Distributed Monitoring and Aggregation in Wireless Sensor Networks

Size: px
Start display at page:

Download "Distributed Monitoring and Aggregation in Wireless Sensor Networks"

Transcription

1 Ditributed Monitoring and Aggregation in Wirele Senor Network Changlei Liu and Guohong Cao Department of Computer Science & Engineering The Pennylvania State Univerity {chaliu, Abtract Self-monitoring the enor tatue uch a livene, node denity and reidue energy i critical for maintaining the normal operation of the enor network. When building the monitoring architecture, mot exiting work focue on minimizing the number of monitoring node. However, with le monitoring point, the fale alarm rate may increae a a conequence. In thi paper, we tudy the fundamental tradeoff between the number of monitoring node and the fale alarm rate in the wirele enor network. Specifically, we propoe fully ditributed monitoring algorithm, to build up a -pollee baed architecture with the objective to minimize the number of overall while bounding the fale alarm rate. Baed on the etablihed monitoring architecture, we further explore the hop-by-hop aggregation opportunity along the multihop path from the polee to the, with the objective to minimize the monitoring overhead. We how that the optimal aggregation path problem i NP-hard and propoe an opportunitic greedy algorithm, which achieve an approximation ratio of 4.Afar a we know, thi i the firt proved contant approximation ratio applied to the aggregation path election cheme over the wirele enor network. I. INTRODUCTION A enor node uually operate in an unattended, harh environment, they are prone to failure and may run out of battery [], []. To make enor network reliable a well a adaptable, enor tatu (uch a livene, denity etimation, reidue energy, etc.) ha to be cloely monitored and made known to the ink, which can promptly react to enor tatu change. In ditributed ytem, the only way to learn the tatu of a node i through receiving meage from the node. For example, in IP network, the -pollee tructure [0] ha been widely ued for network management, where ome pecialized node are called and the other node are called pollee. Each monitor it pollee by actively ending a ping meage and then waiting for the reply or by paively waiting for the pollee to end meage periodically. Compared with the wired network, deigning monitoring mechanim for enor network ha more challenge. One major challenge i that intead of over a fixed topology, enor need to elf-organize themelve into a monitoring architecture in a ditributed manner. Therefore, ditributed monitoring i a critical and challenging iue. In thi paper, we propoe olution to addre the challenge pecific to enor network, to deign a fault tolerant, energy efficient monitoring ytem in a ditributed manner. The whole architecture i build upon the -pollee tructure, where Thi work wa upported in part by National Science Foundation under grant CNS-0. enor elf-organize themelve into two tier, with pollee in the lower tier and in the upper tier. The pollee end tatu report to the along multihop path, during which the intermediate node do the aggregation to reduce the meage overhead. Each make local deciion baed on the received aggregated packet, and forward it deciion toward the ink. When building the monitoring architecture, we focu on the fundamental tradeoff between the number of monitoring node (i.e., ) and the fale alarm rate. Mot of the previou work target at minimizing the number of only, becaue electing more will enhance the difficulty of tracking the tatu of each and thu increae the network management cot [0]. However, in a loy environment, the fale alarm rate can be adverely affected by a maller number of. For example, if the number of i too mall, ome pollee will be too far away from the, and then the chance of link tranient failure will be higher and the fale alarm rate will be larger. To balance the tradeoff between the number of and fale alarm rate, we propoe a ditributed determinitic algorithm, which ue two parameter k,k to guide a better ditribution of and pollee; i.e., no two are le than k hop away from each other, and no pollee i more than k hop away from it. Thi property enable u to minimize the number of while bounding the maximum fale alarm rate. We dicu how to et up thee parameter and further reduce the meage overhead baed on a randomized technique. To increae the energy efficiency and reduce the monitoring overhead, we take the hop-by-hop aggregation opportunitie in enor network. When pollee, which can be multiple hop away from the, end tatu report to their, the tatu report can be aggregated to reduce the number of packet needed. It i nontrivial to determine which aggregation path hould be ued in order to achieve better aggregation. For example, a hown in Fig., the aggregation ratio (), which i defined a the number of tatu report that can be aggregated into one packet, i. Each of the four pollee end a report to the ame periodically. Fig. how that without aggregation, 4 packet will be needed for each period, with a cot of packet-hop. If the report are aggregated along the path hown in Fig., all 4 report can be packed into packet, with a cot of packet-hop. If the aggregation path of Fig. (c) i ued, only packet are needed, with a total of 4 packet-hop. In thi paper, we formulate the election of the optimal aggregation path to minimize the tranmiion energy a a NP-hard problem, and prove that an opportunitic greedy

2 forwarding cheme ha an approximation ratio of 4.Wealo prove that if the pollee i within hop of the, i.e., k =, the bounded ratio i +. (c) Fig.. An example to illutrate the benefit of aggregation: without aggregation aggregation path I (c) aggregation path II, where each line denote a phyical link, and each arrow denote a packet tranmiion over one hop (packet-hop) The ret of the paper i organized a follow. Section II preent the -pollee baed monitoring architecture. Section III formulate the minimum election problem and propoe the ditributed algorithm. Section IV focue on the optimal aggregation path problem, and tudie the greedy algorithm with contant approximation ratio. Performance evaluation are done in Section V. Section VI overview the related work and Section VII conclude the paper. Fig.. II. THE POLLER-POLLEE BASED MONITORING ARCHITECTURE The -pollee tructure reactive mode proactive mode Fig. how the two widely ued operational mode of the -pollee tructure, where each can either poll the pollee and wait for a reply (i.e., reactive mode) or let the pollee end report periodically (i.e., proactive mode). A the proactive mode cut the monitoring traffic by half compared with the reactive mode, we ue the proactive mode in thi paper. Each Link in Fig. i a logical link, which could be multiple hop of phyical link. A a reult, the tatu report detined to the ame have the opportunity to be aggregated at every intermediate node. To do aggregation, each intermediate node may have to wait for report to arrive from the downtream node. Due to the regular pattern of the monitoring traffic, the aggregation rule can be well defined without adding extra delay. The, pollee, and the phyical link between them form a tree. If a node i at the edge of the tree, it i called an edge node; otherwie it i called a non-edge node. Let t denote the polling time interval. For every time t, each pollee end a report to the. Suppoe the need time T d, referred to a the detection time, to detect a pollee failure. A fale alarm occur if a pollee doe not fail but the mie all it report within T d [], []. The Aggregation Aware Monitoring can be imply tated a follow. Each pollee chedule a report to the ame every t; each non-edge pollee collect report from each of it children and end an aggregated report (including it own) to the ame every t, with the aggregation ratio ; each make the deciion about each pollee tatu every T d, and inform the ink when neceary. It i required t T d. n0 r n n0 n n lot aggregation t t Td=t Td=t n time n n t Fig.. An example of the aggregation aited monitoring cheme. topology unynchronized chedule. The vertical arrow line denote the event of packet tranmiion/reception. Fig. ue an example to illutrate the -pollee baed monitoring. Fig. how the topology, where n 0 i the and n,n,n are the pollee. Fig. how the chedule at each node, where the vertical arrow line denote the event of packet tranmiion/reception. The time axe i divided into lice of polling interval t, and different node do not have to be ynchronized. Every t, n,n end report to n, which aggregate the received report with it own into one packet (aume ). With detection timer T d =t, the will receive two report every T d. Suppoe one report from n i lot, the may till receive another report during the next polling interval and will not have a fale alarm about n. Thu, there i a tradeoff between fale alarm rate and detection delay. To reduce the fale alarm rate, the detection timer T d hould be increaed, and vice vera. The fale alarm reult from the loy nature of the wirele link. The failure characteritic of the wirele link ha been tudied in [] by analyzing the packet trace over the real enor tetbed. Due to the oberved burty and tranient error pattern, the wirele link can be modeled a a continuou time Markov chain [], [8], and we have etablihed the relationhip between the fale alarm rate and ditance []. A our work focue on how to build a -pollee architecture, it i independent of the underneath link model. Therefore, we take the reult of [] and apply it here. Aume the link failure rate i f l, and ue F (h, T d ) to denote the fale alarm rate when the pollee i h hop away from the, and the detection timer at i T d. Fig. 4 how the fale alarm rate a a function of the number of hop from to pollee when f l =0.0. A can be een, the fale alarm rate increae a h increae, ince longer path i more vulnerable to failure. A T d increae, the fale alarm rate decreae. Thi i alo conitent with the reult of []. III. THE MINIMUM POLLER SELECTION PROBLEM In thi ection, we formulate the election problem a NP-hard and propoe ditributed algorithm. A. Problem Formulation We conider a network of n enor, where all enor are capable of being either or pollee. At firt hand, we time time time

