Surveillance coverage of sensor networks under a random mobility strategy

Size: px
Start display at page:

Download "Surveillance coverage of sensor networks under a random mobility strategy"

Transcription

1 µ Surveillane overage o sensor networks under a random moility strategy eorge Kesidis & CS Depts, Penn State University University Park, PA, USA kesidis@engrpsuedu Takis Konstantopoulos C Dept, University o Texas Austin, TX, USA takis@eeutexasedu Shashi Phoha ARL, Penn State University University Park, PA, USA sxp26@psuedu Astrat "$ %&$ &( $$ " &$,$ 0&1$$" 23$ 4 $56872&$ 93$ %%:<5&= % (&?@ "< % 0 A($ = 5& $ 3 B C $D &=% &$ %%: <% 3 H% 3 6I2 K PQ$$ R5& S3$% T:<5&= $UV$W Q $W$XDK F<%"$ Q " %%Z [% \ =NO%A3=H% \K % [`& $ M@ :" a6lm :NMQ&$ A %3 <$ K& ḦH%$ 3 5 & $ K<@ X68 $& d e@ %V$("@&$% R %3 <$ K2& U$" O% 4:NM6 INTRODUCTION Sensor network appliations range rom passive surveillane (searh to simultaneous traking o multiple targets and distriuted identiiation o their oordinated movement The targets will have speii spaetime neighorhoods (rom stationary pointtargets to large, rapidly moving ones xample targets range rom individual humans roaming through a rowd to platoons o tanks in a desert war theatre to point explosions to ativation sites o hemial or iologial weapons A wide variety o sensors ould also e used inluding image (video, 3dimensional, inrared, omnidiretional, aousti mirophones, seismi or radiation meters, 72g2W7 Wg27 and h The sensor nodes themselves ould e ixed (to, eg, monitor an airport or power plant or ould orm a moile expeditionary sensor grid Sensor nodes may have limited amounts o availale energy stored in atteries whih may require energy eiient routing and ommuniation medium aess ontrol The environment in whih the sensors and their targets operate ould range rom land (desert, jungle, mountains, sea and air Furthermore, environmental onditions ould inlude high levels o noise, low levels o amient light, loud over and other olusions, and enemy ativity that an ompromise target searh and traking and network ommuniation Individual sensors may need to oordinate in a distriuted ashion to maintain ommuniation onnetivity [8, 13, 5, i5jxkmlonxpq:nrqs5prtukwvas5nxw%xmymzq<z {}2~rkmqqZwq:ymnrq z 5s5ymt:q:z ƒ q:nq<s5prtuk p 5ˆq:tZ~n [q:ymtz}(š@x ƒ Œas5ymzs5zm Oloylonr~rq<prq:zW{}2~kmq p `} ƒxq:nq<s5ptk Ž Ot:q Š ƒxž Œ xmymzmq:p a? ƒx vxs5pzw m X ` <š Vœ Z u Z Bœ[ [œ5žm y} [Ÿmloymlo [yn mymzmloym [n< s5ymz t: [ymt: oxmnrlo [ymn [p prq:t< [ O Oq:ymzms~lo [ymnxqz Ÿmpq:nnrq:zloy~rkmlon Ÿmxm{m olot<s~rlo [ys5prq ~km [nrq 5w~kmq s5x~km [prn s5ymzwzm ym 5~ ymq:t:q:nns5plo }pqz =q:tz~~rkmq loqzvn 5w~rkmq ƒ [px~rkmq ƒxž` j kq =pn~s5x~km [p< nxpq:nq<s5ptkwvxs5n nxmÿÿ$ [p~q:zloyÿ=s5p~ {}W A [ps5y~ Bj ƒa Vœ[ < [ [ [ª2s5ymz nrq<t: [ymzs5x~k [p nxpq:nq<s5prtukwvxs5n nrxmÿmÿ [pr~rq:zloyÿ=s5pr~ {} A Vš[š[œ[ 5žš[ 1, target ontat, and surveillane overage to prespeiied degrees o onidene These are oten onliting goals requiring asi tradeos The ous o this paper is to study target detetion perormane or a sensor network under random moility This paper is organized as ollows We irst deine notation or our susequent prolem ormulation and give a rie overview o moility strategies in targetsearh mode Deterministi and random searh strategies are ompared Next, we desried the prolem o detetion o slowly moving (point targets in two and three dimensional environments, again under a random moility mehanism or the sensor grid For a twodimensional planar environment, we give a ound on the tail o the distriution o timeuntildetetion o a point target A more preise alulation is given or a threedimensional environment Our prolem ormulation allows us to onsider a large numer o sensors operating in a large region Finally, design issues pertaining to the single parameter o moility, the variane «a, are disussed TART SARCH STRATIS Consider a ontiguous region in the plane xtensions to threedimensions (undersea, air or spae environments are straightorward Let e the numer o moile sensors in that orm the nodes o our network The position o the ah node is assumed node at time is denoted y ² to have a maximum 5&$" <" %@& = At time, the total <"$ %@& =$ &$$ o the the intersetion o the set ²% with the region Here, ² [ V» ¾½ ÀK FÂ8»ÄÅ nodes is denotes a losed disk o radius and enter» The distane etween two points» \ is the ulidean distane»uâ X$ÈÇ ÉPÊ V» Ê Â8 Ê We assume in the ollowing that the maximum overage area (maximum assuming no overlapping disks is signiiantly less than the area o Thus, 3$%T: o the nodes is neessary to maintain surveillane overage o the whole region to some degree o onidene as desried elow

