Does Full-Duplex Double the Capacity of Wireless Networks?

Size: px
Start display at page:

Download "Does Full-Duplex Double the Capacity of Wireless Networks?"

Transcription

1 Does Full-Duplex Double the Capacity of Wieless Netwoks? Xiufeng Xie and Xinyu Zhang Univesity of Wisconsin-Madison {xiufeng, Abstact Full-duplex has emeged as a new communication paadigm and is anticipated to double wieless capacity. Existing studies of full-duplex mainly focused on its PHY laye design, which enables bidiectional tansmission between a single pai of nodes. In this pape, we establish an analytical famewok to quantify the netwok-level capacity gain of full-duplex ove halfduplex. Ou analysis eveals that inte-link intefeence and spatial euse substantially educes full-duplex gain, endeing it well below in common cases. Moe emakably, the asymptotic gain appoaches when intefeence ange appoaches tansmission ange. Though a compaison between optimal half- and fullduplex MAC algoithms, we find that full-duplex s gain is futhe educed when it is applied to CSMA based wieless netwoks. Ou analysis povides impotant guidelines fo designing full-duplex netwoks. In paticula, netwok-level mechanisms such as spatial euse and asynchonous contention must be caefully addessed in full-duplex based potocols, in ode to tanslate full-duplex s PHY laye capacity gain into netwok thoughput impovement. I. INTRODUCTION Wieless netwoks have commonly been built on half-duplex adios. A wieless node cannot tansmit and eceive simultaneously, because the intefeence geneated by outgoing signals can easily ovewhelm the incoming signals that ae much weake, so called self-intefeence effect. Yet ecent advances in communications technologies showed the feasibility of canceling such self-intefeence, thus ealizing full-duplex adios that can tansmit and eceive packets simultaneously. Substantial eseach effot has focused on designing full-duplex adios by combining RF and baseband intefeence cancellation [], [], enabling bi-diectional tansmission between a single pai of nodes. Full-duplex technology is thus anticipated to double wieless capacity without adding exta adios [], [3], [4]. In pactice, howeve, wieless netwoks ae moe sophisticated than a single-link. Real-wold wieless netwoks, such as wieless LANs and mesh netwoks, ae distibuted in natue, involving multiple contention domains ove lage aeas, thus entangling both self-intefeence and inte-link intefeence. Hence, one may aise an impotant question: Does full-duplex double the capacity of such distibuted wieless netwoks? This pape establishes a compehensive analytical famewok to quantify the benefits of full-duplex wieless netwoks. Contay to widely held beliefs, the analysis leads to a igoous but negative answe: full-duplex adios cannot double netwok capacity, even if assuming pefect self-intefeence cancellation. The key intuition behind this esult lies in the spatial euse and asynchonous contention effects in wieless netwoks. Fist and foemost, thee exists a fundamental tadeoff between spatial euse and the full-duplex gain. Full-duplex allows a eceive to send packets concuently, but this exta sende expands the intefeence egion, which would have been eused even by a half-duplex adio. Conside the two-cell WLAN in Fig. (a). With half-duplex adios, link TX RX and TX RX do not conflict and can be activated concuently. Wheeas full-duplex enables RX to tansmit simultaneously TX TX Half-duplex netwok RX Full-duplex netwok RX RX RX TX TX (a) (b) Fig.. Spatial euse and asynchonous contention offsets full-duplex gain. Dotted cicles denote intefeence ange. Potocol model [5] is assumed. with TX, it suppesses both TX (whose eceive RX is intefeed by RX) and RX (who intefees with eceive RX). Hence, supisingly, full-duplex esults in the same netwok capacity as half-duplex in such cases. Second, to avoid collisions, distibuted wieless netwoks commonly adopt CSMA algoithms that ae inheently asynchonous and cannot guaantee a pai of tansceives can access the channel simultaneously to enable full-duplex tansmission. As exemplified in Fig. (b), two vetices of a link may belong to diffeent contention domains involving independent contendes. When TX gains channel access and stats tansmission, RX may be still in a long backoff stage (as it contends with moe intefees) and needs to wait fo its tun to tansmit. So, how will these two factos manifest and affect the capacity of lage-scale full-duplex wieless netwoks? Assuming the potocol model [5] fo channel access, we fist analyze the spatial euse in -D andom netwoks and deive the exact capacity gain of full-duplex ove half-duplex netwoks, as a function of, a paamete that govens spatial euse and eflects the diffeence between intefeence ange and tansmission ange. Then, assuming an oacle, synchonized schedule, we extend the analysis to -D netwoks to obtain an uppebound fo the full-duplex capacity gain. Ou analysis establishes novel models (e.g., full-duplex exclusive egion) that fundamentally diffe fom those in capacity modeling of half-duplex netwoks. The analysis poves that unde typical settings, e.g., =, the capacity gain is only.33 in -D netwoks and bounded by.58 in -D netwoks. The asymptotic gain appoaches.8 (i.e., full-duplex impoves capacity by only 8%) as 0. Futhemoe, we elax the assumption of oacle schedule with a distibuted, asynchonous MAC algoithm that allows a pai of full-duplex tansceives to contend fo channel access and tansmit packets independently, as if no mutual intefeence exists. Paametes of the algoithm ae contolled by a utility-maximization famewok, which can achieve optimal thoughput with popotional fainess guaantee. We compae the capacity of this full-duplex MAC with the coesponding utility-optimal half-duplex MAC [6]. Simulation esults show that asynchonous contention futhe educes the chance of fullduplex tansmission in CSMA netwoks. Ou analysis and simulation implies that it is non-tivial to tanslate full-duplex PHY-laye capacity gain to netwoklevel thoughput gain. Taditional CSMA-style MAC is no RX TX

2 (a) Space eusable by othe TX Reusable by othe RX Uneusable by othe TX/RX (b) Fig.. Full-duplex tansmission modes: (a) bidiectional tansmission and (b) womhole elaying. longe the optimal solution fo full-duplex adios due to the spatial euse and asynchonous contention poblems. Netwok designes need to einvent the medium access potocols to fully exploit the potential of full-duplex communications. The emainde of this pape is stuctued as follows. Sec. II intoduces the backgound, model and motivation behind ou analysis. Sec. III analyzes the capacity gain of full-duplex ove half-duplex netwoks. Then, Sec. IV quantifies the asynchonous contention effect in full-duplex CSMA netwoks. Sec. V discusses elated wok and Sec. VI concludes the pape. A. Netwok model II. BACKGROUND AND MOTIVATION In this section, we pesent the essential models and assumptions undelying ou analytical famewok. Full-duplex communications. A full-duplex adio can tansmit and eceive diffeent packets at the same time. Its intefeencecancellation hadwae and baseband signal pocessos can effectively isolate the intefeence fom tansmitted signals to eceived ones. In pactice, pefect isolation is infeasible due to RF leakage. Even with sophisticated hadwae, a full-duplex link can achieve aound.84 capacity gain compaed with a half-duplex link []. In this pape, howeve, we will assume pefect full-duplex adios to isolate the PHY-laye atifacts, and focus on the netwok-level capacity gain instead. Fom a netwok pespective, full duplex links can opeate in two modes []. Bidiectional tansmission mode (Fig. (a)) allows a pai of nodes to tansmit packets to each othe simultaneously. It is applicable to WLANs with uplink/downlink taffic, o multi-hop netwoks with bidiectional flows. Womhole elaying mode (Fig. (b)) enables a eceiving node to fowad packets to anothe node simultaneously, thus acceleating data tanspotation in multi-hop wieless netwoks. Altenatively, full-duplex adios can send busy-tones while eceiving, thus peventing hidden teminals []. Such schemes undeutilize the capacity as the busy-tone contains no data, and thus they ae beyond the scope of this pape. Topology and intefeence model. We conside ad-hoc netwoks whee nodes ae andom unifomly distibuted in a egion of fixed aea, which can be a unit line segment in one dimension, o a unit squae in two dimensions. We extend the widely adopted potocol model [5] to epesent the adjacent link intefeence in full-duplex netwoks. Denote X i as the location of node i. Any tansmission fom node i to j can be successful iff X i X j, and k j, X k X j > ( + ). Hee and ( + ) ae the tansmission ange and intefeence ange, espectively. In multi-hop netwoks, to ensue end-toend connectivity between any two nodes, is a function of n, the numbe of nodes in the netwok, and must satisfy log n = Θ( n ) [5]. (a) (b) Fig. 3. Spatial euse in (a) half-duplex and (b) full-duplex netwoks. Dotted lines denote intefeence ange. B. Factos affecting the full-duplex gain Wheeas full-duplex has the potential to double the capacity of a single pai of nodes, we identify the following netwoklevel factos which degade the capacity gain when multiple contending links ae entangled. Spatial euse. Full-duplex allows a eceive to become an active tansmitte simultaneously, but this ceates moe intefeence and expands the effective spatial occupation of a pai of nodes, compaed with a half-duplex link. As shown in Fig. 3(a), fo a half-duplex link, the eceive is passive and anothe eceive of a neaby link can be placed close to it without mutual intefeence. Similaly, tansmittes of two links can be placed close by. Hence, within the union of the tansmitte and eceive s intefeence ange, thee exists a sizable faction of space that can be eused by nodes of othe links. In contast, if full-duplex adios ae employed and evey node is a tansmitte and eceive, then no space is eusable by othe nodes (Fig. 3(b)). In othe wods, fullduplex cannot double the numbe of concuent tansmissions in a netwok. Theefoe, despite the doubling of single-link capacity, full-duplex sacifices spatial euse and consequently, may not double the netwok-wide capacity. Asynchonous contention. Wieless LANs and multi-hop netwoks commonly adopt the asynchonous CSMA based contention algoithms. Two vetices of a link ae sepaated in space, and may be contending with diffeent set of neighbos. Hence, they may have diffeent channel status (idle/busy) at any time instance. Tansitions between channel status ae also inheently asynchonous due to unpedictable dynamics in each neighbohood. Even when both ae idle, the two nodes cannot tansmit immediately they must espect the CSMA backoff mechanism and wait fo thei backoff countes to expie in ode to avoid collision. And again, the backoff countes ae asynchonous a node with moe contendes tends to have a lage backoff counte, and needs to wait fo a longe idle peiod befoe tansmission. Howeve, to maximize the full-duplex gain, a pai of nodes must be able to synchonize thei tansmissions, i.e., ensuing both channels ae idle and backoff countes fie at the same time. Yet such synchonization equies both nodes to be awae of each othe s channel status in each time slot, which is infeasible in pactice. Theefoe, when applied to eal-wold CSMA netwoks, full-duplex adios need to inevitably espect the asynchonous contention, which educes the chance of fullduplex tansmissions and the capacity gain. Othe factos. Diffeent tansmission modes may affect fullduplex gain diffeently, as exemplified in Fig.. Assume = 0, i.e., intefeence ange equals tansmission ange. When womhole elaying is applied fo a single linea flow, the nomalized end-to-end thoughput can be (fo evey 4 hops, thee can be tansmittes), in contast to 3 fo half-duplex