3 fale alarm rate F(h, t) F(h, t) F(h, 4t) number of hop from to pollee (h) Fig. 4. Relationhip between the fale alarm rate and the ditance the number of meage n=000 n= the probablity ρ Fig.. Relationhip between ρ and meage overhead want to elect the minimum number of node a o that the management cot of can be minimized. On the other hand, if the number of i too mall, ome pollee will be many hop away from a, thu increaing the fale alarm rate. Therefore, our goal i to trike a balance between the number of and fale alarm rate. Since the may alo fail, we aociate each pollee with ω. Each pollee maintain pointer to the different but end tatu report to only one at a time. When the fail, the aociated pointer hould be outdated and the next on the lit will be ued. We formulate the election problem minpl, with the objective to minimize the number of while limiting the maximum fale alarm rate a follow. Given a network graph, the error rate of each link, determine () which node are and which node are pollee, () a many-to-many mapping where each node i aociated with ω, to minimize the total number of while limiting the maximum fale alarm rate of pollee. Theorem : The problem minpl i NP-Hard. Proof: The problem minpl can be proved to be NPhard via a reduction from the minimum k-hop dominating et problem [4], which can be een a a pecial cae of minpl when ω = and the link failure rate i contant. Thi i becaue according to Fig. 4, different hop number between pollee and correpond to different fale alarm rate. Therefore, atifying the contraint of maximum fale alarm rate i equivalent to limiting the maximum number of hop from pollee to. B. Ditributed Poller Selection Algorithm The contruction of -pollee tructure hare ome imilarity with the traditional clutering cheme, where a i imilar to a cluter head. However, there i fundamental difference between them. Firt, the traditional clutering cheme are ingle-hopped, but the pollee hould be within ome bounded hop of it. Second, with multihop between the and pollee, aggregation i ued to reduce the monitoring traffic, which i not conidered in clutering cheme. Third, each pollee may be aociated with ω to be fault tolerant, wherea each cluter member only ha one cluter head. Thu, the traditional clutering cheme i only a pecial cae of the ingle-hop -pollee tructure with ω =. Below, we firt propoe a ditributed determinitic election algorithm, and then preent a hybrid algorithm to further reduce the meage overhead. ) The Randomized Algorithm: The randomized algorithm i preented a a baeline for comparion. Each node elect itelf a a with probability ρ. Poller then announce their tatu within k hop. Senor node that did not elect themelve a will be pollee. The randomized algorithm i very imple, yet it may produce ome pathological cenario where multiple may cluter together in ome area and no exit in ome other area. To addre thi problem, we propoe a determinitic algorithm. Algorithm Determinitic Poller Selection Algorithm Input: agraphg(n, E),k,k Output: a Poller Set S er, a Pollee Set S ee Procedure: Determine(k,k ) : Initialize the tatu and the timer : Broadcat locally to get k -hop neighborhood information : if timer not expired then 4: if id i the mallet among k hop unlabeled neighbor then : broadcat ID = id within k hop, exit : /*S er = S er {id}*/ : end if 8: wait until a packet i received or the timer i expired : if ID received then 0: broadcat polleeid within k hop, exit : /*S ee = S ee {id}*/ : end if : if polleeid received then 4: update the unlabeled Lit within k hop, reet timer and go to 4 : end if : ele : go to 8: end if ) The Determinitic Algorithm: The propoed determinitic algorithm i baed on the ditributed maximal independent et (MIS) algorithm []. An Independent Set i a ubet of node among which there i no edge between any two node. The et i a MIS if no more edge can be added to generate a bigger independent et. In the determinitic algorithm, the concept of MIS i extended to the multihop environment. Two parameter k,k are ued to govern the ditribution of the and pollee, to enure that no two are le than k hop from each other and no pollee i more than k hop from it. That i, the et S er i a k -hop MIS, in which no two node are le than k hop away from each other. Since parameter k,k control the geometrical propertie of the and pollee ditribution, they hould be determined beforehand according to uer demand. Firt, given the contraint of fale alarm rate, k can be determined, baed on the relationhip between the fale alarm and the hop ditance uch a in Fig. 4. Thu, bounding the maximum fale alarm rate become equivalent to bounding the maximum ditance from pollee to the. Second, after k i determined, k can be elected. Although a large k could reduce the number of elected but ome pollee may not find ω within k hop. Therefore, an appropriate k hould be choen to trike a balance between the number of and the number of unlabeled node. Thi can be achieved by the experiment, a in Section V. Given k,k, Algorithm I lit the peudo code of the determinitic election algorithm. At the outet, each node need to obtain the k -hop neighborhood information by

4 Start of the determinitic algorithm 0 Start of the hybrid algorithm round : Ser={,} round : Ser={,,} round : Ser={,,,} randomized phae D(k, k) D(k, k) Unlabeled node pollee Fig.. A numerical example. The determinitic algorithm (above) run in three round, exchanging meage. The hybrid algorithm (below) ha a randomized phae and two determinitic phae, exchanging 0 meage. a localized broadcat. Then the algorithm proceed in round. In each round, if a node ha the mallet id among the k -hop unlabeled neighbor, it elect itelf a belonging to the et S er, and broadcat ID = id within k hop. Node that are not yet labeled but received the declaration will label themelve a pollee, and broadcat polleeid = id within k hop. After that, a new round will tart, during which the algorithm i executed among the remaining unlabeled node. Thi proce repeat until all node are labeled either a or pollee. The upper diagram of Fig. ue a mall network of node to explain the determinitic algorithm, auming k = k =. In the firt round, node and node elect themelve a ince their id i the mallet among the -hop neighborhood, and their -hop neighboring node,4,,,8,0 are recruited a pollee. Then the labeling proce will repeat among the remaining node until everyone i labeled. Thu, in the econd round, node i labeled a and node i labeled a pollee. In the third round, node i labeled a. The meage complexity of Algorithm I can be computed a follow. Aume there are n node. At firt, each node need to broadcat within k hop to get the neighborhood information (line ). After that, each need to broadcat within k hop (line ) and each pollee need to broadcat within k hop (line 0). Suppoe k = k = k, each node broadcat within k hop exactly twice during the execution of the algorithm. Further uppoe d i the node denity, and r i the node communication range. The meage complexity can be etimated by O( n d (kr) )=O(k nd). It i poible to et k a a fractional number. For example, when k =., it mean that each node chooe k = with probability 0.8 and chooe k =with probability 0.. A k control the ditance between the neighboring, allowing k to be a fractional number will provide more flexibility to control the number of, which can be een from Section V. Then, Algorithm need to be extended a follow. Firt, et k = k with probability k k and et k = k with probability k k. Second, each node elect itelf a among the k -hop unlabeled neighbor (line 4). Third, each node broadcat id within k hop (line,0), but update the unlabeled lit within k hop (line 4). Algorithm Hybrid Poller Selection Algorithm Input: agraphg(n, E), k,k,ρ Output: a Poller Set S er, a Pollee Set S ee Procedure: Hybrid(k,k ) : Initialize the node label, timer, S er = φ, S ee = φ : generate a random number σ (0, ) : if σ<ρthen 4: S er = S er {id} : end if : if id S er /*node id i temporarily labeled a */ then : execute the determinitic algorithm Determine(k,k ) 8: /*S er and S ee are updated*/ : end if 0: if node id i unlabeled then : wait until a packet i received or the timer i expired : if ID received then : label itelf a pollee /*S ee = S ee {id}*/ 4: end if : end if : if id {N S er S ee} /*node id i not labeled*/ then : execute the determinitic algorithm Determine(k,k ) 8: end if ) The Hybrid Algorithm: In the determinitic algorithm, each node need to broadcat within k hop twice, auming k = k = k.ak become larger, the meage complexity increae dramatically. To reduce thi meage overhead, we propoe a hybrid algorithm which combine the randomized algorithm and the determinitic algorithm. A hown in Algorithm, the algorithm tart with a randomized phae, during which each node label itelf a a temporary with a probability ρ. After that, the determinitic algorithm i executed among the temporary. If two are le than k hop away from each other, one of them will change it role from to pollee and the other one will confirm itelf a. After receiving the confirmed ID, the unlabeled node within k -hop range of the confirmed will be recruited a pollee. To implement thi, a field in the packet header need to be reerved to differentiate the confirmed ID from the temporary ID. After receiving the confirmed ID, the unlabeled node change the tatu to pollee. Finally, the determinitic algorithm i executed among the et of unlabeled node, i.e., {N S er S ee },tohaveall the node labeled. Compared with the determinitic algorithm, the hybrid algorithm ha much le meage overhead. Firt, due to the ue of the randomized phae, each node doe not have to make the initial k hop broadcat. Second, when the determinitic algorithm i executed for the firt time (line ), only the temporary are involved. Third, after receiving the confirmed ID, many unlabeled node become pollee who are refrained from broadcat. Thu, only a mall portion of the node till remain unlabeled and execute the determinitic algorithm for the econd time (line ). In the following, we give a detailed analyi of the meage overhead, baed on which the optimal value of ρ can be derived to minimize the meage overhead. For eae of illutration, we firt aume k = k = k,

