Design and Performance Analysis of Network Code Division Multiplexing for Wireless Sensor Networks

Size: px
Start display at page:

Download "Design and Performance Analysis of Network Code Division Multiplexing for Wireless Sensor Networks"

Transcription

1 Desgn and Performance Analyss of Network Code Dvson Multplexng for Wreless Sensor Networks Jng Yue, Zhua Ln, Guoqang Mao, and Branka Vucetc School of Electrcal and Informaton Engneerng, he Unversty of Sydney, Sydney, Australa Natonal IC Australa (NICA), Australa School of Computng and Communcatons, Unversty of echnology Sydney, Sydney, Australa E-mal: Astract In ths paper, we nvestgate the performance of a wreless sensor network, n whch multple groups of source nodes communcate wth ther respectve destnaton nodes wth the help of a common relay network A network code dvson multplexng (NCDM) scheme s proposed to remove the ntersesson nterference among multple transmsson sessons at each destnaton We focus on analyzng the soft processng algorthm of the NCDM scheme Based on the analyss results, a new code desgn crtera for the constructon of the generator matrx s proposed Smulaton results show that y followng the proposed code desgn crtera, the t error rato (BER) performance gap etween the scheme we studed and the seral sesson scheme can e managed effectvely In seral sesson scheme, source nodes n a numer of groups communcate wth ther respectve destnatons n a tme dvson manner Index erms Network code dvson multplexng, wreless sensor networks, soft processng algorthm, log-lkelhood rato, t error rato I INRODUCION As a specal channel codng strategy developed for cooperatve communcaton networks [1], dstruted codng has attracted sgnfcant attenton recently Dstruted codng technque has een appled n the desgn of conventonal channel codes, such as dstruted turo codes [], dstruted space-tme codes [3] and dstruted low-densty party-check (LDPC) codes [4] In the aove dstruted codng schemes, transmsson relalty over pont-to-pont wreless communcaton channels has een effcently mproved he dstruted codng schemes dscussed aove are developed for small-scale uncast relay networks owever, many practcal applcatons are n large-scale wreless sensor networks (WSNs) WSNs s the key elements n Internet of hngs (Io) Io s a scenaro n whch oects are provded wth unque dentfers and data transmsson are over a network wthout requrng human-to-human or human-tocomputer nteracton [5] In WSNs, a large numer of sensor nodes gather nformaton from the surroundng envronment and then delver the gathered nformaton to a common destnaton va other sensor nodes, servng as relay nodes he sensor nodes, whch gather nformaton, are referred to as hs work s supported y Australan Research Councl Dscovery Proect DP and the Chna Scholarshp Councl (CSC) source nodes As the source and the relay nodes are n dfferent spatal locatons, the destnaton node receves replcas of the transmtted sgnal va multple nodes, ts sgnal wll have hgher spacal dversty and hence etter performance [6] owever, relay nodes may consume consderale amounts of rado spectrum and energy If not used properly, they may cause further spectrum congeston and nterference Network codng (NC) [7] s a novel approach, n whch the relay nodes are allowed to encode the packets receved from multple source nodes and send the encoded packets nstead Codng operatons enale the relay nodes to compress the nformaton, and whenever possle, to reduce the numer of transmssons and andwdth consumpton and/or maxmzng the transmsson relalty he dea of NC can e appled to WSNs In [8], extrnsc nformaton transfer (EXI) charts are employed to desgn the rregular low-densty generator matrx (LDGM) codes ased on a sngle sesson model In ths paper, we consder a network wth multple sessons We further assume that at each destnaton node, only the nformaton from ts own sesson s requred and the nformaton from other sessons are not allowed to e decoded due to the securty reasons hs assumpton s realstc n some applcaton scenaros n Io For example, n smart meter networks, where multple sensors, measurng water, gas and energy consumptons, communcate wth multple utlty control centres [9] he nformaton from varous utltes, such as for water, gas and energy consumptons, cannot e shared We propose to desgn novel network codng mechansms, referred to as network code dvson multplexng (NCDM) he NCDM scheme can provde securty protecton on physcal layer Furthermore, n order to optmze the overall system performance, ncludng mnmzng nterference, and maxmzng the spectral effcency, dversty and codng gans, we analyze the NCDM scheme desgn and ts performance Based on the analyss results, we propose a new code desgn crtera for the NCDM scheme he remander of the paper s organzed as follows: the system model s ntroduced n Secton II Secton III proposes the NCDM scheme for the parallel sesson model Secton IV analyzes the soft processng algorthm of the NCDM scheme and ntroduces a code desgn crtera Secton V presents the /15/$ IEEE 1861 ISI 015