3 3 nodes. Hence, womhole elaying leads to a capacity gain of.5. On the othe hand, bidiectional tansmission mode can be applied to bi-diectional flows, inceasing the capacity to 3, potentially doubling the capacity of two linea flows. The case is diffeent when vaies and changes the spatial euse accodingly. Fo instance, if =, womhole elaying becomes infeasible as the fist tansmitte intefees the second tansmitte s eceive, although bidiectional tansmission still helps in impoving end-to-end thoughput of multiple flows. Theefoe, both the tansmission mode and intefeence ange paamete have significant impacts on the full-duplex gain. In what follows, we igoously analyze the capacity gain of full-duplex ove half-duplex netwoks by incopoating the above factos. Sec. III bounds the capacity gain assuming synchonized full-duplex tansmissions. Sec. IV futhe elaxes the assumption with an asynchonous channel contention model. III. FULL-DUPLEX GAIN: ASYMPTOTIC ANALYSIS In this section, we chaacteize the asymptotic capacity gain of full-duplex ove half-duplex ad hoc netwoks, as the numbe of nodes n. Each node is a souce node and its destination is andomly chosen. Netwok capacity λ is conventionally defined as the maximum data ate that can be suppoted between evey souce destination pai [5]. Let D denote the aveage distance between a souce node and its destination, d the aveage distance of a hop, then the aveage numbe of hops in each end-to-end flow is D/d, and each flow equies a MAC-laye thoughput of λd/d. Since thee ae n flows in this netwok, total demand fo MAC-laye thoughput is nλd/d. Let N(d) denote the maximum numbe of simultaneous tansmission links. It is a function of hop distance d, which affects the spatial euse between links. Suppose the data ate of any tansmission link is W, then the maximum suppotable MAC-laye thoughput is W N(d). The demand fo MAC-laye thoughput cannot exceed the suppotable amount, thus: A. -D Chain Netwok λ = W nd max (dn(d)) () 0<d In this section, we fist deive tight capacity bounds fo onedimensional full-duplex and half-duplex netwoks in Lemma and Lemma, espectively. Then we chaacteize the fullduplex capacity gain in Theoem. Simila to the model in [7], we assume all nodes ae unifomly and andomly distibuted within a -D netwok of unit length. Then we patition the unit length egion into a set log (n) n of bins. Length of each bin is l(n) = K, K is chosen to ensue that tansmission ange l(n), so that a node in one bin can always each any node in an adjacent bin. As poved in [8], as n, thee is at least one node in each bin with high pobability. Lemma The pe-flow capacity of a -D full-duplex andom netwok is λ F = W nd + Poof: We teat the two full-duplex modes sepaately. () (i) Bidiectional tansmission mode. Conside a full-duplex bidiectional tansmission pai A B with link distance d. As shown in Fig. 4, to avoid intefeence, the distance between A and the ight-most node of any tansmission pai left to A B must be lage than ( + ). d ( ) A d B ( ) ( ) d Fig. 4. Exclusive egion fo -D bidiectional tansmission mode. Theefoe, each tansmission pai must at least occupy a line segment of length ( + ) + d. By dividing the netwok size (unit length) by this minimum length, maximum numbe of simultaneous tansmission pais is uppe bounded by (+ )+d. In bidiectional mode, each tansmission pai can suppot data ate of W. Combining Eq. (), we have the uppebound of pe-flow capacity in bidiectional mode: λ B W nd max (3) 0<d ( + ) + d Fom Eq. (3), we obseve that when d =, the netwok has the maximum thoughput, which means the uppebound has the same fom as Eq. () in Lemma. Fo the capacity lowebound, we constuctively schedule flows following the schedule patten in Fig.4. Note that it is a andom netwok, and distance between any two nodes will toleate a small distubance of twice the bin size. Thus each tansmission will tavel a distance in the inteval of [ l, ], and the distance between two adjacent tansmission pais should be in the inteval of [( + ) l, ( + )]. Simila to [7], in ode to make the distubance negligible, we can choose a pope bin size l(n) which ensues tansmission ange l(n), let K = /l(n), K should be a lage constant, then the lowebound becomes: λ B W ( K ) nd ( + ) + ( K ) W nd + Since this constuctive lowebound equals the uppebound, we have the pe-flow capacity in Lemma. (ii) Womhole elaying mode. A womhole elaying tiple A R B consists of 3 nodes: a half-duplex tansmitte A, a fullduplex elay node R, and a half-duplex eceive B. Conside two adjacent womhole elaying tiples A R B and A R B as shown in Fig. 5. The link distance of A R and R B equals d. To maximize spatial euse (i.e., packing the maximum numbe of links inside the unit length netwok), eceives B and B (o equivalently tansmittes A and A ) must be placed adjacent to each othe. In addition, the distance between elay R and eceive B must be lage than the intefeence ange ( + ). d ( ) A R d A B B R Fig. 5. Exclusive egion fo -D womhole elaying mode. Consequently, thee can be at most one tiple within any line segment of length ( + ) + d. Since each tiple contains two tansmission links, evey two links must occupy a line segment of minimum length ( + ) + d, which is the same as in the bidiectional tansmission mode. Then with a simila deivation

4 4 as above, we can obtain the same capacity uppebound and lowebound, which concludes the poof fo Lemma. We note that fo each womhole elaying tiple A R B, the distance between A and B must be lage than ( + ) to avoid intefeence, i.e., d > ( + ). As capacity is maximized when d =, this implies womhole elaying can achieve the same capacity as bidiectional tansmission only if 0 <, which is also the pactical ange fo [9]. Lemma The pe-flow capacity of a -D half-duplex andom netwok is λ H = W nd (4) + Poof: Fo half-duplex adios, the distance between RX and TX fom diffeent tansmission pais must be lage than ( + ). Theefoe, the minimum length of line segment occupied by each tansmission pai is L H = ( + ), as shown in Fig. 6. Fig. 6. T d R R T ( ) Exclusive egion fo a -D half-duplex netwok. Since each half-duplex tansmission pai only contains one tansmission link, the maximum numbe of tansmission links that can be accommodated in the unit length netwok is: (+ ). Combining with Eq. (), we have the capacity uppebound of the half-duplex scheme: λ H W nd max d (5) 0<d ( + ) When d =, λ H achieves its maximum, which leads to the uppebound fo Eq. (4) in Lemma. With a simila method as in the full-duplex case, we can constuct the half-duplex lowebound: λ H W K nd ( + ) W nd (6) + which, combined with the uppebound, leads to Lemma. Based on Lemma and Lemma, we can obtain the fullduplex capacity gain of a -D andom netwok. Theoem The full-duplex gain of a -D andom netwok is G = λ F = + λ H + = + (7) + Fig. 7. Full-Duplex Capacity Gain Full-duplex gain in -D andom netwoks. Implication: Fig. 7 plots the full-duplex gain unde vaying. When = 0, the asymptotic gain is, even though it can be lage than in cetain finite cases (Sec. II-B). The gain inceases with and appoaches as, when the entie netwok falls in one contention domain. Howeve, in the common case of 0, the gain is no lage than.33, fa fom doubling netwok capacity. B. Full-Duplex Gain in -D Netwoks In this section, we bound the full-duplex capacity gain by compaing capacity uppebound of full-duplex netwoks and lowebound of half-duplex netwoks. ) Exclusive egion fo full-duplex nodes: We extend the classic appoach [5] of deiving capacity uppebound to the fullduplex case. Netwok capacity is popotional to the numbe of simultaneous tansmission links that can be accommodated. Thus an uppebound can be obtained by dividing total netwok aea by a link s exclusive egion, the aea no othe active tansmitte o eceive can euse. We assume all links opeate in the bidiectional tansmission mode. A node is both TX and RX at the same time, hence the distance between any two nodes (except those belonging to the same bidiectional link) must be lage than intefeence ange ( + ). Based on this obsevation, we define the exclusive egion in Fig. 8, which is the union of two cicles with adius R = (+ ). Fig. 8. d ( ) R Exclusive egion fo a full-duplex bidiectional tansmission pai. Unde this definition, if two exclusive egions do not ovelap, the distance between thei nodes will be lage than (+ ) = R, i.e., they do not intefee with each othe. Convesely, if any two exclusive egions ovelap, the minimum distance between two nodes fom each egion will be smalle than ( + ), esulting in intefeence. Theefoe, the sufficient and necessay condition fo intefeence-fee tansmission in bidiectional mode is that no two exclusive egions ovelap. ) Capacity uppebound of -D full-duplex andom netwoks: Conside a -D andom netwok whee n full-duplex nodes ae distibuted unifomly within a unit squae. Its capacity uppebound can be chaacteized as follows: Theoem The pe-flow thoughput capacity λ F of -D fullduplex andom netwok is uppe bounded by W λ F < nd( + ) 4 π accos( + ) + + (+ ) fo lage n. Poof: Fist, we can deive the aea S F of the exclusive egion defined above, with R = (+ ) : S F = πr (R accos( d R ) d R ( d ) ) By dividing the netwok aea by S F, we can deive the uppebound of the maximum numbe of simultaneous tansmission pais. In the bidiectional tansmission mode, one tansmission pai contains two tansmission links, thus the maximum numbe of simultaneous tansmission links is N F = /S F. Then fom Eq. (), we can deive the uppebound of pe-flow capacity of -D full-duplex andom netwoks unde a given d: W ndr max 0<d ( d R π accos( d R ) + d R ) (8) ( d R )

