Mobile Sensor Networks for Leak and Backflow Detection in Water Distribution Systems

Size: px
Start display at page:

Download "Mobile Sensor Networks for Leak and Backflow Detection in Water Distribution Systems"

Transcription

1 Moble Sensor Networks for Leak and Backflow Detecton n Water Dstrbuton Systems M. Agumbe Suresh, L. Smth, A. Rasekh, R. Stoleru, K. Banks, B. Shhada Department of Computer Scence and Engneerng, Texas A&M Unversty Department of Cvl Engneerng, Texas A&M Unversty Department of Computer Scence, Kng Abdullah Unversty of Scence and Technology Abstract Leak detecton and backflow detecton are essental aspects of Water Dstrbuton System (WDS) montorng. Most exstng solutons for leak detecton n water dstrbuton systems focus on the placement of expensve statc sensors located strategcally. In contrast to these, we propose a soluton whereby moble sensors, ther movement aded only by the nherent flow n the system (e.g., water flow n a WDS), detect leaks. Informaton about the leaks are collected from the sensors ether by physcally capturng them, or wth through wreless communcaton. Specfcally, we propose models to maxmze leak detecton, gven a cost constrant (a lmt on the number of sensors). We compare our results to the state of the art and also compare smulatons to mathematcal results to demonstrate the performance of our solutons. I. INTRODUCTION Water Dstrbuton Systems (WDS) play an essental role n our lves. About 9% of the populaton of U.S receves drnkng water from nearly 7, publc WDS. Spannng nearly one mllon mles, ths bured ppelne nfrastructure plays a major role n preservng publc health and ndustral growth n ever-growng urban envronments. The naton s water nfrastructure, however, s agng [8][][6][2]. Many urban water mans may easly date back to early 2th century and are hghly prone to breaks as they are reachng the end of ther servce lfe. Ths s evdenced by estmated 237,6 water man breaks per year n the U.S. leadng to nearly $2.8 bllon lost n yearly revenue [9]. Consequences of water man breaks are twofold: () water loss, dsruptons, and damages due to leakage and () publc health rsks due to backflow events. Water leakage n WDSs cause sgnfcant loss of water n WDSs that already stressed by growng water demand and recurrent droughts over the past decade. The World Bank estmates that worldwde 48.6 bllon cubc meters of water are lost every year, a large proporton of whch s due to water leakages n WDSs [24]. Severe water leakage may also cause ground nstabltes and subsequent secondary economc losses n the forms of damages to urban water, transportaton, and communcaton lnes. Backflow s an unwanted flow of non-potable water or other substances nto the drnkng WDS ppelnes. It occurs through cracks, breaks, or loose connectons when a reverse pressure gradent exsts at cross-connectons. A U.S. EPA complaton of backflow ncdents data ndcates that 459 ncdents caused an estmated 2,93 llnesses from 97 to 2 [8]. The Amercan Water Works Assocaton s report [] on the renvestment needs for the naton s agng drnkng water nfrastructure estmated that $25 bllon may be requred over the next 3 years to replace worn out systems. Such practces would not be effcently accomplshed unless they are well nformed of the condtons of ppelne systems at hgh spatal resolutons ncludng the locaton of cracks, breaks, or loose connectons. Collecton of ths nformaton for the ubqutous bured ppelne nfrastructure usng the exstng onlne statonary technologes (.e., statc sensors placed outsde the ppes), however, s extremely burdensome and costly, f not mpossble. Inlne free-swmmng sensor technologes (moble sensors that travel wth the water flow nsde the ppe and collect nformaton about leaks) [23] [6] [3] [2] [3] has been recently desgned and demonstrated for detectng and pnpontng leaks n ppelnes. When usng free-swmmng sensors to detect leaks, an mportant prmtve s to ensure that the leak s detected. Ths s possble only f the sensor traverses the ppe that has the leak (.e., sensng coverage), whch s the key focus of the paper. Most exstng n-ppe moble sensor solutons dsrupt the normal functonng of a WDS [3] [22], or are too large and nvolve tedous operatons [2]. The movement of a free swmmng moble sensor n a WDS wth branchng ppes s random n terms of the path taken by the sensor. Several exstng solutons gnore ths aspect and assume that they can ensure a determnstc path for the sensor [3] [23] [22] [2]. To reduce the cost of operaton and automate the process of montorng all ppes n a gven area, there s a need to ntellgently nsert suffcent number of sensors so as to ensure that sensors traverse all ppes. It s mportant to note that a utlty manager may suspect the presence of a leak wth the help of a statc sensor system, n whch case, a moble sensor network ads the statc sensor system n confrmng the presence and localzng the leak. A recent work tackles the optmzaton of number of sensors used when a utlty owner/user provdes a requred degree of coverage [2]. Degree of coverage refers to the mnmum probablty that a leak present on any of the ppes s detected. Throughout the paper, we refer to ths problem as the Maxmzaton of Number of Sensors problem (). Gven a constrant on the degree of coverage, the paper presents a greedy algorthm to select the best nserton ponts and number of sensors to nsert at those ponts so as to mnmze

