Randomized Multi-Channel Interrogation Algorithm for Large-Scale RFID Systems

Size: px
Start display at page:

Download "Randomized Multi-Channel Interrogation Algorithm for Large-Scale RFID Systems"

Transcription

1 andomized Multi-Channel Inteogation Algoithm fo Lage-Scale FID Systems Ami-Hamed Mohsenian-ad, Vahid Shah-Mansoui, Vincent W.S. Wong, and obet Schobe Depatment of Electical and Compute Engineeing, The Univesity of Bitish Columbia, Vancouve, Canada {hamed, vahids, vincentw, Abstact A adio fequency identification (FID) system consists of a set of eades and seveal objects, equipped with small compute chips, called tags. In a dense FID system, whee seveal eades ae placed togethe to impove the ead ate and coectness, eades and tags can fequently expeience packet collision. A common appoach to avoid collision is to use a distinct fequency channel fo inteogation fo each eade. Vaious multi-channel anti-collision potocols have been poposed fo FID eades. Howeve, due to thei heuistic natue, most algoithms may not fully utilize the achievable system pefomance. In this pape, we develop an optimization-based distibuted andomized multi-channel inteogation algoithm, called FDFA, fo lage-scale FID systems. Fo this pupose, we develop elaboate models fo eade-to-tag and eade-toeade collision poblems. FDFA algoithm is guaanteed to find a local optimum of a max-min fai esouce allocation poblem to balance the pocessing load among eades. Simulation esults show that FDFA has a significantly bette pefomance than the existing heuistic algoithms in tems of the numbe of essful inteogations. It also bette utilizes the fequency spectum. I. INTODUCTION adio fequency identification (FID) is an emeging wieless technology which allows objects to be identified automatically. An FID tag is a small and inexpensive electonic device designed fo wieless data tansmission. Each tag has a unique ID. It tansmits data ove the ai in esponse to inteogation signals by an FID eade. Multiple eades can connect to a back-end system to tansfe data fo pocessing o stoage [1]. In an FID system with one eade and seveal tags, since the eade and the tags shae the same wieless channel, tagto-tag collision can occu when multiple tags tansmit signals simultaneously to the same eade. This pevents the eade fom ecognizing any tag. Vaious tag anti-collision potocols ae poposed in [2], [3]. An Aloha-based tag anti-collision scheme has also been standadized by EPCglobal in [4] whee the eade begins each inteogation ound by infoming all the tags about the fame size. Each tag then chooses a time slot at andom and tansmits only within that time slot. In seveal FID applications (e.g., fo inventoy checking in a lage-scale waehouse), it is necessay to deploy seveal eades to achieve complete inteogation coveage. In this case, apat fom tag collision, eade-to-tag and eade-to-eade collisions may also occu. eade-to-tag collision occus when a tag eceives signals of compaable stengths fom moe than one eade simultaneously. This can cause the tag to espond abitaily to the eades, leading to incoect inteogation. eade-to-eade collision occus when a eade, which is in the midst of listening to a tag s eply, eceives stonge signals fom one o moe neighboing eades opeating at the same fequency simultaneously. This intefeence can pevent the eade s eceive fom decoding the tag s eply essfully. In a stationay FID system with synchonized eades and a centalized contolle, eade-to-tag and eade-to-eade collisions can be pevented by using a combination of fequency and time division multiple access (FDMA and TDMA) [5]. Howeve, in many pactical lage-scale FID systems, centalized coodination and synchonization ae difficult to achieve. Theefoe, it is of inteest to design distibuted andomized inteogation schemes such that each eade andomly selects the stat time of its inteogation ounds and its opeating channel to educe the pobabilities of eade-to-tag and eadeto-eade collisions. elated algoithms include naive, andom, and caie sensing potocols [6], the distibuted intefeence avoidance (DIA) algoithm with detect and abot [7], and the slotted listen-befoe-talk (S-LBT) scheme [8]. Howeve, given the heuistic natue of all of these algoithms, some may not be able to fully utilize the potential capacity of FID systems. This motivates us to study the multi-channel andom access poblem in FID systems within an optimization-based theoetical famewok. Ou contibutions ae as follows: We fomulate an optimization-based multi-channel andomized inteogation poblem fo lage-scale FID systems. Ou objective is to achieve max-min fainess among eades by taking into account eade-to-eade and eade-to-tag intefeence. Max-min fainess balances the pefomance and pocessing load among eades. We popose a distibuted algoithm to solve the max-min fai optimization poblem. Ou algoithm, efeed to as FDFA, woks based on the iteative coodinate ascent mechanism and is guaanteed to each a local optimal solution of the optimization poblem. Simulation esults show that the FDFA algoithm has a significantly bette pefomance compaed to the peviously poposed heuistic eade anti-collision algoithms in tems of the numbe of coect inteogations and fainess among eades. It bette utilizes the fequency spectum. It also conveges asynchonously and fast. The max-min fainess objectives at the obtained local optima ae vey close to the globally optimal values. The est of this pape is oganized as follows. The system model is descibed in Section II. Ou poposed FDFA algoithm is pesented in Section III. Simulation esults ae pesented in Section IV. Conclusions ae given in Section V.