5 5 Then we need to find the optimal value of d which leads to the maximum pe-flow thoughput λ F. Let x = d/r, C = W nd, and λ F = f(x): x f(x) = C π accos(x) + x (9) x The fist ode deivative of f(x) is: x+x ( x) x df(x) dx = C π accos(x) + (π accos(x) + x (0) x ) Since x = d/r, 0 < x <, we have df(x) dx > 0. Theefoe, f(x) is a monotonic inceasing function of x when 0 < x <. Because x = d/r and d, the netwok achieves maximum pe-flow thoughput when d =. With this obsevation and Eq. (8), we can obtain the netwok capacity in Theoem. Based on Theoem, combined with the connectivity equiement that = Θ( log(n)/n), we can obtain a capacity scaling law fo andom full-duplex netwoks: Coollay Fo a andom full-duplex netwok, λ F (n) = O(/ n log(n)) as n This implies that full-duplex may impove netwok capacity by at most a multiplication facto. Its asymptotic capacity emains the same as that of a half-duplex netwok [5]. 3) Full-duplex gain in -D egula netwoks: To make a fai compaison, ideally full-duplex should be evaluated against half-duplex capacity in the same topology. Howeve, the exact capacity of a -D andom netwok is always difficult to obtain. Theefoe we fist focus on a egula lattice netwok: nodes ae located at junction points, and the distance between adjacent junction points equals tansmission ange. With simila method fo the -D andom netwok, we can deive the fullduplex capacity uppebound fo -D lattice netwok: Lemma 3 The pe-flow thoughput capacity λ F of -D fullduplex egula lattice netwok is uppe bounded by λ F < W nd (+ ) (π accos (+ ) )+ + fo lage n. Poof: In a lattice netwok, the exclusive egion should contain a set of squae cells with side length. Given the necessay and sufficient condition fo intefeence-fee tansmission (Sec. III-B), we can find the aea of the exclusive egion SF R in such a netwok: SF R = S F. Since the link distance d can only be, we can deive the full-duplex uppebound fo lattice netwok similaly to the andom netwok case and obtain Lemma 3. In addition, we can obtain a lowebound of half-duplex peflow capacity in lattice netwoks by constucting an achievable schedule. Lemma 4 The pe-flow thoughput capacity λ H of -D halfduplex egula lattice netwok is lowe bounded by λ H > W nd max(, + )( + ) () fo lage n. Poof: A -D egula netwok is equivalent to multiple -D egula netwoks placed in paallel. To constuct a feasible schedule, we divide time into slots: even slots ae used to tansmit data hoizontally, and odd ones fo vetical tansmission. Thus all nodes in the netwok can be ensued the same chance to send data. Fig. 9 illustates a snapshot of the constucted schedule. d ( ) l ( ) Fig. 9. Half-duplex capacity lowebound. To avoid intefeence, the distance between paallel flows cannot be smalle than +. Meanwhile, in the lattice netwok, the distance between two nodes cannot be smalle. Theefoe the minimum distance between paallel flows should be max (, + ), and thee can be only one tansmission in each ectangle block of side lengths ( + ) and max (, + ), thus the space occupied by each tansmission link is: max(, S H = + )( + ) () By dividing the unit squae aea by aea of the space occupied by each tansmission link, we can obtain the suppotable numbe of simultaneous tansmission links: ( N H max(, + )( + ) ) (3) Fom Eqs. (3) and () we obtain the pe-flow capacity lowebound λ H of -D lattice netwok in Lemma 4. Finally, by compaing full-duplex capacity uppebound (Lemma 3) and half-duplex lowebound (Lemma 4), we can bound the full-duplex capacity gain fo -D lattice netwoks. Theoem 3 Fo a -D egula lattice netwok, full-duplex capacity gain of is uppe bounded by G L = λ F < max(, + )( + ) λ H (+ ) (π accos (+ ) )+ + This esult implies that the uppebound of full-duplex gain G L is detemined only by, and unelated to numbe of nodes n o tansmission ange. Fig. 0 plots the elationship between G L and. Fig. 0. Full-Duplex Capacity Gain Uppebound of full-duplex gain in -D lattice netwoks. Implication: In geneal, G L inceases with, because fo lage, the faction of space eusable by neighboing links

6 6 deceases in half-duplex netwoks (as illustated in Fig ), and thus full-duplex advantage is moe pominent. Howeve, G L is always below in the pactical ange of 0, which matches ou intuition in Sec. II. Note that the fluctuation of G L is caused by the ceiling functions in Theoem 3. In cetain cases, G L can fall below when the spatial euse effect ovewhelms the benefit of full-duplex tansmission. = 0 = ( + ) ( + ) Reusable space Reusable space Fig.. Fo half-duplex, with lage, a smalle faction of space can be eused by neighboing links. 4) Full-duplex gain in -D andom netwoks: In this section, we fist constuct a capacity lowebound fo -D half-duplex andom netwoks, and then compae it with the uppebound in Theoem in ode to bound the full-duplex capacity gain. Lemma 5 Fo lage n, the thoughput capacity λ H of -D half-duplex andom netwok is lowe bounded by W λ H nd( + ) (4) Poof: We can patition the netwok into egula cells (Fig. (a)), each being a squae with side length l(n) = log(n) K n, K >. As poved in [8], fo lage n with high pobability thee is at least one node in each cell. Then we can constuct a schedule by expanding the -D schedule in Lemma, as illustated in Fig. (b). We schedule nodes along a ow (o column) of cells. Multiple -D schedules ae placed paallelly, and the distance between them must be lage than ( + ). Time is slotted to schedule tansmissions along ows and columns, simila to the poof fo Lemma 4. ln ( ) Fig.. (a) Cell patition Paallel -D Schedule ( ) (b) Lowebound constuction Constucting a capacity lowebound fo -D andom netwoks. As nodes ae andom unifomly distibuted, the distance between paallel -D schedules has a small distubance of twice the side length of a cell, and falls in the ange of [( + ), ( + ) + l(n)]. In ode to cancel the small distubance caused by topology andomness, we can choose a lage tansmission ange = K l(n), whee K is a lage constant. Then the distubance is negligible, and the numbe of simultaneous paallel -D schedules is lowe bounded by: ( + )(n) + (n) K ( + )(n) (5) Combining Eq. (5) with the capacity of -D half-duplex netwok in Lemma, we can deive the capacity lowebound λ H in Lemma 4. Fom Lemma 5 we can also obseve that this constuctive lowebound follows the scaling law in [5]. By synthesizing Theoem and Lemma 5, we can easily pove: Theoem 4 The full-duplex capacity gain of a -D andom netwok is uppe bounded by G R = λ F 4 < λ H π accos( + ) + (6) + (+ ) fo lage n. Implication: Simila to egula netwoks, the uppebound of full-duplex gain in andom netwok depends on. Fig. 3 plots G R as vaies. Unde a typical setting of =, G R is only.58, and appoaches.8 as 0, i.e., tansmission ange appoaches intefeence ange. Note that in pactical wieless netwoks, can be vey close to 0, especially fo links with low bit-ate (and thus longe tansmission ange) [9]. Fig. 3. Full-Duplex Capacity Gain Uppebound of full-duplex gain in -D andom netwoks. IV. FULL-DUPLEX GAIN UNDER ASYNCHRONOUS CONTENTION In this section, we intoduce a full-duplex MAC that confoms to the asynchonous contention mechanism of pactical CSMA netwoks. We fist descibe the potocol opeations, and then build a distibuted optimization famewok that adapts the opeations to achieve optimal netwok thoughput. We will compae the capacity of this full-duplex MAC with an optimal half-duplex MAC. A. Full-duplex MAC: model and potocol The poposed full-duplex MAC etains pimitive opeations (e.g., caie sensing and backoff) of the widely-adopted 80. MAC, but with two featues specific to full-duplex: (i) While in eceiving mode, a eceive can continue sensing its channel status [0]. It maks a busy channel if the channel is occupied simultaneously by nodes othe than its own tansmitte. (ii) While in eceiving mode, a eceive can tansmit back to the sende if it senses an idle channel and finishes backoff. Hee we only conside the bidiectional tansmission mode. Fig. 4 illustates a typical channel contention pocedue fo the full-duplex MAC. As the tansmitte and eceive s MAC opeations cannot be synchonized, they need to contend fo channel access independently. Full-duplex oppotunity occus only when thei tansmissions ovelap. The contention pocedue is simila to 80. CSMA, except that each pai of tansmitte/eceive ae awae that they do not intefee with each othe. Specifically, befoe tansmission, a node needs to sense the channel fo a DIFS duation []. Afte sensing an