2 2 the number of sensors requred. The paper also presents a mechansm to localze leaks usng statc devces, called beacons, placed outsde the ppelne. The performance of the soluton s evaluated usng a smulator called FlowSm. The metrc used n the evaluaton was sensng coverage, whch s the number of edges covered by sensors n each smulaton run. A more realstc constrant n desgnng a moble sensor network for WDS leak detecton s the number of avalable sensors, whereby we answer the queston - what s the best sensng coverage we can expect wth a gven number of sensors. We solve the problem of maxmzng the probablty of detectng a leak, gven a constrant on the number of moble sensors that may be used. Specfcally, we tackle two problems, namely, the Maxmzaton of the Lower Bound of Sensng Coverage (), and the Maxmzaton of the Average Sensng Coverage (),.e., we derve nserton ponts and number of sensors to nsert at those ponts so that the lower bound, or average sensng coverage s maxmzed whle keepng the number of sensors nserted constant. Typcally, we are nterested n montorng a part of a WDS where the leak s suspected to be present. The sensors have uncontrolled moblty and ther movement s aded by the flow of water n the ppes. We assume that there s a certan tme perod when the flows n the network do not change (tme-nvarant flow). Our solutons tend to perform better than, snce our problem s formulated to maxmze sensng coverage. To the best of our knowledge, ths paper s the frst attempt to maxmze the probablty of leak detecton usng moble sensors, wthout dsruptng the functon of the WDS, when there s a fxed number of sensors avalable. More formally, the contrbutons of ths paper are: We formulate two optmzaton problems wth a constrant on number of sensors, namely maxmzaton of lower bound of sensng coverage (), and maxmzaton of average sensng coverage () We present solutons usng standard technques,.e., nteger lnear programmng and greedy heurstcs to solve the and problems respectvely We compare our solutons to [2] problem and demonstrate an mprovement n both the lower bound and the average sensng coverage n a vrtual model cty, Mcropols [4] II. BACKGROUND AND RELATED WORK We look at the state of the art on Leakage and Backflow Detecton from two perspectves: water dstrbuton system montorng for leak detecton and wreless sensor networkng for WDS montorng. We also provde background on the terms used n ths paper. A. State of the Art n WDS Leak Detecton There exst several methods based on varous operatng prncples for detecton, localzaton, and pnpontng of leakages n muncpal water dstrbuton systems. Water audts based on meterng and water balance calculatons can be performed to quantfy water losses and provde an extremely crude approxmaton of the locaton of losses. A better estmaton s acheved through step-testng method whereby valves are systematcally closed to subdvde the area and localze the leakage. A comparatvely more recent leak localzaton method s acoustc loggng that s performed usng hydrophones or vbraton sensors []. Ground penetratng radar s employed to localze the leaks by vrtue of detectng underground vods caused by leakage water flow n the mmedate vcnty of ppes. More accurate leakage localzaton, whch s also referred to as leakage pnpontng, may be acheved usng leak nose correlaton, tracer gas, and pg-mounted acoustc technques. Detaled descrpton and comparson of these well-known methods for detecton and pnpontng of leaks may be found n [9] [7] [6]. The applcaton of nlne, moble sensors technology for leakage pnpontng has attracted a lot of attenton by both researchers and practtoners durng the recent years. They have been already appled to water utltes of several ctes around the world, ncludng Dallas, Montreal, and Manla. Ther ncreasng popularty s presumably assocated wth ther ablty to pnpont the leaks more accurately than other exstng methods wthout causng any dsrupton to regular water utlty servce. Table I contans most of the exstng practcal solutons that use moble sensors for leak detecton n WDS. It s clear from the table that there s no soluton that addresses the randomness of sensor movement at junctons of a WDS. Although nlne, moble sensors for pnpontng leakages have been already desgned and fabrcated, decson support models to facltate and enhance ther operaton through smulaton of ther movement n the ppelnes network and optmzaton of ther applcaton s stll underdeveloped. Development of such computatonal models s a major focus of ths study. B. State of the Art n WDS montorng usng Moble Sensors Several solutons to montor ppelne usng moble sensors are addressed by the research communty [2] [4] [9]. TropusNet [4] s a soluton for autonomous contnuous montorng of ppelnes. The soluton however assumes that the path of a sensor can be made determnstc by controllng the flow of water, whch s mpractcal wthout dsruptng the functon of the WDS. MISE-PIPE [9] s another smlar system based on magnetc nducton n underground ppes. Several theoretcal results n ppelne montorng usng moble sensors are also present. [27] performs a mathematcal analyss of sensor placement and presents analyss of complex networks usng graph theoretc concepts. [5] addresses the gallery guardng problem that requres every pont n the ppe to be montored by a robot. However, these problems are specfc to controlled moble devces. The problem of ensurng k-coverage n scenaros smlar to the one we consder s presented n [26]. However, the coverage requrement s dfferent,