2 smulaton results Fnally, Secton VI concludes the paper II SYSEM MODEL We consder a wreless network contanng L transmsson sessons In each transmsson sesson, a group of source nodes communcate wth ther common destnaton node through a group of relay nodes he th sesson s denoted y ϕ, where {1,,,L} We assume that n the th sesson there are S source nodes he total numer of source nodes n the L sessons s M = L =1 S Denote the destnaton node of sesson ϕ yd Assume that the network conssts of N relay nodes whch are shared among all the L sessons he th relay node s denoted y R, {1,,,N} he system model s shown n Fg 1 Fg 1 A network graph used to descre the system model he data transmsson from the source nodes to ther destnaton nodes s carred out n three phases: a roadcast phase, a relay phase and a data recovery phase In the roadcast phase, all the source nodes roadcast ther data packets to all the relay and the destnaton nodes Each data packet s composed of three parts: an nformaton data part, a Cyclc Redundancy Check (CRC) part and a header he ndces of the source nodes and the sesson to whch the source node elongs are contaned n the header he nformaton data parts of all data packets have the same length, as well as the CRC parts and the headers A certan MAC layer protocol, eg, me-dvson Multple Access (DMA) or Carrer Sense Multple Access (CSMA), s assumed to e employed hs ensures that the source node transmssons do not cause nterference to each other In the relay phase, each relay node lstens to the transmsson from the source nodes, decodes the receved data packets, checks the correctness of the decoded packets y usng CRC and puts the correctly decoded packets nto ts uffer Snce each relay node only performs hard decson decodng and CRC check, the decodng process s very fast and the delay due to the decodng at each relay node can e neglected hen each relay node selects unformly at random a numer of d r data packets from ts uffer to perform network codng y usng lnear comnatons of the packets n the feld of GF() [10] d r s selected wth proalty Ω dr accordng to the degree dstruton Ω(x) = Ω dr x dr Snce the numer d r s much smaller than the total numer of source nodes, e, d r M, the proalty of the event that the numer of data packets n a relay node s uffer s smaller than d r s neglgly small and we can always assume that the network codng process s achevale hen at each relay node, a network-coded data packet s formed he connecton nformaton of the source and the relay nodes s contaned n the header of each networkcoded data packet Fnally, all the relay nodes roadcast ther network-coded data packets to the destnaton nodes usng a DMA or CSMA MAC layer protocol In the data recovery phase, data packets receved from the source and the relay nodes n the roadcast and relay phases, respectvely, are organzed nto a data matrx We consder the quas-statc Raylegh fadng channels Wthout lose of generalty, we focus our analyss on the th row of the receved data matrx At the destnaton noded, the receved sgnal can e expressed asr = α E (J β)+n, wherer s a row vector of sze 1 (M+N) α s the fadng coeffcent vector of sze 1 (M +N) he fadng coeffcents reman constant over the length of one data packet ut change ndependently etween adacent packets hus, we can assume perfect channel state nformaton (CSI) at the destnaton nodes represents the element-wse multplcaton of the vector E s the average transmtted energy per t J s a 1 (M + N) vector wth all elements equal to 1 he nary sequenceβ s a random row of the data matrx[m 1 m m L ] G, where represents the multplcaton operaton over the feld of GF() [m 1 m m L ] represents the nformaton matrx of the L sessons G s the correspondng LDGM generator matrx seen from D of sze M (M + N) he parameter n = [n,1,n,,,n,m+n ] s the addtve whte Gaussan nose wth a zero mean and a doule sded power spectral densty of / Next, each destnaton node mplements the NCDM scheme to remove the nterference from the source nodes of other sessons Note that snce all the connecton nformaton are contaned n the header of each data packet, the destnaton nodes know how the checks at the relay nodes are formed and can correspondngly replcate the code graph and perform message-passng decodng III E NCDM SCEME FOR A PARALLEL SESSION MODEL WI MORE AN WO SESSIONS In ths secton, we wll ntroduce the NCDM scheme for the parallel sesson model, whch can e used to remove the nter-sesson nterference at each destnaton By a parallel sesson model, we refer to source nodes n multple sessons communcatng wth ther respectve destnatons through a common relay network smultaneously he fundamental dea ehnd the NCDM process takes advantage of the property of G = 0 ere G and are the generator matrx and the party check matrx of the LDGM codes, respectvely hroughout the paper, we denote the LDGM generator matrx seen from the th destnaton node D y G and the correspondng party check matrx y G s of sze 186

