ANALYSING THE OVERHEAD IN MOBILE AD-HOC NETWORK WITH A HIERARCHICAL ROUTING STRUCTURE

Size: px
Start display at page:

Download "ANALYSING THE OVERHEAD IN MOBILE AD-HOC NETWORK WITH A HIERARCHICAL ROUTING STRUCTURE"

Transcription

1 AALYSIG THE OVERHEAD I MOBILE AD-HOC ETWORK WITH A HIERARCHICAL ROUTIG STRUCTURE Johann Lóez, José M. Barceló, Jorge García-Vidal Technical University of Catalonia (UPC), C/Jordi Girona 1-3, Barcelona, Sain, {johannl, joseb, jorge}@ac.uc.edu Keywords MAET, Routing, Clustering, Overhead. Abstract- Hierarchical routing is a common ractice in actual Internet networs. This ind of routing allows nodes and routers to get small routing tables and small routing overhead. On the oosite side, routing in MAETs is flat; therefore, nodes have to learn how to reach each node in the networ. It means large routing tables, imact in the loo u algorithm and large routing overhead. In this aer we analyze the advantages of using hierarchical routing in MAETs under secific scenarios, showing the reduction of routing overhead from a factor of to / (being the number of nodes and the number of subnets). I. ITRODUCTIO Currently mobile communications have become an imortant role for the eole. Since these inds of communications are considered less a luxury and more a necessity, the number of mobile users, services and devices grows quicly. Most of the researching efforts have been sent on the heterogeneous networs (integration of fixed networs with infrastructure Wireless etwors). However, during the ast few years, essentials efforts have been done in the researching field of Mobile Ad-hoc etworing (MAET) [1], which is basically a wireless networ without infrastructure. One of the main issues in MAET researching is the routing. The rincial results obtained into this area are the well-nown AODV [] (reactive) and the OLSR [3] (roactive) routing rotocols. In MAET, every node requires to articiate as a router, maintaining individually routes to other nodes. If the number of nodes grows largely, the number of routes will increase raidly. This effect together with the mobility of nodes may increase the overhead due to the maintenance of the routes, consuming the scarce bandwidth in the MAET and therefore reducing the throughut. If we do not tae into account the mobility, this scenario is something similar to what haened to the ARPAnet at the beginning. The logical solution to reduce this overhead would be to use a hierarchical structure lie the used in Internet, in which the nodes are aggregated into subnets to be handled as a single entity for routing uroses. However, this structure is difficult to aly in MAETs due to their dynamic and distributed nature. The main roblems to solve in such hierarchical structure are the address acquisition under mobility scenarios, the dynamic creation and removal of subnets and the maintenance of already established sessions when a node moves from one subnet to other and changes its IP address. We are roosing a scheme, which taes advantage of the fact that currently the nodes in MAETs can be groued following hysical or environmental constraints to aly this hierarchical structure. These formed clusters can be considered subnets of a MAET, giving the chance of reresenting multile routes of a large number of nodes by a single route. Since the routing information is cutting down, a reduction in the overhead may be obtained [5]. This scheme is useful in scenarios lie Wireless Mesh etwors (WM) with nodes connected to infrastructures but those are the edge-oints of a MAET, or in scenarios in which there are nodes with This wor was suorted by the Sanish Ministry of Education and Science; It was art of the And the Sixth Framewor Programme EUROGI P3/1

2 leader roles (e.g. an emergency networ). Figure 1 (extracted from [4]) shows an examle of an emergency situation in which a fire tro handle by the head quarters is sub-groued in rescue teams. Each rescue team is controlled by a leader (fire chief). Rescue teams also are divided in rescue units comosed of airs of firemen with a rescue leader. The firemen tro forms a hierarchical structure with communications between the head quarters with the chief and the chief with the rescue unit leaders. Each rescue unit forms a cluster with communications within its own cluster and his rescue leader (intra-cluster communications) and with other clusters (inter-cluster communications), see [4]. From the communications oint of view, each cluster is formed by a leader, usually it has more resources in terms of bandwidth, ower, gateway connectivity, etc, (e.g. a fire-truc) relatively static and nodes that move in the disaster area. In a natural manner, mobile nodes attached to the leader node may form a subnet. If the mobile node moves it can be attached to another leader node. ow the question is whether it is more efficient if that node ees the IP address or whether the node attaches and changes the IP address to one belonging to the new subnet. Figure1. Examle of an emergency situation, in which a MAET can assume a hierarchical structure. In this aer we evaluate analytically the exected overhead reduction generated by the routing rotocol when we adot a hierarchical routing scheme in MAET. We secifically evaluate the overhead incurred by the current routing rotocols (reactive and roactive) used in MAET, then, we modify the obtained models to include the arameters to reresent the hierarchical structure (subnet, address aggregation). Finally, we comare these models to get a reliminary idea of the reduction incurred by our roosal. The main objective of this aer is not to solve all the technological issues arisen in MAETs if subnetting solutions are aroached but to show that an effort in that direction is valuable. The rest of the aer is organized as follows: a generic descrition of the scenario characteristics and the challenges that we have to solve for integrating successfully the hierarchical routing to MAET are given in section II. Then, we resent the analytical model of the overhead generated by the routing mechanisms. Finally, we have the conclusions and future wor. II. SCEARIO DESCRIPTIO We are roosing a scheme which taes advantage of the fact that currently the nodes in a MAET can be groued following hysical or environmental constraints. Figure shows some of the following assumtions: odes form an area of size A around a leader node, and this area will corresond to an IP subnet of dynamic size, e.g. deends on the number of nodes attached to the area. odes form a multi-homed networ with nodes of the same area and with nodes of other areas. A node is attached to an area and therefore has an IP address corresonding to that IP subnet area. IP addresses are used lie host locators. When a node moves to other area has to acquire a new IP address corresonding to the new IP subnet. P3/