3 3 Authors/Company Name Capabltes Sensng technology Free-swmmng or lne tethered Pure Technologes Sahara [22] Detectng leaks, pockets of trapped gas, Hydrophone; camera Lne tethered and vsual nspecton Pure Technologes SmartBall [23] Detectng leaks, pockets of trapped gas, Acoustc emtter and recever Free-swmmng and structural defects Pure Technologes PpeDver [2] Detectng leaks, pockets of trapped gas, Acoustc emtter and recever Free-swmmng and structural defects La et al. (2) PpeProbe [3] Mappng hdden ppelne Meterng pressure and angular Free-swmmng velocty Trnchero et al. (29) [25] Detectng leakage. Includes wreless Hydrophone Free-swmmng transmsson system Chatzgeorgou (2) [6] Detectng leakage Hydrophone Free-swmmng Purdue-TAMU sensor [3] Measurng water qualty parameters. Ion-selectve electrode based bochp Free-swmmng Includes energy harvest and wreless transmsson systems MIT MRL Lab PpeGuard [5] Detectng leakage Measurng pressure Free-swmmng Can be potentally used for backflow detecton TABLE I EXISTING TECHNOLOGIES THAT USE MOBILE SENSORS FOR WDS LEAK DETECTION and moblty s gnored. Despte all the exstng research n practcal as well as theoretcal aspects of ppelne montorng, there s very lttle focus on random, uncontrolled movement of sensors. C. Prelmnares In ths paper, we are nterested n detectng a leak usng a set of moble sensors. The movement of sensors n the ppes cannot be controlled. The movement of water n the ppes pushes the sensors and the sensors flow along the drecton of water flow. If a sensor flows along a ppe wth a leak, t detects the presence of a leak. The nformaton from the sensors s collected ether by communcatng wth the sensors through wreless access ponts placed outsde the ppes, or by physcally capturng the sensors. We model a WDS as a drected graph G(V, E) wth vertces V correspondng to junctons and edges E correspondng to the ppes. There are n vertces n the network, V = {v,..., v n }. The edges n the network are drected and denoted as e j, where the edge s drected from ntal vertex v to termnal vertex v j. The vertces are numbered so that f there s nonzero flow from v to v j then < j. The total number of avalable sensors s s. The sensors placement s determned usng a vector, s = {s, s 2,... s n } where s sensors are nserted n vertex v. The tme of nserton of the sensors s not of sgnfcance, as long as they are nserted before the flows n the ppes change due to varyng demands. We are usually nterested n montorng a certan part of the WDS, called a zone of nterest I. A zone of nterest s typcally the set of edges where the utlty owner/user suspects that the leak s present. III. PROBLEM FORMULATION Before we formulate the problem, we present the leak detecton model (.e., the sensng model), and the sensor moblty model. A. Leak Detecton Model We assume a bnary sensng model,.e., f a sensor passes by a leak, t detects the presence of a leak. Therefore, for leak detecton, we requre that at least one sensor traverses the edge contanng the leak. Typcal locaton accuracy of Sahara leak detecton technology [22], for nstance, s wthn.5 feet and t can locate very small leaks (as small as.5 gal/mn) as clamed by the manufacturer. Ths s consstent wth our model, snce the average length of a ppe n the model cty used n our evaluatons, Mcropols [4], s 3 feet. Throughout ths paper, f a sensor covers an edge, t s assumed that f a leak was present on that edge, t s detected. B. Sensor Moblty Model We assume that the flows n the ppes of the WDS are known, and fxed, for the perod of tme durng whch sensors are deployed. The movement of sensors through ppes s probablstc owng to the flud dynamcs at the junctons of the WDS. In ths paper, we assume that the probablty of a sensor movng through an edge s dependent on the dstrbuton of outgong flows at junctons. The probablty of movng from one vertex to another by traversng a sngle edge s represented n matrx M, where an element p j of matrx M: p j = probablty of movng from vertex v to vertex v j on a sngle edge (n one transton step) Snce G s a drected graph wth no cycles, the matrx M s an upper trangular matrx, as follows: p 2... p n... p 2n M = We model the movement of sensors through vertces as a bnomal dstrbuton. Each sensor represents a tral n the bnomal experment and the probablty that a sensors travels