2 »» Â ½ Let e the mean density o nodes in the given region, ie, or i is random The ojetive o surveillane is to gather inormation aout ertain target ojets that move through the region These ojets exist in a soalled timespae neighorhood haraterized y a timevarying untion or times in some inite interval o (ontinuous time where takes values in the susets o For onveniene o notation, we an ` deine or In the ollowing, we simply assume that i [ Ê ² [ then sensor node ojet at time Certain targets may e :5&=% & in the sense that, or a ixed and» <, or all times where is the enter (ground zero o, or example, an explosion and is its duration An expanding ojet s detetion region grows as a untion o time, eg, a iologial weapon» < < whose agents diuse through the air ie, or some inreasing untion o Finally, a single 3=H ojet ould e haraterized y a (one dimensional K&= in,» or as well as a radius 2, ie, V» < We oviously assume that no sensor node is &$ aware o any suh attriutes o a target ojet In [7, a data usion ramework or sensor data is given and, in partiular, a mehanism is desried or estimation o ojet veloity involving a triangulation etween two nodes sensing the ojet Prolems in surveillane overage Moility strategies have two modes o operation depending on the presene (data aquisition, target traking or asene (searh o a [ target ojet(s In searh mode, moility strategies an e roughly lassiied into two groups: random and deterministi In deterministi strategies, region ould e partitioned a priori into piees and $3 a sensor node assigned to eah piee that eomes the area o the node The node sweeps its home area in, eg, a deterministi zigzag pattern o a lawnmower, searhing or targets Under random searh strategies, eah node moves at random or diuses" through Random moility an e made somewhat more eiient y adopting strategies wherein nodes loally repel" eah other and are then less likely to visit areas very reently visited Alternatively, proximal nodes an dynamially elet a luster head" whih remains ative while the other proximal nodes sleep" to onserve energy and redue ommuniation ongestion in the luster neighorhood [15, 4, 12 Clearly, hyrid and hierarhial moility patterns ould also e devised, eg, a oarser partition o in whih eah element o the partition has more than one node and eah node employs a random sweep pattern within its (now larger and shared home area In dataaquisition mode, the irst node to sense an ojet ould e deemed the oordinator" or that ojet and the alarm to the rest o the network Certain nodes would then deterministially drit toward the target In the ollowing, we ous on sensor networks only in searh mode Roustness o moility strategies A sensor node may ail eause o eletromehanial prolems, unoreseen ostrutions or hazards (inluding traps plaed y the enemy, exhaustion o its power supply, or y overt enemy ativity leading to destrution or apturinghijaking o the node When a node ails in the deterministi moility setting, the remaining nodes need to quikly eome aware o the ailure (note that this assumption would require a nontrivial intrusion detetion system An advantage o random moility strategies is that they require minimal oordination (ommuniation overhead espeially when a node ails and experiene graeul degradation in surveillane overage in that event On the other hand, random moility strategies will, in general, have poorer target detetion perormane Sensor networks with unontrolled random moility Reently, networks o extremely small sensors have een proposed, in partiular the smart dust" projet [9, 10 In suh networks, ontrol o sensor moility may highly limited y energy supply and environmental onditions, an example o the latter eing turulent air For suh networks, moility may e impliitly random, ie, moility may e modeled with diusion dynamis together with a drit imparted at the time o deployment POINT TART DTCTION UNDR BROWNIAN MOVMNT Consider an aritrary point in or, representing a stationary point target, taken to e the origin and taken to ome into existene at time zero (oth without loss o generality sine our sensor moility models are spatial and temporal translation invariant In this setion, we study the distriution o time required y a sensor grid, under a Brownian moility strategy, to detet the ojet Our prolem ormulation allows us to onsider a large numer o sensors operating in a large region d We assume the initial positions o the sensors 5Å" are distriuted as a Poisson point proess with intensity nodesm or nodesm (depending on whether the network is two or threedimensional Reall, at this point, L`H % & $ the notion o a [14 It is onstruted y drawing iid opies o some random set (eg, a disk or a all that are known as $5& and y translating eah opy at the point o a Poisson proess these points are known as $ A and are taken to e independent o the grains LM=NO &$ 2L`H % & % Below we model the network as a (BBM wherey the nodes exeute independent Brownian (, motions,, & The assumption o iid node displaements means that the sensor positions orm a Poisson proess or all [6

3 k The threedimensional environment In this setion, eah stohasti proess is a 3dimensional Brownian motion with independent Cartesian oordinates and variane oeiient «(measured in m s Without loss o generality, suppose that a target is loated at the origin Let = e the all o radius (the surveillane radius entered at the origin At eah point o time, the area that an e monitored y the sensor network is represented y the set ( where : < denotes Minkowski addition o two sets ½ ÀÄ Thus, at eah, the random set ( W Å = is a Boolean model We are interested in the time required or the target detetion: Deine We have 3ä½ " FÀ 3( m [Å or all Now note that, or eah, is itsel a Boolean model Indeed, we may take as enters (or germs the initial Poisson points, and as sets around them (or grains iid opies o the set $ %m& < [ ie, a all arried around y the trajetory o a % % Brownian motion etween and that is a soalled Wiener sausage Hene, is atually the volume ration o the Boolean model with Wiener sausage grains [14: ( d e : $ r where is the target hitting time o a single grain Clearly, y Fuini s theorem, $ <,021 ½» [Å d» Note that» V» :8H U ÀW»Â À3»Â À3T» =««&  << d» < À»U %mm %mp < P =«< m &0 where is a standard Brownian motion (variane 1 with Letting <"= = denote the irst hitting time o the all y a standard Brownian motion started at», we thereore have Hene, $»?4@6 < < = < = Now onsider again the Bessel proess C or a standard Brownian motion started at» It is known ` that C is a onedimensional diusion with C»F d3% ½ QÀ Ä Å Deine <IH C and note that sine there is isotropy (rotational invariane, the hitting time depends on the initial position only through its magnitude, ie, <I= or all» suh that QÈ» Thus, $ r < F K The random variale < H MA < H We see that ON P MA < H ALB Hene we may take «< H ALB 2 d»»d < H d $ has a wellknown distriution [2: Q H$R S XWX e[z$â Q H$R HUT LV MA < H \ S K " d % «, to alleviate notation, and in the end replae y «X With this in mind, and using the expression aove, we have $ r < d `a H((Â8 Â8 ehixâ Ç Ude d d V A The irst integral is learly, the volume o the all = For the seond È integral we use Fuini and a hange o variales (setting Â3» to get that the seond integral equals g ((Â8= R ADh ((Â8 H e  g i d d R A h»v»d H e:âo» m g»9i d d R A$j d Let» e :ÂO» m

