Application-Aware Data Collection in Wireless Sensor Networks

Size: px
Start display at page:

Download "Application-Aware Data Collection in Wireless Sensor Networks"

Transcription

1 This image cannot currently be displayed. Application-Aware Data Collection in Wireless Sensor Networks Fang Xiaolin, Gao Hong, Li Jianzhong Harbin Institute of Technology Li Yingshu Georgia State University

2 Outline Existing work Our problem An approximation algorithm A special instance Simulations 2

3 Existing work Multi-application based data collection Data sharing [9] Sample as less data as possible Existing work studies data point sampling Data point 3

4 Our problem Multi-application based data collection Sample data for a continuous interval Acoustic, video information [10], [11] Vibration measurement [12], [13], [14] Speed information [15] Sample an interval 4

5 Problem definition Given a set of n tasks T, each task Ti is denoted as Ti = <bi,ei,li> bi: beginning time ei: end time li: data sampling interval length Find a continuous sub-interval Ii for each task Ti so that 5

6 Problem complexity Non-linear non-convex optimization problem Nonlinear integer programming problem, If bi,ei,li are regarded as integers 6

7 Greedy algorithm overview 1. Sort by end times 2. Find task set P overlap with first 3. Find solution for P, and Remove 4. Back to step 2 7

8 Greedy algorithm overview 1. Sort by end times 2. Find task set P overlap with first 3. Find solution for P, and Remove 4. Back to step 2 8

9 Greedy algorithm overview 1. Sort by end times 2. Find task set P overlap with first 3. Find solution for P, and Remove 4. Back to step 2 9

10 Greedy algorithm overview 1. Sort by end times 2. Find task set P overlap with first 3. Find solution for P, and Remove 4. Back to step 2 10

11 Find solution for P Compute [s,e] for the tasks overlap with each other s=5 e=14 [s,e]=[5,14] 11

12 Approximation algorithm analysis Approximation ratio is 2 Time complexity is 12

13 A special instance General problem Ti = <bi,ei,li> Special instance Ti = <bi,ei,l> The data lengths are the same Can be solved in O(n 2 ) 13

14 Algorithm overview 1. Sort by the end times 2. Remove tasks cover other tasks 3. Dynamic programming Does not affect the result 14

15 Algorithm overview 1. Sort by the end times 2. Remove tasks cover other tasks 3. Dynamic programming 15

16 Algorithm overview 1. Sort by the end times 2. Remove tasks cover other tasks 3. Dynamic programming Computing x(i,j), then x(1,n) is the result [3,7] [5,9] [12,16] x(i,j) [s,e] x(1,1) [3,7] x(2,2) [5,9] x(3,3) [12,16] x(1,2) [3,8] x(2,3) [5,10] 16

17 Algorithm overview 1. Sort by the end times 2. Remove tasks cover other tasks 3. Dynamic programming Computing x(i,j), then x(1,n) is the result [3,8] x(i,j) [s,e] x(1,1) [3,7] x(2,2) [5,9] x(3,3) [12,16] x(1,2) [3,8] x(2,3) [5,10] 17

18 Algorithm overview 1. Sort by the end times 2. Remove tasks cover other tasks 3. Dynamic programming Computing x(i,j), then x(1,n) is the result [5,10] x(i,j) [s,e] x(1,1) [3,7] x(2,2) [5,9] x(3,3) [12,16] x(1,2) [3,8] x(2,3) [5,10] 18

19 Algorithm overview 1. Sort by the end times 2. Remove tasks cover other tasks 3. Dynamic programming x(1,3) = Computing x(i,j), then x(1,n) is the result min [3,10] x(1,1) U + x(2,3) x(1,2) U + x(3,3) x(i,j) [s,e] x(1,1) [3,7] x(2,2) [5,9] x(3,3) [12,16] x(1,2) [3,8] x(2,3) [5,10] 19

20 Tossim Four cases Simulation Tasks are from multi-applications Each application consists of periodical tasks 20

21 Simulation short sampling interval lengths 21

22 Simulation longer sampling interval lengths 22

23 Simulation Different Window size 23

24 Simulation Data loss 24

25 25

K-Cover of Binary sequence

K-Cover of Binary sequence K-Cover of Binary sequence Prof Amit Kumar Prof Smruti Sarangi Sahil Aggarwal Swapnil Jain Given a binary sequence, represent all the 1 s in it using at most k- covers, minimizing the total length of all

More information

Solutions to Homework 6

Solutions to Homework 6 Solutions to Homework 6 Debasish Das EECS Department, Northwestern University ddas@northwestern.edu 1 Problem 5.24 We want to find light spanning trees with certain special properties. Given is one example

More information

Real-Time Scheduling (Part 1) (Working Draft) Real-Time System Example

Real-Time Scheduling (Part 1) (Working Draft) Real-Time System Example Real-Time Scheduling (Part 1) (Working Draft) Insup Lee Department of Computer and Information Science School of Engineering and Applied Science University of Pennsylvania www.cis.upenn.edu/~lee/ CIS 41,