4 4 through a certan edge s the probablty of success for the trals. We assume that the movement of a sensor s ndependent of the movement of any other sensor. Smlar to [2], we defne a traversal probablty matrx to represent the probablty of a sensor reachng another vertex traversng any path as: T = M k = I + M + M An element of matrx T, t j, s the probablty of reachng vertex v j wth a sensor startng at v. The probablty that a sensor startng at vertex v wll vst the edge s t e,jk = t,jk p jk As ndcated earler, we use a vector s to keep track of the confguraton of sensor deployment. In the vector s = [s, s 2,..., s n ], the entry s k represents the number of sensors deployed at node v k. Probablty of coverng an edge: Consder a scenaro where s sensors are nserted at vertex v. Here, the probablty at least one of these sensors reaches (vsts) edge s ( t e ) s,jk Ths s obtaned based on the probablty of the complement event n whch none of the s sensors, that travel ndependently, reaches. Now consder the cumulatve effect of all sensors nserted n a confguraton s = {s, s 2,... s n }, where s s the number of sensors nserted n vertex v. The probablty that at least one sensor reaches wth the confguraton s, represented as P V (s, ) s P V (s, ) = C. Problem formulaton n ( ) t e s,jk = We formulate two problems, namely, the problem of maxmzng the least probablty of coverng any edge, and the problem of maxmzng the average probablty of coverng any edge. Note that coverng an edge s synonymous to detectng a leak present on that edge. ) Maxmze Lower Bound Sensng Coverage (): We defne Lower Bound Sensng Coverage, LBSC as the mnmum probablty of coverng an edge,.e., Lower Bound Sensng Coverage s the largest number such that E, [P V (s, )] LBSC,.e., LBSC = mn [P V (s, )] As mentoned before, the problem of ensurng a certan LBSC whle mnmzng the number of sensors was formulated n [2] (). In ths paper, we compare our soluton wth. maxmze LBSC.e., maxmze mn such that s = c =...n [( s =... n ( t e,jk ) s )] 2) Maxmze Average Sensng Coverage (): We defne Average Sensng Coverage, ASC for edges as the expected number of edges to be vsted by at least one sensor of the confguraton dvded by total number of edges. For every edge, we ntroduce the ndcator random varable, χ s,ejk, that takes the value f the edge s vsted by the confguraton of sensors and the value otherwse. χ s,ejk = { wth probablty p = P V (s, ) wth probablty p [ Sensng coverage s therefore formally defned as ] E e χ jk s,, the expected number of edges vsted by sensors n the confguraton s. Due to the lnearty of expected value SC = E χ s,ejk = E [ ] χ s,ejk = P V (s, ) ejk ejk maxmze j such that s = c =...n maxmze ASC.e., [ s =... n IV. SOLUTIONS ( t e,jk) s ] For the optmzaton problems stated n the prevous secton, we use standard technques to solve them as descrbed n ths secton. A. Integer Lnear Programmng to solve the Problem The problem of maxmzng lower bound sensng coverage s a mn-max problem that can be reduced to an nteger lnear programmng problem as: [ max mn ] ( ) t e s,jk s whch reduces to mn s max ( ) t e s,jk Snce logarthm s a monotone ncreasng functon, () (2)

5 5 Algorthm Greedy for problem Requre: n, c, t e,jk : ntalze s as 2: for k = to c do 3: max =, nsertat = 4: for all v V do 5: ncrement s 6: f [ ] ( t e,jk )s > max then 7: max = ] [ ( t e,jk )s 8: nsertat = v 9: end f : decrement s : end for 2: ncrement nsertat element n s 3: end for Fg.. v Example network from EPANET v 2 [ ] ( ) ln t e s,jk = ln ( t e,jk) s ( ) where log t e,jk are constants. The problem therefore reduces to: v 3 v 4 v 5 v 8 v 7 v 6 v 9 v mnmze x such that s = c =...n ln ( t e,jk) s x =... n s =... n where x s a new varable ntroduced to convert a mn-max problem to a lnear program. The above problem s solved usng the CPLEX mxed nteger lnear programmng functon. B. Algorthms/Heurstcs to solve the problem The objectve n the problem of maxmzng average sensng coverage ASC s wrtten as mnmze j ( β s j whch s a non lnear convex programmng problem. We solve ths problem usng a heurstc as descrbed n Algorthm for the nteger optmzaton problems. The algorthm starts wth an ntal confguraton n whch no sensors are nserted (lne ) and nsert one sensor at a tme (lne 2), wth nserton done at the node that would generate the best value of the objectve functon gven the confguraton of sensors already n place (lnes 4-). ) C. Example v v 2 Fg. 2. Example network from EPANET To understand the optmzaton problems and ther solutons, we present a sample 2 node network generated from EPANET [7], as shown n fgure. Ths network can be smplfed and wrtten as a graph as shown n fgure 2. At each juncton, the flows are equally dstrbuted n all the outgong edges,.e., p 23 = p 24 = p 27 = 3, p 45 = p 46 = 2, etc. Here, the zone of nterest ncludes all the edges. The problems are solved wth the constrant s + s s 2 =. The soluton to the problem, solved usng CPLEX s {6,, 2, 2,,,,,,,, }, and the lower bound sensng coverage acheved s.995. The soluton to the problem, solved usng the greedy heurstc n Algorthm s {5,, 2, 2,,,,,,,, } and the average sensng coverage s.945. V. PERFORMANCE EVALUATION We use a vrtual cty network model (Mcropols [4]) n our smulatons. Mcropols s a complete model of a cty WDS that s modeled usng EPANET [7]. The performance of our algorthm was evaluated aganst [2]. The placement of sensors s determned usng Flowsm [2] for the prob-

