An Energy-Efficient Communication Scheme in Wireless Cable Sensor Networks
|
|
- Rafe Burke
- 8 years ago
- Views:
Transcription
1 This fll text aer was eer reiewed at the direction of IEEE Commnications Society sbject matter exerts for blication in the IEEE ICC 11 roceedings An Energy-Efficient Commnication Scheme in Wireless Cable Sensor Networks Xiao Chen eartment of Comter Science Texas State Uniersity San Marcos, TX Neil C. Rowe eartment of Comter Science U. S. Naal Postgradate School Monterey, CA Abstract Nowadays wireless sensor networks (WSNs) hae attracted a great deal of stdy de to their low cost and widerange alications. Most of the sensors sed so far are oint sensors which hae a disc-shaed sensing region. In this aer, we stdy a new tye of sensor: the fiber otic cable sensor. Unlike a traditional oint sensor, this tye of sensor has a rectanglar sensing region with a rocessor installed on it to do rocessing and commnication. ike wireless sensor networks with oint sensors, energy-efficient commnication is still an imortant isse in wireless sensor networks with cable sensors becase of the need to efficiently se limited resorces. To address the isse, we roose a Cable Mode Transition (CMT) algorithm, which determines the minimal nmber of actie sensors to maintain K- coerage of a terrain as well as K-connectiity of the network. Secifically, it allocates eriods of inactiity for cable sensors withot affecting the coerage and connectiity reqirements of the network based only on local information. Before resenting CMT, we first show the relationshi between coerage and connectiity, then the eligibility algorithm ermitting a cable sensor to decide whether to stay actie. CMT calls the eligibility algorithm to schedle cables. Simlation reslts show that or scheme is efficient in saing energy and ths can rolong the lifetime of wireless cable sensor networks. I. INTROUCTION Wireless sensor networks (WSNs) hae attracted a great deal of stdy de to the low cost of sensors and their widerange alications. WSNs roide a new class of comter systems and exand hman ability to remotely interact with the hysical world. Most of the sensors sed so far are oint sensors which hae a disc-shaed sensing region. Recently a new kind of sensor has become aailable for detecting seismic signals [4]. It ses a fiber otic cable which is actiely qeried by sending otical signals down it. Each cable has a rocessor on it to rocess data and commnicate with other rocessors on other cables. The cable can be tens of kilometers long so one cable can roide extensie coerage. Comaring with the tradition oint sensors, this kind of sensor has a long length of coerage area which makes it ideal for borders and roads. It will be helfl in detecting excaation behaior sch as digging tnnels and lanting exlosie deices on the roads as well as roiding a secre border with 24/7 sreillance for illegal immigrants. ike oint sensors, wireless commnication among cables is more flexible and conenient than wired commnication in case the toology of the network changes de to cable moement or failres. Also, as in the wireless oint sensor networks, energy-efficient commnication is ery imortant in wireless cable sensor networks de to the limited ower resorce in cable rocessors and the inconenience of charging their batteries freqently. In this aer, we redce energy consmtion in wireless commnication by roosing CMT: A Cable Mode Transition algorithm, which determines the minimal nmber of actie sensors to maintain K-coerage of a terrain as well as K- connectiity of the network. Here, K-coerage means that eery oint in the terrain is coered by at least K cable sensors and K-connectiity means that if K 1 cable sensors fail the network is still connected. The CMT algorithm allocates eriods of inactiity for cables withot affecting the coerage and connectiity reqirements of the network based only on local information. Secifically, we make the following contribtions: This is the first stdy on energy-efficient commnication for wireless cable sensor networks. Conditions hae been fond for coerage to imly connectiity sing cable sensors. Or Cable Mode Transition algorithm is a distribted rotocol that only reqires local information. Simlations are condcted to erify the efficiency of the roosed scheme. The rest of the aer is organized as follows: Section II is the reliminary, Section III formlates the roblem, Section IV describes the energy-efficient commnication scheme CMT in detail, Section V shows the simlation reslts, Section VI mentions the related work, and Section VII concldes the aer and oints ot the ftre direction. II. PREIMINARY In this aer, the cable seismic sensors we se are different from traditional oint sensors. They are different in both sensing and commnication. The sensing region of a oint sensor can be modeled as a disc with a sensing range s and its commnication region can be modeled as a disc with a commnication range r as shown in Fig. 1(a). For a cable sensor deloyed straight with length in Fig. 1(b), its sensing range is the maximm distance that can be sensed orthogonal to the cable, and its sensing region is a rectangle U.S. Goernment work not rotected by U.S. coyright
2 This fll text aer was eer reiewed at the direction of IEEE Commnications Society sbject matter exerts for blication in the IEEE ICC 11 roceedings s r Rect() R w (a) A traditional oint sensor (b) A cable sensor Fig. 2. w is ineligible if K =1 Fig. 1. Traditional oint sensor s. cable sensor if R denoted as Rect(). That is, any object coming across this region can be detected by the cable. In some figres of this aer, the rectanglar sensing region of a cable is reresented by a shaded area. Actally, the sensing region of a cable shold hae ronded ends that are semicircles of radis since coerage extends ast the ends of the cable for distance. Here we make the simlification based on the fact that there will be significant noise in the icinity of the cable ends. The commnication between cables is done by the rocessors on the cables. Each cable shold hae a rocessor to collect data and commnicate with other rocessors on other cables. The rocessor on cable has a commnication region of a disc with a commnication range R and is reresented by a dot. In this aer, we assme the terrain to be coered is a large 2-dimensional conex and a cable is always deloyed straight becase it is easy to roe that it coers the most sensing area if deloyed in this way. III. PROBEM FORMUATION We formlate the energy-efficient commnication roblem as follows: gien a 2-dimensional conex terrain A, and a coerage degree K secified by the alication, we mst allow as many rocessors as ossible to trn off most of the time and at the same time, enogh rocessors mst stay awake to garantee that A is K-coered and the backbone formed by awakened rocessors is K-connected. In this roblem, there are two isses: coerage and connectiity. First we want to know if they are related. If one imlies the other, then if we satisfy the stronger one, the other is also satisfied. Obiosly connectiity does not imly coerage becase if a network on a terrain is connected, it can haen that not eery oint in the terrain is coered by some sensor. On the other hand, if a terrain is