrz Unversty

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

An Ad Hoc Network Load Balancing Energy- Efficient Multipath Routing Protocol

An Ad Hoc Network Load Balancing Energy- Efficient Multipath Routing Protocol 246 JOURNA OF SOFTWAR, VO. 9, NO. 1, JANUARY 2014 An Ad Hoc Network oad alancng nergy- ffcent Multpath Routng Protocol De-jn Kong Shanx Fnance and Taxaton College, Tayuan, Chna mal: dejnkong@163.com Xao-lng

More information

Testing and Debugging Resource Allocation for Fault Detection and Removal Process

Testing and Debugging Resource Allocation for Fault Detection and Removal Process Internatonal Journal of New Computer Archtectures and ther Applcatons (IJNCAA) 4(4): 93-00 The Socety of Dgtal Informaton and Wreless Communcatons, 04 (ISSN: 0-9085) Testng and Debuggng Resource Allocaton

More information

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE

More information

A Programming Model for the Cloud Platform

A Programming Model for the Cloud Platform Internatonal Journal of Advanced Scence and Technology A Programmng Model for the Cloud Platform Xaodong Lu School of Computer Engneerng and Scence Shangha Unversty, Shangha 200072, Chna luxaodongxht@qq.com

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre

More information

TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things

TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things DOI: 10.2298/CSIS110303056C TRM-IoT: A Trust Management Model Based on Fuzzy Reputaton for Internet of Thngs Dong Chen 1, Guran Chang 2, Dawe Sun 1, Jaa L 1, Je Ja 1, and Xngwe Wang 1 1 College of Informaton

More information

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center Dynamc Resource Allocaton and Power Management n Vrtualzed Data Centers Rahul Urgaonkar, Ulas C. Kozat, Ken Igarash, Mchael J. Neely urgaonka@usc.edu, {kozat, garash}@docomolabs-usa.com, mjneely@usc.edu

More information

Hosting Virtual Machines on Distributed Datacenters

Hosting Virtual Machines on Distributed Datacenters Hostng Vrtual Machnes on Dstrbuted Datacenters Chuan Pham Scence and Engneerng, KyungHee Unversty, Korea pchuan@khu.ac.kr Jae Hyeok Son Scence and Engneerng, KyungHee Unversty, Korea sonaehyeok@khu.ac.kr

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

Credit Limit Optimization (CLO) for Credit Cards

Credit Limit Optimization (CLO) for Credit Cards Credt Lmt Optmzaton (CLO) for Credt Cards Vay S. Desa CSCC IX, Ednburgh September 8, 2005 Copyrght 2003, SAS Insttute Inc. All rghts reserved. SAS Propretary Agenda Background Tradtonal approaches to credt

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

Load Balancing By Max-Min Algorithm in Private Cloud Environment

Load Balancing By Max-Min Algorithm in Private Cloud Environment Internatonal Journal of Scence and Research (IJSR ISSN (Onlne: 2319-7064 Index Coperncus Value (2013: 6.14 Impact Factor (2013: 4.438 Load Balancng By Max-Mn Algorthm n Prvate Cloud Envronment S M S Suntharam

More information

The Load Balancing of Database Allocation in the Cloud

The Load Balancing of Database Allocation in the Cloud , March 3-5, 23, Hong Kong The Load Balancng of Database Allocaton n the Cloud Yu-lung Lo and Mn-Shan La Abstract Each database host n the cloud platform often has to servce more than one database applcaton

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

Towards a Formal Framework for Multi-Objective Multi-Agent Planning

Towards a Formal Framework for Multi-Objective Multi-Agent Planning Towards a Formal Framework for Mult-Objectve Mult-Agent Plannng Abdel-Illah Mouaddb, Matheu Boussard, Maroua Bouzd Maréchal Jun, Campus II BP 5186 Computer Scence Department 14032 Caen Cedex, France (mouaddb,mboussar,bouzd@nfo.uncaen.fr

More information

Document Clustering Analysis Based on Hybrid PSO+K-means Algorithm

Document Clustering Analysis Based on Hybrid PSO+K-means Algorithm Document Clusterng Analyss Based on Hybrd PSO+K-means Algorthm Xaohu Cu, Thomas E. Potok Appled Software Engneerng Research Group, Computatonal Scences and Engneerng Dvson, Oak Rdge Natonal Laboratory,

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

Research on Privacy Protection Approach for Cloud Computing Environments

Research on Privacy Protection Approach for Cloud Computing Environments , pp. 113-120 http://dx.do.org/10.14257/jsa.2015.9.3.11 Research on Prvacy Protecton Approach for Cloud Computng Envronments Xaohu L 1,2, Hongxng Lang 3 and Dan Ja 1 1 College of Electrcal and Informaton

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

Agile Traffic Merging for Data Center Networks. Qing Yi and Suresh Singh Portland State University, Oregon June 10 th, 2014

Agile Traffic Merging for Data Center Networks. Qing Yi and Suresh Singh Portland State University, Oregon June 10 th, 2014 Agle Traffc Mergng for Data Center Networks Qng Y and Suresh Sngh Portland State Unversty, Oregon June 10 th, 2014 Agenda Background and motvaton Power optmzaton model Smulated greedy algorthm Traffc mergng