6 Acheved ASC.9 Acheved ASC.9 Acheved ASC (a) (b) (c) Fg. 4. Comparson between and for acheved average sensng coverage n MATLAB for (a) Zone I, (b) Zone I 2, (c) Zone I 3 Acheved ASC (a) Acheved ASC (b) Acheved ASC Fg. 5. Comparson between and for acheved average sensng coverage over runs n FlowSm for (a) Zone I, (b) Zone I 2, (c) Zone I 3 (c) (a) (b) (c) Fg. 6. Comparson between and for acheved lower bound sensng coverage n MATLAB (a) Zone I, (b) Zone I 2, (c) Zone I (a) (b) (c) Fg. 7. Zone I 3 Comparson between and for acheved lower bound sensng coverage over runs n FlowSm for (a) Zone I, (b) Zone I 2, (c) lem, CPLEX n MATLAB for the problem, and a greedy heurstc mplementaton n MATLAB for the M ASC problem. The smulatons were also run on FlowSm [2], that smulates the movement of moble sensors n a WDS based on flows determned by EPANET. Moble sensors have a clear advantage over statc sensors n terms of locatng the leaks. However, to acheve ths end, we need to ensure that the moble sensors traverse through the ppe wth the leak. Ths paper addresses the ssue of coverng all the edges n a gven zone of nterest wth moble sensors, snce t s an essental prerequste for locatng leaks. Comparng the soluton aganst statc sensor networks wll therefore be unfar. On the other hand, other moble sensor solutons assume that the path followed by the sensors s determnstc. Therefore comparng aganst these solutons s also unfar. The parameters that we vared are: () Number of sensors; () zone of nterest - I, I 2, I 3. For comparson, the metrcs we use are: () average sensng coverage (ASC); () lower bound sensng coverage (LBSC). We set the total number of

7 7 Reservor Pumpstaton Ppe I3 V = 7 E = 84 I2 V = 65 E = 86 a greedy heurstc snce the problem s a non-lnear nteger programmng problem. s reduced to a lnear nteger problem that s solved usng CPLEX n MATLAB. Both these solutons are compared to a prevous paper that solves the problem of Mnmzaton of Number of Sensors (). Both the solutons are showed to perform better than n smulaton as well as mathematcally. R EFERENCES I V = 35 E = 44 Fg. 3. Mcropols [4] vrtual cty model showng the zones of nterest for valdaton sensors to 8 dfferent values based on 8 degrees of coverage nputs to M N S (.2,.3,....9) for 3 dfferent zones of nterest. The three zones of nterest are as shown n Fgure 3. All three zones of nterest have dfferent number of vertces, number of edges, and flow dstrbutons at junctons. The ASC and LBSC calculated mathematcally usng MATLAB are plotted n Fgure 5 and Fgure 6. The ASC and LBSC acheved n smulaton usng FlowSm s presented n Fgure 4 and Fgure 7. Here, each scenaro s smulated tmes, and the fgures plot the mean and one standard devaton (f applcable). As the number of sensors s ncreased, the acheved ASC unformly ncreases for both M ASC and M N S problems n both smulaton and mathematcally, as shown n Fgure 4 and Fgure 5. It s nterestng to observe n Fgure 4 that the acheved ASC wth the M ASC s usually hgher than that of M N S, except n one case (Zone I2, number of sensors 328). Ths s because the algorthm n M ASC s a greedy heurstc and does not always acheve the optmal soluton. However, n most cases, M ASC performs better than M N S. It s nterestng to observe Fgure 7 that as the number of sensors s ncreased, the acheved LBSC does not show any dscernable trend n smulatons. However, the LBSC shows an ncreasng trend n theory, as shown n Fgure 6. Ths s because of the random movement of sensors at junctons. The randomness has a lower effect on an average n the case of ASC, but when movement of sensors through ndvdual edges s consdered n calculatng the LBSC, the results become less predctable. In the mathematcal results n Fgure 6, t s clear that LBSC from M N S s lower than that of M LBSC, snce the M LBSC problem s desgned to maxmze LBSC, and the CPLEX solver s used to obtan the optmal soluton. VI. C ONCLUSION Ths paper deals wth leak detecton n Water Dstrbuton Systems. In ths paper, we present an optmzaton problem to maxmze the average, and lower bound probablty of detectng leaks n a WDS, namely Maxmzaton of Average Sensng Coverage (), and Maxmzaton of Lower Bound of Sensng Coverage (). s solved usng [] Amercan Water Works Assocaton. Renvestng n drnkng water nfrastructure. 2. [2] Amercan Water Works Assocaton. Bured no longer: confrontng amerca s water nfrastructure challenge. 23. [3] M. K. Banks, A. Brovont, S. Pekarek, M. Porterfeld, A. Salm, and R. Wu. Development of moble self-powered sensors for potable water dstrbuton. 22. [4] K. Brumbelow, J. Torres, S. Gukema, E. Brstow, and L. Kanta. Vrtual ctes for water dstrbuton and nfrastructure system research. In World Envronmental and Water Resources Congress, 27. [5] D. Chatzgeorgou, Y. Wu, D. Wu, and K. Youcef-Toum. A new n-ppe leak detecton system. Mechatroncs Research Laboratory, MIT. [6] D. M. Chatzgeorgou. Analyss and desgn of an n-ppe system for water leak detecton. Massachusetts Insttute of Technology, 2. [7] Envronmental Protecton Agency. EPANET v2.. Techncal report, 26. [8] US Envronmental Protecton Agency. Potental contamnaton due to cross-connectons and backflow and the assocated health rsks. Offce of Ground Water and Drnkng Water, Washngton DC., 2. [9] US Envronmental Protecton Agency. Control and mtgaton of drnkng water losses n dstrbuton systems. Publcaton No. EPA 86D-9-, 29. [] US Envronmental Protecton Agency. Agng water nfrastructure research. 22. [] O. Hunad, A. Wang, M. Bracken, T. Gambno, and C. Frcke. Acoustc methods for locatng leaks n muncpal water ppe networks. In Internatonal Conference on Water Demand Management, pages 4, 24. [2] J.H. Km, G. Sharma, N. Boudrga, and S.S. Iyengar. SPAMMS: a sensor-based ppelne autonomous montorng and mantenance system. In COMSNETS, 2. [3] T.T. La, Y.T. Chen, P. Huang, and H. Chu. Ppeprobe: a moble sensor droplet for mappng hdden ppelne. In SenSys, 2. [4] T.T.T. La, W.J. Chen, K.H. L, P. Huang, and H.H. Chu. TropusNet: automatng wreless sensor network deployment and replacement n ppelne montorng. In IPSN, 22. [5] X. L, W. Yu, X. Ln, and S.S. Iyengar. On optmzng autonomous ppelne nspecton. Robotcs, IEEE Transactons on, feb. 22. [6] Amercan Socety of Cvl Engneers. Bured no longer: confrontng amerca s water nfrastructure challenge. 22. [7] R Puust, Z Kapelan, DA Savc, and T Koppel. A revew of methods for leakage management n ppe networks. Urban Water Journal, 2. [8] US Congressonal Research Servce. Water nfrastructure needs and nvestment. 2. [9] Zh Sun, Pu Wang, Mehmet C. Vuran, Mznah A. Al-Rodhaan, Abdullah M. Al-Dhelaan, and Ian F. Akyldz. MISE-PIPE: Magnetc nducton-based wreless sensor networks for underground ppelne montorng. Ad Hoc Netw., 9, May 2. [2] M.A. Suresh, R. Stoleru, E.M. Zechman, and B. Shhada. On event detecton and localzaton n acyclc flow networks. Systems, Man, and Cybernetcs: Systems, IEEE Transactons on, 43(3):78 723, 23. [2] Pure Technologes. Ppedver. http : // pccp.shtml. [22] Pure Technologes. Sahara leak & gas pocket detecton. http : // eakg asp ocket.shtml. [23] Pure Technologes. Smartball for water and wastewater water mans. [24] J. Thornton, R. Sturm, and G. Kunkel. Water loss control, 2nd ed. New York: McGraw-Hl, 28.