3 Every node nows each of its one-ho neighbours, e.g. using lin sensing or a Hello rotocol. A message sent by a node is received correctly within a finite time by all of its one-ho neighbours. L L L L Figure. MAET nodes groued to form subnets. Taing into account these assumtions, some challenges lie the subnet formation and address acquisition, the mobility of nodes between subnets, the intra-subnet routing, and the inter-subnet routing have to be solved. 1) Subnet Formation and Address Acquisition In our roosed scheme the node needs a mechanism to detect a leader node and to get attached to it. The leader node is resonsible to give an IP address to the node. In case the node roams to a new area, the node has to detect that is in a new area and must obtain an IP address from the leader node. Future wor will be required to define a rocedure that allows a node to get attached to an area and obtain an IP address within the subnet. There are several roosals in the literature about address acquisition schemes and leader selection algorithms (e.g. DHCP or dynamic stateless address acquisition [6], [7], [8], [9] and [14]). The main issues to solve by these ind of mechanisms are: Leader detection and selection ode Address Construction Dulicate Address Detection ) Mobility between subnets Mobility into the subnet is not a critical issue and it could be erformed by the current roosed MAET routing rotocols (AODV, or OLSR). Although, a mobility management between subnets loos necessary. The roosed mobility management between subnets relies on the use of an USER ID lie the node identification and the IP Address lie the location indicator of the node. This aroach breas the IP aradigm of uniqueness between location and identity. Additionally, this aroach allows suorting terminal and user mobility. The aroach could be based on the aforementioned Address Acquisition rocedure for terminal mobility, the Session Initiation Protocol (SIP), [10] and [11], for streaming multimedia alications, and the Stream Control Transmission Protocol (SCTP) [1] with an enhancement for dynamic address reconfiguration [13] for the alications based on reliable transort rotocol. It mainly rovides mobility in two layers: networ layer and the alication, and for these reason our roosed scheme is so called Multi-layer. 3) Intra and Inter subnet routing Some enhancements to the existing MAET routing rotocol are needed to allow interaction between them and the Address Acquisition mechanism. By default, reactive rotocols lie AODV does not require large changes because its standard [] includes address aggregation, allowing the adotion of this hierarchical scheme. For the case of hierarchical routing with roactive rotocols lie OLSR, the scheme requires a new routing mechanism to allow the address aggregation (inter-subnet routing). Since the subnets are assumed fixed (leader node is mainly static) in our scenario, the mechanism could tae benefit of this fact. Future wor will be required to define these mechanisms and modifications needed by the current routing rotocols to interact with our roosed hierarchical structure. P3/3

4 III. AALYTICAL MODEL To validate our roosal we use some well-nown analytical models of reactive and roactive routing rotocols [15], hierarchical routiing [17], and cellular systems [16]. First than all we will resent briefly each model. The model for MAET routing rotocols let us estimate the control overhead generated in a fixed networ, and the control overhead due to the mobility. After that, we aly some hierarchical routing (subnetting) arameters to the model, estimating the new control overhead generated by the routing rotocols for a fixed etwor. Then, with the exressions obtained and the cellular system models we can estimate the control overhead due to the subnetting and the mobility. Finally, we comare the estimations obtained to validate our roosal. A. MAET Routing Protocols Models These models were develoed and validated in [15], to comare the traffic control overhead and their bandwidth cost generated by reactive and roactive rotocols. It taes into account the networ density, the mobility, the traffic creation, and the traffic density. The arameters used to model the networ are: the number of nodes, the average live time of a lin T b (T b = 1/µ, where µ is the lin breaage rate) to model the mobility, the average length of a route L which deends mainly of the shae of the networ. Additionally, the model assumes that µ and L remain constants, and the networ always remain connected. 1) Reactive rotocol model Since the route creation in reactive rotocols deends mainly of the data traffic creation and diversity, the following arameters are used: the average number of route creation λ (Route Requests), and the average number of active routes er node a, such active route is a air where the source continuously sends acets to the destination. We also have to tae into account the arameters that deend on the rotocol, see [15]: the average number of emissions for a route request (could include the route rely messages) B r, and the route request otimization factor o r, which deends of the networ and the traffic arameters (o r = B r / ). For a ure flooding rotocol, if we include the Route Rely from the destination, we get that; o r = 1 + j /, where j is the number of rely messages. According to [5] the Route Requests are the resonsible for the majority of the routing overhead in networs running AODV, so, we could exect o r 1. In a Fixed etwor a reactive rotocol roduces λ route requests every second. These requests will generate λo r control acets in the networ. We can exress the control overhead due to the routing rotocol by: O ( ) ο = rλ (1) The mobility in the MAETs can be reresented by the lin breaage and creation. Being the lin breaage the most imortant factor to model the reaction of the routing rotocols to mobility, because the rotocols have to react quicly to the breaages when the lin is actively used to transmit data. Therefore, when a lin breaage is detected, the rotocol will basically issue a new route request to reair routes using that lin. If we have a routes in the networ, there will be al active lins, such that µ(al) acets will be generated by a lin breaage. Basically the reactive rotocol will issue a new route request to reair routes using that lin. This route request could be either initiated by the source of the route or by the node detecting the lin breaage. For the latter case this gain may be integrated in the arameter o r. For the more essimistic case the overhead due to the mobility is exressed by: ) Proactive rotocol model O( ) rµ al = o () A roactive rotocol mainly deends on the regular emission of control acets, having the advantage of not generating any overhead at route creation, because their fixed control traffic overhead includes the cost of the route creation. The arameters concerning to the roactive rotocol are, see [15]: the acets for roactively discovering the local toology (hello acets) emitted by a node er second h, and the toology broadcast acets emitted by a node during a second for allowing global nowledge of the toology t. These arameters are exressed in terms of rates. To react to toological changes the active next ho A is defined; it corresonds to the P3/4

5 average number of active lins er node, and it is used to evaluate what toology changes may trigger additional control traffic. Since roactive rotocols can tae advantage from their nowledge of the toology in order to otimize broadcasting, a broadcast otimization factor o is denoted (o = B /), where B denotes the average number of emissions to achieve a toology broadcast. In a roactive rotocol h hello messages are roduced er second in the entire networ, initiating t toology emissions, which generate t o acets. The overhead roduced can be reresented by O( ) = h + o t (3) Quantifying the overhead generated in reaction to mobility is similar as with reactive rotocols. A node detecting a lin breaage on a route will transmit an additional toology broadcast acet. In average a node is on al routes, and several routes may have the same outgoing lin. However, the robability that the next hos for these routes are the same is certainly greater than the robability that the destinations for these routes are the same. With the introduction of the average number of active lins of a node A arameter, the total overhead due to mobility in a roactive rotocol is exressed by O( ) µ = o A (4) With the exressions resented above, we can note that the number of nodes in the networ dominates the overhead in an exonential manner O( ) for both tyes of routing rotocols. The cost of these routing rotocols becomes rohibitive as the number of nodes in the networ gets large. B. Alying hierarchical routing (subnetting) to the routing rotocols In hierarchical routing any node ees comlete routing information about nodes that are close to it, and lesser information about nodes located further away from it. The reduction of the routing information is achieved artitioning the networ (creating subnets). We roose to form the subnets with a level hierarchical clustering based scheme [17], assuming all the nodes are uniformly distributed in the networ and in each subnet for the scoe of this analysis. To aly subnets a new arameter must be included in the model: the number of subnets in the networ. To guarantee full connectivity in the networ one node at least must maintain a route to each node into the same subnet, and a route to each subnet in the networ. From this, the networ must have (-1)+/ routes er node. Therefore, the first advantage in subnetting is the reduction of the routing table and the saving in the loo u algorithm. 1) Reactive rotocols with subnets When we introduce subnets to the reactive rotocol reactive rotocol model, we include the average number of route creation λ I by a node to other nodes into the same subnet, the average number of route creation λ E by a node to other subnets, and the average length of a route q to another subnet. We remind you that we are interested in nowing what is the overhead reduction (if there is) in a MAET using a reactive rotocol lie AODV, and not in solving the technological asects of AODV using subnets. We leave that study as a second ste. Alying the new arameters to the aforementioned model for a fixed networ (1), we have λ I route requests for routes to nodes into the same subnet roduced each second, and (-1)λ E route requests er second for routes to nodes located in other subnets. Therefore, the overhead generated by these requests can be exressed by ο r λi + οrλe ( 1) + q + S Where S reresents the cost of finding out the routes to other subnets (S = (-1) /). Assuming that the robability of having a route to a subnet is much higher (P(cache) 1) than having a route to a articular node, this cost is only aid few times, therefore during a eriod of time long this value will be small (because is not a rate). Since the q value is very small comared with the number of nodes in the networ, and S is constant during the time, we consider these two values does not dominate the overhead (are not relevant) for our analysis. From this we have P3/5