More information

Graduate School of Science and Technology

Graduate School of Science and Technology Contents Master's Course 2 Three Common Courses 2 Materials and Life Science Course 2 Computer and Information Science Course 3 Electrical and Mechanical Engineering Course 3 Doctor's Course 5 Materials

More information

CONTROL, COMMUNICATION & SIGNAL PROCESSING (CCSP)

CONTROL, COMMUNICATION & SIGNAL PROCESSING (CCSP) CONTROL, COMMUNICATION & SIGNAL PROCESSING (CCSP) KEY RESEARCH AREAS Data compression for speech, audio, images, and video Digital and analog signal processing Image and video processing Computer vision

More information

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Sagar M Mane Walchand Institute of Technology Solapur. India. Solapur University, Solapur. S.S.Apte Walchand Institute

More information

1 Simulating Brownian motion (BM) and geometric Brownian motion (GBM)

1 Simulating Brownian motion (BM) and geometric Brownian motion (GBM) Copyright c 2013 by Karl Sigman 1 Simulating Brownian motion (BM) and geometric Brownian motion (GBM) For an introduction to how one can construct BM, see the Appendix at the end of these notes A stochastic

More information

Research Article Cloud Platform Based on Mobile Internet Service Opportunistic Drive and Application Aware Data Mining

Research Article Cloud Platform Based on Mobile Internet Service Opportunistic Drive and Application Aware Data Mining Electrical and Computer Engineering Volume 25, Article ID 357378, 7 pages http://dx.doi.org/.55/25/357378 Research Article Cloud Platform Based on Mobile Internet Service Opportunistic Drive and Application

More information

Load-Balanced Virtual Backbone Construction for Wireless Sensor Networks

Load-Balanced Virtual Backbone Construction for Wireless Sensor Networks Load-Balanced Virtual Backbone Construction for Wireless Sensor Networks Jing (Selena) He, Shouling Ji, Yi Pan, Zhipeng Cai Department of Computer Science, Georgia State University, Atlanta, GA, USA, {jhe9,

More information

Planning and Scheduling in Manufacturing and Services

Planning and Scheduling in Manufacturing and Services Michael L. Pinedo Planning and Scheduling in Manufacturing and Services Second edition 4y Springer Preface Contents of CD-ROM vii xvii Part I Preliminaries 1 Introduction 3 1.1 Planning and Scheduling:

More information

Design of a Bundle Shopbot. Abstract

Design of a Bundle Shopbot. Abstract Design of a Bundle Shopbot Robert Garfinkel 1 (Email: robert.garfinkel@business.uconn.edu) Ram Gopal 1 (Email: ram@business.uconn.edu) Arvind Tripathi 2 (Email: tripathi@u.washington.edu) Fang Yin 1 (Email:

More information

SDN-based Application-Aware Networking on the Example of YouTube Video Streaming

SDN-based Application-Aware Networking on the Example of YouTube Video Streaming Institute of Computer Science Chair of Communication Networks Prof. Dr.-Ing. P. Tran-Gia SDN-based Application-Aware Networking on the Example of YouTube Video Streaming www3.informatik.uni-wuerzburg.de

More information

Near Optimal Solutions

Near Optimal Solutions Near Optimal Solutions Many important optimization problems are lacking efficient solutions. NP-Complete problems unlikely to have polynomial time solutions. Good heuristics important for such problems.

More information

JOB/scheduling system is one of the core and challenging. An Greedy-Based Job Scheduling Algorithm in Cloud Computing

JOB/scheduling system is one of the core and challenging. An Greedy-Based Job Scheduling Algorithm in Cloud Computing JOURNAL OF SOFTWARE, VOL. 9, NO. 4, APRIL 2014 921 An Greedy-Based Job Scheduling Algorithm in Cloud Computing Ji Li a,b, Longhua Feng a,b, Shenglong Fang c a College of Computer Science, Chongqing University,

More information

AN ECONOMICS-BASED POWER-AWARE PROTOCOL FOR COMPUTATION DISTRIBUTION IN MOBILE AD-HOC NETWORKS

AN ECONOMICS-BASED POWER-AWARE PROTOCOL FOR COMPUTATION DISTRIBUTION IN MOBILE AD-HOC NETWORKS AN ECONOMICS-BASED POWER-AWARE PROTOCOL FOR COMPUTATION DISTRIBUTION IN MOBILE AD-HOC NETWORKS Li Shang, Robert P. Dick, and Nira K. Jha Department of Electrical Engineering Princeton University, Princeton,

More information

Share of Turnover in Percentage per 30-Min Intervals

Share of Turnover in Percentage per 30-Min Intervals CB(1)342/15-16(01) Annex For Information Update on Extension of Trading Hours in the Securities Market Purpose Further to the information paper dated 11 November 2013 on the extension of trading hours

More information

Cloud Storage and Online Bin Packing

Cloud Storage and Online Bin Packing Cloud Storage and Online Bin Packing Doina Bein, Wolfgang Bein, and Swathi Venigella Abstract We study the problem of allocating memory of servers in a data center based on online requests for storage.