5 and then extend it to the general cae of k k.firt,the randomized phae introduce zero meage overhead. A a reult, on average a fraction ρ of the node are labeled a and execute the determinitic algorithm for the firt round (line ). Among the nρ temporary, a fraction of node, ay, α, are confirmed a, and a fraction α of the node become pollee. During the execution of the firt-round determinitic algorithm, the nρα confirmed will recruit unlabeled node within k hop a pollee. After that, only a fraction, ay, β, ofthen( ρ) unlabeled node till remain a unlabeled and execute the econd round (line ). Therefore, the total number of node involved in the two round of the determinitic algorithm i nρ + n( ρ)β, with all the other node recruited a pollee by the nρα confirmed. Further ue M(k) to denote the meage complexity of k-hop broadcat. Since each participating node need to broadcat twice within k hop, the overall meage complexity i: [nρ + n( ρ)β]m(k) () β i the fraction of n( ρ) unlabeled node that do not fall in the k-hop range of any of the nρα confirmed. For a node n, the probability that it fall within the k-hop range of node n i πk r a,wherea denote the area ize. Thu, β =( πk r a ) nρα () α denote the fraction of node that are to be labeled a if nρ uniformly ditributed node run the determinitic algorithm. When two node are within k hop, one of them will refrain from being a with half chance. Since there are total nρ node, the probability for each node to become a i α =( πk r a )nρ () Subtituting Eqn. and Eqn. into Eqn. will give u the meage complexity when k = k. Fig. numerically evaluate the effect of varying the number of node n and the probability ρ on the amount of meage overhead, when a =0,r =,k = k =.Iti hown that each curve ha an optimal ρ correponding to the minimum meage overhead. In addition, the optimal value of ρ reduce a the number of node n increae. For example, ρ i about 0., 0., when n = 000, 00, repectively. Fig. ue a imple network to compare the determinitic algorithm and hybrid algorithm. In the hybrid algorithm (lower diagram), the randomized phae elect three node, i.e., node,,, a temporary, among which the determinitic algorithm i executed. Node reign from the role of and become pollee becaue it id i larger than it neighbor node, which i alo a. A a reult, node, are confirmed a and broadcat locally to recruit node,,,4,8,0 a pollee. After that, only node, till remain unlabeled, among which the econd round of the determinitic algorithm i executed. In comparion of the meage overhead, the determinitic algorithm ha = meage exchange, but the hybrid algorithm only ha ( + ) = 0 meage exchange. The meage complexity i reduced by over 0% in thi example. A k,k become larger and the network grow to a larger cale, the meage aving will be more ignificant. After are determined, each pollee need to elect up to ω baed on the received announcement. The election could be imply baed on criteria uch a the ditance to the. Each pollee maintain a lit of pointer to the ω, and each pointer link to the routing entry (e.g., ditance, next hop) of a ditinct. After a fail, each pollee will update it active lit, remove the tale entry and chooe the next on the lit. A more fail, new can be elected by running Algorithm among the neighboring pollee of the failed. IV. THE OPTIMAL AGGREGATION PATH PROBLEM A. The Problem Formulation After the -pollee relationhip i etablihed, each pollee tart to periodically end a report to it. Along the multihop path from pollee to, each non-edge pollee collect report from it downtream children and end an aggregated report (including it own) to the. A demontrated in Fig., a pollee may have multiple path to the, which reult in different energy efficiency. Aume tranmitting one packet over one hop conume one unit of energy. The problem of finding the optimal aggregation path (optph) can be formulated a follow. In a network graph, given the -pollee relationhip, a contant aggregation ratio, each node need to end a report to it periodically. For each, find the optimal aggregation path from all it pollee, uch that the total energy conumption i minimized. When the aggregation ratio i infinite, it i called perfect aggregation. That i, infinite number of report can be aggregated into one packet. It i not hard to ee that the optimal olution of thi pecial cae i the minimum panning tree. For the general cae where the aggregation ratio i finite, it can be proved that the problem of optph i NP-hard, which i conitent with the finding in [4], []. The proof i omitted here due to the limited pace. B. A Greedy Algorithm And It Approximation Ratio Although the problem of electing the optimal aggregation path i NP-hard, we can deign ome heuritic. A imple greedy algorithm i to arbitrarily elect the next hop to forward, a long a it i on the hortet path to the, and opportunitically aggregate the tatu report at the intermediate node. Thi eemingly imple algorithm ha urpriingly good performance, with a tight bound of 4. That i, the energy conumption reulted from the greedy algorithm will not be more than 4 time the optimum olution. Before proving the approximation bound of the greedy algorithm for the optph problem, we firt define ome terminologie. Within a polling domain, the hortet path from all the pollee to the of the domain form a tree, which may be partitioned into different level. A node i aid to be at level i (i 0) if it i i hop away from the ink (i.e., the ). Therefore, the ink i the only node at level 0. A rooted tree i called a level-connected tree if the node

6 (k-) node Level Level Level k- Level k (k-) node Level Level Level k- Level k (k-) node (k-) node (c) Fig.. Wort-cae topology with the bet trategy (above) and wort trategy (below). -level connected tree, =. -level connected tree, =4. (c) k-level connected tree, =(k ). belonging to the neighboring level are connected with each other. Specifically, a k-level-connected tree i compoed of the node at level-i, i =0,...k. Given a tree topology, the et of aggregation path that conume the leat/mot energy i called the bet/wort path, denoted a H b and H w, repectively. Correpondingly, the aggregation trategy that can produce the bet/wort path i called the bet/wort trategy. Givena topology, the ratio of energy conumption between the wort and bet path determine the performance bound/ratio of the topology, denoted a δ. Denote the energy conumption of the bet path H b and wort path H w a E b, E w,thenwe have δ = Ew E b. Given an algorithm, the maximum performance bound/ratio among all poible topologie, denoted a δ max, i called the approximation ratio of the algorithm. The wortcae topology i the topology whoe performance bound equate the approximation ratio of the algorithm. To have an intuitive idea about how to calculate the performance bound, we firt how ome topologie in Fig., whoe performance bound i 4. We can later prove that δ = 4 i the maximum performance bound among all topologie, o thee clae of k-level-connected tree are actually the wortcae topology. In Fig., the wort-cae k-level connected tree i contructed by having each level-i, i =...k with node and level-k with (k ) node, where Fig. are the pecial cae when k =, and Fig. (c) i the general cae. Note that in each level-connected tree, node at the neighboring level are all connected with each other. But for the clarity purpoe not all the link are hown in Fig., with only the aggregation path depicted. The number hown by each link indicate the number of packet tranmiion over that link. In Fig., the upper diagram repreent the bet aggregation path, and the lower diagram repreent the wort aggregation path. A further calculation how that the energy conumption of the bet and wort path are 4(k ) and (k ) in Fig. (c). With =(k ), wehaveδ = 4. In the ret of thi ection, we will prove that δ = 4 i the maximum performance bound among all topologie, and thu the approximation ratio of the greedy algorithm. A all the hortet path contitute a tree and any tree topology i a ubet of ome level-connected tree, we can retrict our attention to the level-connected tree. The following theorem give the approximation ratio for the -level-connected tree, which will be ued to derive the approximation ratio for the arbitrary level-connected tree. Theorem : For a -level-connected tree, the approximation ratio of the opportunitic greedy algorithm i no greater than +,where i the aggregation ratio. Proof: Given a -level-connected tree, the energy pent by ending the report from the level- node to the level- node i fixed, i.e., equal to the number of level- node. The problem optph become how to minimize the energy pent between the level- node and the root by packing the level- report into a minimum number of level- packet. We give the bet and wort aggregation trategy a follow. Bet trategy: packing/ending every level- report into a ingle level- node until all level- node have a packet of (including it own) report contructed without reidue room left. All the remaining level- report are then packed into a ingle level- node. Wort trategy: packing/ending all level- report into a ingle level- node. Excluding it own report, each level- node ha vacancie in the firt packet. The bet trategy trie to fully utilize all the vacancie, while the wort trategy trie to ue a many packet a poible by packing all tatu report aggreively into a ingle node. There may be other alternative bet or wort trategie, but it i ufficient to find one of them for our proof. Taking Fig. 8 a an example, where =, the bet trategy pack every level- report into a level- node, and the wort trategy pack all level- report into a ingle level- node. A imple calculation how that δ =. Now aume level ha l node and level ha l node. Then the wort-cae topology mut atify: ( )(l ) < l ( )l. That i, all but one of the level- node need to be fully packed. Otherwie, if l ( )(l ), ome level- node become edge node without children in both the bet and wort trategy, and could be removed to increae the performance ratio. In other word, the original topology i not the wort cae topology when l ( )(l ). On the other hand, if l > ( )l, l ( )l level- edge node can be removed to increae the performance ratio. To ee thi, removing level- node deceae the number of packet packed at level by exactly l ( )l in the bet trategy, but decreae by at mot l ( )l in the wort trategy. Thu, the original topology i not the wort cae topology when l > ( )l. Therefore, we et l =( )l i, i =0.... Iti followed that E b = l + l,e w = l+ +(l )+l. Then, δ = E w E b = l+ l ++( ) E b l + l l + l = ( )l i ( )l = l i l (4) The performance ratio + i tight, which can be een from Fig. 8. Specifically, Fig. 8& how the wort-cae