3 M (M + N) Let G t represent the tth sumatrx of G and of sze S t (M + N), t {1,,,L} S t s the numer of source nodes n the tth sesson Snce G s a systematc matrx, t can e wrtten as G = [I M P ], where I M represents an M M dentty matrx P s an M N party part matrx Let P t e an S t N party part matrx of G t t s the party-check matrx correspondng to the generator matrx G t o otan sesson ϕ s nformaton at the destnatond, {1,,,L}, the nterference ntroduced from other sessons to ϕ needs to e elmnated hs can e done y multplyng the generator matrx G y ( t ) Usng the property that G t (t ) = 0, t {1,,,L}\, the nterference from other sessons can e removed completely owever, the party check matrx ( t ) s also presented to other sumatrces of G, {1,,,L}\t, as an undesrale y-product For example, when t = 1, after carryng out the frst sesson G 1 s nterference cancelaton process, the successve process of G (1 ) ( ) s not equal to zero due to the contruton of ( 1 ) As a result, the nterference from the second sesson s nformaton cannot e elmnated and the nterference cancelaton process stops o solve( ths prolem, ) 1 n ths paper, we delerately ntroduce a term ( 1 ), so that the product of ( 1 1 ) and ( 1 ) approxmately equals to an dentty matrx I he nterference cancelaton process contnues untl ϕ s nformaton at D s otaned Based on the aove dscusson, the equvalent generator matrx for the th sesson seen from destnaton D s gven y ) ) ) ) G t,t {1,,,L 1}\( t 1 ( t, G L = ( f {1,,L 1} ) G t,t {1,,,L }( t, L 1 f = L where ) ) 1 ( t ) 1 ( t s an nverse matrx of ( t ) ) ( t s a matrx otaned y settng the lnear dependent rows n ( t ) to zeros and keepng other rows unchanged ( Let Φ represent the term of ( ) ) ) ) t,t {1,,L 1}\( t 1 ( t L In a matrx form, Φ can e expressed as 0 S1 A 0 S1 S 0 S1 (B S L ) P 1 0 S 1 A 0 S 1 S 0 S 1 (B S L ) P 1 Φ = 0 S A I S 0 S (B S L ) 0 S N 0 S+1 A 0 S+1 S 0 S+1 (B S L ) P +1, (1) 0 SL A 0 SL S 0 SL (B S L ) P L 0 N A 0 N S 0 N (B S L ) I N } {{ } } {{ } (M S L ) columns N columns where A t = t 1 =1 S, when t L and A t = 0, when t = 1 B t = L =t+1 S, when 1 t L 1 and B t = 0,, when t = L (P t ) s the transpose of the matrx P t [11] For the frst M S L columns, all the elements are equal to zero except an dentty sumatrx I S of sze S S, see (1) For the last N columns of Φ, the frst L sumatrces correspond to the party part matrces of G t, t {1,,L}\ he last N rows form an dentty matrx, as shown n (1) Let [m 1 m m L ] represent an artrary row of the data matrx [m 1 m m L ] At destnaton node D, after the NCDM scheme, we can otan the equvalent receved sgnal as r Φ = [ α E ( J [m1 m m L]G ) ] Φ +n Φ, () where α s the fadng coeffcent of sze 1 (M +N) IV PERFORMANCE ANALYSIS OF E SOF PROCESSING ALGORIM AND CODE DESIGN CRIERIA In [1], the performance of the NCDM scheme for the parallel sesson model wth two sessons was analyzed from the perspectve of matrx In ths secton, we analyze the soft processng algorthm of the NCDM scheme hen, ased on the analyss results, a code desgn crtera s summarzed to etter control the BER performance A Soft Processng Algorthm For a nary random varale X {±1}, ( ts log-lkelhood ) rato (LLR) s defned as l(x) = log Pr{X=+1} P r{x= 1} Susequently, the LLR for a transmtted symol x k at the destnaton node s gven y l k = 4α,k r k E, where α,k s thek th element of the fadng coeffcentα, whch s assumed to e known at the recever For addtve whte Gaussan nose (AWGN) channel, α,k = 1 r k s the receved symol correspondng to the transmtted symol x k Once the LLR values are otaned for all the transmtted symols, we then need to fnd the correspondng nput LLR values for each check node hs can e done y multplyng the LLR values wth each column of the matrx Φ he otaned vectors of the LLR values after the multplcaton are then the LLR values of the nput symols for the check nodes Let Ψ e the set of poston ndces of the non-zero elements of the th column of the matrxφ Let z e the output symol of the th check node hen z = k Ψ x k, where represents the addton operaton over the feld of GF() he output LLR values of each check node can e computed y L = tanh 1( Π k Ψ tanh( l k ) ) ere l k, k Ψ, s the LLR value for the k th nput symol of the check node B Analyss of the Soft Processng Algorthm Let Υ t represent the set formed y the ndces of postons of all the non-zero elements n the th column of P t Let z e the output symol of the th check node of the generator matrx, and let x t,k represent the k transmtted symol of the tth sesson, where t {1,,,L} When M < M + N, the output symol of the th check node can e wrtten as z = L t=1 x t t,k he encoded vector correspondng to the generator matrx 1863