flly coered by a sensor network, is the network connected? The following two theorems show the conditions for coerage to imly connectiity with 1-coerage and K-coerage. The conditions are tre regardless of the locations of rocessors on cables. e to the limited sace, the roofs of all theorems in this aer can be fond in [2]. Theorem 1: For a set of cables haing sensing range and length that 1-coer a 2-dimensional conex terrain A, the commnication grah made by rocessors is connected if the commnication range R Theorem 2: A set of cables that K-coer a 2-dimensional conex terrain A forms a K-connected commnication grah IV. THE CMT AGORITHM From the aboe, we know that if a terrain is K-coered and if the commnication range R , then the network is K-connected. In this section, we resent the cable mode transition (CMT) algorithm to determine the minimal nmber of actie cables to maintain K-coerage secified by the alication as well as K-connectiity. The idea was insired by []. The difference is that their aroach alies to traditional oint sensors with a disc-shaed sensing region and or aroach alies to cable sensors with a rectanglar sensing region. A cable can be in one of the three modes with the energy consmtion from the highest to the lowest: ACTIVE, SNOOPY and SEEP. In the ACTIVE mode, a cable actiely senses and commnicates with other rocessors on other cables; in the SNOOPY mode, each cable collects HEO messages from its neighboring rocessors and checks its eligibility to determine its new mode; and in the SEEP mode, a cable slees to sae energy. The CMT algorithm describes the rles of cable mode transition to sae energy. Before resenting CMT, we introdce the eligibility algorithm it calls whose role is to make each cable check its eligibility to stay actie. A. K-coerage eligibility algorithm Each cable exectes an eligibility algorithm to determine whether it is necessary to stay actie. Gien a reqested coerage degree K, a cable is ineligible to stay actie if eery location within its coerage region is already K-coered by other actie cables in its neighborhood. For examle, in Fig. 2, cables and are actie and cable w is ineligible if K =1, bt eligible if K>1. Before resenting the eligibility algorithm, we define the following concets: The sensing region of cable : contains all the oints sch that <. An intersection oint of two cables and : denoted by, is an intersection oint of the sensing rectangles of and. An intersection oint of a cable and terrain A: denoted by A, is an intersection oint of the sensing rectangle of cable and terrain A. Note that the intersection oints of two cables and between a cable and a terrain A are different from reglar definitions. Here they are formed by the sensing rectangles of cables, not
3 This fll text aer was eer reiewed at the direction of IEEE Commnications Society sbject matter exerts for blication in the IEEE ICC 11 roceedings s r s r (a) q Fig. 3. (a) The intersection oints of cables and (b) The intersection oints between a cable and a terrain A V Fig. 4. The largest distance of two neighboring cables cables themseles. As shown in Fig. 3(a)(b), the intersection oints of two cables and and between cable and terrain A are, q, r and s. Also note that when deloyed on a terrain, two cables may not be arallel or erendiclar to each other. They can intersect with any angle. Bt for conenience s sake and withot affecting the reslts, cables are drawn arallel or erendiclar to each other in Fig. 3. Theorem 3: A conex terrain A is K-coered by a set of cables C if 1) there exist in terrain A intersection oints between cables or between cables and A s bondary; 2) all intersection oints between any cables are at least K-coered; and 3) all intersection oints between any cable and A s bondary are at least K-coered. Theorem 3 conerts the roblem of finding the coerage degree of a terrain to the simler roblem of finding the coerage degrees of all the intersection oints in the terrain. A cable is ineligible to stay actie if all the intersection oints inside its sensing rectangle are at least K-coered. To find all the intersection oints inside its sensing rectangle, a cable needs to know the locations of all the cables in its sensing neighbor set, SN(). SN() shold inclde all the actie cables that are within the maximm distance between the rocessor on and the rocessor on another cable that attaches to. As shown in Fig. 4, that distance is the distance between rocessor on and on another cable, which is (2) 2 +(2) 2 = Cables can find their neighbors throgh exchanging Hello messages. If the actal commnication range R sed by a cable is greater or eqal to , the Hello message from each cable only needs to inclde its own id and location. If R< , a cable may not find all its neighbors throgh sch Hello messages in one ho. Then, more cables will stay actie becase of its limited information. This is roed by the simlation in the next section. Also if R< , the network is not garanteed to be connected as indicated by Theorem 2. The reslting algorithm for a cable to check whether it is eligible to stay actie or not is shown in Fig.. Algorithm A (b) q U Algorithm Eligibility: determine if a cable is eligible to stay actie gien a coerage degree K 1: /* find all intersection oints within Rect() */ 2: IP = { ( w OR A) AN, w SN() AN <}; 3: /* find all oerlaing cables */ 4: OC = { =}; : if IP =then 6: if OC K then 7: retrn INEIGIBE; 8: else 9: retrn EIGIBE; 1: end if 11: end if 12: for each oint IP do 13: /* comte s coerage degree */ 14: cd() = { SN() AN < } 1: if cd() <K then 16: retrn EIGIBE; 17: end if 18: end for 19: retrn INEIGIBE; Fig.. The K-coerage eligibility algorithm Eligibility has three arts: first, cable finds all the intersection oints (of cables and between cables and terrain A) within its rectanglar sensing region and ts these oints into the intersection oint set IP. Next, cable tries to find ot if there are any oerlaing cables which are the cables haen to be laced in the same location as itself. If so, these cables are t into the oerlaing cable set OC. If there is no intersection oint within s sensing rectangle and the nmber of oerlaing cables OC is at least K, cable is ineligible. Otherwise, it is eligible. Finally, cable calclates cd(), the coerage degree of eery intersection oint within its sensing region. If the coerage degree is less than K, cable is eligible; otherwise, it is not eligible. The comtation comlexity of the eligibility algorithm is O(N 3 ) where N is the nmber of cables in the sensing neighbor set. B. Cable mode transitions Now the CMT algorithm is resented in Fig. 6. A cable can transit among SEEP, ACTIVE and SNOOPY modes. Initially all cables are ACTIVE. If the terrain coerage goes oer the reqired degree of the alication, redndant cables will find themseles ineligible to stay actie and go to the SEEP mode ntil no more cables can be trned off withot casing insfficient degree of coerage. If oer time the failre of a cable makes the terrain coerage fall below the reqired degree, some cables will find themseles eligible and go to the ACTIVE mode. The times set by the join and withdraw timers are randomly generated to aoid collisions among mltile cables wanting to join or withdraw simltaneosly.