7 n n n n n n n n n - node - node - node Total (-) node =, δ=/4 =, δ =/ (c) δ =+(-)/² n n n ni ni Fig. 8. The derived bound i tight for -level-tree: the bet trategy (above) and wort trategy (below). The number by the link indicate the number of packet tranmitted over thi link. topology when =and =. For arbitrary, thewortcae topology can be contructed a in Fig. 8(c), where level ha node and level ha ( ) node, then we have δ =+ l+ =+ ( )+ =+ l + l ( ) + () Theorem : The approximation ratio for the arbitrary levelconnected tree i no greater than 4, i.e., δ max = 4. Proof: The theorem can be proved by the induction of L, the depth of the tree. Firt, Theorem how that the bae cae for -level-connected tree i true, i.e., δ max = max( + )= 4. Auming the claim i true for k-level-connected tree, k L, we want to prove that δ max = 4 for (L+)- level-connected tree. A hown in Fig., we divide the total energy conumption of the (L+)-level-connected tree into two part, namely, the upper part coniting of the link from level-(l-) to level- 0 (Fig. ) and the lower part coniting of the link from level-(l+) to level-(l-) (Fig. (c)). Becaue the node below level-(l-) alo contribute to the energy conumption of the upper part, we need to expand the node below level-(l-) onto level-(l-). Then the level-(l-) node in Fig. are the coalecence of level-(l-), level-l and level-(l+) node in Fig.. On the other hand, The node at level-(l-) and above have no contribution to the energy conumption of the lower part, o they can be afely hrunk into one virtual node. A hown in Fig. (c), the virtual node i the root of the - level tree. Ue Ew up,eup to denote the energy conumption of b n n the wort path and the bet path in the upper part (Fig. ), and ue Ew low,elow b to denote the energy conumption of the wort path and the bet path in the lower part (Fig. (c)). It can be een that the above expanding and hrinking operation hall not reduce the gap between the energy conumption in the bet cae and wort cae. Fig. i a (L-)-level-connected tree. By the inductive hypothei, δ max = 4 for Fig.. Therefore E up w Eup b ( 4 )Eup b = 4 Eup b () Fig. (c) i a -level-connected tree. According to Theorem, δ max = 4 for Fig. (c). Then we have E low w E low b ( 4 )Elow b = 4 Elow b () Level Level L- Level L Level L+ upper part energy lower part energy Level Level L- (merging level-l and level-(l+)) Level Level Fig.. Proof of the performance bound by dividing the energy conumption into two part. the original connected tree the upper part conit of the link above level-(l-), with the node at level-l and level-(l+) expanded onto level-(l-). (c) the lower part conit of the link below level-(l-), with the node at level-(l-) and above hrunk into a ingle virtual node. Combining Eqn. and Eqn., we finally have δ = Eup w E up b + Ew low + Eb low 4 The bound of 4 i tight a een from Fig., where the wort-cae topologie are hown. V. PERFORMANCE EVALUATIONS In thi ection, we ue imulation to tet the parameter and evaluate the propoed algorithm. In the imulation, n enor are randomly deployed in a 0 0 quare area. Each pollee i aociated with up to ω, which are ued for fault tolerance. Each enor end a tatu report to it every t, with the report aggregated at the intermediate node. The enor tranmiion range i, and tranmitting one packet over one hop conume one unit of energy. The link failure i modeled a a continuou-time markov chain with an average failure rate of f l =0.0 and a detection period T d =t. The experiment are done over a cutomized C++ imulator. A. Parameter Setting Three parameter need to be determined, k,k for the determinitic algorithm and ρ for the hybrid algorithm. In Section II, Fig. 4 give the relationhip between the fale alarm rate and the ditance from the pollee to the when the average link failure rate i known. A a reult, given the contraint of the maximum fale alarm rate, k can be determined to limit the number of hop from the pollee to the. Suppoe the fale alarm rate i required to be le than 4%, then k baed on Fig. 4. We will et k = in the following experiment unle otherwie pecified, baed on which k and ρ are choen. Fig. 0 how the effect of k.ak increae, there will be le number of becaue k control the ditance between the neighboring. However, the number of pollee that cannot find ω increae a k increae. For example, a k increae from to.8, the number of pollee that cannot find (ω =) increae from 0 to 0. Thi i becaue with le number of, it i le likely for a pollee to find ω within k hop. A can be een, if k =, all pollee can find three. However, if k =.8, over 0% pollee cannot find three. We thu et k =in the following experiment, without otherwie pecified. Note that k may be a fractional number. (c) (8)

8 the number total number of pollee with le than pollee with le than the value of k Fig. 0. and the number of pollee that cannot find ω (n=000) the number of meage The effect of k on the number of Fig.. n=000 n=00 In the hybrid algorithm, each node firt elect itelf a with probability ρ. Fig. how how the value of ρ affect the meage overhead when k = k =. Compared with the analytical reult in Fig., the ame trend i oberved in Fig., where the meage overhead firt drop then rie a ρ increae. The point with the leat number of meage correpond to the optimal ρ. For example, when n = 000, 00, ρ i around 0., 0. in the imulation, and around 0., 0. in the analyi. The little mimatch of the theoretical reult may be explained by the boundary effect of the finite field in reality. That i, in the analyi it i aumed that the ening range of a node fall within the field of the deployment, but thi i not true for the node on the boundary, which will affect the accuracy of the analytical reult. Similarly, Fig. how the relationhip between the meage overhead and ρ when k =,k =. It can be oberved that at the optimal point, ρ i around 0.0, 0.0 when n = 000, 00, which i much maller than the cae when k = k =. Thi i becaue with larger k, a maller number of are able to cover mot of the unlabeled node. In the following, we will ue the optimal ρ correponding to the different n, k,k. B. Comparion of Different Scheme In thi ection, we compare the geometrical property of the hybrid algorithm and the randomized algorithm. Fig. how naphot of the -pollee ditribution after running the randomized and hybrid algorithm among 00 node in a field. The whole network i connected but for clarity purpoe we only how the link within each polling domain. Fig. how that the randomized algorithm produce a cenario where the may be iolated (e.g., node in the up-left corner), clutered together (e.g., node 8,,4 on top), or the pollee (e.g., node in the bottom-left corner) i too far away from it. However, after running the determinitic algorithm in Fig., the hybrid algorithm fixe thee problem. For intance, in Fig. there i on iolated and no i within one hop of each other and no pollee i more than hop away from it. Fig. 4, further compare the hybrid algorithm with the randomized algorithm in term of tatitical geometrical property and fale alarm rate. For fair comparion, we et ρ = 0., 0.0, k =, when n = 000, 00, in the randomized algorithm, to elect the ame number of a in the hybrid algorithm. A een in Fig. 4, the ditance election probability ρ The effect of probability ρ on Fig.. the meage overhead in the hybrid algorithm (k =,k =) the number of meage n=000 n= election probability ρ The effect of probability ρ on the meage overhead in the hybrid algorithm (k =,k =) between and pollee i bounded by hop in the hybrid algorithm, but pan up to hop in the randomized algorithm. About 8% of the pollee in Fig. 4 are more than hop away from their, o the contraint of the fale alarm rate cannot be met in the randomized algorithm. Fig. how that the hybrid algorithm outperform the randomized algorithm in term of the average fale alarm rate, which i calculated by averaging the um of the fale alarm rate over all the node. It can be een that the average fale alarm rate of the hybrid algorithm i about 0% or 0% maller than that of the randomized algorithm, when n = 000 or 00, repectively. Both the determinitic algorithm and the hybrid algorithm have provable ditribution property no i le than k hop away from each other, and no pollee i more than k hop away from it. However, Fig. how that the hybrid algorithm ubtantially reduce the number of meage. The reduction i about 0% and 80%, when k =and k =, repectively. The benefit i thank to the randomized phae adopted by the hybrid algorithm. fale alarm rate x random, n=000 random, n=00 hybrid, n=000 hybrid, n= the average link failure (T =t) d the number of meage the number of node Fig.. Comparion of random Fig.. Comparion of determinitic algorithm with hybrid algorithm algorithm with hybrid algorithm x 0 4 D(k =,k =) Dk =,k =) H(k =,k =) Hk =,k =) VI. RELATED WORK While a lot of reearch in enor network focue on the field or target monitoring [], [], little attention ha been given to the monitoring of enor network itelf. In [], [], two imilar ditributed failure detector were propoed independently for wirele enor network, where each node i collaboratively monitored by it one-hop neighbor. Thee cheme can only detect node failure, but more general tatu uch a reidue energy and coverage cannot be monitored. In [], data aggregation had been ued to obtain a global abtraction of the enor reidue energy, but only when pecific continuou energy diipation model are aumed. More recently, a local monitoring infratructure i propoed