4 seen from the th destnaton node can e wrtten as x = [x 1,1,,x 1,S1,,x t,1,,x t,st,,x L,1,,x L,SL, z M+1,,z,,z M+N ] Let l t,k e the LLR value of the k th receved symol correspondng to the transmtted symol from the tth sesson It can e computed y l t,k = 4α t,k r t,k E, (3) where α t,k s the k th element of the fadng coeffcent α t, whch s assumed to e known at the recever for decodng When 0 M, the receved symol correspondng to the transmtted symol x t,k s r t,k = α t,k (1 x t,k ) + n t,k When M < M +N, the receved symol s r = α (1 z )+n After performng the NCDM scheme, the output LLR values of each check node can e represented y L = tanh 1 lt,k tanh (4) t,t {1,,,L} t he values of the frst M output LLR values can e splt nto three regons, e, 0 < 1 =1 S, 1 =1 S < =1 S, and =1 S < M For the regons where 0 < 1 =1 S and =1 S < M, the output LLR values are L = 0 For the regon where 1 =1 S < =1 S, the output LLR value can e wrtten as L = l, For the last N output LLR values, e, M < M +N, we expect that they are n the form of L = l, ere l, represents the LLR value for the th receved symol at the destnaton node D owever, the th output LLR value when M < M +N can e wrtten as (6) For the frst part lt,k n (6), ts expected value s 1 Let x represent the asolute value of x Snce 0 tanh lt,k < 1, the more product terms there are, the smaller the value lt,k s hus, n order to otan etter performance, the column weght of the generator matrx of each user should e as small as possle Also t can e seen that the larger the value of L s, the smaller the value lt,k s It means that as the numer of the parallel sessons ncreases, the value of ths part ecomes smaller Accordngly, the performance of the system ecomes worse α,e For the second part tanh[ α, (1 x,k )) )] x t t,k + n, l, n (6), ts expected form s tanh, e, α,e tanh[ α, (1 )] x,k ))+n, Now, we focus on analyzng the second part of (6) here are four possle cases for the values of the comnaton of x,k and x t t,k he four cases are shown elow 1 : x t t,k = 0, x,k = 0 : x t t,k = 0, x,k = 1 3 : x t t,k = 1, x,k = 0 4 : x t t,k = 1, x,k = 1 For the frst two cases, e, case 1 and case, the second part of (6) ( can e wrtten ( as the expected form, α,e e, tanh[ α, (1 )] x,k ))+n, For case 3, the( second part ( of (6) can e wrtten α,e as tanh[ α, (1 ) x,k ))+n, 4α, E ] And for case 4, the second part can e wrtten α,e as tanh[ α, (1 ) x,k ))+n, + 4α, E ] In order to acheve the expected form of the second part, we should try to avod the case 3 and case 4 herefore, the value of x t t,k s expected to e zero It can e seen that the value of ths part has drect relatonshp wth the numer of the parallel sessons L x t t,k s the sum of the transmtted symols from the L 1 sessons except the th sesson, where x t,k equals to 0 or 1 wth equal proalty, e, P r (x t,k = 0) = P r (x t,k = 1) = 1 C Code Desgn Crtera As mentoned n Secton III,G s the generator matrx seen from the th destnaton node D G t s the tth sumatrx of G Based on the aove analyss, we can summarze the code desgn crtera as When L s an even numer, the column weght of each sumatrx of the generator matrx G, e, G t, where t {1,,,L}, must e an even numer When L s an odd numer, the column weght of each sumatrx of the generator matrx G can e an odd or even numer V SIMULAION RESULS In ths secton, we present smulaton results for the parallel sesson model wth the NCDM scheme We consder a WSN wth L = 3 and 4 transmsson sessons, respectvely Each transmsson sesson has 500 source nodes, sendng data packets to ther correspondng destnaton nodes va a common mult-hop relay network here are 1500 relay nodes when L = 3, and 000 relay nodes when L = 4 We assume that all source nodes have data packets to transmt All the sourcerelay channels n the network are spatally ndependent and have equal transmttng power In the presented fgures, the lael PSM corresponds to the parallel sesson model, and SSM refers to the seral sesson model Fg (a) presents the performance comparson of varous column weghts of G t, (e, ρ = and ρ = 3), for an even numer of sessons (e, L = 4) When the numer of sessons L s an even numer, f the column weght ρ of G t s an even numer, the BER performance gap etween the seral sesson model and parallel sesson model s smaller than the 1864

5 { } L = tanh 1 lt,k anh α,e α, 1 x t N t,k + n, 0 t,t {1,,L} k Υ t { = tanh 1 lt,k anh α,e t α, 1 } x,k x t,k + n, (6) t,t {1,,L}\ k Υ t one for the case when ρ s an odd numer Note that when the column weght ρ s an odd numer, the BER performance of the parallel sesson model gets worse Fg () presents the performance comparson of varous column weghts ofg t, (e, ρ = and ρ = 3), wth an odd numer of sessons (e, L = 3) he smaller the column weght ρ of G t s, the closer the BER performance of parallel sesson model wth NCDM to that of the seral sesson model From Fg () we can see that when ρ =, the BER performance of the parallel sesson model s very close to the one for the seral sesson model he oservaton s consstent wth the theoretcal results BER BER AWGN,ρ=,SSM AWGN,ρ=,PSM AWGN,ρ=3,SSM AWGN,ρ=3,PSM Fadng,ρ=,SSM Fadng,ρ=,PSM Fadng,ρ=3,SSM Fadng,ρ=3,PSM AWGN,Rep Codes,d=4 Fadng,Rep Codes,d= E /N (db) (a) he numer of sessons s L = 4 AWGN,ρ=,SSM AWGN,ρ=,PSM AWGN,ρ=3,SSM AWGN,ρ=3,PSM Fadng,ρ=,SSM Fadng,ρ=,PSM Fadng,ρ=3,SSM Fadng,ρ=3,PSM AWGN,Rep Codes,d=3 Fadng,Rep Codes,d= E / (db) () he numer of sessons s L = 3 Fg he BER performance comparson etween two dfferent column weghts of generator matrx, e, ρ = and ρ = 3, over AWGN and Raylegh fadng channels, respectvely he numer of sessons s L = 3 and 4 For the Raylegh fadng channel, the BER performance gap etween the seral sesson and parallel sesson model s much larger than that of the AWGN channel hat s ecause the effect of the resdual nterference from other sessons to the performance s relatvely large for fadng channel For comparson, the BER performance for repetton codes s also plotted After usng the NCDM scheme at each dest- 1 naton node, the code rate ecomes L+1 hus we compare the performance of our proposed scheme wth the repetton code wth parameter d = L, e, the messages are repeated L tmes From Fg, t can e seen that the proposed system acheves a sgnfcantly BER performance gan compared wth the system wth the repetton codes n a hgh sgnal to nose rato (SNR) regon VI CONCLUSION In ths work, we proposed a novel network code dvson multplexng scheme for the parallel sesson model We analyzed the soft processng algorthm of the NCDM scheme Based on the analytcal results, a code desgn crtera for the generator matrx constructon method was proposed Smulaton results showed that the prolems caused y the NCDM scheme can e managed effectvely and the BER performance can e mproved sgnfcantly y followng the desgn crtera REFERENCES [1] unter and A Nosratna, Dversty through coded cooperaton, IEEE rans Wreless Commun, vol 5, no, pp 83 89, Fe 006 [] B Zhao and M Valent, Dstruted turo codes: owards the capacty of the relay channel, IEEE VC 03-Fall, vol 1, pp 3 36, Oct 003 [3] S Yu, R Schoer, and L Lampe, Dstruted space-tme lock codng, IEEE rans Commun, vol 54, no 7, pp , Jul 006 [4] A Chakraart, A Baynast, A Saharwal, and B Aazhang, Low densty party check codes for the relay channel, IEEE J Sel Areas Commun, vol 5, no, pp 80 91, Fe 007 [5] L Atzor, A Iera, and G Morato, he nternet of thngs: a survey, Computer Networks, vol 54, no 15, pp , Oct 010 [6] M Dohler, Y L, B Vucetc, A Aghvam, M Arndt, and D Barthel, Performance analyss of dstruted space-tme lock-encoded sensor networks, IEEE rans Veh echnol, vol 55, no 6, pp , Nov 006 [7] R Ahlswede, N Ca, S L, and R Yeung, Network nformaton flow, IEEE rans Inf heory, vol 46, no 4, pp , Jul 000 [8] K Pang, Z Ln, Y L, and B Vucetc, Desgn of dstruted networkchannel codes for wreless sensor networks, n Proc of IEEE ICC 11, Kyoto, Japan, Jun 011, pp 1 5 [9] (011) Newngton smart vllage [Onlne] Avalale: proects/smart-grd-proects/smart-grd-smart-cty/newngton-smart- Vllageaspx [10] S Ln and D Costello, Error Control Codng: Fundamentals and Applcatons, nd ed New Jersey: Prentce all, 004 [11] J Gentle, Matrx Algera: heory, Computatons, and Applcatons n Statstcs, 1st ed New York: Sprnger, 007 [1] J Yue, K Pang, Z Ln, Y L, B Ba, and B Vucetc, Dstruted network channel codng for multple access relay nterference channels, n Proc IEEE Gloecom 1, Anahem, CA, USA, Dec 01, pp