2 p,c p,c I Slot Queyep Tag eply d u n d u n Quey 1st Fame (Estimation of N) 2nd Fame Last Fame eade Tag T (a) Type 1 (b) Type 2 Fig. 3. An inteogation inteval, with length T time units, fo eade. Fig. 1. Fig. 2. eade-to-tag collision in an FID system. d u I n eade Tag eade-to-eade collision in an FID system. II. SYSTEM MODEL A. eade Collision Poblem Let, with size =, denote the set of all eades. Fo each,letd denote the ead ange (o inteogation ange) of eade. eade can collect infomation only fom those tags which ae located within its ead ange. Let d I denote the intefeence ange of eade. eade s tansmission can intefee the inteogation pocess of othe eades on any tag within its intefeence ange. Two types of eade-to-tag collisions can be distinguished. The fist type is shown in Fig. 1(a), whee tag u is within the ead ange of eade and the intefeence ange of eade n (but not within the ead ange of eade n). If both eades use the same channel and tansmit simultaneously, tag u cannot coectly decode the message fom its eade, i.e., eade. Let I denote the set of eades with thei intefeence aea (but not thei ead aea) ovelapping the ead aea of eade. Wehave I = {n : d + d n < <d + d I n, n }, (1) whee denotes the Euclidean distance between an. The fist type of eade-to-tag collision can be avoided if eades an opeate at diffeent fequencies o times [5]. The second type of eade-to-tag collision is shown in Fig. 1(b), whee tag u is within the ead ange of both eades an. In FID systems, tags have low functionality and do not have fequency selectivity [4]. Even if eades an opeate at diffeent channels, tag u cannot decode the inteogation message coectly when both eades tansmit simultaneously. Let S denote the set of eades which have shaed (i.e., ovelapped) ead aea with eade. Wehave S = {n : <d + d n, n }. (2) The second type of eade-to-tag collision can be avoided by having neighboing eades opeate at diffeent time slots. Notice that having neighboing eades opeate at diffeent fequencies cannot avoid this type of collision. Also notice that since d I n d n fo all n,wehave I S = {},. (3) Futhemoe, eade-to-eade collision occus when eade n tansmits while eade is eceiving a message fom tag u (see Fig. 2). Let V denote the set of eades which have eade within thei intefeence ange. That is, V = {n : <d I n, n }. (4) eade-to-eade collision can be avoided if eades opeate at diffeent fequencies o time slots [5]. B. FID Multi-Channel Medium Access Contol Let C, with size C = C, denote the set of available othogonal fequency channels. Fo multi-channel andom access, we assume that the FID medium access contol (MAC) laye complies with the EPCglobal Class-1 Geneation-2 (C1G2) standad [9]. Each eade attempts to pefom the inteogation pocess evey T time units. At the beginning of each inteogation inteval (see Fig. 3), eade andomly chooses to stat an inteogation pocess ove fequency channel c C with inteogation pobability p,c [0, 1]. Wehave c C p,c 1,. (5) In ou model, the poposed andomized multi-channel inteogation algoithm (see Section III) contols eade-to-eade and eade-to-tag collisions, while C1G2 MAC is used to avoid tag-to-tag collision. Accoding to C1G2 MAC [9], if eade decides to stat an inteogation ound, it initiates its 1st inteogation fame by boadcasting a Quey message, which includes the numbe of time slots within the fame. The est of the fame is then divided into seveal small time slots, each stating with a Queyep message to coodinate the timing of sending the eply messages by the tags. Each tag andomly chooses to send its eply back to eade at one of the available time slots. By the end of the 1st fame, eade eceives the eplies fom a subset of the existing tags. Based on that, it estimates the numbe of tags inside its ead aea, denoted by N, e.g., using the technique in [2]. Given the estimate of N, eade continues initiating moe inteogation fames (i.e., 2nd fame, etc) until it can assue, with a cetain statistical confidence, that it has obtained the infomation fom all the tags inside its ead aea. We denote the duation of each inteogation pocess by τ (N ) as shown in Fig. 3. In pactice, we can assume that the inteogation inteval is the same fo all eades: T = T fo all whee T>0. Howeve, the inteogation intevals of diffeent eades