6 O ( ) ο rλi + οrλe ( 1) (5) Since the nodes are uniformly distributed, and assuming that λ I and λ E are indeendent from each other and have the same robability occurrence, we can reresent λ = λ I + (-1)λ E. Exressing (4) in terms of λ we obtain O ( ) οrλ (6) To model the overhead due to the mobility we divide it in two comonents O( ) = O ( ) O ( ) (7) s + The first term O S () reresents the overhead due to the mobility of the nodes into the subnet. And the second one O H () reresents the overhead due to the change of subnet. This overhead is roduced because each time that a node changes of subnet, it must change its address. The rocess to acquire a new address and to attach it to the node ID imlies a message exchange. The lin breaage is assumed in our model lie the main comonent of the overhead in reaction to mobility. After adding subnets to the reactive rotocol model we will have two cases. The first case aears when the broen lin corresonds to a lin between two nodes that are into the same subnet, and for this case the route reair will be local into the subnet. In that case a flooding in the subnet is enough to reair the route, therefore, it is not necessary to reair from the source. The second one, is resented when the broen lin corresonds to a lin between two nodes that are located in different subnets. For this case the route has to be reaired from the source of the route. If we have al active lins in the networ; the overhead O S () due to mobility could be reresented by o r µ al Os ( ) orµ al (8) Due to the difficult to quantify exactly the emissions of control acets in reaction to mobility, we decided to exress it between two quotes, corresonding each one to the aforementioned cases (the bottom and uer bounds). We have to note that often several routes have identical destinations and the majority can be reaired locally, meaning that the overhead will be close to the lower bound the mayor art of the time. ) Adding mobility between subnets to the model A subnet corresonds to a cluster, which is based on the roximity (# of hos) to a cluster head (leader node), forming an area around this cluster head. Desite of the variable size of this area (subnet), we assume a subnet of a fixed size, for this analysis. Therefore, we can assume that a node moving between subnets behaves lie a node moving in a cellular system. For our analysis the most imortant arameter related to the mobility is the robability of subnet (area) boundary crossing. According to [16], an aroximate evaluation for cellular system erformance is obtained through models based on fluid flow assumtions. The following conditions are needed to derive a simle exression: The nodes and their traffic are uniformly distributed over a given subnet (area or cell). The nodes have a mean velocity of v and their directions of movements are uniformly distributed over [0,π]. With the aforementioned conditions the subnet crossover rate ηis given by H P η = v π S Where P corresonds to the erimeter of the subnet, and S is the area of the subnet. If we denote the time sent by a node within a given subnet (dwell time) [18], [19]by the random variable T h. The mean dwell time E(T h ) can be calculated by nowing the subnet crossover rate [0], [1], that is P3/6

7 E ( ) = Which corresond to the average number of handoffs. T h Additionally, the dwell time is assumed exonentially distributed (the residing time of a node in the actual subnet is not related with the residing time of the same node in a revious subnet, memory less system). So, the robability of subnet boundary crossing is given by 1 η P( T h ) e t =η η If our Address Acquisition rocedure generates h acets in average, and if we have / nodes er subnet, we will have h(/) acets in average due to the change of subnet in the entire networ. ow, we can reresent the overhead due to change of subnet by O H ( ) = hη (9) Finally relacing (8) and (9) in (7), we can aroximate the overhead in the routing rotocol model with hierarchical subnetting due to mobility to 3) Proactive rotocol with subnets O( ) or µ al + hη When we aly hierarchical routing with a roactive rotocol, a mechanism to find out the routes to reach other subnets is needed. Within the scoe of this study we introduce the arameter to reresent the cost of finding out these routes, and leaving the descrition and evaluation (identify the value of the arameter ) of the aforementioned mechanism for a future study. With the roactive rotocol, each node emits h hello messages er second, and now each t is emitted to the nodes that are close to it (to all the members of the subnet). The overhead generated is given by O( ) = h + o t +ϕ (10) In addition, the arameter includes the cost of emitting the routes to other subnets to each node. Desite of all this routing information have a cost, we can exect this cost is much lower comared to the overhead without hierarchical routing, because this cost does not deend of a factor lie in the roactive and reactive rotocols, and because the rocedure can tae advantage of the artial nowledge of the toology and the characteristics of the scenario. The overhead generated in reaction to mobility is reresented by the exression (7) where the second comonent O H ()is the same exressed in (9), and the comonent O s ()will be exressed by Os ( ) = o µ A + ϕ (11) The first art corresonds to the overhead generated by a lin breaage, such that the toology is only udated locally. Here is evident that a local toology change does not have to generate control overhead in the entire networ, because certainly the nodes located further away are not affected by these changes. The main idea behind this assumtion is that if a node nows how to reach a subnet, it is not necessary to now how the toology in that subnet is. This assumtion is similar to the idea of Internet in which an Autonomous System (AS) does not now how is organized another AS and only nows how to reach that AS. Again, we have the arameter in the second art of the exression, to reresent the overhead generated in reaction to a lin breaage between subnets. Finally relacing (9) and (11) in (7) we obtain O( ) = o µ A + ϕ + hη P3/7

8 To acquire an order of magnitude of the reduction in the overhead generated by the MAET routing rotocols after alying hierarchical routing we draw two comarable exressions lie (1) and (6). Figure 3 shows a comarison between the overhead generated by a reactive rotocol and the same rotocol with 4 subnets, for the case of static nodes. Figure 3. Overhead comarison between a reactive rotocol and the same rotocol with subnets. The overhead reduction observed in the figure gives us a margin, which is enough to add some overhead generated by the modifications and new mechanisms needed to introduce hierarchical routing to MAET, and to ee an imortant reduction. In both cases, roactive and reactive rotocols with hierarchical routing, we observe an O( /)overhead, which deending of value could be significant, desite of the cost incurred by the changes and mechanisms generated by the addition of hierarchical routing to MAET. In addition we can exect a reduction of the toology acets (bandwidth) for the case of roactive rotocols, and a reduction in the delay incurred to acquire a route for the case of reactive rotocols. IV. COCLUSIOS We resented a scenario in which adding hierarchical routing to MAET roduces a reduction in the routing overhead. We also described the architecture (identify the modifications and the new mechanisms) needed to add the hierarchical routing. Finally we demonstrated analytically the exected reduction in the overhead generated by the MAET with hierarchical routing under a secific scenario. We notice that this study only obtains reliminary results, that allow us justify the current efforts to integrate the hierarchical routing to MAET. Some of the activities are: the subnet formation and address acquisition, the mobility of nodes between subnets, the intra-subnet routing, and the inter-subnet routing (modifications to the existent routing rotocols). We thin that an effort to integrate existing schemes with the corresonding modifications to suort subnetting in MAETs could be valuable. REFERECES [1] Mobile Ad-hoc etwors woring grou IETF URL: htt:// [] C. Perins, E. Belding-Royer, and S. Das. Ad hoc Vector (AODV) Routing. RFC 3561, July 003. [3] T. Clausen and P. Jacquet, "Otimized Lin State Routing Protocol", RFC 366, October 003. [4] H. Aiache et al, WIDES System Secification, Deliverable., IST WIDES, June 004 [5] C. Shiflet, E. M. Belding-Royer and C. E. Perins. "Address Aggregation in Mobile Ad hoc etwors." Proceedings of the IEEE International Conference on Communications (ICC), Paris, France, June 004. P3/8