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

LAMOR: Lifetime-Aware Multipath Optimized Routing Algorithm for Video Transmission over Ad Hoc Networks

LAMOR: Lifetime-Aware Multipath Optimized Routing Algorithm for Video Transmission over Ad Hoc Networks LAMOR: Lfetme-Aware Multpath Optmzed Routng Algorthm for Vdeo ransmsson over Ad Hoc Networks 1 Lansheng an, Lng Xe, Kng-m Ko, Mng Le and Moshe Zukerman Abstract Multpath routng s a key technque to support

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Adaptive Voice Smoother with Optimal Playback Delay for New Generation VoIP Services

Adaptive Voice Smoother with Optimal Playback Delay for New Generation VoIP Services Adaptve Voce Smoother wth Optmal Playack Delay for New Generaton VoIP Servces Shyh-Fang Huang 1, Erc Hsao-Kuang Wu 2, and Pao-Ch Chang 3 1 Department of Electrcal Engneerng, Natonal Central Unversty, Tawan,

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

An Ad Hoc Network Load Balancing Energy- Efficient Multipath Routing Protocol

An Ad Hoc Network Load Balancing Energy- Efficient Multipath Routing Protocol 246 JOURNA OF SOFTWAR, VO. 9, NO. 1, JANUARY 2014 An Ad Hoc Network oad alancng nergy- ffcent Multpath Routng Protocol De-jn Kong Shanx Fnance and Taxaton College, Tayuan, Chna mal: dejnkong@163.com Xao-lng

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com

More information

A role based access in a hierarchical sensor network architecture to provide multilevel security

A role based access in a hierarchical sensor network architecture to provide multilevel security 1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

An Efficient Recovery Algorithm for Coverage Hole in WSNs

An Efficient Recovery Algorithm for Coverage Hole in WSNs An Effcent Recover Algorthm for Coverage Hole n WSNs Song Ja 1,*, Wang Balng 1, Peng Xuan 1 School of Informaton an Electrcal Engneerng Harbn Insttute of Technolog at Weha, Shanong, Chna Automatc Test

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

DISTRIBUTED storage systems have been becoming increasingly

DISTRIBUTED storage systems have been becoming increasingly 268 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 28, NO. 2, FEBRUARY 2010 Cooperatve Recovery of Dstrbuted Storage Systems from Multple Losses wth Network Codng Yuchong Hu, Ynlong Xu, Xaozhao

More information

ADAPTIVE WIENER-TURBO SYSTEM AND ADAPTIVE WIENER-TURBO SYSTEMS WITH JPEG & BIT PLANE COMPRESSIONS

ADAPTIVE WIENER-TURBO SYSTEM AND ADAPTIVE WIENER-TURBO SYSTEMS WITH JPEG & BIT PLANE COMPRESSIONS ISTANBUL UNIVERSITY JOURNAL OF ELECTRICAL & ELECTRONICS ENGINEERING YEAR VOLUME NUMBER : 2007 : 7 : 1 (257-276) ADAPTIVE WIENER-TURBO SYSTEM AND ADAPTIVE WIENER-TURBO SYSTEMS WITH JPEG & BIT PLANE COMPRESSIONS

More information

On Secrecy Capacity Scaling in Wireless Networks

On Secrecy Capacity Scaling in Wireless Networks On Secrecy Capacty Scalng n Wreless Networks O. Ozan Koyluoglu, Student Member, IEEE, C. Emre Koksal, Member, IEEE, and esham El Gamal, Fellow, IEEE arxv:0908.0898v [cs.it] 0 Apr 00 Abstract Ths work studes