More information

Bilevel Models of Transmission Line and Generating Unit Maintenance Scheduling

Bilevel Models of Transmission Line and Generating Unit Maintenance Scheduling Bilevel Models of Transmission Line and Generating Unit Maintenance Scheduling Hrvoje Pandžić July 3, 2012 Contents 1. Introduction 2. Transmission Line Maintenance Scheduling 3. Generating Unit Maintenance

More information

Research Article A Virtual-Ring-Based Data Storage and Retrieval Scheme in Wireless Sensor Networks

Research Article A Virtual-Ring-Based Data Storage and Retrieval Scheme in Wireless Sensor Networks Distributed Sensor Networks Volume 212, Article ID 76315, 1 pages doi:1.1155/212/76315 Research Article A Virtual-Ring-Based Data Storage and Retrieval Scheme in Wireless Sensor Networks Xingpo Ma, Jianliang

More information

Keywords coverage holes, energy efficient, hole detection, hole healing

Keywords coverage holes, energy efficient, hole detection, hole healing Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Hole Detection and

More information

Research Article Robust Monitor Assignment with Minimum Cost for Sensor Network Tomography

Research Article Robust Monitor Assignment with Minimum Cost for Sensor Network Tomography Distributed Sensor Networks Volume 2015, Article ID 512463, 6 pages http://dx.doi.org/10.1155/2015/512463 Research Article Robust Monitor Assignment with Minimum Cost for Sensor Network Tomography Xiaojin

More information

A CHAOS BASED SECURE CLUSTER PROTOCOL FOR WIRELESS SENSOR NETWORKS

A CHAOS BASED SECURE CLUSTER PROTOCOL FOR WIRELESS SENSOR NETWORKS K Y B E R N E T I K A V O L U M E 4 4 ( 2 0 0 8 ), N U M B E R 4, P A G E S 5 2 2 5 3 3 A CHAOS BASED SECURE CLUSTER PROTOCOL FOR WIRELESS SENSOR NETWORKS Qian Fang, Ying Liu and Xiaoqun Zhao Security

More information

Social Network Generation and Friend Ranking Based on Mobile Phone Data

Social Network Generation and Friend Ranking Based on Mobile Phone Data Social Network Generation and Friend Ranking Based on Mobile Phone Data Mustafa I lhan Akbas, Raghu Nandan Avula, Mostafa A. Bassiouni, Damla Turgut Department of Electrical Engineering and Computer Science

More information

Distributed Caching Algorithms for Content Distribution Networks

Distributed Caching Algorithms for Content Distribution Networks Distributed Caching Algorithms for Content Distribution Networks Sem Borst, Varun Gupta, Anwar Walid Alcatel-Lucent Bell Labs, CMU BCAM Seminar Bilbao, September 30, 2010 Introduction Scope: personalized/on-demand

More information

Online Scheduling for Cloud Computing and Different Service Levels

Online Scheduling for Cloud Computing and Different Service Levels 2012 IEEE 201226th IEEE International 26th International Parallel Parallel and Distributed and Distributed Processing Processing Symposium Symposium Workshops Workshops & PhD Forum Online Scheduling for

More information

Accuracy of Homology based Approaches for Coverage Hole Detection in Wireless Sensor Networks

Accuracy of Homology based Approaches for Coverage Hole Detection in Wireless Sensor Networks Accuracy of Homology based Approaches for Coverage Hole Detection in Wireless Sensor Networks Feng Yan, Philippe Martins, Laurent Decreusefond To cite this version: Feng Yan, Philippe Martins, Laurent

More information

VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS

VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS Aswin C Sankaranayanan, Qinfen Zheng, Rama Chellappa University of Maryland College Park, MD - 277 {aswch, qinfen, rama}@cfar.umd.edu Volkan Cevher, James

More information

Analysis of seismic response control for long-span cable-stayed. bridge under traveling wave input *

Analysis of seismic response control for long-span cable-stayed. bridge under traveling wave input * Analysis of seismic response control for long-span cable-stayed bridge under traveling wave input * QI ing-jun, LI iao-jun 2 ( Associate Professor, School of Civil Engineering, Shandong Jianzhu University,

More information

Offline sorting buffers on Line

Offline sorting buffers on Line Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: rkhandekar@gmail.com 2 IBM India Research Lab, New Delhi. email: pvinayak@in.ibm.com

More information

Scan-Line Fill. Scan-Line Algorithm. Sort by scan line Fill each span vertex order generated by vertex list

Scan-Line Fill. Scan-Line Algorithm. Sort by scan line Fill each span vertex order generated by vertex list Scan-Line Fill Can also fill by maintaining a data structure of all intersections of polygons with scan lines Sort by scan line Fill each span vertex order generated by vertex list desired order Scan-Line

More information

Tronico Technology Company Limited. First step of IOT - DIY smart home

Tronico Technology Company Limited. First step of IOT - DIY smart home Tronico Technology Company Limited First step of IOT - DIY smart home What is IOT? 2 The Internet of Things (IoT) is the network of physical objects devices, vehicles, buildings and other items that enables