3 p,c, n p n,c n(n n) Fame Ovelapping T (a) Δ,n <τ (N ) p,c p,c, n p n,c T n(n n) No Fame Ovelapping (b) Δ,n >τ (N ) p,c Fig. 4. Asynchonism between inteogation intevals fo eades an. In scenaio (a), thee is a time ovelapping between the inteogation pocesses of eades an. In this case, asynchonism facto Δ,n <τ (N ). In scenaio (b), thee is no time ovelapping between the inteogation pocesses of eades an. In this case, asynchonism facto Δ,n >τ (N ). may not be synchonized. Theefoe, the inteogation pocess fo diffeent eades may not stat at the same time. We can assume that fo each pai of eades, n, thee exists a time diffeence Δ,n, called the asynchonism facto, between the inteogation intevals of eades an. The asynchonism facto Δ,n is shown in Fig. 4. Clealy, T <Δ,n <T,, n. (6) Note that Δ,n = Δ n,. In geneal, depending on the FID application, eade may not always be able to estimate Δ,n. In this pape, unless stated othewise, we conside the geneal case, whee the asynchonism factos ae not known. In Fig. 4, eade andomly decides to stat an inteogation on one of the channels evey T time units. If the inteogation intevals of eades an have time ovelapping, as in Fig. 4(a), then a eade-to-tag collision (type 1 o type 2) occus fo n I o n S, espectively. eade-to-eade collision can occu if n V. If inteogation intevals have no ovelapping, as in Fig. 4(b), eade collisions will not occu. Let p =(p,c,, c C) denote the inteogation (p) denote the pobability of completing a essful inteogation inteval by eade. That is, the pobability that eade stats an inteogation inteval without expeiencing eithe eade-to-eade o eadeto-tag collisions. We can show the following key esult. pobability vecto. Let P Theoem 1: Assume that the inteogation inteval T is selected lage enough to be at least twice as lage as the length of any inteogation pocess among eades. That is, let max τ (N ) T/2. (7) In that case, fo each eade,wehave P (p) = ( ( n S 1 γ,n e C p )) n,e ( c C p (,c m I (1 γ,m p m,c ) )) (8), whee γ,n denotes the pobability that the inteogation pocesses of eades an have any time ovelapping: γ,n = τ (N )+τ n (N n ). (9) T If Δ,n is known (by clock synchonization of eades), then γ,n =1 if τ n (N n )<Δ,n <τ (N ); and γ,n =0 othewise. The poof of Theoem 1 is given in Appendix A. Since V I S fo each,ifneithe type 1 no type 2 eade-to-tag collisions occu, then eade-to-eade collision will not happen eithe. Thus, the set V does not appea in (8). It is easy to veify that if τ (N ) >T/2 fo all, then we can simply set γ,n =1 fo each and any n I. Thee ae seveal ways to detemine the duation of an inteogation pocess. In the EPCglobal C1G2 system, we have τ (N )=en τ slot 2.72N τ slot fo. Hee, τ slot denotes the duation of each time slot in a C1G2 fame. On aveage, we have τ slot = 850 μs [4]. Using enhanced dynamic famed slotted Aloha [10] with known N,wehaveτ (N )=3N τ slot. C. Poblem Fomulation Let P denote the feasible set of inteogation pobabilities: P = { p: c C p,c 1, p,c [0, 1],,c C }. (10) In this pape, ou goal is to select p P to incease the pobability of essful inteogation fo all eades to achieve max-min fainess among eades. As a esult, the pocessing load is evenly distibuted among all the eades. A vecto of feasible inteogation pobabilities p P is defined to be max-min fai if any ess pobability P cannot incease without deceasing some Pn which is smalle than o equal to P. To obtain max-min fainess, it suffices to solve the following non-linea optimization poblem [11, Lemma 3]: f α (P (p)) (P1) maximize p P whee f α (P )= α 1 (P ) α, (11) and α>0 is lage (e.g., α 10). Function f α is called a utility function. Next, we popose an algoithm to solve poblem (P1). III. FDFA ALGOITHM Although the utilities in (11) ae concave functions in P fo α>0, poblem (P1) is not a convex optimization poblem with espect to p, due to the poduct foms in (8). Thus, finding the optimal solutions of poblem (P1) is not easy in geneal. Fo each eade, we define p =(p,c c C). Hee, the key idea is to use the iteative coodinate ascent method [12] to locally update the inteogation pobabilities fo each eade. In this method, we fix all of the components of vecto p to some values, except fo those components coesponding to one andomly selected eade (e.g., p fo eade ). Then, in a local optimization pocedue, we maximize the objective function of poblem (P1) with espect to p. This pocedue is epeated, leading to an iteative algoithm. A. Local Poblem Let p =(p n,c, n \{},c C) denote the vecto of inteogation pobabilities of all eades othe than eade. Conside the following local poblem fo eade : maximize p 0 subject to ( p, p )) ( + ( ( )) n: S n n p, p + ( ( )) m: I m m p, p + ( ( )) k:/ S k I k ( k p ) p, p P, (Local-P1)