9 [6] K. Weniger, M. Zitterbart. "IPv6 Auto configuration in Large Scale Mobile Ad-Hoc etwors", Proceedings of Euroean Wireless 00, Florence, Italy, Feb. 00. [7] M. Mohsin, R. Praash. IP Address Assignment in a Mobile Ad Hoc etwor, IEEE Military Communications Conference (MILCOM 00), volume, , October 00. [8] S. esargi, R. Praash. MAETconf: Configuration of Hosts in a Mobile Ad Hoc etwor. Proceedings of IFOCOM, 00. [9] S. Thomson and T. arten, "IPv6 Stateless Address Auto configuration" in RFC46 (December 1998). [10] J. Rosenberg, H. Schulzrinne, E. Schooler, M. Handley, G. Camarillo, A. Johnston, J. eterson, R. Sars, Session Initiation Protocol, RFC 361 in IETF, June 00. [11] E. Wedlund, H. Schulzrinne, Mobility Suort using SIP. IEEE/ACM Multimedia conference WOWMOM [1] T. Dreibholz, A. Jungmaier, M. Tüxen, A new Scheme for IP-based Internet Mobility, The 8th Annual IEEE Conference on Local Comuter etwors (LC) Königswinter, Germany ovember 003. [13] R. Stewart, M. Ramalho, Q. Xie, M. Tüxen, I. Rytina, M. Belinchon, and P. Conrad, Stream Control Transmission Protocol (SCTP) Dynamic Address Reconfiguration. IETF, Transort Area Woring Grou, February 003. draft-ietftsvwg-addi-sct-07.txt, wor in rogress. [14] Y. Sun, E. M. Belding-Royer, A Study of Dynamic Addressing Techniques in Mobile Ad-Hoc etwors, Wireless Communications and Mobile Comuting, Aril 004. [15] L. Viennot, P. Jacquet, T. H. Clausen, "Analyzing control traffic overhead versus mobility and data traffic activity in mobile Ad-Hoc networ rotocols," resented at ACM Wireless etwors journal (Winet), 004. [16] B. Jabbari, "Teletraffic asects of evolving and next-generation wireless communication networs," Personal Communications, IEEE [see also IEEE Wireless Communications], vol. 3,. 4, [17] L. Kleinroc, F. Kamoun, "Hierarchical Routing for Large etwors: Performance Evaluation and Otimization," Comuter etwors, Vol. 1, , [18] D. Hong and S S Raaort, "Traffic Model and Performance Analysis for Cellular Mobile Radio Telehone Systems with Prioritized and on-rioritized Hand-off Procedures," IEEE Trans Vehfc Tech, vol 35,no 3, Aug 1986, [19] S. S. Raaort, "The Multile-Call Hand-off Problem in High-Caacity Cellular Communications Systems," IEEE Trans. Vehic. Tech., Aug. 1991, vol. 40, no. 3, [0] G. Morales-Andres and M. Villen-Altamirano, "An Aroach to Modelling Subscriber Mobility in Cellular Radio etwors," Telecom Forum87, Geneva, Switzerland, ov [1] R. Thomas, H. Gilbert, and G. Maziotto, "Influence of the Moving of the Mobile Stations on the Performance of a Radio Mobile Cellular etwor," Proc. 3rd ordic Seminar on Digital Land Mobile Radio Comm., Set P3/9

Multi-Channel Opportunistic Routing in Multi-Hop Wireless Networks

Multi-Channel Opportunistic Routing in Multi-Hop Wireless Networks Multi-Channel Oortunistic Routing in Multi-Ho Wireless Networks ANATOLIJ ZUBOW, MATHIAS KURTH and JENS-PETER REDLICH Humboldt University Berlin Unter den Linden 6, D-99 Berlin, Germany (zubow kurth jr)@informatik.hu-berlin.de

More information

Load Balancing Mechanism in Agent-based Grid

Load Balancing Mechanism in Agent-based Grid Communications on Advanced Comutational Science with Alications 2016 No. 1 (2016) 57-62 Available online at www.isacs.com/cacsa Volume 2016, Issue 1, Year 2016 Article ID cacsa-00042, 6 Pages doi:10.5899/2016/cacsa-00042

More information

On Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks

On Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks On Multicast Caacity and Delay in Cognitive Radio Mobile Ad-hoc Networks Jinbei Zhang, Yixuan Li, Zhuotao Liu, Fan Wu, Feng Yang, Xinbing Wang Det of Electronic Engineering Det of Comuter Science and Engineering

More information

Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks

Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks Static and Dynamic Proerties of Small-world Connection Toologies Based on Transit-stub Networks Carlos Aguirre Fernando Corbacho Ramón Huerta Comuter Engineering Deartment, Universidad Autónoma de Madrid,

More information

Buffer Capacity Allocation: A method to QoS support on MPLS networks**

Buffer Capacity Allocation: A method to QoS support on MPLS networks** Buffer Caacity Allocation: A method to QoS suort on MPLS networks** M. K. Huerta * J. J. Padilla X. Hesselbach ϒ R. Fabregat O. Ravelo Abstract This aer describes an otimized model to suort QoS by mean

More information

On the (in)effectiveness of Probabilistic Marking for IP Traceback under DDoS Attacks

On the (in)effectiveness of Probabilistic Marking for IP Traceback under DDoS Attacks On the (in)effectiveness of Probabilistic Maring for IP Tracebac under DDoS Attacs Vamsi Paruchuri, Aran Durresi 2, and Ra Jain 3 University of Central Aransas, 2 Louisiana State University, 3 Washington

More information

A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION

A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION 9 th ASCE Secialty Conference on Probabilistic Mechanics and Structural Reliability PMC2004 Abstract A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION

More information

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON Rosario Esínola, Javier Contreras, Francisco J. Nogales and Antonio J. Conejo E.T.S. de Ingenieros Industriales, Universidad

More information

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network Finding a Needle in a Haystack: Pinointing Significant BGP Routing Changes in an IP Network Jian Wu, Zhuoqing Morley Mao University of Michigan Jennifer Rexford Princeton University Jia Wang AT&T Labs