More information

E-Logistics Successes and Failures

E-Logistics Successes and Failures E-Logistics Successes and Failures Copyright April 2002 H. Donald Ratliff H. Donald Ratliff 1 Executive Director Regents & UPS Professor don.ratliff@isye.gatech.edu President & CEO don.ratliff@velant.com

More information

Evaluation of an Algorithm used in Routing and Service Discovery Protocols of Wireless Sensor Networks The Trickle Algorithm

Evaluation of an Algorithm used in Routing and Service Discovery Protocols of Wireless Sensor Networks The Trickle Algorithm Evaluation of an Algorithm used in Routing and Service Discovery Protocols of Wireless Sensor Networks The Trickle Algorithm Markus Becker mab@comnets.uni-bremen.de ComNets, TZI, University Bremen, Germany

More information

Content Delivery Networks. Shaxun Chen April 21, 2009

Content Delivery Networks. Shaxun Chen April 21, 2009 Content Delivery Networks Shaxun Chen April 21, 2009 Outline Introduction to CDN An Industry Example: Akamai A Research Example: CDN over Mobile Networks Conclusion Outline Introduction to CDN An Industry

More information

Math 151. Rumbos Spring 2014 1. Solutions to Assignment #22

Math 151. Rumbos Spring 2014 1. Solutions to Assignment #22 Math 151. Rumbos Spring 2014 1 Solutions to Assignment #22 1. An experiment consists of rolling a die 81 times and computing the average of the numbers on the top face of the die. Estimate the probability

More information

On Video Content Delivery in Wireless Environments

On Video Content Delivery in Wireless Environments , pp.81-85 http://dx.doi.org/10.14257/astl.2014.65.20 On Video Content Delivery in Wireless Environments Po-Jen Chuang and Hang-Li Chen Department of Electrical Engineering Tamkang University Tamsui, New

More information

IBM SPSS Neural Networks 22

IBM SPSS Neural Networks 22 IBM SPSS Neural Networks 22 Note Before using this information and the product it supports, read the information in Notices on page 21. Product Information This edition applies to version 22, release 0,

More information

A Bidding Protocol for Deploying Mobile Sensors

A Bidding Protocol for Deploying Mobile Sensors A Bidding Protocol for Deploying Mobile Sensors Guiling Wang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania State University, University Park, PA 1 Email: {guiwang,gcao,tlp}@cse.psu.edu

More information

Wireless LAN Services for Hot-Spot

Wireless LAN Services for Hot-Spot Wireless LAN Services for Hot-Spot Woo-Yong Choi Electronics and Telecommunications Research Institute wychoi53@etri.re.kr ETRI Contents Overview Wireless LAN Services Current IEEE 802.11 MAC Protocol

More information

Scan Conversion of Filled Primitives Rectangles Polygons. Many concepts are easy in continuous space - Difficult in discrete space

Scan Conversion of Filled Primitives Rectangles Polygons. Many concepts are easy in continuous space - Difficult in discrete space Walters@buffalo.edu CSE 480/580 Lecture 7 Slide 1 2D Primitives I Point-plotting (Scan Conversion) Lines Circles Ellipses Scan Conversion of Filled Primitives Rectangles Polygons Clipping In graphics must

More information

PROVIDING STATISTICAL QOS GUARANTEE FOR VOICE OVER IP IN THE IEEE 802.11 WIRELESS LANS

PROVIDING STATISTICAL QOS GUARANTEE FOR VOICE OVER IP IN THE IEEE 802.11 WIRELESS LANS V OICE OVER WIRELESS LOCAL AREA N ETWORK PROVIDING STATISTICAL QOS GUARANTEE FOR VOICE OVER IP IN THE IEEE 82.11 WIRELESS LANS HONGQIANG ZHAI, JIANFENG WANG, AND YUGUANG FANG, UNIVERSITY OF FLORIDA The

More information

Parallel Data Selection Based on Neurodynamic Optimization in the Era of Big Data

Parallel Data Selection Based on Neurodynamic Optimization in the Era of Big Data Parallel Data Selection Based on Neurodynamic Optimization in the Era of Big Data Jun Wang Department of Mechanical and Automation Engineering The Chinese University of Hong Kong Shatin, New Territories,

More information

3/25/2014. 3/25/2014 Sensor Network Security (Simon S. Lam) 1

3/25/2014. 3/25/2014 Sensor Network Security (Simon S. Lam) 1 Sensor Network Security 3/25/2014 Sensor Network Security (Simon S. Lam) 1 1 References R. Blom, An optimal class of symmetric key generation systems, Advances in Cryptology: Proceedings of EUROCRYPT 84,

More information

Approximability of Two-Machine No-Wait Flowshop Scheduling with Availability Constraints

Approximability of Two-Machine No-Wait Flowshop Scheduling with Availability Constraints Approximability of Two-Machine No-Wait Flowshop Scheduling with Availability Constraints T.C. Edwin Cheng 1, and Zhaohui Liu 1,2 1 Department of Management, The Hong Kong Polytechnic University Kowloon,