4 This fll text aer was eer reiewed at the direction of IEEE Commnications Society sbject matter exerts for blication in the IEEE ICC 11 roceedings Cable Mode Transition (CMT) Algorithm 1: If a cable is in the SEEP mode and its slee timer exires, it trns on, starts a snooy timer and goes to the SNOOPY mode. 2: If a cable is in the SNOOPY mode and receies either HEO, JOIN, or WITHRAW message, it calls the eligibility algorithm (in Fig. ) to see if it is eligible to stay actie. If it is, it starts a join timer; else it goes to the SEEP mode. After the join timer starts and if it becomes ineligible (e.g. becase of a JOIN message from a commnicating neighbor), it cancels the join timer. If the join timer exires, the cable broadcasts a Join message and goes to the ACTIVE mode. If the snooy timer exires, it starts a slee timer and goes to the SEEP mode. 3: If a cable is in the ACTIVE mode and receies a HEO message, it dates its neighbor table and calls the eligibility algorithm (in Fig. ) to see if it shold remain actie. If it shold not, it starts a withdraw timer. Before the withdraw timer exires and if it becomes eligible (e.g. becase of a WITHRAW message from a commnicating neighbor), it cancels the withdraw timer. If the withdraw timer exires, it broadcasts a Withdraw message, starts a slee timer and goes to the SEEP mode. Fig. 6. Cable mode transition algorithm V. SIMUATIONS In this section, we condct simlations to ealate or energy-efficient commnication scheme. Or simlator is selfwritten becase there are no aailable ones for cable sensors. We ealate the effectieness and roerties of or scheme by itself de to the lack of others at this oint. In the first simlation, we want to see the relationshi between the nmber of cables deloyed and the aerage coerage degree achieed. To measre coerage, we diide the entire terrain into 1 1 atches. The coerage degree of a atch is aroximated by measring the nmber of actie cables that coer the center of the atch. We se terrains of 3 3 and. In each terrain, we try two kinds of cables: 1 (sensing range and length 1) and (sensing range and length ). Note that we do not hae a nit for these data, which can make the simlations more adatie to the real alications. What matters here is the relatie size of the cables to the terrain. The cables are randomly deloyed onto the terrain in all directions. We start from cables to and go to cables with an increment of in each ste. The degree of each location is calclated and the final coerage degree of the terrain is the aerage of all the locations. Figs. 7(a)(b) show the reslts. From the reslts, we can see that (1) in a larger terrain, the coerage is lower with the same nmber of cables; (2) in a terrain, with the increase of the nmber of cables, the coerage goes ; (3) with the same nmber of cables, the cable has a higher coerage than the 1 cable Aerage coerage degree (a) Aerage coerage degree sing 1 cables in a 3 3 terrain Fig Aerage coerage degree (b) Aerage coerage degree sing cables in a terrain Aerage coerage degree achieed sing different nmbers of cables 1-coerage 2-coerage 3-coerage (a) Actie 1 cables needed in a 3 3 terrain for 1, 2, 3-coerage 1 1-coerage 2-coerage 3-coerage (c) Actie 1 cables needed in a terrain for 1, 2, 3-coerage Fig coerage 2-coerage 3-coerage (b) Actie cables needed in a 3 3 terrain for 1, 2, 3-coerage 1 1-coerage 2-coerage 3-coerage (d) Actie cables needed in a terrain for 1, 2, 3-coerage needed for 1, 2, and 3-coerage becase it is longer and ths has a larger coerage region. In the second simlation, we want to find ot how many cables are actie ot of all deloyed to achiee coerage degrees 1, 2, and 3 sing the CMT algorithm. Again we se the 1 and cables and deloy them on two terrains 3 3 and. Interrain3 3 sing the 1 cables, we start from 1 cables becase this is the nmber to garantee 1, 2, and 3-coerage for the whole terrain. Similarly in terrain 3 3 sing cables, the starting nmber is 1 cables. And in terrain, the starting cable nmbers for 1 and are 2 and 1 resectiely for the same reason. The reslts are shown in Figs. 8(a)(b)(c)(d). From the reslts, we can see that (1) more cables need to be actie to hae higher coerage; (2) the nmber of actie cables does not increase with the increase of cable nmbers. That means, or scheme does not wake more cables becase the coerage goal has already been achieed. In the third simlation, we want to exlore the effect of different commnication ranges to the nmber of actie cables sing the CMT algorithm. We still deloy the 1 and cables on the 3 3 and terrains. To garantee that a terrain is 1-coered, we se different nmbers of cables
5 This fll text aer was eer reiewed at the direction of IEEE Commnications Society sbject matter exerts for blication in the IEEE ICC 11 roceedings Commnication range (a) Actie 1 cables needed with (b) Actie cables needed with different commnication ranges in a different commnication ranges in a 3 3 terrain 3 3 terrain Commnication range Commnication range (c) Actie 1 cables needed with (d) Actie cables needed with different commnication ranges in a different commnication ranges in a terrain terrain Fig Commnication range needed for different commnication ranges for each setting. For examle, for terrain 3 3 with 1, we se 9 cables becase this is the nmber to make sre that the terrain is 1-coered. For terrain 3 3 with, we se cables. For terrain with 1 and, the nmber of cables sed is 23 and resectiely. To make cases general, we t a rocessor on each cable in a random location. We start with a commnication range R that is greater or eqal to , then decrease it gradally. The reslts are shown in Figs. 9(a)(b)(c)(d). From the reslts we can see that if the commnication range is greater or eqal to , many cables can be trned off becase this is the range that they can flly detect their neighbors and find ot if eery location in their sensing region is 1-coered by other actie cables. For examle, in the 3 3 terrain with the 1 cables, only 22 cables need to be actie ot of 9 cables deloyed to 1-coer the whole terrain. The saing is 76%. Then we redce the commnication range. At the beginning, the nmber of actie cables remains the same becase the commnication range is still greater than the distance between two rocessors on cables. Then with the frther decrease of the