7 7 RX RX TX TX Fig. 4. sensing backoff tansmission backoff tansmission tansmission full-duplex oppotunity time Flow of opeations in full-duplex MAC. idle channel, it stats backoff and waits fo an additional idle duation of B time slots, with B andomly chosen fom [0, CW]. It feezes the backoff if the channel becomes busy again, and esumes othewise. Upon completing the backoff, it begins tansmission immediately. CW, the backoff window size, is eset to CW min upon each successful tansmission, and doubled upon failue until eaching a maximum value of CW max []. To ensue a fai compaison between half-duplex and fullduplex netwok capacity, we assume pefect caie sensing fo both, i.e., a tansmitte is awae of all othe tansmittes that can intefee with its eceive. This complies with the potocol model, which assumes no hidden teminal and exposed teminal poblems. In pactical half-duplex netwoks, hidden teminals can be significantly educed using the RTS/CTS message exchange befoe data tansmission [9]. Exposed teminal poblem can be solved appoximately by building a conflict gaph offline [], which specifies the intefeence elation between links. Simila mechanisms can be applied to full-duplex netwoks. To ealize RTS/CTS fo full-duplex bidiectional tansmission, an active tansmitte should be able to decode RTS equests fom the eceive. If the tansmitte is not disupted by stong intefees to the RX TX link, then it can tempoaily suspend its data tansmission, and feeds back a CTS packet to the RX instead. RX then stats tansmission and TX esumes its tansmission. To combat the exposed teminal, an offline conflict gaph can be used, similaly to half-duplex netwoks []. Even if two tansmittes can sense each othe, they can still send packets concuently if thei mutual intefeence is much weake compaed with the signal stength at the eceive of each. B. Utility-optimal full-duplex MAC: optimization fomulation and distibuted solution We conside the poblem of optimizing MAC-laye thoughput capacity fo a netwok containing a given set Γ of links that un the above asynchonous contention potocol. Evey link is a single-hop connection and has a countepat of evese diection, thus Γ is an even numbe and the numbe of nodes equals Γ. Denote S as the set of independent sets (each is a subset of non-intefeing links within Γ). In full-duplex mode, a link and its evese countepat can belong to the same independent set. At any time instance, the set of tansmitting links coespond to one independent set. A MAC scheduling algoithm can be chaacteized by π s, the faction of time each independent set s S is scheduled. Each link e may appea in multiple independent sets, and its thoughput ρ e equals the sum time of all these sets. Ou objective is to map the above asynchonous contention potocol to such a scheduling algoithm, and optimize its paametes to maximize netwok thoughput subject to a fainess constaint. This is equivalent to a utility optimization poblem: max U(ρ e ) (7) e Γ s.t. ρ e π s, e Γ (8) e s,s S π s = (9) s S When U(ρ e ) = log(ρ e ), the objective is poven to achieve optimal thoughput with popotional fainess guaantee [6] among e Γ. Simila to half-duplex netwoks, finding the optimal schedule is an intactable poblem. Howeve, the poblem can be appoximately solved by eplacing the objective function with: max V U(ρ e ) π s log(π s ) (0) e Γ s S whee V is a positive constant. Because s S π s log(π s ) s S S log( S ) = log( S ), it can be easily seen that the appoximation deviates fom the optimum by at most log( S ) V, which is negligible fo lage V. In what follows, we deive a distibuted asynchonous MAC by solving the appoximated optimization poblem, using a subgadient method in a simila manne to the utility-optimal half-duplex MAC in [6]. The above appoximated optimization (0) can be easily poven to be convex, and its Lagangian is: L(ρ, π, q, β) = V U(ρ e ) π s log(π s ) e Γ s S + q e π s ) () π s q e ρ e β( e s,s S s S with dual vaiables q e and β. By solving the KKT condition following a simila pocedue to [6], we can obtain the optimal values of β and π s as: ( ) β = log q e ) () s S exp( e s πs Π e exp(q e ) = s S Π (3) e:e sexp(q e ) In addition, a subgadient of the dual vaiable q e is: q e = [(V/q e ) ] Q π s (4) s:s S,e s whee Q denotes the pojection to [q min, q max ], the ange of q e. The dual vaiable q e can be intepeted as a vitual queue fo each link. The subgadient adaptation (4) conveges to the optimal q e fo the utility optimization poblem (0) [6]. Moe impotantly, it is fully distibuted fo each link e. Suppose time is divided into fames, each stating when a packet is geneated o successfully tansmitted. In each fame, a link e only needs to obseve the numbe of successful tansmissions (which accounts fo the tem s:s S,e s π s), and adapt q e following (4). It has been poven that, by unning a CSMA potocol with packet geneation ate p e fo each link e and exponentiallydistibuted packet duation with mean µ e, the stationay distibution of π s is [3]: Π e p e µ e π s = s S Π (5) e:e sp e µ e

8 8 Algoithm Utility-maximizing full-duplex CSMA.. Fo each time fame, geneate a packet with pobability p e and exponentially distibuted duation (in tems of the numbe of slots) with mean µ e.. Continuously un the full-duplex CSMA/CA potocol in Sec. IV-A. 3. if tansmission completes o new packet aives then 4. Update q e accoding to: 5. q e q e + α(v/q e K e ) Q 6. Set p e and µ e accoding to p e µ e = exp(q e ) endif 7. goto. Thus, to achieve optimal utility using CSMA, it is sufficient to adapt q e and set p e and µ e in each time fame such that exp(q e ) = p e µ e (c.f., Eq. (3)). With this obsevation, we obtain the adaptive CSMA Algoithm fo each full-duplex link. Hee α is a small step size, and K e the numbe of seved packets in the time fame. The algoithm essentially contols the ate of each link in ode to achieve the optimal utility when combined with the undelying full-duplex CSMA contention algoithm that avoids collision. Note that Q can be defined accoding to pactical values of µ e and λ e in 80. netwoks. C. Full-duplex gain: expeimental simulation We compae the achievable capacity of the above full-duplex CSMA algoithm with a utility-optimal half-duplex algoithm [6] which is deived fom an optimization famewok simila to (7), but does not allow a eceive to sense o tansmit while eceiving packets. Both algoithms ae implemented in a C++ based discete event simulato with MAC/PHY paametes (e.g., time slot, CW ange) consistent with 80.g [6]. All links ae assumed to have a capacity of 6Mbps without ate adaptation. By default equals. We conside two types of topologies: (i) Multi-cell WLANs with vaying link distance and bipola Poisson distibution of nodes [4]. APs locations follow Poisson distibution with a given density, and each AP is paied with a client in a andom diection with a given distance d. (ii) Ad-hoc netwoks with andom unifom distibution of node locations in a fixed -D aea. Given node density (aveage numbe of neighbos within tansmission ange), the topology geneato keeps andom tials until obtaining a topology whee all nodes ae connected. Without loss of geneality, each node is paied with one neighbo fo bidiectional tansmission, and MAC-laye capacity (total thoughput of all links) is used as pefomance metic. Effects of asynchonous contention. We study the asynchonous contention effect (Fig. (b)) by simulating the above utility-optimal CSMA in an ad-hoc netwok with 00 nodes, density 6. Fig. 5(a) shows the distibution of the numbe of concuent tansmittes ove 0 5 time slots. Due to asynchonous contention, bidiectional links often cannot be scheduled concuently. Coupled with the effects of spatial euse, full-duplex esults in only.47 aveage gain ove half-duplex mode. One may ague that the contention ovehead can offset the impovement of concuency owing to full-duplex. Fig. 5(b) Faction of slots half-duplex full-duplex Faction of slots 0.8 half-duplex Numbe of concuent TXs Numbe of concuent TXs (a) (b) Fig. 5. Distibution of the numbe of concuent tansmittes in each slot: (a) utility-optimal, distibuted, asynchonous CSMA; (b) oacle schedule that andomly picks tansmittes (no contention ovehead). Faction of links Full-duplex thoughput gain Fig. 6. Distibution of thoughput gain. full-duplex plots the esults of an oacle, ound-based schedule with no contention ovehead. In each slot, it andomly selects tansmittes who do not intefee those links aleady selected, until no moe tansmittes can be selected. This schedule bette leveages the full-duplex advantage and impoves concuency, but the capacity gain is still fa below, as tansmittes ae still selected asynchonously, and the effect of spatial euse pesists. Capacity gain. Fig. 6 plots the distibution of thoughput gain ove all 00 links. The utility-optimal, popotionally fai schedule allocates thoughput quite diffeently fo halfand full-duplex netwoks. Wheeas some links eceive.5 thoughput gain, othes thoughput may be educed when using full-duplex. The aveage thoughput gain of all links is.46. With espect to the Jain s fainess index [6], half- and fullduplex has a fainess index of 0.58 and 0.56, espectively, which ae compaable. Oveall, full-duplex povides cetain capacity gain without noticeable sacifice of fainess, but again, the gain is well below. Effects of. Ou pio analysis identifies, the excess of intefeence ange ove tansmission ange, as a key paamete govening the full-duplex gain. Fig. 7 plots the mean thoughput gain unde vaying (eo bas show the std. ove 00 andom topologies). Consistent with ou theoetical analysis, the gain inceases as inceases. But unde pactical settings, e.g.,, the gain is fa below, and is below the theoetical uppebound pedicted in Sec. III-B. This essentially veifies ou analytical models, and shows the asynchonous contention futhe offsets the full-duplex gain in pactical, lagescale wieless netwoks. Effects of taffic locality in WLANs. In multi-cell wieless LANs, a client can abitaily appoach the AP, thus confining the tansmissions to a local aea and educing spatial euse advantage of half-duplex netwoks. Fig. 8 evaluates this effect by vaying the AP-client distance in a 50-cell netwok. When the link distance (nomalized w..t. tansmission ange) is close to 0, half-duplex netwoks cannot leveage the spatial euse advantage. Full-duplex oppotunities abound and ise the capacity gain close to. Howeve, in the common cases with link