More information

Common Approaches to Real-Time Scheduling

Common Approaches to Real-Time Scheduling Common Approaches to Real-Time Scheduling Clock-driven time-driven schedulers Priority-driven schedulers Examples of priority driven schedulers Effective timing constraints The Earliest-Deadline-First

More information

Concurrent Optimization of Consumer s Electrical Energy Bill and Producer s Power Generation Cost under a Dynamic Pricing Model

Concurrent Optimization of Consumer s Electrical Energy Bill and Producer s Power Generation Cost under a Dynamic Pricing Model Concurrent Optimization of Consumer s Electrical Energy Bill and Producer s Power Generation Cost under a Dynamic Pricing Model Tiansong Cui, Hadi Goudarzi, Safar Hatami, Shahin Nazarian, and Massoud Pedram

More information

How To Balance Network Load In A Wireless Sensor Network

How To Balance Network Load In A Wireless Sensor Network Balancing Network Traffic Load in Geographic Hash Table (GHT) R. Asha, V.Manju, Meka Sindhu & T. Subha Department of Information Technology, Sri Sai Ram Engineering College, Chennai. E-mail : ashaniteesh@gmail.com,

More information

ARTIFICIAL NEURAL NETWORKS FOR ADAPTIVE MANAGEMENT TRAFFIC LIGHT OBJECTS AT THE INTERSECTION

ARTIFICIAL NEURAL NETWORKS FOR ADAPTIVE MANAGEMENT TRAFFIC LIGHT OBJECTS AT THE INTERSECTION The 10 th International Conference RELIABILITY and STATISTICS in TRANSPORTATION and COMMUNICATION - 2010 Proceedings of the 10th International Conference Reliability and Statistics in Transportation and

More information

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of

More information

A Dissertation. entitled. Data Warehouse Operational Design: View Selection and Performance Simulation. Vikas R. Agrawal. Co-Advisor: Dr.

A Dissertation. entitled. Data Warehouse Operational Design: View Selection and Performance Simulation. Vikas R. Agrawal. Co-Advisor: Dr. A Dissertation entitled Data Warehouse Operational Design: View Selection and Performance Simulation by Vikas R. Agrawal Submitted as partial fulfillment of the requirements for the Doctor of Philosophy

More information

Using Macro News Events in Automated FX Trading Strategy

Using Macro News Events in Automated FX Trading Strategy Using Macro News Events in Automated FX Trading Strategy The Main Thesis The arrival of macroeconomic news from the world s largest economies brings additional volatility to the market. 2 Overall methodology

More information

ACTIVITY THEORY (AT) REVIEW

ACTIVITY THEORY (AT) REVIEW ACTIVITY THEORY IN ACTION Brian Tran, CS 260 ACTIVITY THEORY (AT) REVIEW Activities are key structure in AT Composed of subjects, tools, and objective Ex. Bob (subject) is using the weights and treadmills

More information

Logistic Regression. Jia Li. Department of Statistics The Pennsylvania State University. Logistic Regression

Logistic Regression. Jia Li. Department of Statistics The Pennsylvania State University. Logistic Regression Logistic Regression Department of Statistics The Pennsylvania State University Email: jiali@stat.psu.edu Logistic Regression Preserve linear classification boundaries. By the Bayes rule: Ĝ(x) = arg max

More information

Monte Carlo Methods in Finance

Monte Carlo Methods in Finance Author: Yiyang Yang Advisor: Pr. Xiaolin Li, Pr. Zari Rachev Department of Applied Mathematics and Statistics State University of New York at Stony Brook October 2, 2012 Outline Introduction 1 Introduction

More information

Optimization Problems in Infrastructure Security

Optimization Problems in Infrastructure Security Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1 Optimization Problems in Infrastructure Security Evangelos Kranakis Carleton University School of Computer Science Ottawa,

More information

Predictability of Non-Linear Trading Rules in the US Stock Market Chong & Lam 2010

Predictability of Non-Linear Trading Rules in the US Stock Market Chong & Lam 2010 Department of Mathematics QF505 Topics in quantitative finance Group Project Report Predictability of on-linear Trading Rules in the US Stock Market Chong & Lam 010 ame: Liu Min Qi Yichen Zhang Fengtian

More information

Manual for SOA Exam MLC.

Manual for SOA Exam MLC. Chapter 4 Life Insurance Extract from: Arcones Manual for the SOA Exam MLC Fall 2009 Edition available at http://wwwactexmadrivercom/ 1/13 Non-level payments paid at the end of the year Suppose that a

More information

Structural Health Monitoring Tools (SHMTools)

Structural Health Monitoring Tools (SHMTools) Structural Health Monitoring Tools (SHMTools) Parameter Specifications LANL/UCSD Engineering Institute LA-CC-14-046 c Copyright 2014, Los Alamos National Security, LLC All rights reserved. May 30, 2014

More information

Arithmetic Coding: Introduction

Arithmetic Coding: Introduction Data Compression Arithmetic coding Arithmetic Coding: Introduction Allows using fractional parts of bits!! Used in PPM, JPEG/MPEG (as option), Bzip More time costly than Huffman, but integer implementation