9 Hop : % Hop : % Hop : % Hop 4: % Hop : % Hop : 4% Fig Fig.. Snaphot of -pollee ditribution, where the tar denote the and the dot denote the pollee: randomized algorithm, ρ =0., hybrid (randomized + determinitic) algorithm, ρ =0.,k =,k = Hop : 4% Hop : % Hop : 4% Ditribution of the ditance between and pollee: randomized algorithm hybrid algorithm in []. But their goal i to monitor the tranmiion over the wirele link for ecurity purpoe, intead of from the perpective of fault tolerance. By contrat, our -pollee baed monitoring architecture can repond to querie about a variety of enor tatu tailored to the application demand. The problem of electing a ubet of node to form a backbone ha been extenively tudied in different context, e.g., clutering [], connected dominating et (CDS) [8], [4], relay node placement [], etc. The objective of thee work i to minimize the cardinality of the elected ubet of node, but ignore the contraint of fale alarm rate, which i crucial in wirele enor network. In addition, mot of thee work are limited in the election of ingle-hop, ingle vantage point (e.g., cluter head, dominator). However, our work focue on multi-hop multi- monitoring architecture contruction, where ome geometrical propertie of the -pollee ditribution can be guaranteed. Aggregation path election problem ha been propoed in [4], [], wherein ome heuritic are developed but without performance guarantee. There are alo ome other aggregation cheme that target for the different application cenario [], [], [0], but none of them guarantee contant approximation ratio. To the bet of our knowledge, our reult i the firt proved contant approximation ratio applied to the aggregation path election cheme for the wirele enor network. VII. CONCLUSIONS In thi paper, we focu on the ditributed deign of monitoring and aggregation algorithm for wirele enor network. Baed on the -pollee tructure we firt propoed fully ditributed algorithm to elect the minimum number of while bounding the fale alarm rate. Then a greedy aggregation cheme wa propoed to reduce the meage overhead due to monitoring. Theoretical analye and extenive imulation how that the determinitic algorithm can flexibly control the -pollee ditribution property to bound the fale alarm rate, the hybrid algorithm can reduce the meage overhead ignificantly, and the greedy aggregation cheme decreae the monitoring traffic with a contant approximation ratio of 4. REFERENCES [] I. Akyildiz, W. Su, Y. Sankaraubramaniam, and E.Cayirci, Wirele Senor Network: A Survey, Computer Network, March 00. [] S. Baagni, A ditributed algorithm for finding a maximal weighted independent et in wirele network, in th International Conference on Parallel and Ditributed Computing and Sytem (PDCS),. [] R. Critecu, B. Beferull-Lozano, and M. Vetterli, On network correlated data gathering, in INFOCOM, 00. [4] F. Dai and J. Wu, On contructing k-connected k-dominating et in wirele network, Journal of Parallel and Ditributed Computing (JPDC), 00. [] Dezun Dong, Yunhao Liu, and Xiangke Liao, Self-monitoring for enor network, in MobiHoc, 008. [] Kai-Wei Fan, Sha Liu, and Praun Sinha, On the potential of tructurefree data aggregation in enor network, in INFOCOM, 00. [] Chih fan Hin and Mingyan Liu, A ditributed monitoring mechanim for wirele enor network, in WISE, 00. [8] A. Konrad, B. Y. Zhao, A. D. Joeph, and R. Ludwig, A markov-baed channel model algorithm for wirele network, Wirele Network, vol., pp. 8, 00. [] H. Lee, A. Cerpa, and P. Levi, Improving wirele imulation through noie modeling, in IPSN, 00. [0] Li (Erran) Li, Marina Thottan, Bin Yao, and Sanjoy Paul, Ditributed network monitoring with bounded link utilization in ip network, in INFOCOM, San Francico, April 00. [] C. Liu and G. Cao, Minimizing the cot of mine election via enor network, in INFOCOM, 00. [] C. Liu and G. Cao, An multi- baed energy-efficient monitoring cheme for wirele enor network, in INFOCOM mini-conference, 00. [] S. Mira, S. Hong, G. Xue, and J. Tang, Contrained relay node placement in wirele enor network to meet connectivity and urvivability requirement, in INFOCOM, 008. [4] S. J. Park and R. Sivakumar, Energy efficient correlated data aggregation for wirele enor network, International Journal of Ditributed Senor Network, 008. [] S. ROSS, Stochatic Procee, John Wiley and Son,. [] Stanilav Rot and Hari Balakrihnan, Memento: A health monitoring ytem for wirele enor network, in SECON, 00. [] L. Su, C. Liu, and G. Cao, Routing in intermittently connected enor network, in ICNP, 008. [8] Peng-Jun Wan, Khaled M. Alzoubi, and Ophir Frieder, Ditributed contruction of connected dominating et in wirele ad hoc network, Mobile Network and Application, vol., no., 004. [] O. Youni and S. Fahmy, Ditributed clutering in ad-hoc enor network: A hybrid, energy-efficient approach, in INFOCOM, 004. [0] Bo Yu, Jianzhong Li, and Yinghu Li, Ditributed data aggregation cheduling in wirele enor network, in INFOCOM, 00. [] W. Zhang and G. Cao, Dctc: Dynamic convoy tree-baed collaboration for target tracking in enor network, IEEE Tranaction on Wirele Communication, 004. [] Jerry Zhao, Rameh Govindan, and Deborah Etrin, Reidual energy can for monitoring wirele enor network, in WCNC, 00. [] R. Zheng and R. Barton, Toward optimal data aggregation in random wirele enor network, in INFOCOM, 00.