More information

TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES

TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES C. Gutiérrez, S. Servigne, R. Laurini LIRIS, INSA Lyon, Bât. Blaise Pascal, 20 av. Albert Einstein 69621 Villeurbanne, France

More information

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation Large-Scale IP Traceback in High-Seed Internet: Practical Techniques and Theoretical Foundation Jun Li Minho Sung Jun (Jim) Xu College of Comuting Georgia Institute of Technology {junli,mhsung,jx}@cc.gatech.edu

More information

Local Connectivity Tests to Identify Wormholes in Wireless Networks

Local Connectivity Tests to Identify Wormholes in Wireless Networks Local Connectivity Tests to Identify Wormholes in Wireless Networks Xiaomeng Ban Comuter Science Stony Brook University xban@cs.sunysb.edu Rik Sarkar Comuter Science Freie Universität Berlin sarkar@inf.fu-berlin.de

More information

Automatic Search for Correlated Alarms

Automatic Search for Correlated Alarms Automatic Search for Correlated Alarms Klaus-Dieter Tuchs, Peter Tondl, Markus Radimirsch, Klaus Jobmann Institut für Allgemeine Nachrichtentechnik, Universität Hannover Aelstraße 9a, 0167 Hanover, Germany

More information

Comparing Dissimilarity Measures for Symbolic Data Analysis

Comparing Dissimilarity Measures for Symbolic Data Analysis Comaring Dissimilarity Measures for Symbolic Data Analysis Donato MALERBA, Floriana ESPOSITO, Vincenzo GIOVIALE and Valentina TAMMA Diartimento di Informatica, University of Bari Via Orabona 4 76 Bari,

More information

Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes

Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes Time-Cost Trade-Offs in Resource-Constraint Proect Scheduling Problems with Overlaing Modes François Berthaut Robert Pellerin Nathalie Perrier Adnène Hai February 2011 CIRRELT-2011-10 Bureaux de Montréal

More information

Multiperiod Portfolio Optimization with General Transaction Costs

Multiperiod Portfolio Optimization with General Transaction Costs Multieriod Portfolio Otimization with General Transaction Costs Victor DeMiguel Deartment of Management Science and Oerations, London Business School, London NW1 4SA, UK, avmiguel@london.edu Xiaoling Mei

More information

Characterizing and Modeling Network Traffic Variability

Characterizing and Modeling Network Traffic Variability Characterizing and Modeling etwork Traffic Variability Sarat Pothuri, David W. Petr, Sohel Khan Information and Telecommunication Technology Center Electrical Engineering and Comuter Science Deartment,

More information

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm International Journal of Comuter Theory and Engineering, Vol. 7, No. 4, August 2015 A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm Xin Lu and Zhuanzhuan Zhang Abstract This

More information

A Multivariate Statistical Analysis of Stock Trends. Abstract

A Multivariate Statistical Analysis of Stock Trends. Abstract A Multivariate Statistical Analysis of Stock Trends Aril Kerby Alma College Alma, MI James Lawrence Miami University Oxford, OH Abstract Is there a method to redict the stock market? What factors determine

More information

An important observation in supply chain management, known as the bullwhip effect,

An important observation in supply chain management, known as the bullwhip effect, Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David Simchi-Levi Decision Sciences Deartment, National

More information

Design of A Knowledge Based Trouble Call System with Colored Petri Net Models

Design of A Knowledge Based Trouble Call System with Colored Petri Net Models 2005 IEEE/PES Transmission and Distribution Conference & Exhibition: Asia and Pacific Dalian, China Design of A Knowledge Based Trouble Call System with Colored Petri Net Models Hui-Jen Chuang, Chia-Hung

More information

Web Application Scalability: A Model-Based Approach

Web Application Scalability: A Model-Based Approach Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research

More information

The risk of using the Q heterogeneity estimator for software engineering experiments

The risk of using the Q heterogeneity estimator for software engineering experiments Dieste, O., Fernández, E., García-Martínez, R., Juristo, N. 11. The risk of using the Q heterogeneity estimator for software engineering exeriments. The risk of using the Q heterogeneity estimator for

More information

Evaluating a Web-Based Information System for Managing Master of Science Summer Projects

Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Till Rebenich University of Southamton tr08r@ecs.soton.ac.uk Andrew M. Gravell University of Southamton amg@ecs.soton.ac.uk

More information

Re-Dispatch Approach for Congestion Relief in Deregulated Power Systems

Re-Dispatch Approach for Congestion Relief in Deregulated Power Systems Re-Disatch Aroach for Congestion Relief in Deregulated ower Systems Ch. Naga Raja Kumari #1, M. Anitha 2 #1, 2 Assistant rofessor, Det. of Electrical Engineering RVR & JC College of Engineering, Guntur-522019,

More information

X How to Schedule a Cascade in an Arbitrary Graph

X How to Schedule a Cascade in an Arbitrary Graph X How to Schedule a Cascade in an Arbitrary Grah Flavio Chierichetti, Cornell University Jon Kleinberg, Cornell University Alessandro Panconesi, Saienza University When individuals in a social network

More information

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS

CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Review of the Air Force Academy No (23) 203 CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Cătălin CIOACĂ Henri Coandă Air Force Academy, Braşov, Romania Abstract: The

More information

An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods

An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods An inventory control system for sare arts at a refinery: An emirical comarison of different reorder oint methods Eric Porras a*, Rommert Dekker b a Instituto Tecnológico y de Estudios Sueriores de Monterrey,

More information

The Online Freeze-tag Problem

The Online Freeze-tag Problem The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden mikael.hammar@atus.com School of Technology and Society, Malmö University,

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 2011 757. Load-Balancing Spectrum Decision for Cognitive Radio Networks

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 2011 757. Load-Balancing Spectrum Decision for Cognitive Radio Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 20 757 Load-Balancing Sectrum Decision for Cognitive Radio Networks Li-Chun Wang, Fellow, IEEE, Chung-Wei Wang, Student Member, IEEE,

More information

Implementation of Statistic Process Control in a Painting Sector of a Automotive Manufacturer

Implementation of Statistic Process Control in a Painting Sector of a Automotive Manufacturer 4 th International Conference on Industrial Engineering and Industrial Management IV Congreso de Ingeniería de Organización Donostia- an ebastián, etember 8 th - th Imlementation of tatistic Process Control

More information

An Analysis Model of Botnet Tracking based on Ant Colony Optimization Algorithm

An Analysis Model of Botnet Tracking based on Ant Colony Optimization Algorithm An Analysis Model of Botnet Tracing based on Ant Colony Otimization Algorithm Ping Wang Tzu Chia Wang* Pu-Tsun Kuo Chin Pin Wang Deartment of Information Management Kun Shan University, Taiwan TEL: 886+6-05-0545

More information

Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11)

Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11) Point Location Prerocess a lanar, olygonal subdivision for oint location ueries. = (18, 11) Inut is a subdivision S of comlexity n, say, number of edges. uild a data structure on S so that for a uery oint

More information

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

An Approach to Optimizations Links Utilization in MPLS Networks

An Approach to Optimizations Links Utilization in MPLS Networks An Aroach to Otimizations Utilization in MPLS Networks M.K Huerta X. Hesselbach R.Fabregat Deartment of Telematics Engineering. Technical University of Catalonia. Jori Girona -. Camus Nor, Eif C, UPC.