More information

Priv-Code: Preserving Privacy Against Traffic Analysis through Network Coding for Multihop Wireless Networks

Priv-Code: Preserving Privacy Against Traffic Analysis through Network Coding for Multihop Wireless Networks Prv-Code: Preservng Prvacy Aganst Traffc Analyss through Networ Codng for Multhop Wreless Networs Zhguo Wan, Ka Xng, Yunhao Lu MOE Key Lab for Informaton System Securty, School of Software, Tsnghua Natonal

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

Automated information technology for ionosphere monitoring of low-orbit navigation satellite signals

Automated information technology for ionosphere monitoring of low-orbit navigation satellite signals Automated nformaton technology for onosphere montorng of low-orbt navgaton satellte sgnals Alexander Romanov, Sergey Trusov and Alexey Romanov Federal State Untary Enterprse Russan Insttute of Space Devce

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks

Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks Coordnated Denal-of-Servce Attacks n IEEE 82.22 Networks Y Tan Department of ECE Stevens Insttute of Technology Hoboken, NJ Emal: ytan@stevens.edu Shamk Sengupta Department of Math. & Comp. Sc. John Jay

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com G. G. Md. Nawaz Al 1,2, Rajb Chakraborty 2, Md. Shhabul Alam 2 and Edward Chan 1 1 Cty Unversty of Hong Kong, Hong Kong, Chna taposh_kuet20@yahoo.comcsedchan@ctyu.edu.hk 2 Khulna Unversty of Engneerng

More information

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks 2007 Internatonal Conference on Convergence Informaton Technology An Adaptve and Dstrbuted Clusterng Scheme for Wreless Sensor Networs Xnguo Wang, Xnmng Zhang, Guolang Chen, Shuang Tan Department of Computer

More information

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of

More information

Dynamic Fleet Management for Cybercars

Dynamic Fleet Management for Cybercars Proceedngs of the IEEE ITSC 2006 2006 IEEE Intellgent Transportaton Systems Conference Toronto, Canada, September 17-20, 2006 TC7.5 Dynamc Fleet Management for Cybercars Fenghu. Wang, Mng. Yang, Ruqng.

More information

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. XX, MONTH 2XX 1 Effcent On-Demand Data Servce Delvery to Hgh-Speed Trans n Cellular/Infostaton Integrated Networks Hao Lang, Student Member,

More information

8 Algorithm for Binary Searching in Trees

8 Algorithm for Binary Searching in Trees 8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the

More information

Time Domain simulation of PD Propagation in XLPE Cables Considering Frequency Dependent Parameters

Time Domain simulation of PD Propagation in XLPE Cables Considering Frequency Dependent Parameters Internatonal Journal of Smart Grd and Clean Energy Tme Doman smulaton of PD Propagaton n XLPE Cables Consderng Frequency Dependent Parameters We Zhang a, Jan He b, Ln Tan b, Xuejun Lv b, Hong-Je L a *

More information

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks Master s Thess Ttle Confgurng robust vrtual wreless sensor networks for Internet of Thngs nspred by bran functonal networks Supervsor Professor Masayuk Murata Author Shnya Toyonaga February 10th, 2014

More information

PRACTICE 1: MUTUAL FUNDS EVALUATION USING MATLAB.

PRACTICE 1: MUTUAL FUNDS EVALUATION USING MATLAB. PRACTICE 1: MUTUAL FUNDS EVALUATION USING MATLAB. INDEX 1. Load data usng the Edtor wndow and m-fle 2. Learnng to save results from the Edtor wndow. 3. Computng the Sharpe Rato 4. Obtanng the Treynor Rato

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

Properties of Indoor Received Signal Strength for WLAN Location Fingerprinting

Properties of Indoor Received Signal Strength for WLAN Location Fingerprinting Propertes of Indoor Receved Sgnal Strength for WLAN Locaton Fngerprntng Kamol Kaemarungs and Prashant Krshnamurthy Telecommuncatons Program, School of Informaton Scences, Unversty of Pttsburgh E-mal: kakst2,prashk@ptt.edu

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre

More information

SPEED: A Stateless Protocol for Real-Time Communication in Sensor Networks

SPEED: A Stateless Protocol for Real-Time Communication in Sensor Networks : A Stateless Protocol for Real-Tme Communcaton n Sensor Networks Tan He a John A Stankovc a Chenyang Lu b Tarek Abdelzaher a a Department of Computer Scence b Department of Computer Scence & Engneerng

More information

A New Quality of Service Metric for Hard/Soft Real-Time Applications

A New Quality of Service Metric for Hard/Soft Real-Time Applications A New Qualty of Servce Metrc for Hard/Soft Real-Tme Applcatons Shaoxong Hua and Gang Qu Electrcal and Computer Engneerng Department and Insttute of Advanced Computer Study Unversty of Maryland, College

More information

A heuristic task deployment approach for load balancing

A heuristic task deployment approach for load balancing Xu Gaochao, Dong Yunmeng, Fu Xaodog, Dng Yan, Lu Peng, Zhao Ja Abstract A heurstc task deployment approach for load balancng Gaochao Xu, Yunmeng Dong, Xaodong Fu, Yan Dng, Peng Lu, Ja Zhao * College of

More information

A Fast Incremental Spectral Clustering for Large Data Sets

A Fast Incremental Spectral Clustering for Large Data Sets 2011 12th Internatonal Conference on Parallel and Dstrbuted Computng, Applcatons and Technologes A Fast Incremental Spectral Clusterng for Large Data Sets Tengteng Kong 1,YeTan 1, Hong Shen 1,2 1 School