4 Algoithm 1 - FDFA: Executed by each eade. 1: Allocate memoy fo p and p. 2: andomly choose p and p such that ( ) p, p P. 3: Set clock time t. 4: epeat then 6: Solve poblem (Local-P1) using IPM [13]. 7: Update p accoding to the solution. 8: Boadcast a contol message to announce p. 5: if t T update then 10: Stat an inteogation inteval, using C1G2 MAC, 11: ove fequency channel c C, with pobability p,c. 12: if a contol message is eceived then 13: Update p accodingly. 14: until eade device stops opeation. 9: if t T inte whee denotes coodinate-wise inequality. Note that the objective functions in poblems (Local-P1) and (P1) ae the same. Fo the objective function in (Local-P1), the fist tem is inceasing in p. The second and thid tems ae deceasing in p. The last tem does not depend on p as fo each eade k, such that / S k I k, pobability Pk does not depend on p. By solving poblem (Local-P1), eade can select p such that the objective function in poblem (P1) is maximized assuming that p is fixed (i.e., none of the othe eades change thei inteogation pobabilities). Theoem 2: Fo each eade, poblem (Local-P1) is a convex optimization poblem. The poof of Theoem 2 is given in Appendix B. Fom Theoem 2, we can use vaious convex pogamming techniques to solve poblem (Local-P1) in each eade. In paticula, poblem (Local-P1) can be solved using the inteio-point method (IPM) [13, Ch. 11] via local iteations if each eade can obtain the infomation on the inteogation pobabilities of all eades within d I max =max n d I n distance away. Thus, the iteative coodinate ascent method is applicable. B. FDFA Algoithm Ou poposed fully distibuted fequency allocation (FDFA) algoithm fo FID systems is given in Algoithm 1. It is executed in each eade.lett inte be an unbounded set of time instances at which eade may stat an inteogation inteval based on its inteogation pobability vecto p.fo any two consecutive elements t 1, t 2 T inte,wehave t 2 t 1 = T.LetT update be an unbounded set of time instances at which eade updates its inteogation pobability vecto p by solving poblem (Local-P1) using IPM. We assume that: (a) The updates ae asynchonous acoss the eades. That is, fo any, n such that n, wehave:t update Tn update = {}. (b) Thee is a global constant T update such that fo any, thee exist t 1,t 2 T update such that t 1 t 2 T update.in othe wods, all eades update thei inteogation pobabilities at least once evey T update time units. C. Convegence and Optimality In this section, we analytically investigate the convegence and optimality featues of Algoithm 1. At each time instance t 0, letf α (t) denote the cuent value of the objective function fo poblem (P1). We can show the following: Theoem 3: Fo any choice of system paametes and stating fom any initial point: (a) Function F α (t) is uppe bounded; i.e., F α (t) α 0. (b) Function F α (t) is non-deceasing at time t T update. That is, fo each t 1,t 2 T update such that t 1 t 2, F α (t 1 ) F α (t 2 ). (c) Algoithm 1 conveges. That is, thee exists a Fα such that Fα = lim t F α (t). The poof of Theoem 3 is given in Appendix C. Theoem 3 guaantees the convegence of Algoithm 1 fo any choice of system paametes. We can futhe show that: Theoem 4: Any fixed point of Algoithm 1 is a stationay point of poblem (P1). That is, it is at least a locally optimal solution fo the non-convex optimization poblem (P1). The poof of Theoem 4 is given in Appendix D. Fom Theoems 3 and 4, convegence and local optimality of Algoithm 1 ae guaanteed. Clealy, the obtained inteogation pobabilities may not necessaily be globally optimal. Howeve, simulation esults in Section IV show that Algoithm 1 usually esults in nea globally optimal pefomance, making it a pactical distibuted fequency selection and andomized inteogation algoithm fo lage-scale FID systems. IV. PEFOMANCE EVALUATION In this section, we evaluate the pefomance of the poposed FDFA algoithm and compae it with fou othe distibuted andomized inteogation schemes. In the simulation model, the total coveage aea is a lage squae waehouse with each side equal to 1 km. Thee ae 25 eades andomly deployed in the field such that complete inteogation coveage is achieved. Clealy, some spots can be within the inteogation aeas of multiple eades. Fo each eade, the inteogation ange d and the intefeence ange d I ae 50 m and 100 m, espectively [14]. On aveage, thee ae 1,000 mobile tags in the inteogation ange of each eade. The inteogation inteval T is 10 sec. We also set α =10. The aveage time fo a complete essful inteogation pocess is 3 sec, assuming that the enhanced dynamic famed slotted Aloha [10] is being used. We also set τ slot equal to 1 ms as in [4]. Poblem (Local- P1) is solved by using the MOSEK optimization softwae [15]. We stat by fist compaing the FDFA algoithm with DIA [7], S-LBT [8], and andom anaive algoithms [6] in tems of the aveage pobability of a essful inteogation among all eades (i.e., the atio of the essfully inteogated tags compaed to the total numbe of tags in the system). The simulation time is 1,000 sec. The esults when the numbe of channels C vaies fom 1 to 15 ae shown in Fig. 5. In this figue, each point epesents the aveage esults of simulating 20 diffeent andomly geneated topologies. We can see that, fo all algoithms, the pobabilities incease as moe channels become available. Howeve, the FDFA algoithm always outpefoms the othe heuistic algoithms. Notice that all algoithms each some satuation levels, which ae diffeent fo all algoithms. ecall fom Section II that eade-to-eade and type 1 eade-to-tag collisions can be avoided if the neighboing eades opeate on diffeent channels. Howeve, having the eades opeate on diffeent channels cannot avoid type 2 eade-to-tag collision. Thus, if the numbe of channels