4 j R  k» g e the density o, where is a standard normal distriuted random variale Thus, m»»@ H e:âo» m d» A»V»D 1 ½» U 0 1 ½,0 1 ½ Åm&0 Colleting the alulations together, we get $ < g Å R A» Å d» 1 ½ a A Åm m Now reall that the atual variane is «(hene replae y «X in the last expression and inally sustitute in the expression m to get: e  «This is a distriution with a Weiulltype tail The twodimensional environment In a twodimensional (planar environment, the expression or the distriution o the hitting time < given in (3 aove is not availale We an, however, use the Cherno upper ound: (O < H < H OÂ8 e  " where the expression or ex ½ < H ex «< H is given as a ratio o modiied Bessel untions in 201, p 297, o [2 This lower ound ould then e sustituted into (2 to otain a lower ound on $$ and thus otain an upper ound on the tail o the target detetion time distriution (1 Random moility design A design ojetive here ould e as ollows: Suppose that a point target is required to e deteted within a prespeiied time with an error proaility less than R, where is a positive numer Our design variale is the variane «o the node moility When is very small, the target detetion goal an e : ahieved i we hoose «X roughly larger than «[Å d This is ound y solving a quadrati inequality and taking asymptotis when eomes small We omit the details o the omputation We next ompute the expetation o the target hitting time as ollows First rewrite ( R RT P with the ovious hoie o the onstants The integration d an e perormed to give O % A V» where is the tail o the standard normal distriution untion Using the inequality V» R = ounds an e otained Finally, y sustituting the values o the onstants, we otain an exat expression: R  R «This is a rapidly dereasing untion o A, (exponential deay SUMMAR We onsidered the prolem o surveillane o a potentially large region undertaken y a potentially large group o moile sensors Under a random moility strategy or the sensor grid, the distriution o the ontat time etween two nodes and the distriution o the timeuntildetetion o slowly moving (point targets were studied Both two and three dimensional environments were onsidered Finally, design issues pertaining to the single parameter o moility, the variane «a, were disussed RFRNCS [1 Bettstetter, C On the minimum node degree and H $6 onnetivity o a wireless multihop network " $$&%, Lausanne, Switzerland, une 2002 W& KH$,? [2 Borodin, AN and Salminen, P LM=NO &$ $$ ( & [ &$ $("&$ Birkhäuser, Boston, 1996 [3 Canny Complexity o Root Motion Planning MIT Press, Camridge, MA, une 1988 [4 C Chevally, R Van Dyk and TA Hall, Selorganization or Wireless Sensor Networks In 6,, Prineton, Marh 2002 [5 Dowell, L and Bruno, ML Connetivity o random graphs in moile sensor networks: validation o Monte 6" 72L " Carlo simulation results, Berlin, 2000 [6 Frey, A and Shmidt, V Marked point proesses in the plane I 6 <V A& K 2 &$r6, 65110, 1998 [7 Friedlander, D and Phoha, S Semanti inormation usion or oordinated signal proessing in moile

5 h,z Ẍ66 2$ V$3&$ sensor networks `$3"% 26 Speial issue on sensor networks,, August 2002 [8 upta, P and Kumar, PR Critial power onnetivity 5& : & <@D in wireless networks In: `$ $D%W3 &=% ẌD& KU &=$ KÀ $"3 % $ M$ 6 6 3, WM Mneany, in, and Q Zhang (eds Birkhäuser, Boston, , 1998 [9 Kahn, M, Katz, RH and Pister, KS Moile H $6", $ ` 3" &$ :NM$,H% networking or smart dust In `$ :6$, Seattle, 1999 [10 Kahn, M, Katz, RH and Pister, KS merging Challenges: moile networking or smart dust $ " & &=% & :NM$,H,Z 6, Vol 2, No 3, 2000 [11 Kesidis, R Rao and S Phoha, "Moility management o adho sensor networks using distriuted annealing", CS Dept, Penn State University, Tehnial Report, CS 03017, Sept 29, 2003 [12 Krishnamahari, B, Wiker, SB, and Bejar, R Phase transition phenomena in wireless ad ho networks 6, 3 %" $ H d 2 :Ǹ,D :" $ \NOT, % L %, San Antonio, TX, Novemer 2001 [13 Q Li, R Peterson, M DeRosa, and D Rus Reative Behavior in Selreoniguring Sensor Networks in 6" % L, %, Atlanta, 2002 [14 Santi, P, Blough, DM, and Vainstein, F A proailisti analysis or the range assignment 6" $ % prolem in ad ho networks, Long Beah, CA, 2001 [15 Stoyan, D, Kendall, WS, and Meke, Q?& K,u522%@ & $ 6 5& : Wiley, New ork, 1996 [16 L Suramanian and RH Katz An arhiteture or 6, uilding selonigurale systems In $$H, 2000

ECONOMICS OF SECURITY PATCH MANAGEMENT

ECONOMICS OF SECURITY PATCH MANAGEMENT ECONOMCS OF SECURTY PATCH MANAGEMENT Huseyin Cavusoglu * Hasan Cavusoglu Jun Zhang AB Freeman Shool o Business, Tulane University 7 MAlister Drive, New Orleans, LA 70118, USA Sauder Shool o Business, The

More information

FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts

FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts FOOD FOR THOUGHT Topial Insights from our Sujet Matter Experts DEGREE OF DIFFERENCE TESTING: AN ALTERNATIVE TO TRADITIONAL APPROACHES The NFL White Paper Series Volume 14, June 2014 Overview Differene

More information

5.2 The Master Theorem

5.2 The Master Theorem 170 CHAPTER 5. RECURSION AND RECURRENCES 5.2 The Master Theorem Master Theorem In the last setion, we saw three different kinds of behavior for reurrenes of the form at (n/2) + n These behaviors depended

More information

Channel Assignment Strategies for Cellular Phone Systems

Channel Assignment Strategies for Cellular Phone Systems Channel Assignment Strategies for Cellular Phone Systems Wei Liu Yiping Han Hang Yu Zhejiang University Hangzhou, P. R. China Contat: wliu5@ie.uhk.edu.hk 000 Mathematial Contest in Modeling (MCM) Meritorious

More information

Computer Networks Framing

Computer Networks Framing Computer Networks Framing Saad Mneimneh Computer Siene Hunter College of CUNY New York Introdution Who framed Roger rabbit? A detetive, a woman, and a rabbit in a network of trouble We will skip the physial

More information

Wireless Networking Guide 2007 www.lexmark.com

Wireless Networking Guide 2007 www.lexmark.com Wireless Networking Guide 2007 www.lexmark.om P/N 13L0828 E.C. 3L0101 Contents Installing the printer on a wireless network...4 Wireless network ompatiility...4 Information you will need to set up the

More information

Automated Test Generation from Vulnerability Signatures

Automated Test Generation from Vulnerability Signatures Automated Test Generation from Vulneraility Signatures Adulaki Aydin, Muath Alkhalaf, and Tevfik Bultan Computer Siene Department University of California, Santa Barara Email: {aki,muath,ultan}@s.us.edu

More information

) ( )( ) ( ) ( )( ) ( ) ( ) (1)

) ( )( ) ( ) ( )( ) ( ) ( ) (1) OPEN CHANNEL FLOW Open hannel flow is haraterized by a surfae in ontat with a gas phase, allowing the fluid to take on shapes and undergo behavior that is impossible in a pipe or other filled onduit. Examples