9 Nomalized link distance Fig. 7. Effect of in ad-hoc Fig. 8. Full-duplex gain in multicell WLANs. netwoks. distance above 0.3, the gain is still fa below and deceases as link distance inceases to. Theefoe, full-duplex gain can be pominent in multi-cell WLANs, but only if the AP-client distance is much smalle compaed with the tansmission ange. Mean thoughput gain Mean thoughput gain V. RELATED WORK Full-duplex technology has aleady been poposed in boadband cellula netwoks (e.g., WiMax) to facilitate the fequencydevision mode. Cellula base stations tansmitting and eceiving adios can opeate simultaneously in two adjacent fequency bands, and a special hadwae filte called duplexe is used to mitigate leakage intefeence. Howeve, owing to lowe cost and bette suppot fo asymmetic uplink/downlink taffic, half-duplex time-devision mode is deployed in most cellula netwoks [5]. Recently, Choi et al. [] ealized singlechannel full-duplex though delicate antenna placement and self-intefeence cancellation, which inspied substantial wok (e.g., [], [6], [7]). Reseach along this diection mainly tagets the design and implementation of full-duplex PHY laye. The implication fo highe-laye (e.g., multi-hop outing [8], [9]) is lagely undeexploed. Since the landmak pape of Gupta and Kuma [5], substantial eseach has focused on analyzing wieless netwok capacity unde vaious topologies and PHY laye technologies (e.g., MIMO and diectional antennas [0]). Existing analysis unanimously assumes half-duplex adios, and tagets capacity scaling laws unde infinite numbe of nodes. In this wok, we have developed simple models to analyze the unique featues of full-duplex netwoks, and deive the capacity gain ove halfduplex netwoks. The utility-optimal full-duplex MAC in this pape shaes simila spiit with existing wok on utility-optimal CSMA [6], []. Howeve, ou objective is not to implement a new MAC, but athe to pefom a fai compaison between the optimal thoughput of half- and full-duplex netwoks, thus distilling the key factos that futue MAC potocols should take into account in ode to exploe the full-duplex gain. VI. CONCLUSION While it is tempting to believe that full-duplex can double wieless capacity, this pape dispoves the peception though asymptotic analysis and netwok optimization. Indeed, fo a single link, full-duplex may have a capacity gain of ove half-duplex, but in lage-scale wieless netwoks, spatial euse and asynchonous contention effects significantly undemine the actual benefits of full-duplex. Futue netwok designes need to eenginee the MAC potocols taking into these two factos, in ode to tanslate the PHY laye full-duplex gain into netwok laye thoughput impovement. Fo tactability, ou analysis has made a numbe of assumptions. The analysis of full-duplex capacity gain in -D netwoks assumes an oacle schedule that geedily enables bidiectional full-duplex tansmissions. Wheeas the utility-optimal MAC allows a mix of full-duplex and half-duplex tansmissions, it adopts a andomized CSMA-style schedule. As futue wok, we will deive the full-duplex capacity when an oacle, adaptive schedule is used. In addition, consistent with the potocol model, we assumed pefect caie sensing when compaing half- and full-duplex thoughput unde the utility-optimal MAC. Since pactical MAC potocols still suffe fom hidden- and exposed teminal poblems, both half- and full-duplex netwoks may undeutilize the capacity, possibly to diffeent extent. It would be inteesting to test the full-duplex gain unde these pactical conditions. REFERENCES [] J. I. Choi, M. Jain, K. Sinivasan, P. Levis, and S. Katti, Achieving Single Channel, Full Duplex Wieless Communication, in Poc. of ACM MobiCom, 00. [] M. Duate, C. Dick, and A. Sabhawal, Expeiment-Diven Chaacteization of Full-Duplex Wieless Systems, IEEE Tansactions on Wieless Communications, vol., no., 0. [3] Engadget, Reseaches demo full-duplex wieless: double the thoughput with no new towes, Sep. 0. [4] Slashdot, Full Duplex Wieless Tech Could Double Bandwidth, Sep. 0. [5] P. Gupta and P. Kuma, The Capacity of Wieless Netwoks, IEEE Tansactions on Infomation Theoy, vol. 46, no., 000. [6] J. Liu, Y. Yi, A. Poutiee, M. Chiang, and H. V. Poo, Towads Utility- Optimal Random Access Without Message Passing, Wiel. Commun. Mob. Comput., vol. 0, no., 00. [7] J. Liu, D. Goeckel, and D. Towsley, Bounds on the Gain of Netwok Coding and Boadcasting in Wieless Netwoks, in Poc. of IEEE INFOCOM, 007. [8] P. Kuma, A Coection to the Poof of a Lemma in The Capacity of Wieless Netwoks, IEEE Tans. on Infomation Theoy, 003. [9] M. Z. Bodsky and R. T. Mois, In Defense of Wieless Caie Sense, in Poc. of ACM SIGCOMM, 009. [0] S. Sen, R. Roy Choudhuy, and S. Nelakuditi, No Time to Countdown: Migating Backoff to the Fequency Domain, in ACM MobiCom, 0. [] IEEE, 80.: Wieless LAN Medium Access Contol (MAC) and Physical Laye (PHY) Specifications, 007. [] M. Vutukuu, K. Jamieson, and H. Balakishnan, Hanessing Exposed Teminals in Wieless Netwoks, in Poc. of USENIX NSDI, 008. [3] L. Jiang and J. Waland, A Distibuted CSMA Algoithm fo Thoughput and Utility Maximization in Wieless Netwoks, IEEE/ACM Tans. Netw., vol. 8, no. 3, 00. [4] J. Andews, R. Ganti, M. Haenggi, N. Jindal, and S. Webe, A Pime on Spatial Modeling and Analysis in Wieless Netwoks, IEEE Comm. Magazine, vol. 48, no., 00. [5] Conniq, Duplexing Scheme in WiMAX: TDD o FDD, 0. [6] A. Sahai, G. Patel, and A. Sabhawal, Pushing the Limits of Full-duplex: Design and Real-time Implementation, CoRR, vol. abs/ , 0. [7] M. Duate, A. Sabhawal, V. Aggawal, R. Jana, K. K. Ramakishnan, C. W. Rice, and N. K. Shankaanaayanan, Design and Chaacteization of a Full-duplex Multi-Antenna System fo WiFi netwoks, CoRR, vol. abs/0.639, 0. [8] X. Fang, D. Yang, and G. Xue, Distibuted Algoithms fo Multipath Routing in Full-Duplex Wieless Netwoks, in IEEE MASS, 0. [9] M. Kodialam and T. Nandagopal, Chaacteizing Achievable Rates in Multi-hop Wieless Mesh Netwoks with Othogonal Channels, IEEE/ACM Tans. Netw., vol. 3, no. 4, 005. [0] C. Jiang, Y. Shi, Y. Hou, W. Lou, S. Kompella, and S. Midkiff, Towad Simple Citeia to Establish Capacity Scaling Laws fo Wieless Netwoks, in Poc. of IEEE INFOCOM, 0. [] B. Nadelli, J. Lee, K. Lee, Y. Yi, S. Chong, E. Knightly, and M. Chiang, Expeimental Evaluation of Optimal CSMA, in IEEE INFOCOM, 0.

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing M13914 Questions & Answes Chapte 10 Softwae Reliability Pediction, Allocation and Demonstation Testing 1. Homewok: How to deive the fomula of failue ate estimate. λ = χ α,+ t When the failue times follow

More information

Effect of Contention Window on the Performance of IEEE 802.11 WLANs

Effect of Contention Window on the Performance of IEEE 802.11 WLANs Effect of Contention Window on the Pefomance of IEEE 82.11 WLANs Yunli Chen and Dhama P. Agawal Cente fo Distibuted and Mobile Computing, Depatment of ECECS Univesity of Cincinnati, OH 45221-3 {ychen,

More information

An Introduction to Omega

An Introduction to Omega An Intoduction to Omega Con Keating and William F. Shadwick These distibutions have the same mean and vaiance. Ae you indiffeent to thei isk-ewad chaacteistics? The Finance Development Cente 2002 1 Fom

More information

FXA 2008. Candidates should be able to : Describe how a mass creates a gravitational field in the space around it.

FXA 2008. Candidates should be able to : Describe how a mass creates a gravitational field in the space around it. Candidates should be able to : Descibe how a mass ceates a gavitational field in the space aound it. Define gavitational field stength as foce pe unit mass. Define and use the peiod of an object descibing

More information

Randomized Multi-Channel Interrogation Algorithm for Large-Scale RFID Systems

Randomized Multi-Channel Interrogation Algorithm for Large-Scale RFID Systems andomized Multi-Channel Inteogation Algoithm fo Lage-Scale FID Systems Ami-Hamed Mohsenian-ad, Vahid Shah-Mansoui, Vincent W.S. Wong, and obet Schobe Depatment of Electical and Compute Engineeing, The

More information

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo (

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo ( Hubs, Bidges, and Switches Used fo extending LANs in tems of geogaphical coveage, numbe of nodes, administation capabilities, etc. Diffe in egads to: m collision domain isolation m laye at which they opeate

More information

Efficient Redundancy Techniques for Latency Reduction in Cloud Systems

Efficient Redundancy Techniques for Latency Reduction in Cloud Systems Efficient Redundancy Techniques fo Latency Reduction in Cloud Systems 1 Gaui Joshi, Emina Soljanin, and Gegoy Wonell Abstact In cloud computing systems, assigning a task to multiple seves and waiting fo

More information

Chapter 3 Savings, Present Value and Ricardian Equivalence

Chapter 3 Savings, Present Value and Ricardian Equivalence Chapte 3 Savings, Pesent Value and Ricadian Equivalence Chapte Oveview In the pevious chapte we studied the decision of households to supply hous to the labo maket. This decision was a static decision,

More information

Software Engineering and Development

Software Engineering and Development I T H E A 67 Softwae Engineeing and Development SOFTWARE DEVELOPMENT PROCESS DYNAMICS MODELING AS STATE MACHINE Leonid Lyubchyk, Vasyl Soloshchuk Abstact: Softwae development pocess modeling is gaining

More information

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS ON THE R POLICY IN PRODUCTION-INVENTORY SYSTEMS Saifallah Benjaafa and Joon-Seok Kim Depatment of Mechanical Engineeing Univesity of Minnesota Minneapolis MN 55455 Abstact We conside a poduction-inventoy

More information

Financing Terms in the EOQ Model

Financing Terms in the EOQ Model Financing Tems in the EOQ Model Habone W. Stuat, J. Columbia Business School New Yok, NY 1007 hws7@columbia.edu August 6, 004 1 Intoduction This note discusses two tems that ae often omitted fom the standad

More information

The transport performance evaluation system building of logistics enterprises

The transport performance evaluation system building of logistics enterprises Jounal of Industial Engineeing and Management JIEM, 213 6(4): 194-114 Online ISSN: 213-953 Pint ISSN: 213-8423 http://dx.doi.og/1.3926/jiem.784 The tanspot pefomance evaluation system building of logistics

More information

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM Main Golub Faculty of Electical Engineeing and Computing, Univesity of Zageb Depatment of Electonics, Micoelectonics,

More information

An Efficient Group Key Agreement Protocol for Ad hoc Networks

An Efficient Group Key Agreement Protocol for Ad hoc Networks An Efficient Goup Key Ageement Potocol fo Ad hoc Netwoks Daniel Augot, Raghav haska, Valéie Issany and Daniele Sacchetti INRIA Rocquencout 78153 Le Chesnay Fance {Daniel.Augot, Raghav.haska, Valéie.Issany,

More information

Ilona V. Tregub, ScD., Professor

Ilona V. Tregub, ScD., Professor Investment Potfolio Fomation fo the Pension Fund of Russia Ilona V. egub, ScD., Pofesso Mathematical Modeling of Economic Pocesses Depatment he Financial Univesity unde the Govenment of the Russian Fedeation