5 Aveage Pobability of Successful Inteogation FDFA with known AFs FDFA with unknown AFs DIA S LBT andom Naive Numbe of Fequency Channels, C Numbe of Successful Inteogations in the eade with Minimum Successful Inteogations FDFA with known AFs FDFA with unknown AFs DIA S LBT andom Naive (sec) Fig. 5. Compaison between the poposed FDFA algoithm and DIA [7], S-LBT [8], and also andom, anaive [6] algoithms when the numbe of channels vaies fom 1 to 15. FDFA outpefoms all othe heuistic algoithms. Fig. 6. Compaison between FDFA algoithm with the DIA [7], S-LBT [8], and also andom, anaive [6] algoithms in tems of max-min fainess. is high, diffeent algoithms diffe depending on thei type 2 eade-to-tag collision avoidance. Fom Fig. 5, FDFA bette avoids type 2 eade-to-tag collisions than the othe algoithms. Next, we investigate fainess (i.e., balanced pefomance) among eades. Following the same simulation model as in [7], [8], we assume that the numbe of channels C is 10. The simulation time is 1,000 sec. We compae the minimum numbe of essful inteogations among eades fo diffeent algoithms. esults ae shown in Fig. 6. Each cuve epesents the aveage esults of simulating 20 diffeent andomly geneated topologies. We can see that the FDFA algoithm pefoms bette than all the heuistic algoithms as max-min fainess is indeed the design objective fo FDFA. Using FDFA, if the asynchonism factos (AFs) (i.e., Δ,n fo all, n )ae unknown, theminimum numbe of essful inteogations among all eades, which is measued at the end of the simulation, i.e., afte 1000 time slots, is 23. We notice that since each inteogation inteval T takes 10 sec, thee ae in total 1000/10 = 100 inteogation attempts duing the simulation time. Since, in the wost case, 23 out of 100 attempts ae essful, the minimum pobability of essful inteogation among all eades is This is 29%, 47%, 63%, and 121% highe than a simila value fo DIA, S-LBT, andom, and naive algoithms, espectively. If the AFs ae known, then the minimum pobability of essful inteogation futhe inceases by 11%. Notice that by achieving max-min fainess, the pocessing load becomes simila fo all eade devices. Finally, we investigate optimality. ecall that the FDFA algoithm aims to maximize the objective value of the max-min (p))). We detemine the pecentage diffeence of the optimal values obtained fom the FDFA algoithm to the global optimal value of poblem (P1). We conside 20 andom topologies, each has 25 eades and 10 channels. The global optimum of poblem (P1) is appoximately obtained by unning the FDFA algoithm 100 times, with each time stating fom a diffeent andomly selected initial point. The global optimal value is then selected to be the maximum obseved local optimum among all 100 simulations. esults ae shown in Fig. 7. On aveage, FDFA achieves 95.1% fainess poblem (i.e., f α(p Nomalized Objective Value (%) fo Max Min Fainess Poblem FDFA with unknown AFs Topology Numbe Fig. 7. Optimality of FDFA algoithm in tems of maximizing the objective value fo max-min fainess poblem (P1). of the global optimal value of poblem (P1). This implies nea optimal pefomance fo the FDFA algoithm. V. CONCLUSION In this pape, we systematically studied the andomized multi-channel inteogation poblem fo lage-scale and dense FID systems. We fist modeled the eade-to-eade collision and eade-to-tag collisions (both types) in FID systems. We then deived the pobability of pefoming a essful inteogation by each eade, whee the eades opeate asynchonously. The joint channel selection and andomized inteogation poblem was fomulated as a max-min fai esouce allocation poblem. We poposed a distibuted algoithm, called FDFA, to solve the optimization poblem. FDFA is guaanteed to convege to at least a local optimal solution of the max-min fainess poblem. Simulation esults show that FDFA has a significantly bette pefomance compaed to the peviously poposed heuistic multi-channel anti-collision algoithms in tems of the numbe of coect inteogations and fainess among eades. It also bette utilizes the fequency spectum and has a fast convegence speed.