More information

REDUCTION FACTOR OF FEEDING LINES THAT HAVE A CABLE AND AN OVERHEAD SECTION

REDUCTION FACTOR OF FEEDING LINES THAT HAVE A CABLE AND AN OVERHEAD SECTION C I E 17 th International Conferene on Eletriity istriution Barelona, 1-15 May 003 EUCTION FACTO OF FEEING LINES THAT HAVE A CABLE AN AN OVEHEA SECTION Ljuivoje opovi J.. Elektrodistriuija - Belgrade -

More information

Efficient Mobile Asset Tracking and Localization in ZigBee Wireless Network

Efficient Mobile Asset Tracking and Localization in ZigBee Wireless Network Journal of Advanes in Computer Networks, Vol. 3, No., Marh 05 Effiient Moile Asset Traking and Loalization in ZigBee Wireless Network R. Mardeni, Senior Memer, IACSIT, and Shaifull Nizam Othman offer a

More information

Chapter 1 Microeconomics of Consumer Theory

Chapter 1 Microeconomics of Consumer Theory Chapter 1 Miroeonomis of Consumer Theory The two broad ategories of deision-makers in an eonomy are onsumers and firms. Eah individual in eah of these groups makes its deisions in order to ahieve some

More information

10.1 The Lorentz force law

10.1 The Lorentz force law Sott Hughes 10 Marh 2005 Massahusetts Institute of Tehnology Department of Physis 8.022 Spring 2004 Leture 10: Magneti fore; Magneti fields; Ampere s law 10.1 The Lorentz fore law Until now, we have been

More information

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks Performane Analysis of IEEE 80.11 in Multi-hop Wireless Networks Lan Tien Nguyen 1, Razvan Beuran,1, Yoihi Shinoda 1, 1 Japan Advaned Institute of Siene and Tehnology, 1-1 Asahidai, Nomi, Ishikawa, 93-19

More information

Impedance Method for Leak Detection in Zigzag Pipelines

Impedance Method for Leak Detection in Zigzag Pipelines 10.478/v10048-010-0036-0 MEASUREMENT SCIENCE REVIEW, Volume 10, No. 6, 010 Impedane Method for Leak Detetion in igzag Pipelines A. Lay-Ekuakille 1, P. Vergallo 1, A. Trotta 1 Dipartimento d Ingegneria

More information

A DESIGN OF A FAST PARALLEL-PIPELINED IMPLEMENTATION OF AES: ADVANCED ENCRYPTION STANDARD

A DESIGN OF A FAST PARALLEL-PIPELINED IMPLEMENTATION OF AES: ADVANCED ENCRYPTION STANDARD International Journal of Computer Siene & Information Tehnology (IJCSIT) Vol 6, No 6, Deemer 2014 A DESIGN OF A FAST PARALLEL-PIPELINED IMPLEMENTATION OF AES: ADVANCED ENCRYPTION STANDARD Ghada F.Elkaany,

More information

Chapter 6 A N ovel Solution Of Linear Congruenes Proeedings NCUR IX. (1995), Vol. II, pp. 708{712 Jerey F. Gold Department of Mathematis, Department of Physis University of Utah Salt Lake City, Utah 84112

More information

THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES

THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES Proeedings of FEDSM 98 998 ASME Fluids Engineering Division Summer Meeting June 2-25, 998 Washington DC FEDSM98-529 THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES John D. Wright Proess

More information

gloser og kommentarer til Macbeth ( sidetal henviser til "Illustrated Shakespeare") GS 96

gloser og kommentarer til Macbeth ( sidetal henviser til Illustrated Shakespeare) GS 96 side 1! " # $ % &! " '! ( $ ) *! " & +! '!, $ #! "! - % " "! &. / 0 1 & +! '! ' & ( ' 2 ) % $ 2 3 % # 2! &. 2! ' 2! '! $ $! " 2! $ ( ' 4! " 3 & % / ( / ( ' 5! * ( 2 & )! 2 5! 2 &! # '! " & +! '! ' & &!

More information

Trade Information, Not Spectrum: A Novel TV White Space Information Market Model

Trade Information, Not Spectrum: A Novel TV White Space Information Market Model Trade Information, Not Spetrum: A Novel TV White Spae Information Market Model Yuan Luo, Lin Gao, and Jianwei Huang 1 Abstrat In this paper, we propose a novel information market for TV white spae networks,

More information

UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE

UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE September 8, 2009 Table of Contents 1 Home 2 University 3 Your 4 Add 5 Managing 6 How 7 Viewing 8 Closing 9 Reposting Page 1 and Work-Study Employers

More information

The Price of Uncertainty in Security Games

The Price of Uncertainty in Security Games The Prie of Unertainty in Seurity Games Tehnial Report Jens Grossklags a Benjamin Johnson iolas Christin a Shool of Information University of California, Berkeley Berkeley, CA 947 jensg@ishool.erkeley.edu

More information

Sebastián Bravo López

Sebastián Bravo López Transfinite Turing mahines Sebastián Bravo López 1 Introdution With the rise of omputers with high omputational power the idea of developing more powerful models of omputation has appeared. Suppose that

More information

Capacity at Unsignalized Two-Stage Priority Intersections

Capacity at Unsignalized Two-Stage Priority Intersections Capaity at Unsignalized Two-Stage Priority Intersetions by Werner Brilon and Ning Wu Abstrat The subjet of this paper is the apaity of minor-street traffi movements aross major divided four-lane roadways

More information

Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems

Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems Bypassing Spae Explosion in Regular Expression Mathing for Network Intrusion Detetion and Prevention Systems Jignesh Patel Alex X. Liu Eri Torng Department of Computer Siene and Engineering Mihigan State

More information

Known: long, aluminum cylinder acts as an extended surface.