More information

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN Modeling and Veifying a Pice Model fo Congestion Contol in Compute Netwoks Using PROMELA/SPIN Clement Yuen and Wei Tjioe Depatment of Compute Science Univesity of Toonto 1 King s College Road, Toonto,

More information

Timing Synchronization in High Mobility OFDM Systems

Timing Synchronization in High Mobility OFDM Systems Timing Synchonization in High Mobility OFDM Systems Yasamin Mostofi Depatment of Electical Engineeing Stanfod Univesity Stanfod, CA 94305, USA Email: yasi@wieless.stanfod.edu Donald C. Cox Depatment of

More information

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN*

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN* Automatic Testing of Neighbo Discovey Potocol Based on FSM and TTCN* Zhiliang Wang, Xia Yin, Haibin Wang, and Jianping Wu Depatment of Compute Science, Tsinghua Univesity Beijing, P. R. China, 100084 Email:

More information

An Energy Efficient and Accurate Slot Synchronization Scheme for Wireless Sensor Networks

An Energy Efficient and Accurate Slot Synchronization Scheme for Wireless Sensor Networks An Enegy Efficient and Accuate Slot Synchonization Scheme fo Wieless Senso Netwoks Lillian Dai Pithwish asu Jason Redi N Technologies, 0 Moulton St., Cambidge, MA 038 ldai@bbn.com pbasu@bbn.com edi@bbn.com

More information

An Approach to Optimized Resource Allocation for Cloud Simulation Platform

An Approach to Optimized Resource Allocation for Cloud Simulation Platform An Appoach to Optimized Resouce Allocation fo Cloud Simulation Platfom Haitao Yuan 1, Jing Bi 2, Bo Hu Li 1,3, Xudong Chai 3 1 School of Automation Science and Electical Engineeing, Beihang Univesity,

More information

Peer-to-Peer File Sharing Game using Correlated Equilibrium

Peer-to-Peer File Sharing Game using Correlated Equilibrium Pee-to-Pee File Shaing Game using Coelated Equilibium Beibei Wang, Zhu Han, and K. J. Ray Liu Depatment of Electical and Compute Engineeing and Institute fo Systems Reseach, Univesity of Mayland, College

More information

An Analysis of Manufacturer Benefits under Vendor Managed Systems

An Analysis of Manufacturer Benefits under Vendor Managed Systems An Analysis of Manufactue Benefits unde Vendo Managed Systems Seçil Savaşaneil Depatment of Industial Engineeing, Middle East Technical Univesity, 06531, Ankaa, TURKEY secil@ie.metu.edu.t Nesim Ekip 1

More information

2 r2 θ = r2 t. (3.59) The equal area law is the statement that the term in parentheses,

2 r2 θ = r2 t. (3.59) The equal area law is the statement that the term in parentheses, 3.4. KEPLER S LAWS 145 3.4 Keple s laws You ae familia with the idea that one can solve some mechanics poblems using only consevation of enegy and (linea) momentum. Thus, some of what we see as objects

More information

Figure 2. So it is very likely that the Babylonians attributed 60 units to each side of the hexagon. Its resulting perimeter would then be 360!

Figure 2. So it is very likely that the Babylonians attributed 60 units to each side of the hexagon. Its resulting perimeter would then be 360! 1. What ae angles? Last time, we looked at how the Geeks intepeted measument of lengths. Howeve, as fascinated as they wee with geomety, thee was a shape that was much moe enticing than any othe : the

More information

Channel selection in e-commerce age: A strategic analysis of co-op advertising models

Channel selection in e-commerce age: A strategic analysis of co-op advertising models Jounal of Industial Engineeing and Management JIEM, 013 6(1):89-103 Online ISSN: 013-0953 Pint ISSN: 013-843 http://dx.doi.og/10.396/jiem.664 Channel selection in e-commece age: A stategic analysis of

More information

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION Page 1 STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION C. Alan Blaylock, Hendeson State Univesity ABSTRACT This pape pesents an intuitive appoach to deiving annuity fomulas fo classoom use and attempts

More information

Adaptive Queue Management with Restraint on Non-Responsive Flows

Adaptive Queue Management with Restraint on Non-Responsive Flows Adaptive Queue Management wi Restaint on Non-Responsive Flows Lan Li and Gyungho Lee Depatment of Electical and Compute Engineeing Univesity of Illinois at Chicago 85 S. Mogan Steet Chicago, IL 667 {lli,

More information

Cloud Service Reliability: Modeling and Analysis

Cloud Service Reliability: Modeling and Analysis Cloud Sevice eliability: Modeling and Analysis Yuan-Shun Dai * a c, Bo Yang b, Jack Dongaa a, Gewei Zhang c a Innovative Computing Laboatoy, Depatment of Electical Engineeing & Compute Science, Univesity

More information

The Binomial Distribution

The Binomial Distribution The Binomial Distibution A. It would be vey tedious if, evey time we had a slightly diffeent poblem, we had to detemine the pobability distibutions fom scatch. Luckily, thee ae enough similaities between

More information

An Infrastructure Cost Evaluation of Single- and Multi-Access Networks with Heterogeneous Traffic Density

An Infrastructure Cost Evaluation of Single- and Multi-Access Networks with Heterogeneous Traffic Density An Infastuctue Cost Evaluation of Single- and Multi-Access Netwoks with Heteogeneous Taffic Density Andes Fuuskä and Magnus Almgen Wieless Access Netwoks Eicsson Reseach Kista, Sweden [andes.fuuska, magnus.almgen]@eicsson.com

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations White Pape 48 Revision by Victo Avela > Executive summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance

More information

Episode 401: Newton s law of universal gravitation

Episode 401: Newton s law of universal gravitation Episode 401: Newton s law of univesal gavitation This episode intoduces Newton s law of univesal gavitation fo point masses, and fo spheical masses, and gets students pactising calculations of the foce

More information

Over-encryption: Management of Access Control Evolution on Outsourced Data

Over-encryption: Management of Access Control Evolution on Outsourced Data Ove-encyption: Management of Access Contol Evolution on Outsouced Data Sabina De Capitani di Vimecati DTI - Univesità di Milano 26013 Cema - Italy decapita@dti.unimi.it Stefano Paaboschi DIIMM - Univesità

More information

Scheduling Hadoop Jobs to Meet Deadlines

Scheduling Hadoop Jobs to Meet Deadlines Scheduling Hadoop Jobs to Meet Deadlines Kamal Kc, Kemafo Anyanwu Depatment of Compute Science Noth Caolina State Univesity {kkc,kogan}@ncsu.edu Abstact Use constaints such as deadlines ae impotant equiements

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations By Victo Avela White Pape #48 Executive Summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance the availability

More information

High Availability Replication Strategy for Deduplication Storage System

High Availability Replication Strategy for Deduplication Storage System Zhengda Zhou, Jingli Zhou College of Compute Science and Technology, Huazhong Univesity of Science and Technology, *, zhouzd@smail.hust.edu.cn jlzhou@mail.hust.edu.cn Abstact As the amount of digital data

More information

Optimizing Content Retrieval Delay for LT-based Distributed Cloud Storage Systems

Optimizing Content Retrieval Delay for LT-based Distributed Cloud Storage Systems Optimizing Content Retieval Delay fo LT-based Distibuted Cloud Stoage Systems Haifeng Lu, Chuan Heng Foh, Yonggang Wen, and Jianfei Cai School of Compute Engineeing, Nanyang Technological Univesity, Singapoe

More information

Data Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation

Data Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation (213) 1 28 Data Cente Demand Response: Avoiding the Coincident Peak via Wokload Shifting and Local Geneation Zhenhua Liu 1, Adam Wieman 1, Yuan Chen 2, Benjamin Razon 1, Niangjun Chen 1 1 Califonia Institute

More information

Database Management Systems

Database Management Systems Contents Database Management Systems (COP 5725) D. Makus Schneide Depatment of Compute & Infomation Science & Engineeing (CISE) Database Systems Reseach & Development Cente Couse Syllabus 1 Sping 2012

More information

Nontrivial lower bounds for the least common multiple of some finite sequences of integers

Nontrivial lower bounds for the least common multiple of some finite sequences of integers J. Numbe Theoy, 15 (007), p. 393-411. Nontivial lowe bounds fo the least common multiple of some finite sequences of integes Bai FARHI bai.fahi@gmail.com Abstact We pesent hee a method which allows to

More information

Converting knowledge Into Practice

Converting knowledge Into Practice Conveting knowledge Into Pactice Boke Nightmae srs Tend Ride By Vladimi Ribakov Ceato of Pips Caie 20 of June 2010 2 0 1 0 C o p y i g h t s V l a d i m i R i b a k o v 1 Disclaime and Risk Wanings Tading

More information

Tracking/Fusion and Deghosting with Doppler Frequency from Two Passive Acoustic Sensors

Tracking/Fusion and Deghosting with Doppler Frequency from Two Passive Acoustic Sensors Tacking/Fusion and Deghosting with Dopple Fequency fom Two Passive Acoustic Sensos Rong Yang, Gee Wah Ng DSO National Laboatoies 2 Science Pak Dive Singapoe 11823 Emails: yong@dso.og.sg, ngeewah@dso.og.sg

More information

Towards Realizing a Low Cost and Highly Available Datacenter Power Infrastructure

Towards Realizing a Low Cost and Highly Available Datacenter Power Infrastructure Towads Realizing a Low Cost and Highly Available Datacente Powe Infastuctue Siam Govindan, Di Wang, Lydia Chen, Anand Sivasubamaniam, and Bhuvan Ugaonka The Pennsylvania State Univesity. IBM Reseach Zuich

More information

Gauss Law. Physics 231 Lecture 2-1

Gauss Law. Physics 231 Lecture 2-1 Gauss Law Physics 31 Lectue -1 lectic Field Lines The numbe of field lines, also known as lines of foce, ae elated to stength of the electic field Moe appopiately it is the numbe of field lines cossing