8 [25] D. Trnchero and R. Stefanell. Mcrowave archtectures for wreless moble montorng networks nsde water dstrbuton conduts. Mcrowave Theory and Technques, IEEE Transactons on, 29. [26] S. Xong, L. Yu, H. Shen, C. Wang, and W. Lu. Effcent algorthms for sensor deployment and routng n sensor networks for network-structured envronment montorng. In INFOCOM, 22. [27] A. Yazdan and P. Jeffrey. Complex network analyss of water dstrbuton systems. Arxv preprnt arxv:4.2, 2. 8

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Formulating & Solving Integer Problems Chapter 11 289

Formulating & Solving Integer Problems Chapter 11 289 Formulatng & Solvng Integer Problems Chapter 11 289 The Optonal Stop TSP If we drop the requrement that every stop must be vsted, we then get the optonal stop TSP. Ths mght correspond to a ob sequencng

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School Robust Desgn of Publc Storage Warehouses Yemng (Yale) Gong EMLYON Busness School Rene de Koster Rotterdam school of management, Erasmus Unversty Abstract We apply robust optmzaton and revenue management

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Fragility Based Rehabilitation Decision Analysis

Fragility Based Rehabilitation Decision Analysis .171. Fraglty Based Rehabltaton Decson Analyss Cagdas Kafal Graduate Student, School of Cvl and Envronmental Engneerng, Cornell Unversty Research Supervsor: rcea Grgoru, Professor Summary A method s presented

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008 Rsk-based Fatgue Estmate of Deep Water Rsers -- Course Project for EM388F: Fracture Mechancs, Sprng 2008 Chen Sh Department of Cvl, Archtectural, and Envronmental Engneerng The Unversty of Texas at Austn

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

Agile Traffic Merging for Data Center Networks. Qing Yi and Suresh Singh Portland State University, Oregon June 10 th, 2014

Agile Traffic Merging for Data Center Networks. Qing Yi and Suresh Singh Portland State University, Oregon June 10 th, 2014 Agle Traffc Mergng for Data Center Networks Qng Y and Suresh Sngh Portland State Unversty, Oregon June 10 th, 2014 Agenda Background and motvaton Power optmzaton model Smulated greedy algorthm Traffc mergng

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

Damage detection in composite laminates using coin-tap method

Damage detection in composite laminates using coin-tap method Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

A Lyapunov Optimization Approach to Repeated Stochastic Games

A Lyapunov Optimization Approach to Repeated Stochastic Games PROC. ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, OCT. 2013 1 A Lyapunov Optmzaton Approach to Repeated Stochastc Games Mchael J. Neely Unversty of Southern Calforna http://www-bcf.usc.edu/