Known: long, aluminum cylinder acts as an extended surface. Prolem : A long, irular aluminium rod attahed at one end to the heated all and transers heat through onvetion to a old luid. (a) I the diameter o the rod is triples, y ho muh ould the rate o heat removal

More information

MATE: MPLS Adaptive Traffic Engineering

MATE: MPLS Adaptive Traffic Engineering MATE: MPLS Adaptive Traffi Engineering Anwar Elwalid Cheng Jin Steven Low Indra Widjaja Bell Labs EECS Dept EE Dept Fujitsu Network Communiations Luent Tehnologies Univ. of Mihigan Calteh Pearl River,

More information

Integrating Parallel File I/O and Database Support for High-Performance Scientific Data Management

Integrating Parallel File I/O and Database Support for High-Performance Scientific Data Management In Pro of SC: High Performane Networking and Computing, Novemer Integrating Parallel File I/O and Dataase Support for High-Performane Sientifi Data Management Jaehun No Rajeev Thakur Alok Choudhary Math

More information

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection Behavior Analysis-Based Learning Framework for Host Level Intrusion Detetion Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit Eletrial and Computer Engineering Department University of Arizona

More information

User s Guide VISFIT: a computer tool for the measurement of intrinsic viscosities

User s Guide VISFIT: a computer tool for the measurement of intrinsic viscosities File:UserVisfit_2.do User s Guide VISFIT: a omputer tool for the measurement of intrinsi visosities Version 2.a, September 2003 From: Multiple Linear Least-Squares Fits with a Common Interept: Determination

More information

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu

More information

The analysis of brushing tool characteristics

The analysis of brushing tool characteristics ARCHIVES OF CIVIL AND MECHANICAL ENGINEERING Vol. IV 004 No. 4 The analysis of rushing tool harateristis Kiele University of Tehnology, al. Tysiąleia P. P. 7, 5-34 Kiele In this paper, an analytial proedure

More information

arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA

arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA LBNL-52402 Marh 2003 On the Speed of Gravity and the v/ Corretions to the Shapiro Time Delay Stuart Samuel 1 arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrene Berkeley National Laboratory

More information

1.3 Complex Numbers; Quadratic Equations in the Complex Number System*

1.3 Complex Numbers; Quadratic Equations in the Complex Number System* 04 CHAPTER Equations and Inequalities Explaining Conepts: Disussion and Writing 7. Whih of the following pairs of equations are equivalent? Explain. x 2 9; x 3 (b) x 29; x 3 () x - 2x - 22 x - 2 2 ; x

More information

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds Intelligent Measurement Proesses in 3D Optial Metrology: Produing More Aurate Point Clouds Charles Mony, Ph.D. 1 President Creaform in. mony@reaform3d.om Daniel Brown, Eng. 1 Produt Manager Creaform in.

More information

Weighting Methods in Survey Sampling

Weighting Methods in Survey Sampling Setion on Survey Researh Methods JSM 01 Weighting Methods in Survey Sampling Chiao-hih Chang Ferry Butar Butar Abstrat It is said that a well-designed survey an best prevent nonresponse. However, no matter

More information

Suggested Answers, Problem Set 5 Health Economics

Suggested Answers, Problem Set 5 Health Economics Suggested Answers, Problem Set 5 Health Eonomis Bill Evans Spring 2013 1. The graph is at the end of the handout. Fluoridated water strengthens teeth and redues inidene of avities. As a result, at all

More information

TS150 Visible (exposed) fixing with screws on a timber sub-frame

TS150 Visible (exposed) fixing with screws on a timber sub-frame TS150 Visile (exposed) fixing with srews on a timer su-frame This system offers a ost effetive solution for installing Trespa Meteon panels in a large variety of panel dimensions. Trespa Meteon panels

More information

Programming Basics - FORTRAN 77 http://www.physics.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html

Programming Basics - FORTRAN 77 http://www.physics.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html CWCS Workshop May 2005 Programming Basis - FORTRAN 77 http://www.physis.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html Program Organization A FORTRAN program is just a sequene of lines of plain text.

More information

Earthquake Loss for Reinforced Concrete Building Structures Before and After Fire damage

Earthquake Loss for Reinforced Concrete Building Structures Before and After Fire damage Earthquake Loss for Reinfored Conrete Building Strutures Before and After Fire damage Pai-Mei LIU, Yi-Hsuan Tu and Maw-Shyong SHEU 3 ABSTRACT The purpose of this paper is to propose a rational analytial

More information

Journal of Engineering Science and Technology Review 6 (5) (2013) 143-148. Research Article

Journal of Engineering Science and Technology Review 6 (5) (2013) 143-148. Research Article Jestr Journal o Engineering Siene and Tehnology Review 6 (5) (13) 143-148 Researh Artile JOURNAL OF Engineering Siene and Tehnology Review www.jestr.org Numerial Analyses on Seismi Behaviour o Conrete-illed

More information

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401 IEEE TRASACTIOS O DEPEDABLE AD SECURE COMPUTIG, VOL. 9, O. 3, MAY/JUE 2012 401 Mitigating Distributed Denial of Servie Attaks in Multiparty Appliations in the Presene of Clok Drifts Zhang Fu, Marina Papatriantafilou,

More information

Income Protection CLAIM FORM

Income Protection CLAIM FORM Inome Protetion CLAIM FORM PLEASE COMPLETE THIS APPLICATION IN BLACK PEN ONLY USING BLOCK LETTERS 1 PERSONAL DETAILS Poliy numer Important notes: a This form must e ompleted in full and returned to PO

More information

Planning Approximations to the average length of vehicle routing problems with time window constraints

Planning Approximations to the average length of vehicle routing problems with time window constraints Planning Aroximations to the average length of vehile routing rolems with time window onstraints Miguel Andres Figliozzi ABSTRACT This aer studies aroximations to the average length of Vehile Routing Prolems

More information

DSP-I DSP-I DSP-I DSP-I

DSP-I DSP-I DSP-I DSP-I DSP-I DSP-I DSP-I DSP-I Digital Signal Proessing I (8-79) Fall Semester, 005 IIR FILER DESIG EXAMPLE hese notes summarize the design proedure for IIR filters as disussed in lass on ovember. Introdution:

More information

cos t sin t sin t cos t

cos t sin t sin t cos t Exerise 7 Suppose that t 0 0andthat os t sin t At sin t os t Compute Bt t As ds,andshowthata and B ommute 0 Exerise 8 Suppose A is the oeffiient matrix of the ompanion equation Y AY assoiated with the

More information

How To Fator

How To Fator CHAPTER hapter 4 > Make the Connetion 4 INTRODUCTION Developing seret odes is big business beause of the widespread use of omputers and the Internet. Corporations all over the world sell enryption systems

More information

Asymmetric Error Correction and Flash-Memory Rewriting using Polar Codes

Asymmetric Error Correction and Flash-Memory Rewriting using Polar Codes 1 Asymmetri Error Corretion and Flash-Memory Rewriting using Polar Codes Eyal En Gad, Yue Li, Joerg Kliewer, Mihael Langberg, Anxiao (Andrew) Jiang and Jehoshua Bruk Abstrat We propose effiient oding shemes