More information

An Investigation on LTE Mobility Management

An Investigation on LTE Mobility Management An Investigation on LTE Mobility Management Ren-Huang Liou, Yi-Bing Lin, Fellow, IEEE, and Shang-Chih Tsai Deartment of Comuter Science National Chiao Tung University {rhliou, liny, tsaisc}@csnctuedutw

More information

STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND

STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND Giorgio Sciascia *, Sandro Scalise *, Harald Ernst * and Rodolfo Mura + * DLR (German Aerosace Centre) Institute for Communications

More information

Storage Basics Architecting the Storage Supplemental Handout

Storage Basics Architecting the Storage Supplemental Handout Storage Basics Architecting the Storage Sulemental Handout INTRODUCTION With digital data growing at an exonential rate it has become a requirement for the modern business to store data and analyze it

More information

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS Liviu Grigore Comuter Science Deartment University of Illinois at Chicago Chicago, IL, 60607 lgrigore@cs.uic.edu Ugo Buy Comuter Science

More information

Failure Behavior Analysis for Reliable Distributed Embedded Systems

Failure Behavior Analysis for Reliable Distributed Embedded Systems Failure Behavior Analysis for Reliable Distributed Embedded Systems Mario Tra, Bernd Schürmann, Torsten Tetteroo {tra schuerma tetteroo}@informatik.uni-kl.de Deartment of Comuter Science, University of

More information

Red vs. Blue - Aneue of TCP congestion Control Model

Red vs. Blue - Aneue of TCP congestion Control Model In IEEE INFOCOM 2 A Study of Active Queue Management for Congestion Control Victor Firoiu Marty Borden 1 vfiroiu@nortelnetworks.com mborden@tollbridgetech.com Nortel Networks TollBridge Technologies 6

More information

Proposition of a new approach to adapt SIP protocol to Ad hoc Networks

Proposition of a new approach to adapt SIP protocol to Ad hoc Networks , pp.133-148 http://dx.doi.org/10.14257/ijseia.2014.8.7,11 Proposition of a new approach to adapt SIP protocol to Ad hoc Networks I. Mourtaji, M. Bouhorma, M. Benahmed and A. Bouhdir Computer and Communication

More information

Project Management and. Scheduling CHAPTER CONTENTS

Project Management and. Scheduling CHAPTER CONTENTS 6 Proect Management and Scheduling HAPTER ONTENTS 6.1 Introduction 6.2 Planning the Proect 6.3 Executing the Proect 6.7.1 Monitor 6.7.2 ontrol 6.7.3 losing 6.4 Proect Scheduling 6.5 ritical Path Method

More information

Saturation Throughput in a Heterogeneous Multi-channel Cognitive Radio Network

Saturation Throughput in a Heterogeneous Multi-channel Cognitive Radio Network Saturation Throughut in a Heterogeneous Multi-channel Cognitive Radio Network Vicent Pla, Stijn De Vuyst, Koen De Turck, Elena Bernal-Mor, Jorge Martinez-Bauset and Sabine Wittevrongel ITACA research institute,

More information

FIArch Workshop. Towards Future Internet Architecture. Brussels 22 nd February 2012

FIArch Workshop. Towards Future Internet Architecture. Brussels 22 nd February 2012 FIrch Worksho Brussels 22 nd February 2012 Towards Future Internet rchitecture lex Galis University College London a.galis@ee.ucl.ac.uk www.ee.ucl.ac.uk/~agalis FIrch Worksho Brussels 22 nd February 2012

More information

The impact of metadata implementation on webpage visibility in search engine results (Part II) q

The impact of metadata implementation on webpage visibility in search engine results (Part II) q Information Processing and Management 41 (2005) 691 715 www.elsevier.com/locate/inforoman The imact of metadata imlementation on webage visibility in search engine results (Part II) q Jin Zhang *, Alexandra

More information

A Novel Architecture Style: Diffused Cloud for Virtual Computing Lab

A Novel Architecture Style: Diffused Cloud for Virtual Computing Lab A Novel Architecture Style: Diffused Cloud for Virtual Comuting Lab Deven N. Shah Professor Terna College of Engg. & Technology Nerul, Mumbai Suhada Bhingarar Assistant Professor MIT College of Engg. Paud

More information

Machine Learning with Operational Costs

Machine Learning with Operational Costs Journal of Machine Learning Research 14 (2013) 1989-2028 Submitted 12/11; Revised 8/12; Published 7/13 Machine Learning with Oerational Costs Theja Tulabandhula Deartment of Electrical Engineering and

More information

An effective multi-objective approach to prioritisation of sewer pipe inspection

An effective multi-objective approach to prioritisation of sewer pipe inspection An effective multi-objective aroach to rioritisation of sewer ie insection L. Berardi 1 *, O.Giustolisi 1, D.A. Savic 2 and Z. Kaelan 2 1 Technical University of Bari, Civil and Environmental Engineering

More information

TRANSMISSION Control Protocol (TCP) has been widely. On Parameter Tuning of Data Transfer Protocol GridFTP for Wide-Area Networks

TRANSMISSION Control Protocol (TCP) has been widely. On Parameter Tuning of Data Transfer Protocol GridFTP for Wide-Area Networks On Parameter Tuning of Data Transfer Protocol GridFTP for Wide-Area etworks Takeshi Ito, Hiroyuki Ohsaki, and Makoto Imase Abstract In wide-area Grid comuting, geograhically distributed comutational resources

More information

Monitoring Frequency of Change By Li Qin

Monitoring Frequency of Change By Li Qin Monitoring Frequency of Change By Li Qin Abstract Control charts are widely used in rocess monitoring roblems. This aer gives a brief review of control charts for monitoring a roortion and some initial

More information

F inding the optimal, or value-maximizing, capital

F inding the optimal, or value-maximizing, capital Estimating Risk-Adjusted Costs of Financial Distress by Heitor Almeida, University of Illinois at Urbana-Chamaign, and Thomas Philion, New York University 1 F inding the otimal, or value-maximizing, caital

More information

The Magnus-Derek Game

The Magnus-Derek Game The Magnus-Derek Game Z. Nedev S. Muthukrishnan Abstract We introduce a new combinatorial game between two layers: Magnus and Derek. Initially, a token is laced at osition 0 on a round table with n ositions.