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada

More information

Performance of Multiple TFRC in Heterogeneous Wireless Networks

Performance of Multiple TFRC in Heterogeneous Wireless Networks Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding

More information

A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks

A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks Changlei Liu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University E-mail:

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com

More information

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL Excerpt from the Proceeding of the COMSO Conference 0 India Two Dimenional FEM Simulation of Ultraonic Wave Propagation in Iotropic Solid Media uing COMSO Bikah Ghoe *, Krihnan Balaubramaniam *, C V Krihnamurthy

More information

Group Mutual Exclusion Based on Priorities

Group Mutual Exclusion Based on Priorities Group Mutual Excluion Baed on Prioritie Karina M. Cenci Laboratorio de Invetigación en Sitema Ditribuido Univeridad Nacional del Sur Bahía Blanca, Argentina kmc@c.un.edu.ar and Jorge R. Ardenghi Laboratorio

More information

A note on profit maximization and monotonicity for inbound call centers

A note on profit maximization and monotonicity for inbound call centers A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an

More information

Partial optimal labeling search for a NP-hard subclass of (max,+) problems

Partial optimal labeling search for a NP-hard subclass of (max,+) problems Partial optimal labeling earch for a NP-hard ubcla of (max,+) problem Ivan Kovtun International Reearch and Training Center of Information Technologie and Sytem, Kiev, Uraine, ovtun@image.iev.ua Dreden

More information

DUE to the small size and low cost of a sensor node, a

DUE to the small size and low cost of a sensor node, a 1992 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 10, OCTOBER 2015 A Networ Coding Baed Energy Efficient Data Bacup in Survivability-Heterogeneou Senor Networ Jie Tian, Tan Yan, and Guiling Wang

More information

Name: SID: Instructions

Name: SID: Instructions CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/

More information

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems, MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS

More information

Bi-Objective Optimization for the Clinical Trial Supply Chain Management

Bi-Objective Optimization for the Clinical Trial Supply Chain Management Ian David Lockhart Bogle and Michael Fairweather (Editor), Proceeding of the 22nd European Sympoium on Computer Aided Proce Engineering, 17-20 June 2012, London. 2012 Elevier B.V. All right reerved. Bi-Objective

More information

INFORMATION Technology (IT) infrastructure management

INFORMATION Technology (IT) infrastructure management IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, MAY 214 1 Buine-Driven Long-term Capacity Planning for SaaS Application David Candeia, Ricardo Araújo Santo and Raquel Lope Abtract Capacity Planning

More information

Unit 11 Using Linear Regression to Describe Relationships

Unit 11 Using Linear Regression to Describe Relationships Unit 11 Uing Linear Regreion to Decribe Relationhip Objective: To obtain and interpret the lope and intercept of the leat quare line for predicting a quantitative repone variable from a quantitative explanatory

More information

A Spam Message Filtering Method: focus on run time

A Spam Message Filtering Method: focus on run time , pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department

More information

NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET

NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET Chapter 1 NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET S. Srivatava Univerity of Miouri Kana City, USA hekhar@conrel.ice.umkc.edu S. R. Thirumalaetty now

More information

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare

More information

A technical guide to 2014 key stage 2 to key stage 4 value added measures

A technical guide to 2014 key stage 2 to key stage 4 value added measures A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool

More information

Maximizing Acceptance Probability for Active Friending in Online Social Networks

Maximizing Acceptance Probability for Active Friending in Online Social Networks Maximizing for Active Friending in Online Social Network De-Nian Yang, Hui-Ju Hung, Wang-Chien Lee, Wei Chen Academia Sinica, Taipei, Taiwan The Pennylvania State Univerity, State College, Pennylvania,

More information

Assessing the Discriminatory Power of Credit Scores

Assessing the Discriminatory Power of Credit Scores Aeing the Dicriminatory Power of Credit Score Holger Kraft 1, Gerald Kroiandt 1, Marlene Müller 1,2 1 Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Gottlieb-Daimler-Str. 49, 67663 Kaierlautern,

More information

Utility-Based Flow Control for Sequential Imagery over Wireless Networks

Utility-Based Flow Control for Sequential Imagery over Wireless Networks Utility-Baed Flow Control for Sequential Imagery over Wirele Networ Tomer Kihoni, Sara Callaway, and Mar Byer Abtract Wirele enor networ provide a unique et of characteritic that mae them uitable for building

More information

Cluster-Aware Cache for Network Attached Storage *

Cluster-Aware Cache for Network Attached Storage * Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,

More information

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms Rik Management for a Global Supply Chain Planning under Uncertainty: Model and Algorithm Fengqi You 1, John M. Waick 2, Ignacio E. Gromann 1* 1 Dept. of Chemical Engineering, Carnegie Mellon Univerity,

More information

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations Proceeding of the 0 Indutrial Engineering Reearch Conference T. Doolen and E. Van Aken, ed. Profitability of Loyalty Program in the Preence of Uncertainty in Cutomer Valuation Amir Gandomi and Saeed Zolfaghari

More information

TRADING rules are widely used in financial market as

TRADING rules are widely used in financial market as Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a

More information

A Note on Profit Maximization and Monotonicity for Inbound Call Centers

A Note on Profit Maximization and Monotonicity for Inbound Call Centers OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright

More information

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International

More information

Mixed Method of Model Reduction for Uncertain Systems

Mixed Method of Model Reduction for Uncertain Systems SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol 4 No June Mixed Method of Model Reduction for Uncertain Sytem N Selvaganean Abtract: A mixed method for reducing a higher order uncertain ytem to a table reduced

More information

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad

More information

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic

More information

CASE STUDY BRIDGE. www.future-processing.com

CASE STUDY BRIDGE. www.future-processing.com CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION

More information

Mobility Improves Coverage of Sensor Networks

Mobility Improves Coverage of Sensor Networks Mobility Improve Coverage of Senor Networ Benyuan Liu Dept. of Computer Science Univerity of Maachuett-Lowell Lowell, MA 1854 Peter Bra Dept. of Computer Science City College of New Yor New Yor, NY 131

More information

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,

More information

Simulation of Sensorless Speed Control of Induction Motor Using APFO Technique

Simulation of Sensorless Speed Control of Induction Motor Using APFO Technique International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, Augut 2012 Simulation of Senorle Speed Control of Induction Motor Uing APFO Technique T. Raghu, J. Sriniva Rao, and S. Chandra

More information

Algorithms for Advance Bandwidth Reservation in Media Production Networks

Algorithms for Advance Bandwidth Reservation in Media Production Networks Algorithm for Advance Bandwidth Reervation in Media Production Network Maryam Barhan 1, Hendrik Moen 1, Jeroen Famaey 2, Filip De Turck 1 1 Department of Information Technology, Ghent Univerity imind Gaton

More information

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation Proceeding on Privacy Enhancing Technologie 2015; 2015 (2):1 17 Reza Shokri* Privacy Game: Optimal Uer-Centric Data Obfucation Abtract: Conider uer who hare their data (e.g., location) with an untruted

More information

Project Management Basics

Project Management Basics Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management

More information

Towards Control-Relevant Forecasting in Supply Chain Management

Towards Control-Relevant Forecasting in Supply Chain Management 25 American Control Conference June 8-1, 25. Portland, OR, USA WeA7.1 Toward Control-Relevant Forecating in Supply Chain Management Jay D. Schwartz, Daniel E. Rivera 1, and Karl G. Kempf Control Sytem

More information

SCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto

More information

MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) *

MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) * MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) * Praanna Padmanabhan School of Computer Science The Univerity of Oklahoma Norman OK, USA praannap@yahoo-inc.com Dr. Le Gruenwald

More information

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1. International Journal of Advanced Technology & Engineering Reearch (IJATER) REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND Abtract TAGUCHI METHODOLOGY Mr.

More information

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test Report 4668-1b Meaurement report Sylomer - field tet Report 4668-1b 2(16) Contet 1 Introduction... 3 1.1 Cutomer... 3 1.2 The ite and purpoe of the meaurement... 3 2 Meaurement... 6 2.1 Attenuation of

More information

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring Redeigning Rating: Aeing the Dicriminatory Power of Credit Score under Cenoring Holger Kraft, Gerald Kroiandt, Marlene Müller Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Thi verion: June

More information

Scheduling of Jobs and Maintenance Activities on Parallel Machines

Scheduling of Jobs and Maintenance Activities on Parallel Machines Scheduling of Job and Maintenance Activitie on Parallel Machine Chung-Yee Lee* Department of Indutrial Engineering Texa A&M Univerity College Station, TX 77843-3131 cylee@ac.tamu.edu Zhi-Long Chen** Department

More information

Availability of WDM Multi Ring Networks

Availability of WDM Multi Ring Networks Paper Availability of WDM Multi Ring Network Ivan Rado and Katarina Rado H d.o.o. Motar, Motar, Bonia and Herzegovina Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, Univerity

More information

Gabriel E. Arrobo and Richard D. Gitlin, NAI Charter Fellow

Gabriel E. Arrobo and Richard D. Gitlin, NAI Charter Fellow Technology and Innovation, Vol. 15, pp. 227 236, 2013 1949-8241/13 $90.00 +.00 Printed in the USA. All right reerved. DOI: http://dx.doi.org/10.3727/194982413x13790020921825 Copyright ã 2013 Cognizant

More information

Senior Thesis. Horse Play. Optimal Wagers and the Kelly Criterion. Author: Courtney Kempton. Supervisor: Professor Jim Morrow