More information

State of Maryland Participation Agreement for Pre-Tax and Roth Retirement Savings Accounts

State of Maryland Participation Agreement for Pre-Tax and Roth Retirement Savings Accounts State of Maryland Partiipation Agreement for Pre-Tax and Roth Retirement Savings Aounts DC-4531 (08/2015) For help, please all 1-800-966-6355 www.marylandd.om 1 Things to Remember Complete all of the setions

More information

Recovering Articulated Motion with a Hierarchical Factorization Method

Recovering Articulated Motion with a Hierarchical Factorization Method Reovering Artiulated Motion with a Hierarhial Fatorization Method Hanning Zhou and Thomas S Huang University of Illinois at Urbana-Champaign, 405 North Mathews Avenue, Urbana, IL 680, USA {hzhou, huang}@ifpuiuedu

More information

AUDITING COST OVERRUN CLAIMS *

AUDITING COST OVERRUN CLAIMS * AUDITING COST OVERRUN CLAIMS * David Pérez-Castrillo # University of Copenhagen & Universitat Autònoma de Barelona Niolas Riedinger ENSAE, Paris Abstrat: We onsider a ost-reimbursement or a ost-sharing

More information

the machine and check the components

the machine and check the components Quik Setup Guide Start Here MFC-7860DW Please read the Safety and Legal ooklet first efore you set up your mahine. Then, please read this Quik Setup Guide for the orret setup and installation. To view

More information

Fixed-income Securities Lecture 2: Basic Terminology and Concepts. Present value (fixed interest rate) Present value (fixed interest rate): the arb

Fixed-income Securities Lecture 2: Basic Terminology and Concepts. Present value (fixed interest rate) Present value (fixed interest rate): the arb Fixed-inome Seurities Leture 2: Basi Terminology and Conepts Philip H. Dybvig Washington University in Saint Louis Various interest rates Present value (PV) and arbitrage Forward and spot interest rates

More information

A Comparison of Default and Reduced Bandwidth MR Imaging of the Spine at 1.5 T

A Comparison of Default and Reduced Bandwidth MR Imaging of the Spine at 1.5 T 9 A Comparison of efault and Redued Bandwidth MR Imaging of the Spine at 1.5 T L. Ketonen 1 S. Totterman 1 J. H. Simon 1 T. H. Foster 2. K. Kido 1 J. Szumowski 1 S. E. Joy1 The value of a redued bandwidth

More information

Supply chain coordination; A Game Theory approach

Supply chain coordination; A Game Theory approach aepted for publiation in the journal "Engineering Appliations of Artifiial Intelligene" 2008 upply hain oordination; A Game Theory approah Jean-Claude Hennet x and Yasemin Arda xx x LI CNR-UMR 668 Université

More information

3 Game Theory: Basic Concepts

3 Game Theory: Basic Concepts 3 Game Theory: Basi Conepts Eah disipline of the soial sienes rules omfortably ithin its on hosen domain: : : so long as it stays largely oblivious of the others. Edard O. Wilson (1998):191 3.1 and and

More information

In order to be able to design beams, we need both moments and shears. 1. Moment a) From direct design method or equivalent frame method

In order to be able to design beams, we need both moments and shears. 1. Moment a) From direct design method or equivalent frame method BEAM DESIGN In order to be able to design beams, we need both moments and shears. 1. Moment a) From diret design method or equivalent frame method b) From loads applied diretly to beams inluding beam weight

More information

Is the trailing-stop strategy always good for stock trading?

Is the trailing-stop strategy always good for stock trading? Is the trailing-stop strategy always good or stock trading? Zhe George Zhang, Yu Benjamin Fu December 27, 2011 Abstract This paper characterizes the trailing-stop strategy or stock trading and provides

More information

Software Reliability Measuring using Modified Maximum Likelihood Estimation and SPC

Software Reliability Measuring using Modified Maximum Likelihood Estimation and SPC Software Reliaility Measuring using Modified Maximum Likelihood Estimation and SPC Dr. R Satya Prasad Associate Prof, Dept. of CSE Acharya Nagarjuna University Guntur, INDIA K Ramchand H Rao Dept. of CSE

More information

SOFTWARE ENGINEERING I

SOFTWARE ENGINEERING I SOFTWARE ENGINEERING I CS 10 Catalog Desription PREREQUISITE: CS 21. Introdution to the systems development life yle, software development models, analysis and design tehniques and tools, and validation

More information

Hierarchical Clustering and Sampling Techniques for Network Monitoring

Hierarchical Clustering and Sampling Techniques for Network Monitoring S. Sindhuja Hierarhial Clustering and Sampling Tehniques for etwork Monitoring S. Sindhuja ME ABSTRACT: etwork monitoring appliations are used to monitor network traffi flows. Clustering tehniques are

More information

WORKFLOW CONTROL-FLOW PATTERNS A Revised View

WORKFLOW CONTROL-FLOW PATTERNS A Revised View WORKFLOW CONTROL-FLOW PATTERNS A Revised View Nik Russell 1, Arthur H.M. ter Hofstede 1, 1 BPM Group, Queensland University of Tehnology GPO Box 2434, Brisbane QLD 4001, Australia {n.russell,a.terhofstede}@qut.edu.au

More information

Using Live Chat in your Call Centre

Using Live Chat in your Call Centre Using Live Chat in your Call Centre Otober Key Highlights Yesterday's all entres have beome today's ontat entres where agents deal with multiple queries from multiple hannels. Live Chat hat is one now

More information

HEAT CONDUCTION. q A q T

HEAT CONDUCTION. q A q T HEAT CONDUCTION When a temperature gradient eist in a material, heat flows from the high temperature region to the low temperature region. The heat transfer mehanism is referred to as ondution and the

More information

Measurement of Powder Flow Properties that relate to Gravity Flow Behaviour through Industrial Processing Lines

Measurement of Powder Flow Properties that relate to Gravity Flow Behaviour through Industrial Processing Lines Measurement of Powder Flow Properties that relate to Gravity Flow ehaviour through Industrial Proessing Lines A typial industrial powder proessing line will inlude several storage vessels (e.g. bins, bunkers,

More information

Strategic Plan. Achieving our 2020 vision. Faculty of Health Sciences

Strategic Plan. Achieving our 2020 vision. Faculty of Health Sciences Strategi Plan Ahieving our 00 vision Faulty of Health Sienes Our Values guide our ations Health and Understanding, promoting, and influening the holisti well-eing of self and others Our Vision To e a national

More information

Hybrid linear programming to estimate CAP impacts of flatter rates and environmental top-ups

Hybrid linear programming to estimate CAP impacts of flatter rates and environmental top-ups AUA Working Paper Series No. 2010-?? September 2010 Hybrid linear programming to estimate CAP impats o latter rates and environmental top-ups The ase o arable ropping in Kopais plain, Greee Stelios Rozakis

More information

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism An Effiient Network Traffi Classifiation Based on Unknown and Anomaly Flow Detetion Mehanism G.Suganya.M.s.,B.Ed 1 1 Mphil.Sholar, Department of Computer Siene, KG College of Arts and Siene,Coimbatore.