More information

Two-resource stochastic capacity planning employing a Bayesian methodology

Two-resource stochastic capacity planning employing a Bayesian methodology Journal of the Oerational Research Society (23) 54, 1198 128 r 23 Oerational Research Society Ltd. All rights reserved. 16-5682/3 $25. www.algrave-journals.com/jors Two-resource stochastic caacity lanning

More information

The fast Fourier transform method for the valuation of European style options in-the-money (ITM), at-the-money (ATM) and out-of-the-money (OTM)

The fast Fourier transform method for the valuation of European style options in-the-money (ITM), at-the-money (ATM) and out-of-the-money (OTM) Comutational and Alied Mathematics Journal 15; 1(1: 1-6 Published online January, 15 (htt://www.aascit.org/ournal/cam he fast Fourier transform method for the valuation of Euroean style otions in-the-money

More information

Concurrent Program Synthesis Based on Supervisory Control

Concurrent Program Synthesis Based on Supervisory Control 010 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 30-July 0, 010 ThB07.5 Concurrent Program Synthesis Based on Suervisory Control Marian V. Iordache and Panos J. Antsaklis Abstract

More information

A Novel Pathway for Portability of Networks and Handing-on between Networks

A Novel Pathway for Portability of Networks and Handing-on between Networks A Novel Pathway for Portability of Networks and Handing-on between Networks D. S. Dayana #1, S. R. Surya #2 Department of Computer Applications, SRM University, Chennai, India 1 dayanads@rediffmail.com

More information

Branch-and-Price for Service Network Design with Asset Management Constraints

Branch-and-Price for Service Network Design with Asset Management Constraints Branch-and-Price for Servicee Network Design with Asset Management Constraints Jardar Andersen Roar Grønhaug Mariellee Christiansen Teodor Gabriel Crainic December 2007 CIRRELT-2007-55 Branch-and-Price

More information

MetroNet6 - Homeland Security IPv6 R&D over Wireless

MetroNet6 - Homeland Security IPv6 R&D over Wireless MetroNet6 - Homeland Security IPv6 R&D over Wireless By: George Usi, President, Sacramento Technology Group and Project Manager, California IPv6 Task Force gusi@sactechgroup.com Acknowledgement Reference:

More information

Mobile SCTP Transport Layer Mobility Management for the Internet

Mobile SCTP Transport Layer Mobility Management for the Internet Mobile SCTP Transport Layer Mobility Management for the Maximilian Riegel Siemens AG, Munich, Germany E-mail: maximilian.riegel@icn.siemens.de Dr. Michael Tüxen Siemens AG, Munich, Germany E-mail: michael.tuexen@icn.siemens.de

More information

Receiver Buffer Requirement for Video Streaming over TCP

Receiver Buffer Requirement for Video Streaming over TCP Receiver Buffer Requirement for Video Streaming over TCP Taehyun Kim a and Mostafa H. Ammar b a Wireless and Mobile Systems Grou, Freescale Semiconductor, Austin, TX 7735, USA E-mail: taehyun.kim@freescale.com

More information

Stochastic Derivation of an Integral Equation for Probability Generating Functions

Stochastic Derivation of an Integral Equation for Probability Generating Functions Journal of Informatics and Mathematical Sciences Volume 5 (2013), Number 3,. 157 163 RGN Publications htt://www.rgnublications.com Stochastic Derivation of an Integral Equation for Probability Generating

More information

Managing specific risk in property portfolios

Managing specific risk in property portfolios Managing secific risk in roerty ortfolios Andrew Baum, PhD University of Reading, UK Peter Struemell OPC, London, UK Contact author: Andrew Baum Deartment of Real Estate and Planning University of Reading

More information

CABRS CELLULAR AUTOMATON BASED MRI BRAIN SEGMENTATION

CABRS CELLULAR AUTOMATON BASED MRI BRAIN SEGMENTATION XI Conference "Medical Informatics & Technologies" - 2006 Rafał Henryk KARTASZYŃSKI *, Paweł MIKOŁAJCZAK ** MRI brain segmentation, CT tissue segmentation, Cellular Automaton, image rocessing, medical

More information

A Method to Segment a 3D Surface Point Cloud for Selective Sensing in Robotic Exploration

A Method to Segment a 3D Surface Point Cloud for Selective Sensing in Robotic Exploration A Method to Segment a 3D Surface Point Cloud for Selectie Sensing in Robotic Exloration Philli Curtis, Pierre Payeur School of Information Technology and Engineering Uniersity of Ottawa Ottawa, O, Canada

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

NUTSS: A SIP-based Approach to UDP and TCP Network Connectivity

NUTSS: A SIP-based Approach to UDP and TCP Network Connectivity NUTSS: A SIP-based Aroach to UDP and TCP Network Connectivity Saikat Guha Det. of Comuter Science Cornell University Ithaca, NY 14853 saikat@cs.cornell.edu Yutaka Takeda Panasonic Communications San Diego,

More information

Multistage Human Resource Allocation for Software Development by Multiobjective Genetic Algorithm

Multistage Human Resource Allocation for Software Development by Multiobjective Genetic Algorithm The Oen Alied Mathematics Journal, 2008, 2, 95-03 95 Oen Access Multistage Human Resource Allocation for Software Develoment by Multiobjective Genetic Algorithm Feng Wen a,b and Chi-Ming Lin*,a,c a Graduate

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Optimal Routing and Scheduling in Transportation: Using Genetic Algorithm to Solve Difficult Optimization Problems

Optimal Routing and Scheduling in Transportation: Using Genetic Algorithm to Solve Difficult Optimization Problems By Partha Chakroborty Brics "The roblem of designing a good or efficient route set (or route network) for a transit system is a difficult otimization roblem which does not lend itself readily to mathematical

More information

On Traffic Fairness in Data Center Fabrics

On Traffic Fairness in Data Center Fabrics On Traffic Fairness in Data Center Fabrics Dallal Belabed, Stefano Secci, Guy Pujolle, Dee Medhi Sorbonne Universities, UPMC Univ Paris 6, UMR 766, LIP6, F-755, Paris, France. Email: firstname.lastname@umc.fr

More information

An Efficient Method for Improving Backfill Job Scheduling Algorithm in Cluster Computing Systems

An Efficient Method for Improving Backfill Job Scheduling Algorithm in Cluster Computing Systems The International ournal of Soft Comuting and Software Engineering [SCSE], Vol., No., Secial Issue: The Proceeding of International Conference on Soft Comuting and Software Engineering 0 [SCSE ], San Francisco

More information

Secure synthesis and activation of protocol translation agents

Secure synthesis and activation of protocol translation agents Home Search Collections Journals About Contact us My IOPscience Secure synthesis and activation of rotocol translation agents This content has been downloaded from IOPscience. Please scroll down to see

More information

Enhanced Security Key Management Scheme for MANETS

Enhanced Security Key Management Scheme for MANETS Enhanced Security Key Management Scheme for MANETS EDNA ELIZABETH.N, SUBASREE.S, and S.RADHA Electronics and Communication Engineering Deartment Sri Sivasubramaniya Nadar College of Engineering Kalavakkam,

More information

From Simulation to Experiment: A Case Study on Multiprocessor Task Scheduling

From Simulation to Experiment: A Case Study on Multiprocessor Task Scheduling From to Exeriment: A Case Study on Multirocessor Task Scheduling Sascha Hunold CNRS / LIG Laboratory Grenoble, France sascha.hunold@imag.fr Henri Casanova Det. of Information and Comuter Sciences University

More information

Effect Sizes Based on Means

Effect Sizes Based on Means CHAPTER 4 Effect Sizes Based on Means Introduction Raw (unstardized) mean difference D Stardized mean difference, d g Resonse ratios INTRODUCTION When the studies reort means stard deviations, the referred