More information

Alarm transmission through Radio and GSM networks

Alarm transmission through Radio and GSM networks Alam tansmission though Radio and GSM netwoks 2015 Alam tansmission though Radio netwok RR-IP12 RL10 E10C E10C LAN RL1 0 R11 T10 (T10U) Windows MONAS MS NETWORK MCI > GNH > GND > +E > DATA POWER DATA BUS

More information

MATHEMATICAL SIMULATION OF MASS SPECTRUM

MATHEMATICAL SIMULATION OF MASS SPECTRUM MATHEMATICA SIMUATION OF MASS SPECTUM.Beánek, J.Knížek, Z. Pulpán 3, M. Hubálek 4, V. Novák Univesity of South Bohemia, Ceske Budejovice, Chales Univesity, Hadec Kalove, 3 Univesity of Hadec Kalove, Hadec

More information

Energy Efficient Cache Invalidation in a Mobile Environment

Energy Efficient Cache Invalidation in a Mobile Environment Enegy Efficient Cache Invalidation in a Mobile Envionment Naottam Chand, Ramesh Chanda Joshi, Manoj Misa Electonics & Compute Engineeing Depatment Indian Institute of Technology, Rookee - 247 667. INDIA

More information

Experiment 6: Centripetal Force

Experiment 6: Centripetal Force Name Section Date Intoduction Expeiment 6: Centipetal oce This expeiment is concened with the foce necessay to keep an object moving in a constant cicula path. Accoding to Newton s fist law of motion thee

More information

An Epidemic Model of Mobile Phone Virus

An Epidemic Model of Mobile Phone Virus An Epidemic Model of Mobile Phone Vius Hui Zheng, Dong Li, Zhuo Gao 3 Netwok Reseach Cente, Tsinghua Univesity, P. R. China zh@tsinghua.edu.cn School of Compute Science and Technology, Huazhong Univesity

More information

Top K Nearest Keyword Search on Large Graphs

Top K Nearest Keyword Search on Large Graphs Top K Neaest Keywod Seach on Lage Gaphs Miao Qiao, Lu Qin, Hong Cheng, Jeffey Xu Yu, Wentao Tian The Chinese Univesity of Hong Kong, Hong Kong, China {mqiao,lqin,hcheng,yu,wttian}@se.cuhk.edu.hk ABSTRACT

More information

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS Vesion:.0 Date: June 0 Disclaime This document is solely intended as infomation fo cleaing membes and othes who ae inteested in

More information

Research on Risk Assessment of the Transformer Based on Life Cycle Cost

Research on Risk Assessment of the Transformer Based on Life Cycle Cost ntenational Jounal of Smat Gid and lean Enegy eseach on isk Assessment of the Tansfome Based on Life ycle ost Hui Zhou a, Guowei Wu a, Weiwei Pan a, Yunhe Hou b, hong Wang b * a Zhejiang Electic Powe opoation,

More information

YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH

YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH nd INTERNATIONAL TEXTILE, CLOTHING & ESIGN CONFERENCE Magic Wold of Textiles Octobe 03 d to 06 th 004, UBROVNIK, CROATIA YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH Jana VOBOROVA; Ashish GARG; Bohuslav

More information

Risk Sensitive Portfolio Management With Cox-Ingersoll-Ross Interest Rates: the HJB Equation

Risk Sensitive Portfolio Management With Cox-Ingersoll-Ross Interest Rates: the HJB Equation Risk Sensitive Potfolio Management With Cox-Ingesoll-Ross Inteest Rates: the HJB Equation Tomasz R. Bielecki Depatment of Mathematics, The Notheasten Illinois Univesity 55 Noth St. Louis Avenue, Chicago,

More information

Carter-Penrose diagrams and black holes

Carter-Penrose diagrams and black holes Cate-Penose diagams and black holes Ewa Felinska The basic intoduction to the method of building Penose diagams has been pesented, stating with obtaining a Penose diagam fom Minkowski space. An example

More information

A Comparative Analysis of Data Center Network Architectures

A Comparative Analysis of Data Center Network Architectures A Compaative Analysis of Data Cente Netwok Achitectues Fan Yao, Jingxin Wu, Guu Venkataamani, Suesh Subamaniam Depatment of Electical and Compute Engineeing, The Geoge Washington Univesity, Washington,

More information

Spirotechnics! September 7, 2011. Amanda Zeringue, Michael Spannuth and Amanda Zeringue Dierential Geometry Project

Spirotechnics! September 7, 2011. Amanda Zeringue, Michael Spannuth and Amanda Zeringue Dierential Geometry Project Spiotechnics! Septembe 7, 2011 Amanda Zeingue, Michael Spannuth and Amanda Zeingue Dieential Geomety Poject 1 The Beginning The geneal consensus of ou goup began with one thought: Spiogaphs ae awesome.

More information

Model Question Paper Mathematics Class XII

Model Question Paper Mathematics Class XII Model Question Pape Mathematics Class XII Time Allowed : 3 hous Maks: 100 Ma: Geneal Instuctions (i) The question pape consists of thee pats A, B and C. Each question of each pat is compulsoy. (ii) Pat

More information

The Role of Gravity in Orbital Motion

The Role of Gravity in Orbital Motion ! The Role of Gavity in Obital Motion Pat of: Inquiy Science with Datmouth Developed by: Chistophe Caoll, Depatment of Physics & Astonomy, Datmouth College Adapted fom: How Gavity Affects Obits (Ohio State

More information

A Capacitated Commodity Trading Model with Market Power

A Capacitated Commodity Trading Model with Market Power A Capacitated Commodity Tading Model with Maket Powe Victo Matínez-de-Albéniz Josep Maia Vendell Simón IESE Business School, Univesity of Navaa, Av. Peason 1, 08034 Bacelona, Spain VAlbeniz@iese.edu JMVendell@iese.edu

More information

The Impact of Radio Propagation Models on Ad Hoc Networks Performances

The Impact of Radio Propagation Models on Ad Hoc Networks Performances Jounal of Compute Science 8 (5): 752-760, 2012 ISSN 1549-3636 2012 Science Publications The Impact of Radio Popagation Models on Ad Hoc Netwoks Pefomances 1 Rhattoy, A. and 2 A. Zatni 1 Depatment of Compute,

More information

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor > PNN05-P762 < Reduced Patten Taining Based on Task Decomposition Using Patten Distibuto Sheng-Uei Guan, Chunyu Bao, and TseNgee Neo Abstact Task Decomposition with Patten Distibuto (PD) is a new task

More information

Financial Planning and Risk-return profiles

Financial Planning and Risk-return profiles Financial Planning and Risk-etun pofiles Stefan Gaf, Alexande Kling und Jochen Russ Pepint Seies: 2010-16 Fakultät fü Mathematik und Witschaftswissenschaften UNIERSITÄT ULM Financial Planning and Risk-etun

More information

Approximation Algorithms for Data Management in Networks

Approximation Algorithms for Data Management in Networks Appoximation Algoithms fo Data Management in Netwoks Chistof Kick Heinz Nixdof Institute and Depatment of Mathematics & Compute Science adebon Univesity Gemany kueke@upb.de Haald Räcke Heinz Nixdof Institute

More information

IBM Research Smarter Transportation Analytics

IBM Research Smarter Transportation Analytics IBM Reseach Smate Tanspotation Analytics Laua Wynte PhD, Senio Reseach Scientist, IBM Watson Reseach Cente lwynte@us.ibm.com INSTRUMENTED We now have the ability to measue, sense and see the exact condition

More information

Define What Type of Trader Are you?

Define What Type of Trader Are you? Define What Type of Tade Ae you? Boke Nightmae srs Tend Ride By Vladimi Ribakov Ceato of Pips Caie 20 of June 2010 1 Disclaime and Risk Wanings Tading any financial maket involves isk. The content of this

More information

An application of stochastic programming in solving capacity allocation and migration planning problem under uncertainty

An application of stochastic programming in solving capacity allocation and migration planning problem under uncertainty An application of stochastic pogamming in solving capacity allocation and migation planning poblem unde uncetainty Yin-Yann Chen * and Hsiao-Yao Fan Depatment of Industial Management, National Fomosa Univesity,

More information

Optimal Peer Selection in a Free-Market Peer-Resource Economy

Optimal Peer Selection in a Free-Market Peer-Resource Economy Optimal Pee Selection in a Fee-Maket Pee-Resouce Economy Micah Adle, Rakesh Kuma, Keith Ross, Dan Rubenstein, David Tune and David D Yao Dept of Compute Science Univesity of Massachusetts Amhest, MA; Email:

More information

Semipartial (Part) and Partial Correlation

Semipartial (Part) and Partial Correlation Semipatial (Pat) and Patial Coelation his discussion boows heavily fom Applied Multiple egession/coelation Analysis fo the Behavioal Sciences, by Jacob and Paticia Cohen (975 edition; thee is also an updated

More information

Explicit, analytical solution of scaling quantum graphs. Abstract

Explicit, analytical solution of scaling quantum graphs. Abstract Explicit, analytical solution of scaling quantum gaphs Yu. Dabaghian and R. Blümel Depatment of Physics, Wesleyan Univesity, Middletown, CT 06459-0155, USA E-mail: ydabaghian@wesleyan.edu (Januay 6, 2003)

More information

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years.