More information

Optimal Branch Exchange for Feeder Reconfiguration in Distribution Networks

Optimal Branch Exchange for Feeder Reconfiguration in Distribution Networks Optimal Branch Exchange for Feeder Reconfiguration in Distribution Networks Qiuyu Peng and Steven H. Low Engr. & App. Sci., Caltech, CA Abstract The feeder reconfiguration problem chooses the on/off status

More information

A study of artificial bee colony variants for radar waveform design

A study of artificial bee colony variants for radar waveform design Zhang and Zhang EURASIP Journal on Wireless Communications and Networking (2016) 2016:13 DOI 10.1186/s13638-015-0510-3 RESEARCH Open Access A study of artificial bee colony variants for radar waveform

More information

On the Synchronization of Co-Located IEEE 802.15.4 Networks for IoT Applications

On the Synchronization of Co-Located IEEE 802.15.4 Networks for IoT Applications On the Synchronization of Co-Located IEEE 802.15.4 Networks for IoT Applications Falko Dressler and Noorsalwati Nordin Dept. of Computer Science, University of Paderborn, Germany Institute of Computer

More information

Algorithm Design and Analysis

Algorithm Design and Analysis Algorithm Design and Analysis LECTURE 27 Approximation Algorithms Load Balancing Weighted Vertex Cover Reminder: Fill out SRTEs online Don t forget to click submit Sofya Raskhodnikova 12/6/2011 S. Raskhodnikova;

More information

An Expressive Auction Design for Online Display Advertising. AUTHORS: Sébastien Lahaie, David C. Parkes, David M. Pennock

An Expressive Auction Design for Online Display Advertising. AUTHORS: Sébastien Lahaie, David C. Parkes, David M. Pennock An Expressive Auction Design for Online Display Advertising AUTHORS: Sébastien Lahaie, David C. Parkes, David M. Pennock Li PU & Tong ZHANG Motivation Online advertisement allow advertisers to specify

More information

Research Article Average Bandwidth Allocation Model of WFQ

Research Article Average Bandwidth Allocation Model of WFQ Modelling and Simulation in Engineering Volume 2012, Article ID 301012, 7 pages doi:10.1155/2012/301012 Research Article Average Bandwidth Allocation Model of WFQ TomášBaloghandMartinMedvecký Institute

More information

Delay-Aware Big Data Collection Strategies for Sensor Cloud Services Dr. Chi-Tsun (Ben), Cheng

Delay-Aware Big Data Collection Strategies for Sensor Cloud Services Dr. Chi-Tsun (Ben), Cheng Delay-Aware Big Data Collection Strategies for Sensor Cloud Services Dr. Chi-Tsun (Ben), Cheng chi-tsun.cheng@polyu.edu.hk http://www.eie.polyu.edu.hk/~bcheng/ An Overview Introduction Wireless Sensor

More information

Single machine parallel batch scheduling with unbounded capacity

Single machine parallel batch scheduling with unbounded capacity Workshop on Combinatorics and Graph Theory 21th, April, 2006 Nankai University Single machine parallel batch scheduling with unbounded capacity Yuan Jinjiang Department of mathematics, Zhengzhou University

More information

Load Balancing Hashing in Geographic Hash Tables

Load Balancing Hashing in Geographic Hash Tables Load Balancing Hashing in Geographic Hash Tables M. Elena Renda, Giovanni Resta, and Paolo Santi Abstract In this paper, we address the problem of balancing the network traffic load when the data generated

More information

Scheduling Aperiodic and Sporadic Jobs in Priority- Driven Systems

Scheduling Aperiodic and Sporadic Jobs in Priority- Driven Systems Scheduling Aperiodic and Sporadic Jobs in Priority- Driven Systems Ingo Sander ingo@kth.se Liu: Chapter 7 IL2212 Embedded Software 1 Outline l System Model and Assumptions l Scheduling Aperiodic Jobs l

More information

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,

More information

Robust Egress Interdomain Traffic Engineering

Robust Egress Interdomain Traffic Engineering Robust Egress Interdomain Traffic Engineering Jian Qiu and Lixin Gao Department of ECE, University of Massachusetts, Amherst, MA 0003 {jqiu,lgao}@ecs.umass.edu Abstract BGP is traditionally configured

More information

PRODUCTION PLANNING AND SCHEDULING Part 1

PRODUCTION PLANNING AND SCHEDULING Part 1 PRODUCTION PLANNING AND SCHEDULING Part Andrew Kusiak 9 Seamans Center Iowa City, Iowa - 7 Tel: 9-9 Fax: 9-669 andrew-kusiak@uiowa.edu http://www.icaen.uiowa.edu/~ankusiak Forecasting Planning Hierarchy

More information

Specification of the Bayesian CRM: Model and Sample Size. Ken Cheung Department of Biostatistics, Columbia University

Specification of the Bayesian CRM: Model and Sample Size. Ken Cheung Department of Biostatistics, Columbia University Specification of the Bayesian CRM: Model and Sample Size Ken Cheung Department of Biostatistics, Columbia University Phase I Dose Finding Consider a set of K doses with labels d 1, d 2,, d K Study objective:

More information

Selecting Best Investment Opportunities from Stock Portfolios Optimized by a Multiobjective Evolutionary Algorithm

Selecting Best Investment Opportunities from Stock Portfolios Optimized by a Multiobjective Evolutionary Algorithm Selecting Best Investment Opportunities from Stock Portfolios Optimized by a Multiobjective Evolutionary Algorithm Krzysztof Michalak Department of Information Technologies, Institute of Business Informatics,

More information

AUTOMATIC ACCIDENT DETECTION AND AMBULANCE RESCUE WITH INTELLIGENT TRAFFIC LIGHT SYSTEM

AUTOMATIC ACCIDENT DETECTION AND AMBULANCE RESCUE WITH INTELLIGENT TRAFFIC LIGHT SYSTEM AUTOMATIC ACCIDENT DETECTION AND AMBULANCE RESCUE WITH INTELLIGENT TRAFFIC LIGHT SYSTEM Mr.S.Iyyappan 1, Mr.V.Nandagopal 2 P.G Scholar, Dept. of EEE, Ganadipathy Tulis s Jain Engineering College, Vellore,

More information

A Simple Inventory System

A Simple Inventory System A Simple Inventory System Section 1.3 Discrete-Event Simulation: A First Course Section 1.3: A Simple Inventory System customers. demand items.. facility. order items.. supplier Distributes items from

More information

Scheduling Virtual Machines in Cloud Computing For Enhancing Income and Resource Utilization

Scheduling Virtual Machines in Cloud Computing For Enhancing Income and Resource Utilization Scheduling Virtual Machines in Cloud Computing For Enhancing Income and Resource Utilization Sanaz Yousefian 1 and Ahmad Habibi Zadnavin 1* 1 Department of Computer Engineering, Engineering Faculty, Azad

More information

Fairness and Throughput Guarantees with Maximal Scheduling in Multi-hop Wireless Networks

Fairness and Throughput Guarantees with Maximal Scheduling in Multi-hop Wireless Networks Fairness and Throughput Guarantees with Maximal Scheduling in Multi-hop Wireless Networks Saswati Sarkar University of Pennsylvania Philadelphia, PA, USA swati@seas.upenn.edu Prasanna Chaporkar INRIA Paris,

More information

Completion Time Scheduling and the WSRPT Algorithm

Completion Time Scheduling and the WSRPT Algorithm Completion Time Scheduling and the WSRPT Algorithm Bo Xiong, Christine Chung Department of Computer Science, Connecticut College, New London, CT {bxiong,cchung}@conncoll.edu Abstract. We consider the online

More information

ESE 50 ISE 10 ESE - 50 20 - - 4 2 ISE -

ESE 50 ISE 10 ESE - 50 20 - - 4 2 ISE - Second Year B.Tech. Program in Electronics Semester I 1MA 203 201 202 203 204 252 253 Applied Mathematics III Circuits Theory L T P Credits Scheme Theory Marks Practical Marks -- Data Structures and Algorithms

More information

Resource Allocation Modeling Techniques Applied to Air Force Crew Scheduling Problem

Resource Allocation Modeling Techniques Applied to Air Force Crew Scheduling Problem Kepler Research, Inc. Proprietary Resource Allocation Modeling Techniques Applied to Air Force Crew Scheduling Problem Submitted by: Kepler Research, Inc. February 2012 1. Introduction and Background The

More information

HY345 Operating Systems

HY345 Operating Systems HY345 Operating Systems Recitation 2 - Memory Management Solutions Panagiotis Papadopoulos panpap@csd.uoc.gr Problem 7 Consider the following C program: int X[N]; int step = M; //M is some predefined constant

More information

Indexing Spatio-Temporal archive As a Preprocessing Alsuccession

Indexing Spatio-Temporal archive As a Preprocessing Alsuccession The VLDB Journal manuscript No. (will be inserted by the editor) Indexing Spatio-temporal Archives Marios Hadjieleftheriou 1, George Kollios 2, Vassilis J. Tsotras 1, Dimitrios Gunopulos 1 1 Computer Science

More information

Ericsson T18s Voice Dialing Simulator

Ericsson T18s Voice Dialing Simulator Ericsson T18s Voice Dialing Simulator Mauricio Aracena Kovacevic, Anna Dehlbom, Jakob Ekeberg, Guillaume Gariazzo, Eric Lästh and Vanessa Troncoso Dept. of Signals Sensors and Systems Royal Institute of

More information

Hardware and Software Design of Mine Environmental Monitoring System

Hardware and Software Design of Mine Environmental Monitoring System , pp.67-76 http://dx.doi.org/10.14257/ijmue.2014.9.1.07 Hardware and Software Design of Mine Environmental Monitoring System Dongjie Li and Jian Song School of Automation, Harbin University of Science