6 APPENDIX A. Poof of Theoem 1 We fist pove (9). Given (7), fo each pai, n,an inteogation cycle (which consists of all inteogation fames within an inteogation inteval) fo eade n (with duation τ n (N n )) may ovelap with only one inteogation cycle of eade (with duation τ (N )). Fom Fig. 4, ovelapping of inteogation cycles between eades an occus when τ n (N n ) < Δ,n <τ (N ). (12) Since eades andomly and independently stat up thei opeation, Δ,n has a unifom distibution ove T/2 and T/2. Thus, the pobability of (12) happening is as in (9). Next, we notice that fo each eade, the pobability of completing a essful inteogation is obtained as P (p) = c C p,c P ( ) A No,c A NoT1,c A NoT2,c, (13) whee P(A No,c A NoT1,c A NoT2,c ) denotes the pobability that no eade collision occus while eade is pefoming an inteogation on channel c. A No,c, A NoT1,c, and A NoT2,c coespond to the events whee no eade-to-eade collisions, no type 1 eade-to-tag collisions, ano type 2 eade-to-tag collisions occu, espectively. Since V I S, if eadeto-tag collisions do not happen, then eade-to-eade collision cannot happen eithe. Thus, we have P(A No,c A NoT1,c A NoT2,c )=P(A NoT1,c A NoT2,c ). (14) Since A NoT1,c and A NoT2,c ae independent events due to (3), we have: P(A NoT1,c A NoT2,c )=P(A NoT1,c ) P(A NoT2,c ). Finally, fo all c C,wehaveP(A NoT1,c )= n I (1 γ,n p n,c ) and P(A NoT2,c )= ( n S 1 γ,n e C p n,e). eplacing these pobabilities in (13), we obtain (8). B. Poof of Theoem 2 Fom (8), the objective function in (Local-P1) becomes ( f α c C θ ) (,c p,c + n: S n f α ϑ,n (1 γ,n c C p,c) ) + m: I m f α ( c C ζ,m,c(1 γ,m p,c ) ) + ξ, whee θ,c, ϑ,n, ζ,m,c, and ξ only depend on p and can be teated as constants in poblem (Local-P1). Fo example, θ,c = ( i S (1 γ,i e C p i,e) ) ( ) j I (1 γ,j p j,c ). Since f α is concave fo, the objective function of poblem (Local-P1) is a summation of concave-affine compositions ove p. Thus, it is concave. Since the constaint in (Local-P1) is linea, poblem (Local-P1) is a convex poblem. C. Poof of Theoem 3 Pat (a): Since P 1, f α (P ) f α (1) = 1/α. Pat (b): We pove this pat by contadiction. Fist, we assume that F α (t 1 ) >F α (t 2 ). In that case, thee exists a time instance t [t 1,t 2 ] such that unning Algoithm 1 esults in educing the value of the objective function of poblem (P1) at time t. In othe wods, thee exists a eade such that t T update and F α is educed by executing line 6 of Algoithm 1 in eade. Howeve, this is impossible as the objective function in poblem (P1) is the same as that in poblem (Local-P1). Thus, we indeed have F α (t 1 ) F α (t 2 ). Pat (c): The limit in this pat diectly esults fom Pats (a) and (b). Notice that any uppe boundeon-deceasing sequence of eal numbes conveges to a fixed point. D. Poof of Theoem 4 Let p denote any fixed point of Algoithm 1. Given p = p fo, p = p is the optimal solution of poblem (Local-P1). Since (Local-P1) is convex, p should satisfy the Kaush-Kuhn-Tucke (KKT) conditions [13, p. 244] coesponding to (Local-P1) fo all. By definition, each stationay point [16, p. 194] of non-convex poblem (P1) should also satisfy all the KKT conditions fo poblem (P1). Since the objective functions in poblems (P1) and (Local- P1) ae the same and the set of constaints in (P1) is the union of the set of constaints in (Local-P1) fo all, the KKT conditions fo non-convex poblem (P1) ae equal to the union of the KKT conditions fo poblem (Local-P1) fo all. Thus, since p satisfies the KKT conditions of poblem (Local-P1) fo all eades, it also satisfies the KKT conditions fo poblem (P1). That is, each fixed point p is a local optimal solution fo poblem (P1). ACKNOWLEDGEMENT This eseach is suppoted by the Natual Sciences and Engineeing eseach Council (NSEC) of Canada unde gant numbe STPGP EFEENCES [1] V. Shah-Mansoui and V. W. S. Wong, Anonymous cadinality estimation in FID systems with multiple eades, in Poc. of IEEE Globecom, Honolulu, HI, Dec [2] J. S. Choi, H. Lee, D. W. Engels, and. Elmasi, obust and dynamic bin slotted anti-collision algoithms in FID systems, in Poc. of IEEE Int l Conf. on FID, Las Vegas, NV, Ap [3] H. Koh, S. Yun, and H. Kim, Sidewalk: a FID tag anti-collision algoithm exploiting sequential aangements of tags, in Poc. of IEEE ICC, Beijing, China, May [4] EPCglobal, Class 1 Geneation 2 UHF ai inteface potocol standad, v , Dec [Online]. Available: [5] Z. Zhou, H. Gupta, S.. Das, and X. Zhu, Slotted scheduled tag access in multi-eade FID systems, in Poc. of IEEE Int l Conf. on Netwoks Potocols (ICNP), Beijing, China, Sept [6] S. Jain and S.. Das, Collision avoidance in a dense FID netwok, in Poc. of ACM Int l Wokshop on Wieless Netwok Testbeds, Expeimental Evaluation and Chaacteization, Los Angeles, CA, Sept [7] Y. Tanaka and I. Sasase, Intefeence avoidance algoithms fo passive FID systems using contention-based tansmit abotion, IEICE Tans. on Communications, vol. E90-B, pp , Nov [8] C.-H. Quan, J.-C. Choi, G.-Y. Choi, and C.-W. Lee, The Slotted-LBT: A FID eade medium access scheme in dense eade envionments, in Poc. of IEEE Int l Conf. on FID, Las Vegas, NV, Ap [9] EPCglobal, Low level eade potocol, Aug [Online]. Available: [10] S.-. Lee, S.-D. Joo, and C.-W. Lee, An enhanced dynamic famed slotted ALOHA algoithm fo FID tag identification, in Poc. of Int l Conf. on Mobile and Ubiquitous Systems, San Diego, CA, July [11] J. Mo and J. Waland, Fai end-to-end window-based congestion contol, IEEE/ACM Tans. Netwoking, vol. 8, pp , Oct [12] D. P. Betsekas and J. N. Tsitsiklis, Paallel and Distibuted Computation: Numeical Methods. Pentice Hall, [13] S. Boyd and L. Vandenbeghe, Convex Optimization. Cambidge Univesity Pess, [14] S. Ahson and M. Ilyas, FID Handbook: Applications, Technology, Secuity, and Pivacy. CC Pess, [15] MOSEK [16] D. P. Betsekas, Nonlinea Pogamming, 2nd ed. Athena Sci., 2004.