commnication range, each cable cannot flly detect all its neighbors een if they are there. From the limited neighbors that a cable can detect, it will more and more likely decide to stay awake becase not all the locations within its sensing region can be coered by its detected neighbors. After a certain oint, for examle, in the terrain with the cables, when the commnication range redces to 2 or 1, no cable can be trned off becase each cable thinks it is the only one to coer the locations in its sensing region. In smmary, the simlation reslts show that the CMT scheme can make as many cables as ossible to go to slee withot affecting the connectiity of the network according to the reqired coerage degree K from the alication. VI. REATE WORK In the literatre, for oint sensors, there are seeral aers working on saing ower by determining a minimal nmber of actie sensors to maintain coerage as well as connectiity. In terms of the relationshi between coerage and connectiity, an imortant reslt was roed by Zhang and Ho [6], which states that if the commnication range R c is at least twice the sensing range R s, a comlete coerage of a conex area imlies connectiity of the actie sensors. Wang et al. [] generalize the reslt in [6] by showing that, when the commnication range R c is at least twice the sensing range R s,akcoered network will reslt in a K-connected network. Then the athors t forward the coerage configration rotocol (CCP) that can dynamically configre the network to roide different coerage degrees reqired by alications. Carle and Simlot [1] roose another mechanism for energy-efficient connected area coerage when all sensor nodes hae the same sensing range and the commnication range eqals the sensing range. The goal of the algorithm is to se one of the existing rotocols (e.g. ai and W s algorithm [3]) to select an areadominating set of nodes of minimm cardinality, sch that the selected set coers the gien area. VII. CONCUSION AN FUTURE WORK In this aer, we roosed a distribted algorithm called CMT to redce commnication energy consmtion in a new tye of sensor network: the fiber otic cable sensor network, by ermitting rocessors take trns to go to slee withot affecting the coerage and connectiity of the network. Simlation reslts showed that or scheme is efficient in saing energy and can ths rolong the lifetime of the network. In the ftre, we will discss oint coerage and barrier coerage roblems sing cable sensor. ACKNOWEGMENTS This research was sorted by NSF grant CBET This work reresents the oinions of the athors only and does not necessarily reresent the iews of the U.S. Goernment. REFERENCES [1] J. Carle,. Simlot, Energy efficient area monitoring by sensor networks, IEEE Comter, ol. 37, No. 2, 4, [2] X. Chen, N. C. Rowe, Energy efficient commnication of cable sensors, Technical reort, eartment of Comter Science, Texas State Uniersity, San Marcos, 1. [3] F. ai, J. W, istribted dominant rning in ad hoc wireless networks, Proc. of IEEE International Conference on Commnications, 3. [4] N. Rowe, Efficient deloyment of fiber-otic cable seismic sensors, Proc. of SIPE, Aril, 1. [] X. R. Wang, G.. Xing, Y. F. Zhang, C. Y., R. Pless and C. Gill, Integrated coerage and connectiity configration in wireless sensor networks, Proc. of the 1st ACM SenSys, 3, [6] H. Zhang, J. C. Ho, Maintaining sensing coerage and connectiity in large sensor networks, Technical reort UIUC, UIUCCS-R-3-231, 3.
5 Using Your Verbatim Autodialer
5 Using Yor Verbatim Atodialer 5.1 Placing Inqiry Calls to the Verbatim Atodialer ( Yo may call the Verbatim atodialer at any time from any phone. The nit will wait the programmed nmber of rings before
More informationCHAPTER ONE VECTOR GEOMETRY
CHAPTER ONE VECTOR GEOMETRY. INTRODUCTION In this chapter ectors are first introdced as geometric objects, namely as directed line segments, or arrows. The operations of addition, sbtraction, and mltiplication
More informationKentucky Deferred Compensation (KDC) Program Summary
Kentcky Deferred Compensation (KDC) Program Smmary Smmary and Highlights of the Kentcky Deferred Compensation (KDC) Program Simple. Smart. For yo. For life. 457 Plan 401(k) Plan Roth 401(k) Deemed Roth
More informationDeploying Network Load Balancing
C H A P T E R 9 Deploying Network Load Balancing After completing the design for the applications and services in yor Network Load Balancing clster, yo are ready to deploy the clster rnning the Microsoft
More informationMobility Management and Its Applications in Efficient Broadcasting in Mobile Ad Hoc Networks
Mobilit Management and Its Applications in Efficient Broadcasting in Mobile Ad Hoc Netorks Jie W and Fei Dai Department of Compter Science and Engineering Florida Atlantic Uniersit Boca Raton, FL 33431
More information10 Evaluating the Help Desk
10 Evalating the Help Desk The tre measre of any society is not what it knows bt what it does with what it knows. Warren Bennis Key Findings Help desk metrics having to do with demand and with problem
More informationManipulating Deformable Linear Objects: Characteristic Features for Vision-Based Detection of Contact State Transitions
Maniplating Deformable Linear Objects: Characteristic Featres for Vision-Based Detection of Contact State Transitions Jürgen Acker Dominik Henrich Embedded Systems and Robotics Lab. (RESY) Faclty of Informatics,
More informationHOMOTOPY FIBER PRODUCTS OF HOMOTOPY THEORIES
HOMOTOPY FIBER PRODUCTS OF HOMOTOPY THEORIES JULIA E. BERGNER Abstract. Gien an appropriate diagram of left Qillen fnctors between model categories, one can define a notion of homotopy fiber prodct, bt
More informationDirect Loan Basics & Entrance Counseling Guide. For Graduate and Professional Student Direct PLUS Loan Borrowers
Direct Loan Basics & Entrance Conseling Gide For Gradate and Professional Stdent Direct PLUS Loan Borrowers DIRECT LOAN BASICS & ENTRANCE COUNSELING GUIDE For Gradate and Professional Stdent Direct PLUS
More informationFINANCIAL FITNESS SELECTING A CREDIT CARD. Fact Sheet
FINANCIAL FITNESS Fact Sheet Janary 1998 FL/FF-02 SELECTING A CREDIT CARD Liz Gorham, Ph.D., AFC Assistant Professor and Family Resorce Management Specialist, Utah State University Marsha A. Goetting,
More informationSpectrum Balancing for DSL with Restrictions on Maximum Transmit PSD