Senior Thesis. Horse Play. Optimal Wagers and the Kelly Criterion. Author: Courtney Kempton. Supervisor: Professor Jim Morrow Senior Thei Hore Play Optimal Wager and the Kelly Criterion Author: Courtney Kempton Supervior: Profeor Jim Morrow June 7, 20 Introduction The fundamental problem in gambling i to find betting opportunitie

More information

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,

More information

Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn

Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Ditributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Jonathan Ledlie and Margo Seltzer Diviion of Engineering and Applied Science Harvard Univerity Abtract Numerou propoal exit for load

More information

In this paper, we investigate toll setting as a policy tool to regulate the use of roads for dangerous goods

In this paper, we investigate toll setting as a policy tool to regulate the use of roads for dangerous goods Vol. 43, No. 2, May 2009, pp. 228 243 in 0041-1655 ein 1526-5447 09 4302 0228 inform doi 10.1287/trc.1080.0236 2009 INFORMS Toll Policie for Mitigating Hazardou Material Tranport Rik Patrice Marcotte,

More information

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE Progre In Electromagnetic Reearch Letter, Vol. 3, 51, 08 BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE S. H. Zainud-Deen Faculty of Electronic Engineering Menoufia

More information

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4

More information

INTERACTIVE TOOL FOR ANALYSIS OF TIME-DELAY SYSTEMS WITH DEAD-TIME COMPENSATORS

INTERACTIVE TOOL FOR ANALYSIS OF TIME-DELAY SYSTEMS WITH DEAD-TIME COMPENSATORS INTERACTIVE TOOL FOR ANALYSIS OF TIMEDELAY SYSTEMS WITH DEADTIME COMPENSATORS Joé Lui Guzmán, Pedro García, Tore Hägglund, Sebatián Dormido, Pedro Alberto, Manuel Berenguel Dep. de Lenguaje y Computación,

More information

Network Architecture for Joint Failure Recovery and Traffic Engineering

Network Architecture for Joint Failure Recovery and Traffic Engineering Network Architecture for Joint Failure Recovery and Traffic Engineering Martin Suchara Dept. of Computer Science Princeton Univerity, NJ 08544 muchara@princeton.edu Dahai Xu AT&T Lab Reearch Florham Park,

More information

QUANTIFYING THE BULLWHIP EFFECT IN THE SUPPLY CHAIN OF SMALL-SIZED COMPANIES

QUANTIFYING THE BULLWHIP EFFECT IN THE SUPPLY CHAIN OF SMALL-SIZED COMPANIES Sixth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2008) Partnering to Succe: Engineering, Education, Reearch and Development June 4 June 6 2008,

More information

Online story scheduling in web advertising

Online story scheduling in web advertising Online tory cheduling in web advertiing Anirban Dagupta Arpita Ghoh Hamid Nazerzadeh Prabhakar Raghavan Abtract We tudy an online job cheduling problem motivated by toryboarding in web advertiing, where

More information

A New Optimum Jitter Protection for Conversational VoIP

A New Optimum Jitter Protection for Conversational VoIP Proc. Int. Conf. Wirele Commun., Signal Proceing (Nanjing, China), 5 pp., Nov. 2009 A New Optimum Jitter Protection for Converational VoIP Qipeng Gong, Peter Kabal Electrical & Computer Engineering, McGill

More information

Return on Investment and Effort Expenditure in the Software Development Environment

Return on Investment and Effort Expenditure in the Software Development Environment International Journal of Applied Information ytem (IJAI) IN : 2249-0868 Return on Invetment and Effort Expenditure in the oftware Development Environment Dineh Kumar aini Faculty of Computing and IT, ohar

More information

Design of Compound Hyperchaotic System with Application in Secure Data Transmission Systems

Design of Compound Hyperchaotic System with Application in Secure Data Transmission Systems Deign of Compound Hyperchaotic Sytem with Application in Secure Data Tranmiion Sytem D. Chantov Key Word. Lyapunov exponent; hyperchaotic ytem; chaotic ynchronization; chaotic witching. Abtract. In thi

More information

v = x t = x 2 x 1 t 2 t 1 The average speed of the particle is absolute value of the average velocity and is given Distance travelled t

v = x t = x 2 x 1 t 2 t 1 The average speed of the particle is absolute value of the average velocity and is given Distance travelled t Chapter 2 Motion in One Dimenion 2.1 The Important Stuff 2.1.1 Poition, Time and Diplacement We begin our tudy of motion by conidering object which are very mall in comparion to the ize of their movement

More information

Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS

Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS Chapter Stoc and Their Valuation ANSWERS TO EN-OF-CHAPTER QUESTIONS - a. A proxy i a document giving one peron the authority to act for another, typically the power to vote hare of common toc. If earning

More information

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms Tap Into Smartphone Demand: Mobile-izing Enterprie Webite by Uing Flexible, Open Source Platform acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Tap Into Smartphone Demand:

More information

International Journal of Heat and Mass Transfer

International Journal of Heat and Mass Transfer International Journal of Heat and Ma Tranfer 5 (9) 14 144 Content lit available at ScienceDirect International Journal of Heat and Ma Tranfer journal homepage: www.elevier.com/locate/ijhmt Technical Note

More information

Socially Optimal Pricing of Cloud Computing Resources

Socially Optimal Pricing of Cloud Computing Resources Socially Optimal Pricing of Cloud Computing Reource Ihai Menache Microoft Reearch New England Cambridge, MA 02142 t-imena@microoft.com Auman Ozdaglar Laboratory for Information and Deciion Sytem Maachuett

More information

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE Li-Chiou Chen Department of Information Sytem School of Computer Science and Information Sytem Pace Univerity

More information

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC

More information

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE Journal of Information Technology Management ISSN #1042-1319 A Publication of the Aociation of Management THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE LI-CHIOU

More information

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal How Enterprie Can Build Integrated Digital Marketing Experience Uing Drupal acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 How Enterprie Can Build Integrated Digital Marketing

More information

AN OVERVIEW ON CLUSTERING METHODS

AN OVERVIEW ON CLUSTERING METHODS IOSR Journal Engineering AN OVERVIEW ON CLUSTERING METHODS T. Soni Madhulatha Aociate Preor, Alluri Intitute Management Science, Warangal. ABSTRACT Clutering i a common technique for tatitical data analyi,

More information

How to Maximize User Satisfaction Degree in Multi-service IP Networks

How to Maximize User Satisfaction Degree in Multi-service IP Networks How to Maximize Uer Satifaction Degree in Multi-ervice IP Network Huy Anh Nguyen, Tam Van Nguyen and Deokai Choi Department of Electronic and Computer Engineering Chonnam National Univerity Gwangu, KOREA

More information

Bidding for Representative Allocations for Display Advertising

Bidding for Representative Allocations for Display Advertising Bidding for Repreentative Allocation for Diplay Advertiing Arpita Ghoh, Preton McAfee, Kihore Papineni, and Sergei Vailvitkii Yahoo! Reearch. {arpita, mcafee, kpapi, ergei}@yahoo-inc.com Abtract. Diplay

More information

RO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds

RO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds !111! 111!ttthhh IIIEEEEEEEEE///AAACCCMMM IIInnnttteeerrrnnnaaatttiiiooonnnaaalll SSSyyymmmpppoooiiiuuummm ooonnn CCCllluuuttteeerrr,,, CCClllooouuuddd aaannnddd GGGrrriiiddd CCCooommmpppuuutttiiinnnggg

More information

MECH 2110 - Statics & Dynamics

MECH 2110 - Statics & Dynamics Chapter D Problem 3 Solution 1/7/8 1:8 PM MECH 11 - Static & Dynamic Chapter D Problem 3 Solution Page 7, Engineering Mechanic - Dynamic, 4th Edition, Meriam and Kraige Given: Particle moving along a traight

More information

Performance Evaluation and Delay Modelling of VoIP Traffic over 802.11 Wireless Mesh Network

Performance Evaluation and Delay Modelling of VoIP Traffic over 802.11 Wireless Mesh Network International Journal of Computer Application (975 8887) Volume 1 No.9, May 11 Performance Evaluation and Delay Modelling of VoIP Traffic over 8.11 Wirele Meh Network Amit Chhabra Dept. of CSE SDDIET,

More information

Graph Analyi I Network Meaure of the Networked Adaptive Agents

Graph Analyi I Network Meaure of the Networked Adaptive Agents Uing Graph Analyi to Study Network of Adaptive Agent Sherief Abdallah Britih Univerity in Dubai, United Arab Emirate Univerity of Edinburgh, United Kingdom hario@ieee.org ABSTRACT Experimental analyi of

More information

On Secure Network Coding with Unequal Link Capacities and Restricted Wiretapping Sets

On Secure Network Coding with Unequal Link Capacities and Restricted Wiretapping Sets On Secure Network Coing with Unequal Link Capacitie an Retricte Wiretapping Set Tao Cui an Tracey Ho Department of Electrical Engineering California Intitute of Technology Paaena, CA 9115, USA Email: {taocui,

More information

Performance of a Browser-Based JavaScript Bandwidth Test

Performance of a Browser-Based JavaScript Bandwidth Test Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further

More information

Cost Models for Selecting Materialized Views in Public Clouds

Cost Models for Selecting Materialized Views in Public Clouds International Journal of Data Warehouing and Mining, 0(4), -25, October-December 204 Cot Model for Selecting Materialized View in ublic Cloud Romain erriot, Clermont Univerité, Univerité Blaie acal, Aubière

More information

Introduction to the article Degrees of Freedom.