More information

Softmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting

Softmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting Journal of Data Science 12(2014),563-574 Softmax Model as Generalization uon Logistic Discrimination Suffers from Overfitting F. Mohammadi Basatini 1 and Rahim Chiniardaz 2 1 Deartment of Statistics, Shoushtar

More information

Pressure Drop in Air Piping Systems Series of Technical White Papers from Ohio Medical Corporation

Pressure Drop in Air Piping Systems Series of Technical White Papers from Ohio Medical Corporation Pressure Dro in Air Piing Systems Series of Technical White Paers from Ohio Medical Cororation Ohio Medical Cororation Lakeside Drive Gurnee, IL 600 Phone: (800) 448-0770 Fax: (847) 855-604 info@ohiomedical.com

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singaore. Title Automatic Robot Taing: Auto-Path Planning and Maniulation Author(s) Citation Yuan, Qilong; Lembono, Teguh

More information

Alpha Channel Estimation in High Resolution Images and Image Sequences

Alpha Channel Estimation in High Resolution Images and Image Sequences In IEEE Comuter Society Conference on Comuter Vision and Pattern Recognition (CVPR 2001), Volume I, ages 1063 68, auai Hawaii, 11th 13th Dec 2001 Alha Channel Estimation in High Resolution Images and Image

More information

Forensic Science International

Forensic Science International Forensic Science International 214 (2012) 33 43 Contents lists available at ScienceDirect Forensic Science International jou r nal h o me age: w ww.els evier.co m/lo c ate/fo r sc iin t A robust detection

More information

Drinking water systems are vulnerable to

Drinking water systems are vulnerable to 34 UNIVERSITIES COUNCIL ON WATER RESOURCES ISSUE 129 PAGES 34-4 OCTOBER 24 Use of Systems Analysis to Assess and Minimize Water Security Risks James Uber Regan Murray and Robert Janke U. S. Environmental

More information

Risk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7

Risk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7 Chater 7 Risk and Return LEARNING OBJECTIVES After studying this chater you should be able to: e r t u i o a s d f understand how return and risk are defined and measured understand the concet of risk

More information

Risk in Revenue Management and Dynamic Pricing

Risk in Revenue Management and Dynamic Pricing OPERATIONS RESEARCH Vol. 56, No. 2, March Aril 2008,. 326 343 issn 0030-364X eissn 1526-5463 08 5602 0326 informs doi 10.1287/ore.1070.0438 2008 INFORMS Risk in Revenue Management and Dynamic Pricing Yuri

More information

Compensating Fund Managers for Risk-Adjusted Performance

Compensating Fund Managers for Risk-Adjusted Performance Comensating Fund Managers for Risk-Adjusted Performance Thomas S. Coleman Æquilibrium Investments, Ltd. Laurence B. Siegel The Ford Foundation Journal of Alternative Investments Winter 1999 In contrast

More information

Principles of Hydrology. Hydrograph components include rising limb, recession limb, peak, direct runoff, and baseflow.

Principles of Hydrology. Hydrograph components include rising limb, recession limb, peak, direct runoff, and baseflow. Princiles of Hydrology Unit Hydrograh Runoff hydrograh usually consists of a fairly regular lower ortion that changes slowly throughout the year and a raidly fluctuating comonent that reresents the immediate

More information

Learning Human Behavior from Analyzing Activities in Virtual Environments

Learning Human Behavior from Analyzing Activities in Virtual Environments Learning Human Behavior from Analyzing Activities in Virtual Environments C. BAUCKHAGE 1, B. GORMAN 2, C. THURAU 3 & M. HUMPHRYS 2 1) Deutsche Telekom Laboratories, Berlin, Germany 2) Dublin City University,

More information

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418 An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. Vijay9908914010@gmail.com

More information

A Link-state QoS Routing Protocol for Ad Hoc Networks

A Link-state QoS Routing Protocol for Ad Hoc Networks A Link-state QoS Routing Protocol for Ad Hoc Networks Anelise Munaretto 1 Hakim Badis 2 Khaldoun Al Agha 2 Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 8, rue du Capitaine Scott, 75015, Paris,

More information

Methods for Estimating Kidney Disease Stage Transition Probabilities Using Electronic Medical Records

Methods for Estimating Kidney Disease Stage Transition Probabilities Using Electronic Medical Records (Generating Evidence & Methods to imrove atient outcomes) Volume 1 Issue 3 Methods for CER, PCOR, and QI Using EHR Data in a Learning Health System Article 6 12-1-2013 Methods for Estimating Kidney Disease

More information

Rummage Web Server Tuning Evaluation through Benchmark

Rummage Web Server Tuning Evaluation through Benchmark IJCSNS International Journal of Comuter Science and Network Security, VOL.7 No.9, Setember 27 13 Rummage Web Server Tuning Evaluation through Benchmark (Case study: CLICK, and TIME Parameter) Hiyam S.

More information

The Economics of the Cloud: Price Competition and Congestion

The Economics of the Cloud: Price Competition and Congestion Submitted to Oerations Research manuscrit The Economics of the Cloud: Price Cometition and Congestion Jonatha Anselmi Basque Center for Alied Mathematics, jonatha.anselmi@gmail.com Danilo Ardagna Di. di

More information

EECS 122: Introduction to Communication Networks Homework 3 Solutions

EECS 122: Introduction to Communication Networks Homework 3 Solutions EECS 22: Introduction to Communication Networks Homework 3 Solutions Solution. a) We find out that one-layer subnetting does not work: indeed, 3 deartments need 5000 host addresses, so we need 3 bits (2

More information

Computational Finance The Martingale Measure and Pricing of Derivatives

Computational Finance The Martingale Measure and Pricing of Derivatives 1 The Martingale Measure 1 Comutational Finance The Martingale Measure and Pricing of Derivatives 1 The Martingale Measure The Martingale measure or the Risk Neutral robabilities are a fundamental concet

More information

Penalty Interest Rates, Universal Default, and the Common Pool Problem of Credit Card Debt

Penalty Interest Rates, Universal Default, and the Common Pool Problem of Credit Card Debt Penalty Interest Rates, Universal Default, and the Common Pool Problem of Credit Card Debt Lawrence M. Ausubel and Amanda E. Dawsey * February 2009 Preliminary and Incomlete Introduction It is now reasonably

More information

A Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations

A Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations A Simle Model of Pricing, Markus and Market Power Under Demand Fluctuations Stanley S. Reynolds Deartment of Economics; University of Arizona; Tucson, AZ 85721 Bart J. Wilson Economic Science Laboratory;

More information

A Modified Measure of Covert Network Performance

A Modified Measure of Covert Network Performance A Modified Measure of Covert Network Performance LYNNE L DOTY Marist College Deartment of Mathematics Poughkeesie, NY UNITED STATES lynnedoty@maristedu Abstract: In a covert network the need for secrecy

More information

Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE

Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Develoment FRANCE Synosys There is no doubt left about the benefit of electrication and subsequently

More information