Spectrm Balancing for DSL with Restrictions on Maximm Transmit PSD Driton Statovci, Tomas Nordström, and Rickard Nilsson Telecommnications Research Center Vienna (ftw.), Dona-City-Straße 1, A-1220 Vienna,
More informationJoint Routing and Scheduling in Multi-hop Wireless Networks with Directional Antennas
Joint Roting and Schedling in Mlti-hop Wireless Netorks ith Directional Antennas Partha Dtta IBM Research India parthdt@in.ibm.com Viek Mhatre Motorola Inc. iekmhatre@motorola.com Debmalya Panigrahi CSAIL,
More informationQUANTIFYING THE PERFORMANCE OF A TOP-DOWN NATURAL VENTILATION WINDCATCHER. Benjamin M. Jones a,b and Ray Kirby b, *
QUANTFYNG TH PRFORMANC OF A TOP-DOWN NATURAL VNTLATON WNDCATCHR Benjamin M. Jones a,b and Ray Kirby b, * a Monodraght Ltd. Halifax Hose, Halifax Road, Cressex Bsiness Park High Wycombe, Bckinghamshire,
More informationHSBC Internet Banking. Combined Product Disclosure Statement and Supplementary Product Disclosure Statement
HSBC Internet Banking Combined Prodct Disclosre Statement and Spplementary Prodct Disclosre Statement AN IMPORTANT MESSAGE FOR HSBC CUSTOMERS NOTICE OF CHANGE For HSBC Internet Banking Combined Prodct
More informationLeveraging History for Faster Sampling of Online Social Networks
Leeraging History for Faster Sampling of Online Social Netorks Zhojie Zho George Washington Uniersity rexzho@g.ed Nan Zhang George Washington Uniersity nzhang10@g.ed Gatam Das Uniersity of Texas at Arlington
More informationPlanning a Smart Card Deployment
C H A P T E R 1 7 Planning a Smart Card Deployment Smart card spport in Microsoft Windows Server 2003 enables yo to enhance the secrity of many critical fnctions, inclding client athentication, interactive
More informationA Method to Segment a 3D Surface Point Cloud for Selective Sensing in Robotic Exploration
A Method to Segment a 3D Surface Point Cloud for Selectie Sensing in Robotic Exloration Philli Curtis, Pierre Payeur School of Information Technology and Engineering Uniersity of Ottawa Ottawa, O, Canada
More informationFacilities. Car Parking and Permit Allocation Policy
Facilities Car Parking and Permit Allocation Policy Facilities Car Parking and Permit Allocation Policy Contents Page 1 Introdction....................................................2 2.0 Application
More informationEvery manufacturer is confronted with the problem
HOW MANY PARTS TO MAKE AT ONCE FORD W. HARRIS Prodction Engineer Reprinted from Factory, The Magazine of Management, Volme 10, Nmber 2, Febrary 1913, pp. 135-136, 152 Interest on capital tied p in wages,
More informationBorrowing for College. Table of contents. A guide to federal loans for higher education
Borrowing for College A gide to federal loans for higher edcation Table of contents Edcation loan basics 2 Applying for edcation loans 3 Repaying edcation loans 3 Controlling edcation loan debt 5 Glossary
More informationOn a Generalized Graph Coloring/Batch Scheduling Problem
Reglar Papers On a Generalized Graph Coloring/Batch Schedling Problem Giorgio Lcarelli 1, Ioannis Milis Dept. of Informatics, Athens University of Economics and Bsiness, 104 34, Athens, Greece, {glc, milis}@aeb.gr
More informationPgrading To Windows XP 4.0 Domain Controllers and Services
C H A P T E R 8 Upgrading Windows NT 4.0 Domains to Windows Server 2003 Active Directory Upgrading yor domains from Microsoft Windows NT 4.0 to Windows Server 2003 Active Directory directory service enables
More informationThe Online Freeze-tag Problem
The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden mikael.hammar@atus.com School of Technology and Society, Malmö University,
More informationDesigning and Deploying File Servers
C H A P T E R 2 Designing and Deploying File Servers File servers rnning the Microsoft Windows Server 2003 operating system are ideal for providing access to files for sers in medim and large organizations.
More informationEnabling Advanced Windows Server 2003 Active Directory Features
C H A P T E R 5 Enabling Advanced Windows Server 2003 Active Directory Featres The Microsoft Windows Server 2003 Active Directory directory service enables yo to introdce advanced featres into yor environment
More informationGUIDELINE. Guideline for the Selection of Engineering Services
GUIDELINE Gideline for the Selection of Engineering Services 1998 Mission Statement: To govern the engineering profession while enhancing engineering practice and enhancing engineering cltre Pblished by
More informationResource Pricing and Provisioning Strategies in Cloud Systems: A Stackelberg Game Approach
Resorce Pricing and Provisioning Strategies in Clod Systems: A Stackelberg Game Approach Valeria Cardellini, Valerio di Valerio and Francesco Lo Presti Talk Otline Backgrond and Motivation Provisioning
More informationASAND: Asynchronous Slot Assignment and Neighbor Discovery Protocol for Wireless Networks
ASAND: Asynchronos Slot Assignment and Neighbor Discovery Protocol for Wireless Networks Fikret Sivrikaya, Costas Bsch, Malik Magdon-Ismail, Bülent Yener Compter Science Department, Rensselaer Polytechnic
More informationDesigning an Authentication Strategy
C H A P T E R 1 4 Designing an Athentication Strategy Most organizations need to spport seamless access to the network for mltiple types of sers, sch as workers in offices, employees who are traveling,
More informationPurposefully Engineered High-Performing Income Protection
The Intelligent Choice for Disability Income Insrance Prposeflly Engineered High-Performing Income Protection Keeping Income strong We engineer or disability income prodcts with featres that deliver benefits
More informationMake the College Connection
Make the College Connection A college planning gide for stdents and their parents Table of contents The compelling case for college 2 Selecting a college 3 Paying for college 5 Tips for meeting college
More informationThe Dot Product. Properties of the Dot Product If u and v are vectors and a is a real number, then the following are true:
00 000 00 0 000 000 0 The Dot Prodct Tesday, 2// Section 8.5, Page 67 Definition of the Dot Prodct The dot prodct is often sed in calcls and physics. Gien two ectors = and = , then their
More informationMicrosoft Licensing NEWSLETTER. Agreement & Products. Contents. Insight, your Trusted Advisor. Your Trusted Advisor uk.insight.