More information

Scheduling Parallel Jobs with Linear Speedup

Scheduling Parallel Jobs with Linear Speedup Scheduling Parallel Jobs with Linear Speedup Alexander Grigoriev and Marc Uetz Maastricht University, Quantitative Economics, P.O.Box 616, 6200 MD Maastricht, The Netherlands. Email: {a.grigoriev,m.uetz}@ke.unimaas.nl

More information

A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique

A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique Jyoti Malhotra 1,Priya Ghyare 2 Associate Professor, Dept. of Information Technology, MIT College of

More information

Appendix: Simple Methods for Shift Scheduling in Multi-Skill Call Centers

Appendix: Simple Methods for Shift Scheduling in Multi-Skill Call Centers MSOM.1070.0172 Appendix: Simple Methods for Shift Scheduling in Multi-Skill Call Centers In Bhulai et al. (2006) we presented a method for computing optimal schedules, separately, after the optimal staffing

More information

Index tracking UNDER TRANSACTION COSTS:

Index tracking UNDER TRANSACTION COSTS: MARKE REVIEWS Index tracking UNDER RANSACION COSS: rebalancing passive portfolios by Reinhold Hafner, Ansgar Puetz and Ralf Werner, RiskLab GmbH Portfolio managers must be able to estimate transaction

More information

1/18/2013. 5.5-year Ph.D. student internships in. Done job hunting recently. Will join Yahoo! Labs soon. Interviewed with

1/18/2013. 5.5-year Ph.D. student internships in. Done job hunting recently. Will join Yahoo! Labs soon. Interviewed with Liangjie Hong Ph.D. Candidate Dept. of Computer Science and Engineering 5.5-year Ph.D. student internships in a local software company (2008, 2 months) Yahoo! Labs (2010, 3 months) Yahoo! Labs (2011, 3

More information

Towards Efficient Routing in Vehicular Ad Hoc Networks

Towards Efficient Routing in Vehicular Ad Hoc Networks Towards Efficient Routing in Vehicular Ad Hoc Networks Moez Jerbi*, Sidi-Mohammed Senouci* and Yacine Ghamri-Doudane** *France Telecom R&D, Core Network Laboratories, Lannion, France **Networks and Multimedia

More information

Load Balanced Short Path Routing in Wireless Networks

Load Balanced Short Path Routing in Wireless Networks Load Balanced Short Path Routing in Wireless Networks Jie Gao, IEEE member, Li Zhang Abstract We study routing algorithms on wireless networks that use only short paths, for minimizing latency, and achieve

More information

In Flight ALS Point Cloud Georeferencing using RTK GPS Receiver

In Flight ALS Point Cloud Georeferencing using RTK GPS Receiver Integration of Geodetic Sensors In Flight ALS Point Cloud Georeferencing using RTK GPS Receiver Yannick Stebler, Philipp Schär, Jan Skaloud, Bertrand Merminod E mail: yannick.stebler@epfl.ch Web: http://topo.epfl.ch

More information

Learning in Abstract Memory Schemes for Dynamic Optimization

Learning in Abstract Memory Schemes for Dynamic Optimization Fourth International Conference on Natural Computation Learning in Abstract Memory Schemes for Dynamic Optimization Hendrik Richter HTWK Leipzig, Fachbereich Elektrotechnik und Informationstechnik, Institut

More information

StreamStorage: High-throughput and Scalable Storage Technology for Streaming Data

StreamStorage: High-throughput and Scalable Storage Technology for Streaming Data : High-throughput and Scalable Storage Technology for Streaming Data Munenori Maeda Toshihiro Ozawa Real-time analytical processing (RTAP) of vast amounts of time-series data from sensors, server logs,

More information

RANKING OF CLOUD SERVICE PROVIDERS IN CLOUD

RANKING OF CLOUD SERVICE PROVIDERS IN CLOUD RANKING OF CLOUD SERVICE PROVIDERS IN CLOUD C.S. RAJARAJESWARI, M. ARAMUDHAN Research Scholar, Bharathiyar University,Coimbatore, Tamil Nadu, India. Assoc. Professor, Department of IT, PKIET, Karaikal,

More information

Three Effective Top-Down Clustering Algorithms for Location Database Systems

Three Effective Top-Down Clustering Algorithms for Location Database Systems Three Effective Top-Down Clustering Algorithms for Location Database Systems Kwang-Jo Lee and Sung-Bong Yang Department of Computer Science, Yonsei University, Seoul, Republic of Korea {kjlee5435, yang}@cs.yonsei.ac.kr

More information

Course overview Processamento de sinais 2009/10 LEA

Course overview Processamento de sinais 2009/10 LEA Course overview Processamento de sinais 2009/10 LEA João Pedro Gomes jpg@isr.ist.utl.pt Instituto Superior Técnico Processamento de sinais MEAer (IST) Course overview 1 / 19 Course overview Motivation:

More information

C21 Model Predictive Control

C21 Model Predictive Control C21 Model Predictive Control Mark Cannon 4 lectures Hilary Term 216-1 Lecture 1 Introduction 1-2 Organisation 4 lectures: week 3 week 4 { Monday 1-11 am LR5 Thursday 1-11 am LR5 { Monday 1-11 am LR5 Thursday

More information