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years. 9.2 Inteest Objectives 1. Undestand the simple inteest fomula. 2. Use the compound inteest fomula to find futue value. 3. Solve the compound inteest fomula fo diffeent unknowns, such as the pesent value,

More information

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers Concept and Expeiences on using a Wiki-based System fo Softwae-elated Semina Papes Dominik Fanke and Stefan Kowalewski RWTH Aachen Univesity, 52074 Aachen, Gemany, {fanke, kowalewski}@embedded.wth-aachen.de,

More information

Multiband Microstrip Patch Antenna for Microwave Applications

Multiband Microstrip Patch Antenna for Microwave Applications IOSR Jounal of Electonics and Communication Engineeing (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 3, Issue 5 (Sep. - Oct. 2012), PP 43-48 Multiband Micostip Patch Antenna fo Micowave Applications

More information

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available

More information

Promised Lead-Time Contracts Under Asymmetric Information

Promised Lead-Time Contracts Under Asymmetric Information OPERATIONS RESEARCH Vol. 56, No. 4, July August 28, pp. 898 915 issn 3-364X eissn 1526-5463 8 564 898 infoms doi 1.1287/ope.18.514 28 INFORMS Pomised Lead-Time Contacts Unde Asymmetic Infomation Holly

More information

Controlling the Money Supply: Bond Purchases in the Open Market

Controlling the Money Supply: Bond Purchases in the Open Market Money Supply By the Bank of Canada and Inteest Rate Detemination Open Opeations and Monetay Tansmission Mechanism The Cental Bank conducts monetay policy Bank of Canada is Canada's cental bank supevises

More information

4a 4ab b 4 2 4 2 5 5 16 40 25. 5.6 10 6 (count number of places from first non-zero digit to

4a 4ab b 4 2 4 2 5 5 16 40 25. 5.6 10 6 (count number of places from first non-zero digit to . Simplify: 0 4 ( 8) 0 64 ( 8) 0 ( 8) = (Ode of opeations fom left to ight: Paenthesis, Exponents, Multiplication, Division, Addition Subtaction). Simplify: (a 4) + (a ) (a+) = a 4 + a 0 a = a 7. Evaluate

More information

Uncertain Version Control in Open Collaborative Editing of Tree-Structured Documents

Uncertain Version Control in Open Collaborative Editing of Tree-Structured Documents Uncetain Vesion Contol in Open Collaboative Editing of Tee-Stuctued Documents M. Lamine Ba Institut Mines Télécom; Télécom PaisTech; LTCI Pais, Fance mouhamadou.ba@ telecom-paistech.f Talel Abdessalem

More information

Gravitation. AP Physics C

Gravitation. AP Physics C Gavitation AP Physics C Newton s Law of Gavitation What causes YOU to be pulled down? THE EARTH.o moe specifically the EARTH S MASS. Anything that has MASS has a gavitational pull towads it. F α Mm g What

More information

SUPPORT VECTOR MACHINE FOR BANDWIDTH ANALYSIS OF SLOTTED MICROSTRIP ANTENNA

SUPPORT VECTOR MACHINE FOR BANDWIDTH ANALYSIS OF SLOTTED MICROSTRIP ANTENNA Intenational Jounal of Compute Science, Systems Engineeing and Infomation Technology, 4(), 20, pp. 67-7 SUPPORT VECTOR MACHIE FOR BADWIDTH AALYSIS OF SLOTTED MICROSTRIP ATEA Venmathi A.R. & Vanitha L.

More information

CRRC-1 Method #1: Standard Practice for Measuring Solar Reflectance of a Flat, Opaque, and Heterogeneous Surface Using a Portable Solar Reflectometer

CRRC-1 Method #1: Standard Practice for Measuring Solar Reflectance of a Flat, Opaque, and Heterogeneous Surface Using a Portable Solar Reflectometer CRRC- Method #: Standad Pactice fo Measuing Sola Reflectance of a Flat, Opaque, and Heteogeneous Suface Using a Potable Sola Reflectomete Scope This standad pactice coves a technique fo estimating the

More information

Chris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment

Chris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment Chis J. Skinne The pobability of identification: applying ideas fom foensic statistics to disclosue isk assessment Aticle (Accepted vesion) (Refeeed) Oiginal citation: Skinne, Chis J. (2007) The pobability

More information

VISCOSITY OF BIO-DIESEL FUELS

VISCOSITY OF BIO-DIESEL FUELS VISCOSITY OF BIO-DIESEL FUELS One of the key assumptions fo ideal gases is that the motion of a given paticle is independent of any othe paticles in the system. With this assumption in place, one can use

More information

Strategic Betting for Competitive Agents

Strategic Betting for Competitive Agents Stategic Betting fo Competitive Agents Liad Wagman Depatment of Economics Duke Univesity Duham, NC, USA liad.wagman@duke.edu Vincent Conitze Depts. of Compute Science and Economics Duke Univesity Duham,

More information

How To Find The Optimal Stategy For Buying Life Insuance

How To Find The Optimal Stategy For Buying Life Insuance Life Insuance Puchasing to Reach a Bequest Ehan Bayakta Depatment of Mathematics, Univesity of Michigan Ann Abo, Michigan, USA, 48109 S. David Pomislow Depatment of Mathematics, Yok Univesity Toonto, Ontaio,

More information

UNIT CIRCLE TRIGONOMETRY

UNIT CIRCLE TRIGONOMETRY UNIT CIRCLE TRIGONOMETRY The Unit Cicle is the cicle centeed at the oigin with adius unit (hence, the unit cicle. The equation of this cicle is + =. A diagam of the unit cicle is shown below: + = - - -

More information

arxiv:1110.2612v1 [q-fin.st] 12 Oct 2011

arxiv:1110.2612v1 [q-fin.st] 12 Oct 2011 Maket inefficiency identified by both single and multiple cuency tends T.Toká 1, and D. Hováth 1, 1 Sos Reseach a.s., Stojáenská 3, 040 01 Košice, Slovak Republic Abstact axiv:1110.2612v1 [q-fin.st] 12

More information

Signal Processing in RFID

Signal Processing in RFID Signal Pocessing in RFID Makus Rupp, Jelena Kaitović, Robet Langwiese Institute of Telecommunications, Vienna Univesity of Technology Duisbug July 5, 202 Outline Intoduction Tag Collision Model Simple

More information

(a) The centripetal acceleration of a point on the equator of the Earth is given by v2. The velocity of the earth can be found by taking the ratio of

(a) The centripetal acceleration of a point on the equator of the Earth is given by v2. The velocity of the earth can be found by taking the ratio of Homewok VI Ch. 7 - Poblems 15, 19, 22, 25, 35, 43, 51. Poblem 15 (a) The centipetal acceleation of a point on the equato of the Eath is given by v2. The velocity of the eath can be found by taking the

More information

Strength Analysis and Optimization Design about the key parts of the Robot

Strength Analysis and Optimization Design about the key parts of the Robot Intenational Jounal of Reseach in Engineeing and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Pint): 2320-9356 www.ijes.og Volume 3 Issue 3 ǁ Mach 2015 ǁ PP.25-29 Stength Analysis and Optimization Design

More information

who supply the system vectors for their JVM products. 1 HBench:Java will work best with support from JVM vendors

who supply the system vectors for their JVM products. 1 HBench:Java will work best with support from JVM vendors Appeaed in the ACM Java Gande 2000 Confeence, San Fancisco, Califonia, June 3-5, 2000 HBench:Java: An Application-Specific Benchmaking Famewok fo Java Vitual Machines Xiaolan Zhang Mago Seltze Division

More information

TARGET ESTIMATION IN COLOCATED MIMO RADAR VIA MATRIX COMPLETION. Shunqiao Sun, Athina P. Petropulu and Waheed U. Bajwa

TARGET ESTIMATION IN COLOCATED MIMO RADAR VIA MATRIX COMPLETION. Shunqiao Sun, Athina P. Petropulu and Waheed U. Bajwa TARGET ESTIMATION IN COLOCATED MIMO RADAR VIA MATRIX COMPLETION Shunqiao Sun, Athina P. Petopulu and Waheed U. Bajwa Depatment of Electical & Compute Engineeing, Rutges, The State Univesity of New Jesey

More information

Memory-Aware Sizing for In-Memory Databases

Memory-Aware Sizing for In-Memory Databases Memoy-Awae Sizing fo In-Memoy Databases Kasten Molka, Giuliano Casale, Thomas Molka, Laua Mooe Depatment of Computing, Impeial College London, United Kingdom {k.molka3, g.casale}@impeial.ac.uk SAP HANA

More information

NUCLEAR MAGNETIC RESONANCE

NUCLEAR MAGNETIC RESONANCE 19 Jul 04 NMR.1 NUCLEAR MAGNETIC RESONANCE In this expeiment the phenomenon of nuclea magnetic esonance will be used as the basis fo a method to accuately measue magnetic field stength, and to study magnetic

More information

Pessu Behavior Analysis for Autologous Fluidations

Pessu Behavior Analysis for Autologous Fluidations EXPERIENCE OF USING A CFD CODE FOR ESTIMATING THE NOISE GENERATED BY GUSTS ALONG THE SUN- ROOF OF A CAR Liang S. Lai* 1, Geogi S. Djambazov 1, Choi -H. Lai 1, Koulis A. Peicleous 1, and Fédéic Magoulès

More information

30 H. N. CHIU 1. INTRODUCTION. Recherche opérationnelle/operations Research

30 H. N. CHIU 1. INTRODUCTION. Recherche opérationnelle/operations Research RAIRO Rech. Opé. (vol. 33, n 1, 1999, pp. 29-45) A GOOD APPROXIMATION OF THE INVENTORY LEVEL IN A(Q ) PERISHABLE INVENTORY SYSTEM (*) by Huan Neng CHIU ( 1 ) Communicated by Shunji OSAKI Abstact. This

More information

Gravitational Mechanics of the Mars-Phobos System: Comparing Methods of Orbital Dynamics Modeling for Exploratory Mission Planning

Gravitational Mechanics of the Mars-Phobos System: Comparing Methods of Orbital Dynamics Modeling for Exploratory Mission Planning Gavitational Mechanics of the Mas-Phobos System: Compaing Methods of Obital Dynamics Modeling fo Exploatoy Mission Planning Alfedo C. Itualde The Pennsylvania State Univesity, Univesity Pak, PA, 6802 This

More information

The Supply of Loanable Funds: A Comment on the Misconception and Its Implications

The Supply of Loanable Funds: A Comment on the Misconception and Its Implications JOURNL OF ECONOMICS ND FINNCE EDUCTION Volume 7 Numbe 2 Winte 2008 39 The Supply of Loanable Funds: Comment on the Misconception and Its Implications. Wahhab Khandke and mena Khandke* STRCT Recently Fields-Hat

More information

MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION

MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION K.C. CHANG AND TAN ZHANG In memoy of Pofesso S.S. Chen Abstact. We combine heat flow method with Mose theoy, supe- and subsolution method with

More information

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request.

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request. Retiement Benefit 1 Things to Remembe Complete all of the sections on the Retiement Benefit fom that apply to you equest. If this is an initial equest, and not a change in a cuent distibution, emembe to

More information