Isse 1 & 2 2016 1 Microsoft Licensing Agreement & Prodcts NEWSLETTER Contents Ugrade to Office 365 Plan E5 Promotional Ste U 2 Office 365 Edcation 2 FastTrack Adotion for O365 and EMS Heling with yor Migration
More informationModeling Roughness Effects in Open Channel Flows D.T. Souders and C.W. Hirt Flow Science, Inc.
FSI-2-TN6 Modeling Roghness Effects in Open Channel Flows D.T. Soders and C.W. Hirt Flow Science, Inc. Overview Flows along rivers, throgh pipes and irrigation channels enconter resistance that is proportional
More informationHigh Availability for Internet Information Server Using Double-Take 4.x
High Availability for Internet Information Server Using Doble-Take 4.x High Availability for Internet Information Server Using Doble-Take 4.x pblished April 2000 NSI and Doble-Take are registered trademarks
More information9 Setting a Course: Goals for the Help Desk
IT Help Desk in Higher Edcation ECAR Research Stdy 8, 2007 9 Setting a Corse: Goals for the Help Desk First say to yorself what yo wold be; and then do what yo have to do. Epictets Key Findings Majorities
More informationConfiguration Management for Software Product Lines
onfigration Management for Software Prodct Lines Roland Laqa and Peter Knaber Franhofer Institte for Experimental Software Engineering (IESE) Saerwiesen 6 D-67661 Kaiserslatern, Germany +49 6301 707 161
More informationIntroduction to HBase Schema Design
Introdction to HBase Schema Design Amandeep Khrana Amandeep Khrana is a Soltions Architect at Clodera and works on bilding soltions sing the Hadoop stack. He is also a co-athor of HBase in Action. Prior
More informationRoth 401(k) and Roth 403(b) Accounts: Pay Me Now or Pay Me Later Why a Roth Election Should Be Part of Your Plan Now
Reprinted with permission from the Society of FSP. Reprodction prohibited withot pblisher's written permission. Roth 401(k) and Roth 403(b) Acconts: Why a Roth Election Shold Be Part of Yor Plan Now by
More informationThe Intelligent Choice for Disability Income Protection
The Intelligent Choice for Disability Income Protection provider Pls Keeping Income strong We prposeflly engineer or disability income prodct with featres that deliver benefits sooner and contine paying
More informationPlanning an Active Directory Deployment Project
C H A P T E R 1 Planning an Active Directory Deployment Project When yo deploy the Microsoft Windows Server 2003 Active Directory directory service in yor environment, yo can take advantage of the centralized,
More informationLoad Balancing Mechanism in Agent-based Grid
Communications on Advanced Comutational Science with Alications 2016 No. 1 (2016) 57-62 Available online at www.isacs.com/cacsa Volume 2016, Issue 1, Year 2016 Article ID cacsa-00042, 6 Pages doi:10.5899/2016/cacsa-00042
More information8 Service Level Agreements
8 Service Level Agreements Every organization of men, be it social or political, ltimately relies on man s capacity for making promises and keeping them. Hannah Arendt Key Findings Only abot 20 percent
More information7 Help Desk Tools. Key Findings. The Automated Help Desk
7 Help Desk Tools Or Age of Anxiety is, in great part, the reslt of trying to do today s jobs with yesterday s tools. Marshall McLhan Key Findings Help desk atomation featres are common and are sally part
More informationTight Bounds for Randomized Load Balancing on Arbitrary Network Topologies
Tight Bonds for Randomized Load Balancing on Arbitrary Network Topologies Thomas Saerwald and He Sn Max Planck Institte for Informatics Saarbrücken 66123, Germany Institte of Modern Mathematics and Physics,
More information3 Distance in Graphs. Brief outline of this lecture
Distance in Graphs While the preios lectre stdied jst the connectiity properties of a graph, now we are going to inestigate how long (short, actally) a connection in a graph is. This natrally leads to
More informationT -dominance: Prioritized Defense Deployment for
T -dominance: Prioritized Defense Deployment for BYOD Secrity Wei Peng, Feng Li, Keesook J. Han, Xkai Zo, and Jie W Department of Compter and Information Science Department of Compter, Information, and
More informationThe Intelligent Choice for Basic Disability Income Protection
The Intelligent Choice for Basic Disability Income Protection provider Pls Limited Keeping Income strong We prposeflly engineer or basic disability income prodct to provide benefit-rich featres delivering
More informationOptimal Trust Network Analysis with Subjective Logic
The Second International Conference on Emerging Secrity Information, Systems and Technologies Optimal Trst Network Analysis with Sbjective Logic Adn Jøsang UNIK Gradate Center, University of Oslo Norway
More informationSQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID
International Journal of Comuter Science & Information Technology (IJCSIT) Vol 6, No 4, August 014 SQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID
More informationEffective governance to support medical revalidation
Effective governance to spport medical revalidation A handbook for boards and governing bodies This docment sets ot a view of the core elements of effective local governance of the systems that spport
More informationDIRECT TAX LAWS Taxability of Capital Gains on By-back of Shares - Debate ignites after AAR s rling in RST s case BACKGROUND 1. Recently, the Athority for Advance Rlings ( AAR ) in the case of RST, In
More informationHow To Plan A Cloud Infrastructure
Concrrent Placement, Capacity Provisioning, and Reqest Flow Control for a Distribted Clod Infrastrctre Shang Chen, Yanzhi Wang, Massod Pedram Department of Electrical Engineering University of Sothern
More informationDesigning a TCP/IP Network
C H A P T E R 1 Designing a TCP/IP Network The TCP/IP protocol site defines indstry standard networking protocols for data networks, inclding the Internet. Determining the best design and implementation
More informationTarget Tracking with Monitor and Backup Sensors in Wireless Sensor Networks
Target Tracking with Monitor and Backup Sensors in Wireless Sensor Networks Md. Zakirul Alam Bhuiyan, Guojun Wang,andJieWu School of Information Science and Engineering Central South Uniersity, Changsha
More informationPlanning a Managed Environment
C H A P T E R 1 Planning a Managed Environment Many organizations are moving towards a highly managed compting environment based on a configration management infrastrctre that is designed to redce the
More informationCloser Look at ACOs. Making the Most of Accountable Care Organizations (ACOs): What Advocates Need to Know
Closer Look at ACOs A series of briefs designed to help advocates nderstand the basics of Accontable Care Organizations (ACOs) and their potential for improving patient care. From Families USA Updated
More informationCurriculum development
DES MOINES AREA COMMUNITY COLLEGE Crriclm development Competency-Based Edcation www.dmacc.ed Why does DMACC se competency-based edcation? DMACC tilizes competency-based edcation for a nmber of reasons.