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

Enterprise Master Patient Index

Enterprise Master Patient Index Enterprse Master Patent Index Healthcare data are captured n many dfferent settngs such as hosptals, clncs, labs, and physcan offces. Accordng to a report by the CDC, patents n the Unted States made an

More information

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays VoIP Playout Buffer Adjustment usng Adaptve Estmaton of Network Delays Mroslaw Narbutt and Lam Murphy* Department of Computer Scence Unversty College Dubln, Belfeld, Dubln, IRELAND Abstract The poor qualty

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000 Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from

More information

Credit Limit Optimization (CLO) for Credit Cards

Credit Limit Optimization (CLO) for Credit Cards Credt Lmt Optmzaton (CLO) for Credt Cards Vay S. Desa CSCC IX, Ednburgh September 8, 2005 Copyrght 2003, SAS Insttute Inc. All rghts reserved. SAS Propretary Agenda Background Tradtonal approaches to credt

More information

Analysis of Premium Liabilities for Australian Lines of Business

Analysis of Premium Liabilities for Australian Lines of Business Summary of Analyss of Premum Labltes for Australan Lnes of Busness Emly Tao Honours Research Paper, The Unversty of Melbourne Emly Tao Acknowledgements I am grateful to the Australan Prudental Regulaton

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

Detecting Leaks from Waste Storage Ponds using Electrical Tomographic Methods

Detecting Leaks from Waste Storage Ponds using Electrical Tomographic Methods Detectng Leas from Waste Storage Ponds usng Electrcal Tomographc Methods Andrew Bnley #, Wllam Daly ## & Abelardo Ramrez ## # Lancaster Unversty, Lancaster, LA1 4YQ, UK ## Lawrence Lvermore Natonal Laboratory,

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center Dynamc Resource Allocaton and Power Management n Vrtualzed Data Centers Rahul Urgaonkar, Ulas C. Kozat, Ken Igarash, Mchael J. Neely urgaonka@usc.edu, {kozat, garash}@docomolabs-usa.com, mjneely@usc.edu

More information

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. XX, MONTH 2XX 1 Effcent On-Demand Data Servce Delvery to Hgh-Speed Trans n Cellular/Infostaton Integrated Networks Hao Lang, Student Member,

More information

A Simple Approach to Clustering in Excel

A Simple Approach to Clustering in Excel A Smple Approach to Clusterng n Excel Aravnd H Center for Computatonal Engneerng and Networng Amrta Vshwa Vdyapeetham, Combatore, Inda C Rajgopal Center for Computatonal Engneerng and Networng Amrta Vshwa

More information

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

A Dynamic Load Balancing for Massive Multiplayer Online Game Server A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,

More information

POLYSA: A Polynomial Algorithm for Non-binary Constraint Satisfaction Problems with and

POLYSA: A Polynomial Algorithm for Non-binary Constraint Satisfaction Problems with and POLYSA: A Polynomal Algorthm for Non-bnary Constrant Satsfacton Problems wth and Mguel A. Saldo, Federco Barber Dpto. Sstemas Informátcos y Computacón Unversdad Poltécnca de Valenca, Camno de Vera s/n

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

Portfolio Loss Distribution

Portfolio Loss Distribution Portfolo Loss Dstrbuton Rsky assets n loan ortfolo hghly llqud assets hold-to-maturty n the bank s balance sheet Outstandngs The orton of the bank asset that has already been extended to borrowers. Commtment

More information

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and

More information

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part

More information

Preventive Maintenance and Replacement Scheduling: Models and Algorithms

Preventive Maintenance and Replacement Scheduling: Models and Algorithms Preventve Mantenance and Replacement Schedulng: Models and Algorthms By Kamran S. Moghaddam B.S. Unversty of Tehran 200 M.S. Tehran Polytechnc 2003 A Dssertaton Proposal Submtted to the Faculty of the

More information

2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet

2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet 2008/8 An ntegrated model for warehouse and nventory plannng Géraldne Strack and Yves Pochet CORE Voe du Roman Pays 34 B-1348 Louvan-la-Neuve, Belgum. Tel (32 10) 47 43 04 Fax (32 10) 47 43 01 E-mal: corestat-lbrary@uclouvan.be

More information

Scalability of a Mobile Cloud Management System

Scalability of a Mobile Cloud Management System Scalablty of a Moble Cloud Management System Roberto Bfulco Unversty of Napol Federco II roberto.bfulco2@unna.t Marcus Brunner NEC Laboratores Europe brunner@neclab.eu Peer Hasselmeyer NEC Laboratores

More information

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;

More information

EVERY year, seasonal hurricanes threaten coastal areas.