Effect of Contention Window on the Performance of IEEE 802.11 WLANs

Effect of Contention Window on the Performance of IEEE 802.11 WLANs Effect of Contention Window on the Pefomance of IEEE 82.11 WLANs Yunli Chen and Dhama P. Agawal Cente fo Distibuted and Mobile Computing, Depatment of ECECS Univesity of Cincinnati, OH 45221-3 {ychen,

More information

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM Main Golub Faculty of Electical Engineeing and Computing, Univesity of Zageb Depatment of Electonics, Micoelectonics,

More information

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS ON THE R POLICY IN PRODUCTION-INVENTORY SYSTEMS Saifallah Benjaafa and Joon-Seok Kim Depatment of Mechanical Engineeing Univesity of Minnesota Minneapolis MN 55455 Abstact We conside a poduction-inventoy

More information

Software Engineering and Development

Software Engineering and Development I T H E A 67 Softwae Engineeing and Development SOFTWARE DEVELOPMENT PROCESS DYNAMICS MODELING AS STATE MACHINE Leonid Lyubchyk, Vasyl Soloshchuk Abstact: Softwae development pocess modeling is gaining

More information

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing M13914 Questions & Answes Chapte 10 Softwae Reliability Pediction, Allocation and Demonstation Testing 1. Homewok: How to deive the fomula of failue ate estimate. λ = χ α,+ t When the failue times follow

More information

The Binomial Distribution

The Binomial Distribution The Binomial Distibution A. It would be vey tedious if, evey time we had a slightly diffeent poblem, we had to detemine the pobability distibutions fom scatch. Luckily, thee ae enough similaities between

More information

Efficient Redundancy Techniques for Latency Reduction in Cloud Systems

Efficient Redundancy Techniques for Latency Reduction in Cloud Systems Efficient Redundancy Techniques fo Latency Reduction in Cloud Systems 1 Gaui Joshi, Emina Soljanin, and Gegoy Wonell Abstact In cloud computing systems, assigning a task to multiple seves and waiting fo

More information

Timing Synchronization in High Mobility OFDM Systems

Timing Synchronization in High Mobility OFDM Systems Timing Synchonization in High Mobility OFDM Systems Yasamin Mostofi Depatment of Electical Engineeing Stanfod Univesity Stanfod, CA 94305, USA Email: yasi@wieless.stanfod.edu Donald C. Cox Depatment of