More informationThe Time is Now for Stronger EHR Interoperability and Usage in Healthcare
The Time is Now for Stronger EHR Interoperability and Usage in Healthcare Sponsored by Table of Contents 03 Stdy: Large Nmber of EHRs Do Not Meet Usability Standards 05 Black Book: EHR Satisfaction Growing
More informationEMC VNX Series. EMC Secure Remote Support for VNX. Version VNX1, VNX2 300-014-340 REV 03
EMC VNX Series Version VNX1, VNX2 EMC Secre Remote Spport for VNX 300-014-340 REV 03 Copyright 2012-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Jly, 2014 EMC believes the information
More informationRegular Specifications of Resource Requirements for Embedded Control Software
Reglar Specifications of Resorce Reqirements for Embedded Control Software Rajeev Alr and Gera Weiss University of Pennsylvania Abstract For embedded control systems a schedle for the allocation of resorces
More informationTechnical Notes. PostgreSQL backups with NetWorker. Release number 1.0 302-001-174 REV 01. June 30, 2014. u Audience... 2. u Requirements...
PostgreSQL backps with NetWorker Release nmber 1.0 302-001-174 REV 01 Jne 30, 2014 Adience... 2 Reqirements... 2 Terminology... 2 PostgreSQL backp methodologies...2 PostgreSQL dmp backp... 3 Configring
More informationCRM Customer Relationship Management. Customer Relationship Management
CRM Cstomer Relationship Management Farley Beaton Virginia Department of Taxation Discssion Areas TAX/AMS Partnership Project Backgrond Cstomer Relationship Management Secre Messaging Lessons Learned 2
More informationChapter 1. LAN Design
Chapter 1 LAN Design CCNA3-1 Chapter 1 Note for Instrctors These presentations are the reslt of a collaboration among the instrctors at St. Clair College in Windsor, Ontario. Thanks mst go ot to Rick Graziani
More informationPosition paper smart city. economics. a multi-sided approach to financing the smart city. Your business technologists.
Position paper smart city economics a mlti-sided approach to financing the smart city Yor bsiness technologists. Powering progress From idea to reality The hman race is becoming increasingly rbanised so
More informationMutualcast: An Efficient Mechanism for One-To-Many Content Distribution ABSTRACT Categories and Subject Descriptors General Terms Keywords
Mtalcast: An Efficient Mechanism for One-To-Many Content Distribtion Jin Li, Philip A. Cho and Cha Zhang, Microsoft Research, Commnication and Collaboration Systems Grop One Microsoft Way, Bld. 3, Redmond,
More informationSocial Work Bursary: Academic Year 2014/15 Application notes for students on postgraduate courses
Social Work Brsary: Academic Year 2014/15 Application notes for stdents on postgradate corses These notes are for stdents who do not have a partner or any dependants. Please make sre yo complete the correct
More informationThe Role of the Community Occupational Therapist
Ceredigion Conty Concil Social Services Department The Role of the Commnity Occpational Therapist...taking care to make a difference Large Print or other format/medim are available on reqest please telephone
More informationSocial Work Bursary: Academic year 2015/16 Application notes for students on undergraduate courses
Social Work Brsary: Academic year 2015/16 Application notes for stdents on ndergradate corses These notes are for ndergradate stdents who have previosly received a brsary. Please make sre yo complete the
More informationPlanning and Implementing An Optimized Private Cloud
W H I T E PA P E R Intelligent HPC Management Planning and Implementing An Optimized Private Clod Creating a Clod Environment That Maximizes Yor ROI Planning and Implementing An Optimized Private Clod
More informationMVM-BVRM Video Recording Manager v2.22
Video MVM-BVRM Video Recording Manager v2.22 MVM-BVRM Video Recording Manager v2.22 www.boschsecrity.com Distribted storage and configrable load balancing iscsi disk array failover for extra reliability
More informationPhone Banking Terms Corporate Accounts
Phone Banking Terms Corporate Acconts If there is any inconsistency between the terms and conditions applying to an Accont and these Phone Banking Terms, these Phone Banking Terms prevail in respect of
More informationA Spare Part Inventory Management Model for Better Maintenance of Intelligent Transportation Systems
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 A Spare Part Inventory Management Model for Better Maintenance of Intelligent
More informationPreparing your heavy vehicle for brake test
GUIDE Preparing yor heavy vehicle for brake test A best practice gide Saving lives, safer roads, ctting crime, protecting the environment Breaking the braking myth Some people believe that a locked wheel
More informationResearch on Pricing Policy of E-business Supply Chain Based on Bertrand and Stackelberg Game
International Jornal of Grid and Distribted Compting Vol. 9, No. 5 (06), pp.-0 http://dx.doi.org/0.457/ijgdc.06.9.5.8 Research on Pricing Policy of E-bsiness Spply Chain Based on Bertrand and Stackelberg
More informationA Layered Architecture for Querying Dynamic Web Content
A Layered Architectre for Qerying Dynamic Web Content Hasan Dalc Uniersity at Stony Brook dalc@cs.snysb.ed Jliana Freire Bell Laboratories jliana@research.bell-labs.com Michael Kifer Uniersity at Stony
More informationLocal Connectivity Tests to Identify Wormholes in Wireless Networks
Local Connectivity Tests to Identify Wormholes in Wireless Networks Xiaomeng Ban Comuter Science Stony Brook University xban@cs.sunysb.edu Rik Sarkar Comuter Science Freie Universität Berlin sarkar@inf.fu-berlin.de
More informationCloser Look at ACOs. Designing Consumer-Friendly Beneficiary Assignment and Notification Processes for Accountable Care Organizations
Closer Look at ACOs A series of briefs designed to help advocates nderstand the basics of Accontable Care Organizations (ACOs) and their potential for improving patient care. From Families USA Janary 2012