More information

Complex Service Provisioning in Collaborative Cloud Markets

Complex Service Provisioning in Collaborative Cloud Markets Melane Sebenhaar, Ulrch Lampe, Tm Lehrg, Sebastan Zöller, Stefan Schulte, Ralf Stenmetz: Complex Servce Provsonng n Collaboratve Cloud Markets. In: W. Abramowcz et al. (Eds.): Proceedngs of the 4th European

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

Evaluation of Coordination Strategies for Heterogeneous Sensor Networks Aiming at Surveillance Applications

Evaluation of Coordination Strategies for Heterogeneous Sensor Networks Aiming at Surveillance Applications Evaluaton of Coordnaton Strateges for Heterogeneous Sensor Networs Amng at Survellance Applcatons Edson Pgnaton de Fretas, *, Tales Hemfarth*, Carlos Eduardo Perera*, Armando Morado Ferrera, Flávo Rech

More information

Conversion between the vector and raster data structures using Fuzzy Geographical Entities

Conversion between the vector and raster data structures using Fuzzy Geographical Entities Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

Control Charts with Supplementary Runs Rules for Monitoring Bivariate Processes

Control Charts with Supplementary Runs Rules for Monitoring Bivariate Processes Control Charts wth Supplementary Runs Rules for Montorng varate Processes Marcela. G. Machado *, ntono F.. Costa * * Producton Department, Sao Paulo State Unversty, Campus of Guaratnguetá, 56-4 Guaratnguetá,

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

Optimal Choice of Random Variables in D-ITG Traffic Generating Tool using Evolutionary Algorithms

Optimal Choice of Random Variables in D-ITG Traffic Generating Tool using Evolutionary Algorithms Optmal Choce of Random Varables n D-ITG Traffc Generatng Tool usng Evolutonary Algorthms M. R. Mosav* (C.A.), F. Farab* and S. Karam* Abstract: Impressve development of computer networks has been requred

More information

A role based access in a hierarchical sensor network architecture to provide multilevel security

A role based access in a hierarchical sensor network architecture to provide multilevel security 1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

Damage detection in composite laminates using coin-tap method

Damage detection in composite laminates using coin-tap method Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

Blind Estimation of Transmit Power in Wireless Networks

Blind Estimation of Transmit Power in Wireless Networks Bln Estmaton of Transmt Power n Wreless Networks Murtaza Zafer (IBM Research), Bongjun Ko (IBM Research), Chatschk Bskan (IBM Research) an Ivan Ho (Imperal College, UK) Transmt-power Estmaton: Problem

More information

LIFETIME INCOME OPTIONS

LIFETIME INCOME OPTIONS LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com

More information

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network On Fle Delay Mnmzaton for Content Uploadng to Meda Cloud va Collaboratve Wreless Network Ge Zhang and Yonggang Wen School of Computer Engneerng Nanyang Technologcal Unversty Sngapore Emal: {zh0001ge, ygwen}@ntu.edu.sg

More information

Automated information technology for ionosphere monitoring of low-orbit navigation satellite signals

Automated information technology for ionosphere monitoring of low-orbit navigation satellite signals Automated nformaton technology for onosphere montorng of low-orbt navgaton satellte sgnals Alexander Romanov, Sergey Trusov and Alexey Romanov Federal State Untary Enterprse Russan Insttute of Space Devce

More information

Single and multiple stage classifiers implementing logistic discrimination

Single and multiple stage classifiers implementing logistic discrimination Sngle and multple stage classfers mplementng logstc dscrmnaton Hélo Radke Bttencourt 1 Dens Alter de Olvera Moraes 2 Vctor Haertel 2 1 Pontfíca Unversdade Católca do Ro Grande do Sul - PUCRS Av. Ipranga,

More information

Self-Motivated Relay Selection for a Generalized Power Line Monitoring Network

Self-Motivated Relay Selection for a Generalized Power Line Monitoring Network Self-Motvated Relay Selecton for a Generalzed Power Lne Montorng Network Jose Cordova and Xn Wang 1, Dong-Lang Xe 2, Le Zuo 3 1 Department of Electrcal and Computer Engneerng, State Unversty of New York

More information

An Intelligent Policy System for Channel Allocation of Information Appliance

An Intelligent Policy System for Channel Allocation of Information Appliance Tamkang Journal of Scence and Engneerng, Vol. 5, No., pp. 63-68 (2002) 63 An Intellgent Polcy System for Channel Allocaton of Informaton Applance Cheng-Yuan Ku, Chang-Jnn Tsao 2 and Davd Yen 3 Department

More information

Adaptive and Dynamic Load Balancing in Grid Using Ant Colony Optimization

Adaptive and Dynamic Load Balancing in Grid Using Ant Colony Optimization Sandp Kumar Goyal et al. / Internatonal Journal of Engneerng and Technology (IJET) Adaptve and Dynamc Load Balancng n Grd Usng Ant Colony Optmzaton Sandp Kumar Goyal 1, Manpreet Sngh 1 Department of Computer

More information

Stochastic Games on a Multiple Access Channel

Stochastic Games on a Multiple Access Channel Stochastc Games on a Multple Access Channel Prashant N and Vnod Sharma Department of Electrcal Communcaton Engneerng Indan Insttute of Scence, Bangalore 560012, Inda Emal: prashant2406@gmal.com, vnod@ece.sc.ernet.n

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com

More information