EVERY year, seasonal hurricanes threaten coastal areas. 1 Strategc Stockplng of Power System Supples for Dsaster Recovery Carleton Coffrn, Pascal Van Hentenryck, and Russell Bent Abstract Ths paper studes the Power System Stochastc Storage Problem (PSSSP),

More information

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT Chapter 4 ECOOMIC DISATCH AD UIT COMMITMET ITRODUCTIO A power system has several power plants. Each power plant has several generatng unts. At any pont of tme, the total load n the system s met by the

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

J. Parallel Distrib. Comput. Environment-conscious scheduling of HPC applications on distributed Cloud-oriented data centers

J. Parallel Distrib. Comput. Environment-conscious scheduling of HPC applications on distributed Cloud-oriented data centers J. Parallel Dstrb. Comput. 71 (2011) 732 749 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. ournal homepage: www.elsever.com/locate/pdc Envronment-conscous schedulng of HPC applcatons

More information

SPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background:

SPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background: SPEE Recommended Evaluaton Practce #6 efnton of eclne Curve Parameters Background: The producton hstores of ol and gas wells can be analyzed to estmate reserves and future ol and gas producton rates and

More information

Physical Security and Vulnerability Modeling for Infrastructure Facilities

Physical Security and Vulnerability Modeling for Infrastructure Facilities Proceedngs of the 39th Hawa Internatonal Conference on System Scences - 2006 Physcal Securty and Vulnerablty Modelng for Infrastructure Facltes Dean A. Jones Chad E. Davs Sanda Natonal Laboratores Albuquerque,

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm Internatonal Journal of Grd Dstrbuton Computng, pp.175-190 http://dx.do.org/10.14257/gdc.2014.7.6.14 Optmzaton odel of Relable Data Storage n Cloud Envronment Usng Genetc Algorthm Feng Lu 1,2,3, Hatao

More information

Optimization of network mesh topologies and link capacities for congestion relief

Optimization of network mesh topologies and link capacities for congestion relief Optmzaton of networ mesh topologes and ln capactes for congeston relef D. de Vllers * J.M. Hattngh School of Computer-, Statstcal- and Mathematcal Scences Potchefstroom Unversty for CHE * E-mal: rwddv@pu.ac.za

More information

Sensor placement for leak detection and location in water distribution networks

Sensor placement for leak detection and location in water distribution networks Sensor placement for leak detecton and locaton n water dstrbuton networks ABSTRACT R. Sarrate*, J. Blesa, F. Near, J. Quevedo Automatc Control Department, Unverstat Poltècnca de Catalunya, Rambla de Sant

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu

More information

Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks

Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks Secure Walkng GPS: A Secure Localzaton and Key Dstrbuton Scheme for Wreless Sensor Networks Q M, John A. Stankovc, Radu Stoleru 2 Department of Computer Scence, Unversty of Vrgna, USA 2 Department of Computer

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

CHAPTER EVALUATING EARTHQUAKE RETROFITTING MEASURES FOR SCHOOLS: A COST-BENEFIT ANALYSIS

CHAPTER EVALUATING EARTHQUAKE RETROFITTING MEASURES FOR SCHOOLS: A COST-BENEFIT ANALYSIS CHAPTER 17 EVALUATING EARTHQUAKE RETROFITTING MEASURES FOR SCHOOLS: A COST-BENEFIT ANALYSIS A.W. Smyth, G. Deodats, G. Franco, Y. He and T. Gurvch Department of Cvl Engneerng and Engneerng Mechancs, Columba

More information

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems Jont Schedulng of Processng and Shuffle Phases n MapReduce Systems Fangfe Chen, Mural Kodalam, T. V. Lakshman Department of Computer Scence and Engneerng, The Penn State Unversty Bell Laboratores, Alcatel-Lucent

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng Envronment Congcong Xong, Long Feng, Lxan Chen A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng

More information

Research of Network System Reconfigurable Model Based on the Finite State Automation

Research of Network System Reconfigurable Model Based on the Finite State Automation JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang

More information

Risk Model of Long-Term Production Scheduling in Open Pit Gold Mining

Risk Model of Long-Term Production Scheduling in Open Pit Gold Mining Rsk Model of Long-Term Producton Schedulng n Open Pt Gold Mnng R Halatchev 1 and P Lever 2 ABSTRACT Open pt gold mnng s an mportant sector of the Australan mnng ndustry. It uses large amounts of nvestments,

More information

Allocating Time and Resources in Project Management Under Uncertainty

Allocating Time and Resources in Project Management Under Uncertainty Proceedngs of the 36th Hawa Internatonal Conference on System Scences - 23 Allocatng Tme and Resources n Project Management Under Uncertanty Mark A. Turnqust School of Cvl and Envronmental Eng. Cornell

More information

The Safety Board recommends that the Penn Central Transportation. Company and the American Railway Engineering Association revise

The Safety Board recommends that the Penn Central Transportation. Company and the American Railway Engineering Association revise V. RECOWNDATONS 4.! The Safety Board recommends that the Penn Central Transportaton Company and the Amercan Ralway Engneerng Assocaton revse ther track nspecton and mantenance standards or recommended

More information

How To Improve Power Demand Response Of A Data Center Wth A Real Time Power Demand Control Program

How To Improve Power Demand Response Of A Data Center Wth A Real Time Power Demand Control Program Demand Response of Data Centers: A Real-tme Prcng Game between Utltes n Smart Grd Nguyen H. Tran, Shaole Ren, Zhu Han, Sung Man Jang, Seung Il Moon and Choong Seon Hong Department of Computer Engneerng,

More information