More informationCompensation Approaches for Far-field Speaker Identification
Compensation Approaches for Far-field Speaer Identification Qin Jin, Kshitiz Kmar, Tanja Schltz, and Richard Stern Carnegie Mellon University, USA {qjin,shitiz,tanja,rms}@cs.cm.ed Abstract While speaer
More information3. Fluid Dynamics. 3.1 Uniform Flow, Steady Flow
3. Flid Dynamics Objectives Introdce concepts necessary to analyse flids in motion Identify differences between Steady/nsteady niform/non-niform compressible/incompressible flow Demonstrate streamlines
More informationAdaptive behaviour in a predator-prey model leads to multiple equilibrium states. A. Pimenov, A. Korobeinikov, D. Rachinskii
Preprint núm. 1195 September 214 Adaptie behaior in a predator-prey model leads to mltiple eqilibrim states A. Pimeno, A. Korobeiniko, D. Rachinskii ADAPTIVE BEHAVIOUR IN A PREDATOR-PREY MODEL LEADS TO
More informationaééäçóáåö=táåççïë= péêîéê=ommp=oéöáçå~ä= açã~áåë
C H A P T E R 7 aééäçóáåö=táåççïë= péêîéê=ommp=oéöáçå~ä= açã~áåë Deploying Microsoft Windows Server 2003 s involves creating new geographically based child domains nder the forest root domain. Deploying
More informationA Contemporary Approach
BORICP01.doc - 1 Second Edition Edcational Psychology A Contemporary Approach Gary D. Borich The University of Texas at Astin Martin L. Tombari University of Denver (This pblication may be reprodced for
More informationSample Pages. Edgar Dietrich, Alfred Schulze. Measurement Process Qualification
Sample Pages Edgar Dietrich, Alfred Schlze Measrement Process Qalification Gage Acceptance and Measrement Uncertainty According to Crrent Standards ISBN: 978-3-446-4407-4 For frther information and order
More informationEvolutionary Path Planning for Robot Assisted Part Handling in Sheet Metal Bending
Evoltionary Path Planning for Robot Assisted Part Handling in Sheet Metal Bending Abstract Xiaoyn Liao G. Gary Wang * Dept. of Mechanical & Indstrial Engineering, The University of Manitoba Winnipeg, MB,
More informationUsing GPU to Compute Options and Derivatives
Introdction Algorithmic Trading has created an increasing demand for high performance compting soltions within financial organizations. The actors of portfolio management and ris assessment have the obligation
More informationA guide to safety recalls in the used vehicle industry GUIDE
A gide to safety recalls in the sed vehicle indstry GUIDE Definitions Aftermarket parts means any prodct manfactred to be fitted to a vehicle after it has left the vehicle manfactrer s prodction line.
More informationCandidate: Kyle Jarnigan. Date: 04/02/2012
Cstomer Service Manager Assessment Report 04/02/2012 www.resorceassociates.com To Improve Prodctivity Throgh People. Cstomer Service Manager Assessment Report 04/02/2012 Prepared For: NAME Prepared by:
More informationThe Good Governance Standard for Public Services
The Good Governance Standard for Pblic Services The Independent Commission for Good Governance in Pblic Services The Independent Commission for Good Governance in Pblic Services, chaired by Sir Alan Langlands,
More informationA Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm
International Journal of Comuter Theory and Engineering, Vol. 7, No. 4, August 2015 A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm Xin Lu and Zhuanzhuan Zhang Abstract This
More informationHigh Availability for Microsoft SQL Server Using Double-Take 4.x
High Availability for Microsoft SQL Server Using Doble-Take 4.x High Availability for Microsoft SQL Server Using Doble-Take 4.x pblished April 2000 NSI and Doble-Take are registered trademarks of Network
More informationGraph-based Simplex Method for Pairwise Energy Minimization with Binary Variables
Graph-based Simplex Method for Pairwise Energy Minimization with Binary Variables Daniel Průša Center for Machine Perception, Faclty of Electrical Engineering, Czech Technical Uniersity Karloo náměstí
More informationAn important observation in supply chain management, known as the bullwhip effect,
Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David Simchi-Levi Decision Sciences Deartment, National
More informationPoint Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11)
Point Location Prerocess a lanar, olygonal subdivision for oint location ueries. = (18, 11) Inut is a subdivision S of comlexity n, say, number of edges. uild a data structure on S so that for a uery oint
More informationEVOLUTIONARY GAME ANALYSIS ON CYBER SECURITY INVESTMENT
EVOLUTONAY GAME ANALYSS ON CYBE SECUTY NVESTMENT ong Pan, School/College of Business, Hohai Uniersity & Bryant Uniersity, ran@bryant.edu Chen Zhang, Ph.D., College of Business, Bryant Uniersity, Smithfield,,
More informationFaceTrust: Assessing the Credibility of Online Personas via Social Networks
FaceTrst: Assessing the Credibility of Online Personas via Social Networks Michael Sirivianos Kyngbaek Kim Xiaowei Yang Dke University University of California, Irvine Dke University msirivia@cs.dke.ed
More informationAn unbiased crawling strategy for directed social networks
Abstract An nbiased crawling strategy for directed social networks Xeha Yang 1,2, HongbinLi 2* 1 School of Software, Shenyang Normal University, Shenyang 110034, Liaoning, China 2 Shenyang Institte of
More informationInferring Continuous Dynamic Social Influence and Personal Preference for Temporal Behavior Prediction
Inferring Continos Dynamic Social Inflence and Personal Preference for Temporal Behavior Prediction Jn Zhang 1,2,3,4 Chaokn Wang 2,3,4 Jianmin Wang 2,3,4 Jeffrey X Y 5 1 Department of Compter Science and
More informationOn the intensimetric analysis and monitoring of flue organ pipes. 1 Introduction
On the intensimetric analysis and monitoring of flue organ ies Domenico Stanzial FSSG, National Research Council of Italy, Fondazione G. Cini, Isola di San Giorgio Maggiore, I-3014 Venezia, Italy, domenico.stanzial@cini.e.cnr.it,
More information