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

One-Shot Games for Spectrum Sharing among Co-Located Radio Access Networks

One-Shot Games for Spectrum Sharing among Co-Located Radio Access Networks One-Shot Games for Spectrum Sharng among Co-Located Rado Access etwors Sofonas Halu, Alexs A. Dowhuszo, Olav Tronen and Lu We Department of Communcatons and etworng, Aalto Unversty, P.O. Box 3000, FI-00076

More information

Inter-domain Routing in Optical Networks with Wavelength Converters

Inter-domain Routing in Optical Networks with Wavelength Converters Inter-doman Routng n Optcal Networks wth Wavelength Converters Anteneh Beshr, Marcelo Yannuzz, and Fernando Kupers Network Archtectures and Servces Delft Unversty of Technology Mekelweg 4, 2628 CD Delft,

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

Wireless Inter-Session Network Coding - An Approach Using Virtual Multicasts

Wireless Inter-Session Network Coding - An Approach Using Virtual Multicasts Wreless Inter-Sesson Network Codng - An Approach Usng Vrtual Multcasts Mchael Hendlmaer,DesmondS.Lun,DanalTraskov,andMurelMédard Insttute for Communcatons Engneerng CCIB RLE Technsche Unverstät München

More information

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services When Network Effect Meets Congeston Effect: Leveragng Socal Servces for Wreless Servces aowen Gong School of Electrcal, Computer and Energy Engeerng Arzona State Unversty Tempe, AZ 8587, USA xgong9@asuedu

More information

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network On Fle Delay Mnmzaton for Content Uploadng to Meda Cloud va Collaboratve Wreless Network Ge Zhang and Yonggang Wen School of Computer Engneerng Nanyang Technologcal Unversty Sngapore Emal: {zh0001ge, ygwen}@ntu.edu.sg

More information

A DATA MINING APPLICATION IN A STUDENT DATABASE

A DATA MINING APPLICATION IN A STUDENT DATABASE JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

VoIP over Multiple IEEE 802.11 Wireless LANs

VoIP over Multiple IEEE 802.11 Wireless LANs SUBMITTED TO IEEE TRANSACTIONS ON MOBILE COMPUTING 1 VoIP over Multple IEEE 80.11 Wreless LANs An Chan, Graduate Student Member, IEEE, Soung Chang Lew, Senor Member, IEEE Abstract IEEE 80.11 WLAN has hgh

More information

VOLUME 5 BLAGOEVGRAD, BULGARIA SCIENTIFIC. Research ELECTRONIC ISSUE ISSN 1312-7535

VOLUME 5 BLAGOEVGRAD, BULGARIA SCIENTIFIC. Research ELECTRONIC ISSUE ISSN 1312-7535 VOLUME 5 007 BLAGOEVGRAD, BULGARIA SCIENTIFIC Research ISSN 131-7535 ELECTRONIC ISSUE IMPROVING FAIRNESS IN CDMA-HDR NETWORKS Valentn Hrstov Abstract. Improvng throughput and farness n Cellular Data Networks

More information

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan

More information

Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks

Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks Secure Walkng GPS: A Secure Localzaton and Key Dstrbuton Scheme for Wreless Sensor Networks Q M, John A. Stankovc, Radu Stoleru 2 Department of Computer Scence, Unversty of Vrgna, USA 2 Department of Computer

More information

Dynamic Pricing for Smart Grid with Reinforcement Learning

Dynamic Pricing for Smart Grid with Reinforcement Learning Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,

More information

Implementation of Deutsch's Algorithm Using Mathcad

Implementation of Deutsch's Algorithm Using Mathcad Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"

More information

How To Improve Power Demand Response Of A Data Center Wth A Real Time Power Demand Control Program

How To Improve Power Demand Response Of A Data Center Wth A Real Time Power Demand Control Program Demand Response of Data Centers: A Real-tme Prcng Game between Utltes n Smart Grd Nguyen H. Tran, Shaole Ren, Zhu Han, Sung Man Jang, Seung Il Moon and Choong Seon Hong Department of Computer Engneerng,

More information

Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks

Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks The Scentfc World Journal Volume 3, Artcle ID 43796, pages http://dx.do.org/.55/3/43796 Research Artcle QoS and Energy Aware Cooperatve Routng Protocol for Wldfre Montorng Wreless Sensor Networks Mohamed

More information

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn

More information

Adaptive Fractal Image Coding in the Frequency Domain

Adaptive Fractal Image Coding in the Frequency Domain PROCEEDINGS OF INTERNATIONAL WORKSHOP ON IMAGE PROCESSING: THEORY, METHODOLOGY, SYSTEMS AND APPLICATIONS 2-22 JUNE,1994 BUDAPEST,HUNGARY Adaptve Fractal Image Codng n the Frequency Doman K AI UWE BARTHEL

More information

Downlink Power Allocation for Multi-class. Wireless Systems

Downlink Power Allocation for Multi-class. Wireless Systems Downlnk Power Allocaton for Mult-class 1 Wreless Systems Jang-Won Lee, Rav R. Mazumdar, and Ness B. Shroff School of Electrcal and Computer Engneerng Purdue Unversty West Lafayette, IN 47907, USA {lee46,