Introduction to the article Degrees of Freedom. Introduction to the article Degree of Freedom. The article by Walker, H. W. Degree of Freedom. Journal of Educational Pychology. 3(4) (940) 53-69, wa trancribed from the original by Chri Olen, George Wahington

More information

Support Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data.

Support Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data. The Sixth International Power Engineering Conference (IPEC23, 27-29 November 23, Singapore Support Vector Machine Baed Electricity Price Forecating For Electricity Maret utiliing Projected Aement of Sytem

More information

Review of Multiple Regression Richard Williams, University of Notre Dame, http://www3.nd.edu/~rwilliam/ Last revised January 13, 2015

Review of Multiple Regression Richard Williams, University of Notre Dame, http://www3.nd.edu/~rwilliam/ Last revised January 13, 2015 Review of Multiple Regreion Richard William, Univerity of Notre Dame, http://www3.nd.edu/~rwilliam/ Lat revied January 13, 015 Aumption about prior nowledge. Thi handout attempt to ummarize and yntheize

More information

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME RADMILA KOCURKOVÁ Sileian Univerity in Opava School of Buine Adminitration in Karviná Department of Mathematical Method in Economic Czech Republic

More information

Growing Self-Organizing Maps for Surface Reconstruction from Unstructured Point Clouds

Growing Self-Organizing Maps for Surface Reconstruction from Unstructured Point Clouds Growing Self-Organizing Map for Surface Recontruction from Untructured Point Cloud Renata L. M. E. do Rêgo, Aluizio F. R. Araújo, and Fernando B.de Lima Neto Abtract Thi work introduce a new method for

More information

Queueing Models for Multiclass Call Centers with Real-Time Anticipated Delays

Queueing Models for Multiclass Call Centers with Real-Time Anticipated Delays Queueing Model for Multicla Call Center with Real-Time Anticipated Delay Oualid Jouini Yve Dallery Zeynep Akşin Ecole Centrale Pari Koç Univerity Laboratoire Génie Indutriel College of Adminitrative Science

More information

CASE STUDY ALLOCATE SOFTWARE

CASE STUDY ALLOCATE SOFTWARE CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT

More information

Assigning Tasks for Efficiency in Hadoop

Assigning Tasks for Efficiency in Hadoop Aigning Tak for Efficiency in Hadoop [Extended Abtract] Michael J. Ficher Computer Science Yale Univerity P.O. Box 208285 New Haven, CT, USA michael.ficher@yale.edu Xueyuan Su Computer Science Yale Univerity

More information

Exposure Metering Relating Subject Lighting to Film Exposure

Exposure Metering Relating Subject Lighting to Film Exposure Expoure Metering Relating Subject Lighting to Film Expoure By Jeff Conrad A photographic expoure meter meaure ubject lighting and indicate camera etting that nominally reult in the bet expoure of the film.

More information

2. METHOD DATA COLLECTION

2. METHOD DATA COLLECTION Key to learning in pecific ubject area of engineering education an example from electrical engineering Anna-Karin Cartenen,, and Jonte Bernhard, School of Engineering, Jönköping Univerity, S- Jönköping,

More information

Software Engineering Management: strategic choices in a new decade

Software Engineering Management: strategic choices in a new decade Software Engineering : trategic choice in a new decade Barbara Farbey & Anthony Finkeltein Univerity College London, Department of Computer Science, Gower St. London WC1E 6BT, UK {b.farbey a.finkeltein}@ucl.ac.uk

More information

MSc Financial Economics: International Finance. Bubbles in the Foreign Exchange Market. Anne Sibert. Revised Spring 2013. Contents

MSc Financial Economics: International Finance. Bubbles in the Foreign Exchange Market. Anne Sibert. Revised Spring 2013. Contents MSc Financial Economic: International Finance Bubble in the Foreign Exchange Market Anne Sibert Revied Spring 203 Content Introduction................................................. 2 The Mone Market.............................................

More information

HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * Michael Spagat Royal Holloway, University of London, CEPR and Davidson Institute.

HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * Michael Spagat Royal Holloway, University of London, CEPR and Davidson Institute. HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * By Michael Spagat Royal Holloway, Univerity of London, CEPR and Davidon Intitute Abtract Tranition economie have an initial condition of high human

More information

OPINION PIECE. It s up to the customer to ensure security of the Cloud

OPINION PIECE. It s up to the customer to ensure security of the Cloud OPINION PIECE It up to the cutomer to enure ecurity of the Cloud Content Don t outource what you don t undertand 2 The check lit 2 Step toward control 4 Due Diligence 4 Contract 4 E-dicovery 4 Standard

More information

Laureate Network Products & Services Copyright 2013 Laureate Education, Inc.

Laureate Network Products & Services Copyright 2013 Laureate Education, Inc. Laureate Network Product & Service Copyright 2013 Laureate Education, Inc. KEY Coure Name Laureate Faculty Development...3 Laureate Englih Program...9 Language Laureate Signature Product...12 Length Laureate

More information

Health Insurance and Social Welfare. Run Liang. China Center for Economic Research, Peking University, Beijing 100871, China,

Health Insurance and Social Welfare. Run Liang. China Center for Economic Research, Peking University, Beijing 100871, China, Health Inurance and Social Welfare Run Liang China Center for Economic Reearch, Peking Univerity, Beijing 100871, China, Email: rliang@ccer.edu.cn and Hao Wang China Center for Economic Reearch, Peking

More information

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds Acceleration-Diplacement Crah Pule Optimiation A New Methodology to Optimie Vehicle Repone for Multiple Impact Speed D. Gildfind 1 and D. Ree 2 1 RMIT Univerity, Department of Aeropace Engineering 2 Holden

More information

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE RAVI KUMAR G 1, C.MUTHUSAMY 2 & A.VINAYA BABU 3 1 HP Bangalore, Reearch Scholar JNTUH, Hyderabad, India, 2 Yahoo, Bangalore,

More information

THE IMPACT OF MULTIFACTORIAL GENETIC DISORDERS ON CRITICAL ILLNESS INSURANCE: A SIMULATION STUDY BASED ON UK BIOBANK ABSTRACT KEYWORDS

THE IMPACT OF MULTIFACTORIAL GENETIC DISORDERS ON CRITICAL ILLNESS INSURANCE: A SIMULATION STUDY BASED ON UK BIOBANK ABSTRACT KEYWORDS THE IMPACT OF MULTIFACTORIAL GENETIC DISORDERS ON CRITICAL ILLNESS INSURANCE: A SIMULATION STUDY BASED ON UK BIOBANK BY ANGUS MACDONALD, DELME PRITCHARD AND PRADIP TAPADAR ABSTRACT The UK Biobank project

More information

Auction-Based Resource Allocation for Sharing Cloudlets in Mobile Cloud Computing

Auction-Based Resource Allocation for Sharing Cloudlets in Mobile Cloud Computing 1 Auction-Baed Reource Allocation for Sharing Cloudlet in Mobile Cloud Computing A-Long Jin, Wei Song, Senior Member, IEEE, and Weihua Zhuang, Fellow, IEEE Abtract Driven by pervaive mobile device and

More information

How To Understand The Hort Term Power Market

How To Understand The Hort Term Power Market Short-term allocation of ga network and ga-electricity input forecloure Miguel Vazquez a,, Michelle Hallack b a Economic Intitute (IE), Federal Univerity of Rio de Janeiro (UFRJ) b Economic Department,

More information