More information

Discovering Trends in Large Datasets Using Neural Networks

Discovering Trends in Large Datasets Using Neural Networks Disovering Trends in Large Datasets Using Neural Networks Khosrow Kaikhah, Ph.D. and Sandesh Doddameti Department of Computer Siene Texas State University San Maros, Texas 78666 Abstrat. A novel knowledge

More information

The Optimal Deterrence of Tax Evasion: The Trade-off Between Information Reporting and Audits

The Optimal Deterrence of Tax Evasion: The Trade-off Between Information Reporting and Audits The Optimal Deterrene of Tax Evasion: The Trade-off Between Information Reporting and Audits Yulia Paramonova Department of Eonomis, University of Mihigan Otober 30, 2014 Abstrat Despite the widespread

More information

Pattern Recognition Techniques in Microarray Data Analysis

Pattern Recognition Techniques in Microarray Data Analysis Pattern Reognition Tehniques in Miroarray Data Analysis Miao Li, Biao Wang, Zohreh Momeni, and Faramarz Valafar Department of Computer Siene San Diego State University San Diego, California, USA faramarz@sienes.sdsu.edu

More information

Instructions BEFORE Cataract Surgery

Instructions BEFORE Cataract Surgery Instrutions BEFORE Catarat Surgery Your Surgery is at the Surgery Center of Southern Illinois: Loated at: 806 N. Treas, Marion, Ill. 618-993-2113 The surgery enter will all you prior to your surgery and

More information

A Context-Aware Preference Database System

A Context-Aware Preference Database System J. PERVASIVE COMPUT. & COMM. (), MARCH 005. TROUBADOR PUBLISHING LTD) A Context-Aware Preferene Database System Kostas Stefanidis Department of Computer Siene, University of Ioannina,, kstef@s.uoi.gr Evaggelia

More information

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero FE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero Robotis, Computer Vision and Intelligent Control Group. University

More information

Procurement auctions are sometimes plagued with a chosen supplier s failing to accomplish a project successfully.

Procurement auctions are sometimes plagued with a chosen supplier s failing to accomplish a project successfully. Deision Analysis Vol. 7, No. 1, Marh 2010, pp. 23 39 issn 1545-8490 eissn 1545-8504 10 0701 0023 informs doi 10.1287/dea.1090.0155 2010 INFORMS Managing Projet Failure Risk Through Contingent Contrats

More information

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator nternational Journal of Computer and Eletrial Engineering, Vol. 1, No. 1, April 2009 Neural network-based Load Balaning and Reative Power Control by Stati VAR Compensator smail K. Said and Marouf Pirouti

More information

Marker Tracking and HMD Calibration for a Video-based Augmented Reality Conferencing System

Marker Tracking and HMD Calibration for a Video-based Augmented Reality Conferencing System Marker Traking and HMD Calibration for a Video-based Augmented Reality Conferening System Hirokazu Kato 1 and Mark Billinghurst 2 1 Faulty of Information Sienes, Hiroshima City University 2 Human Interfae

More information

A Holistic Method for Selecting Web Services in Design of Composite Applications

A Holistic Method for Selecting Web Services in Design of Composite Applications A Holisti Method for Seleting Web Servies in Design of Composite Appliations Mārtiņš Bonders, Jānis Grabis Institute of Information Tehnology, Riga Tehnial University, 1 Kalu Street, Riga, LV 1658, Latvia,

More information

Improved SOM-Based High-Dimensional Data Visualization Algorithm

Improved SOM-Based High-Dimensional Data Visualization Algorithm Computer and Information Siene; Vol. 5, No. 4; 2012 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Siene and Eduation Improved SOM-Based High-Dimensional Data Visualization Algorithm Wang

More information

CIS570 Lecture 4 Introduction to Data-flow Analysis 3

CIS570 Lecture 4 Introduction to Data-flow Analysis 3 Introdution to Data-flow Analysis Last Time Control flow analysis BT disussion Today Introdue iterative data-flow analysis Liveness analysis Introdue other useful onepts CIS570 Leture 4 Introdution to

More information

A novel active mass damper for vibration control of bridges

A novel active mass damper for vibration control of bridges IABMAS 08, International Conferene on Bridge Maintenane, Safety and Management, 3-7 July 008, Seoul, Korea A novel ative mass damper for vibration ontrol of bridges U. Starossek & J. Sheller Strutural

More information

AUTOMATED VISUAL TRAFFIC MONITORING AND SURVEILLANCE THROUGH A NETWORK OF DISTRIBUTED UNITS

AUTOMATED VISUAL TRAFFIC MONITORING AND SURVEILLANCE THROUGH A NETWORK OF DISTRIBUTED UNITS AUTOMATED VISUAL TRAFFIC MOITORIG AD SURVEILLACE THROUGH A ETWORK OF DISTRIBUTED UITS A. Koutsia a, T. Semertzidis a, K. Dimitropoulos a,. Grammalidis a and K. Georgouleas b a Informatis and Telematis

More information

Optimal Base Station Density for Power Efficiency in Cellular Networks

Optimal Base Station Density for Power Efficiency in Cellular Networks Optimal Base Station Density for Power Efficiency in Cellular Networks Sanglap Sarkar, Radha Krishna Ganti Dept. of Electrical Engineering Indian Institute of Technology Chennai, 636, India Email:{ee11s53,

More information

Open and Extensible Business Process Simulator

Open and Extensible Business Process Simulator UNIVERSITY OF TARTU FACULTY OF MATHEMATICS AND COMPUTER SCIENCE Institute of Computer Siene Karl Blum Open and Extensible Business Proess Simulator Master Thesis (30 EAP) Supervisors: Luiano Garía-Bañuelos,

More information

Modeling and analyzing interference signal in a complex electromagnetic environment