More information

A Perfect QoS Routing Algorithm for Finding the Best Path for Dynamic Networks

A Perfect QoS Routing Algorithm for Finding the Best Path for Dynamic Networks A Perfect QoS Routng Algorthm for Fndng the Best Path for Dynamc Networks Hazem M. El-Bakry Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, EGYPT helbakry20@yahoo.com Nkos Mastoraks

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

+ + + - - This circuit than can be reduced to a planar circuit

+ + + - - This circuit than can be reduced to a planar circuit MeshCurrent Method The meshcurrent s analog of the nodeoltage method. We sole for a new set of arables, mesh currents, that automatcally satsfy KCLs. As such, meshcurrent method reduces crcut soluton to

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

Performance Analysis of Time-of-Arrival Mobile Positioning in Wireless Cellular CDMA Networks

Performance Analysis of Time-of-Arrival Mobile Positioning in Wireless Cellular CDMA Networks Performance Analyss of Tme-of-Arrval Moble Postonng n Wreless Cellular CDMA Networks 437 1 X Performance Analyss of Tme-of-Arrval Moble Postonng n Wreless Cellular CDMA Networks M. A.Landols, A. H. Muqabel,

More information

Multi-Source Video Multicast in Peer-to-Peer Networks

Multi-Source Video Multicast in Peer-to-Peer Networks ult-source Vdeo ultcast n Peer-to-Peer Networks Francsco de Asís López-Fuentes*, Eckehard Stenbach Technsche Unverstät ünchen Insttute of Communcaton Networks, eda Technology Group 80333 ünchen, Germany

More information

LIFETIME INCOME OPTIONS

LIFETIME INCOME OPTIONS LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com

More information

Rapid Estimation Method for Data Capacity and Spectrum Efficiency in Cellular Networks

Rapid Estimation Method for Data Capacity and Spectrum Efficiency in Cellular Networks Rapd Estmaton ethod for Data Capacty and Spectrum Effcency n Cellular Networs C.F. Ball, E. Humburg, K. Ivanov, R. üllner Semens AG, Communcatons oble Networs unch, Germany carsten.ball@semens.com Abstract

More information

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng Envronment Congcong Xong, Long Feng, Lxan Chen A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng

More information

AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION

AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION The Medterranean Journal of Computers and Networks, Vol. 2, No. 1, 2006 57 AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION L. Bada 1,*, M. Zorz 2 1 Department of Engneerng,

More information

Energy Conserving Routing in Wireless Ad-hoc Networks

Energy Conserving Routing in Wireless Ad-hoc Networks Energy Conservng Routng n Wreless Ad-hoc Networks Jae-Hwan Chang and Leandros Tassulas Department of Electrcal and Computer Engneerng & Insttute for Systems Research Unversty of Maryland at College ark

More information

Distributed Multi-Target Tracking In A Self-Configuring Camera Network

Distributed Multi-Target Tracking In A Self-Configuring Camera Network Dstrbuted Mult-Target Trackng In A Self-Confgurng Camera Network Crstan Soto, B Song, Amt K. Roy-Chowdhury Department of Electrcal Engneerng Unversty of Calforna, Rversde {cwlder,bsong,amtrc}@ee.ucr.edu

More information

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays VoIP Playout Buffer Adjustment usng Adaptve Estmaton of Network Delays Mroslaw Narbutt and Lam Murphy* Department of Computer Scence Unversty College Dubln, Belfeld, Dubln, IRELAND Abstract The poor qualty

More information

v a 1 b 1 i, a 2 b 2 i,..., a n b n i.

v a 1 b 1 i, a 2 b 2 i,..., a n b n i. SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Mining Multiple Large Data Sources

Mining Multiple Large Data Sources The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 2 24 Mnng Multple Large Data Sources Anmesh Adhkar, Pralhad Ramachandrarao 2, Bhanu Prasad 3, and Jhml Adhkar 4 Department of

More information

Statistical Methods to Develop Rating Models

Statistical Methods to Develop Rating Models Statstcal Methods to Develop Ratng Models [Evelyn Hayden and Danel Porath, Österrechsche Natonalbank and Unversty of Appled Scences at Manz] Source: The Basel II Rsk Parameters Estmaton, Valdaton, and

More information

MONITORING METHODOLOGY TO ASSESS THE PERFORMANCE OF GSM NETWORKS

MONITORING METHODOLOGY TO ASSESS THE PERFORMANCE OF GSM NETWORKS Electronc Communcatons Commttee (ECC) wthn the European Conference of Postal and Telecommuncatons Admnstratons (CEPT) MONITORING METHODOLOGY TO ASSESS THE PERFORMANCE OF GSM NETWORKS Athens, February 2008

More information

How To Improve Delay Throughput In Wireless Networks With Multipath Routing And Channel Codeing

How To Improve Delay Throughput In Wireless Networks With Multipath Routing And Channel Codeing Delay-Throughput Enhancement n Wreless Networs wth Mult-path Routng and Channel Codng Kevan Ronas, Student Member, IEEE, Amr-Hamed Mohsenan-Rad, Member, IEEE, Vncent W.S. Wong, Senor Member, IEEE, Sathsh

More information

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Comparison of Control Strategies for Shunt Active Power Filter under Different Load Conditions

Comparison of Control Strategies for Shunt Active Power Filter under Different Load Conditions Comparson of Control Strateges for Shunt Actve Power Flter under Dfferent Load Condtons Sanjay C. Patel 1, Tushar A. Patel 2 Lecturer, Electrcal Department, Government Polytechnc, alsad, Gujarat, Inda

More information