Modeling and analyzing interference signal in a complex electromagnetic environment Liu et al. EURASIP Journal on Wireless Communiations and Networking (016) 016:1 DOI 10.1186/s13638-015-0498-8 RESEARCH Modeling and analyzing interferene signal in a omplex eletromagneti environment Chun-tong

More information

JEFFREY ALLAN ROBBINS. Bachelor of Science. Blacksburg, Virginia

JEFFREY ALLAN ROBBINS. Bachelor of Science. Blacksburg, Virginia A PROGRAM FOR SOLUtiON OF LARGE SCALE VEHICLE ROUTING PROBLEMS By JEFFREY ALLAN ROBBINS Bahelor of Siene Virginia Polytehni Institute and State University Blaksburg, Virginia 1974 II Submitted to the Faulty

More information

Bandwidth Allocation and Session Scheduling using SIP

Bandwidth Allocation and Session Scheduling using SIP JOURAL OF COUICAIS, VOL., O. 5, AUGUS 006 7 Bandwidth Alloation and Session Sheduling using SIP Hassan HASSA, Jean-arie GARCIA and Olivier BRU LAAS-CRS, oulouse, Frane Email: {hhassan}@laas.fr Abstrat

More information

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF ' R :::i:. ATIONAL :'.:::::: RETENTION ':: Compliane with the way you work, PRODUCT BRIEF In-plae Management of Unstrutured Data The explosion of unstrutured data ombined with new laws and regulations

More information

Modelling and Simulation of Closed Loop Controlled Buck Converter Fed Pmbldc Drive System

Modelling and Simulation of Closed Loop Controlled Buck Converter Fed Pmbldc Drive System Researh Journal of Applied Sienes, Engineering and Tehnology 3(4): 284-289, 2011 ISSN: 2040-7467 Maxwell Sientifi Organization, 2011 Reeived: Feruary 14, 2011 Aepted: Marh 15, 2011 Pulished: April 20,

More information

Explanatory Examples on Indian Seismic Code IS 1893 (Part I)

Explanatory Examples on Indian Seismic Code IS 1893 (Part I) Doument No. :: IITK-GSDMA-EQ1-V.0 inal Report :: A - Earthquake Codes IITK-GSDMA Projet on Building Codes Explanatory Examples on Indian Seismi Code IS 1893 (Part I) by Dr. Sudhir K Jain Department of

More information

HOW TO CALCULATE PRESSURE ANYWHERE IN A PUMP SYSTEM? Jacques Chaurette p. eng. www.lightmypump.com April 2003

HOW TO CALCULATE PRESSURE ANYWHERE IN A PUMP SYSTEM? Jacques Chaurette p. eng. www.lightmypump.com April 2003 HOW TO CALCULATE PRESSURE ANYWHERE IN A PUMP SYSTEM? Jaques Chaurette p. en. www.lihtmypump.om April 003 Synopsis Calulatin the total head of the pump is not the only task of the pump system desiner. Often

More information

Professional Certificate Training in Business Writing

Professional Certificate Training in Business Writing Professional Certifiate Training in Business Writing About Training in Business Writing ZeebraCross Centre for Management Exellene (ZCME) is an initiative of ZeebraCross (Unit of InfousRx Marketing and

More information

On Some Mathematics for Visualizing High Dimensional Data

On Some Mathematics for Visualizing High Dimensional Data On Some Mathematis for Visualizing High Dimensional Data Edward J. Wegman Jeffrey L. Solka Center for Computational Statistis George Mason University Fairfax, VA 22030 This paper is dediated to Professor

More information

Static Fairness Criteria in Telecommunications

Static Fairness Criteria in Telecommunications Teknillinen Korkeakoulu ERIKOISTYÖ Teknillisen fysiikan koulutusohjelma 92002 Mat-208 Sovelletun matematiikan erikoistyöt Stati Fairness Criteria in Teleommuniations Vesa Timonen, e-mail: vesatimonen@hutfi

More information

Actuarial Present Values of Annuities under Stochastic Interest Rate

Actuarial Present Values of Annuities under Stochastic Interest Rate Int. Journal of Math. Analysis, Vol. 7, 03, no. 59, 93-99 HIKARI Ltd, www.m-hikari.com http://d.doi.org/0.988/ijma.03.3033 Actuarial Present Values of Annuities under Stochastic Interest Rate Zhao Xia

More information

A Game Theoretical Approach to Gateway Selections in Multi-domain Wireless Networks

A Game Theoretical Approach to Gateway Selections in Multi-domain Wireless Networks 1 A Game Theoretial Approah to Gateway Seletions in Multi-domain Wireless Networks Yang Song, Starsky H.Y. Wong and Kang-Won Lee IBM Researh, Hawthorne, NY Email: {yangsong, hwong, kangwon}@us.ibm.om Abstrat

More information

CHAPTER J DESIGN OF CONNECTIONS

CHAPTER J DESIGN OF CONNECTIONS J-1 CHAPTER J DESIGN OF CONNECTIONS INTRODUCTION Chapter J of the addresses the design and heking of onnetions. The hapter s primary fous is the design of welded and bolted onnetions. Design requirements

More information

Relativity in the Global Positioning System

Relativity in the Global Positioning System Relativity in the Global Positioning System Neil Ashby Department of Physis,UCB 390 University of Colorado, Boulder, CO 80309-00390 NIST Affiliate Email: ashby@boulder.nist.gov July 0, 006 AAPT workshop

More information

AngelCast: Cloud-based Peer-Assisted Live Streaming Using Optimized Multi-Tree Construction

AngelCast: Cloud-based Peer-Assisted Live Streaming Using Optimized Multi-Tree Construction AngelCast: Cloud-based Peer-Assisted Live Streaming Using Optimized Multi-Tree Constrution Raymond Sweha Boston University remos@s.bu.edu Vathe Ishakian Boston University visahak@s.bu.edu Azer Bestavros

More information

Optimal Allocation of Filters against DDoS Attacks

Optimal Allocation of Filters against DDoS Attacks Optimal Alloation of Filters against DDoS Attaks Karim El Defrawy ICS Dept. University of California, Irvine Email: keldefra@ui.edu Athina Markopoulou EECS Dept. University of California, Irvine Email:

More information

A Robust Optimization Approach to Dynamic Pricing and Inventory Control with no Backorders

A Robust Optimization Approach to Dynamic Pricing and Inventory Control with no Backorders A Robust Optimization Approah to Dynami Priing and Inventory Control with no Bakorders Elodie Adida and Georgia Perakis July 24 revised July 25 Abstrat In this paper, we present a robust optimization formulation

More information