More information

MATHEMATICAL SIMULATION OF MASS SPECTRUM

MATHEMATICAL SIMULATION OF MASS SPECTRUM MATHEMATICA SIMUATION OF MASS SPECTUM.Beánek, J.Knížek, Z. Pulpán 3, M. Hubálek 4, V. Novák Univesity of South Bohemia, Ceske Budejovice, Chales Univesity, Hadec Kalove, 3 Univesity of Hadec Kalove, Hadec

More information

The transport performance evaluation system building of logistics enterprises

The transport performance evaluation system building of logistics enterprises Jounal of Industial Engineeing and Management JIEM, 213 6(4): 194-114 Online ISSN: 213-953 Pint ISSN: 213-8423 http://dx.doi.og/1.3926/jiem.784 The tanspot pefomance evaluation system building of logistics

More information

Peer-to-Peer File Sharing Game using Correlated Equilibrium

Peer-to-Peer File Sharing Game using Correlated Equilibrium Pee-to-Pee File Shaing Game using Coelated Equilibium Beibei Wang, Zhu Han, and K. J. Ray Liu Depatment of Electical and Compute Engineeing and Institute fo Systems Reseach, Univesity of Mayland, College

More information

Tracking/Fusion and Deghosting with Doppler Frequency from Two Passive Acoustic Sensors

Tracking/Fusion and Deghosting with Doppler Frequency from Two Passive Acoustic Sensors Tacking/Fusion and Deghosting with Dopple Fequency fom Two Passive Acoustic Sensos Rong Yang, Gee Wah Ng DSO National Laboatoies 2 Science Pak Dive Singapoe 11823 Emails: yong@dso.og.sg, ngeewah@dso.og.sg

More information

An Efficient Group Key Agreement Protocol for Ad hoc Networks

An Efficient Group Key Agreement Protocol for Ad hoc Networks An Efficient Goup Key Ageement Potocol fo Ad hoc Netwoks Daniel Augot, Raghav haska, Valéie Issany and Daniele Sacchetti INRIA Rocquencout 78153 Le Chesnay Fance {Daniel.Augot, Raghav.haska, Valéie.Issany,

More information

Adaptive Queue Management with Restraint on Non-Responsive Flows

Adaptive Queue Management with Restraint on Non-Responsive Flows Adaptive Queue Management wi Restaint on Non-Responsive Flows Lan Li and Gyungho Lee Depatment of Electical and Compute Engineeing Univesity of Illinois at Chicago 85 S. Mogan Steet Chicago, IL 667 {lli,

More information

Episode 401: Newton s law of universal gravitation

Episode 401: Newton s law of universal gravitation Episode 401: Newton s law of univesal gavitation This episode intoduces Newton s law of univesal gavitation fo point masses, and fo spheical masses, and gets students pactising calculations of the foce

More information

An Epidemic Model of Mobile Phone Virus

An Epidemic Model of Mobile Phone Virus An Epidemic Model of Mobile Phone Vius Hui Zheng, Dong Li, Zhuo Gao 3 Netwok Reseach Cente, Tsinghua Univesity, P. R. China zh@tsinghua.edu.cn School of Compute Science and Technology, Huazhong Univesity

More information

Nontrivial lower bounds for the least common multiple of some finite sequences of integers

Nontrivial lower bounds for the least common multiple of some finite sequences of integers J. Numbe Theoy, 15 (007), p. 393-411. Nontivial lowe bounds fo the least common multiple of some finite sequences of integes Bai FARHI bai.fahi@gmail.com Abstact We pesent hee a method which allows to

More information

Data Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation

Data Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation (213) 1 28 Data Cente Demand Response: Avoiding the Coincident Peak via Wokload Shifting and Local Geneation Zhenhua Liu 1, Adam Wieman 1, Yuan Chen 2, Benjamin Razon 1, Niangjun Chen 1 1 Califonia Institute

More information

FXA 2008. Candidates should be able to : Describe how a mass creates a gravitational field in the space around it.

FXA 2008. Candidates should be able to : Describe how a mass creates a gravitational field in the space around it. Candidates should be able to : Descibe how a mass ceates a gavitational field in the space aound it. Define gavitational field stength as foce pe unit mass. Define and use the peiod of an object descibing

More information

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS Vesion:.0 Date: June 0 Disclaime This document is solely intended as infomation fo cleaing membes and othes who ae inteested in

More information

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN Modeling and Veifying a Pice Model fo Congestion Contol in Compute Netwoks Using PROMELA/SPIN Clement Yuen and Wei Tjioe Depatment of Compute Science Univesity of Toonto 1 King s College Road, Toonto,

More information

Approximation Algorithms for Data Management in Networks

Approximation Algorithms for Data Management in Networks Appoximation Algoithms fo Data Management in Netwoks Chistof Kick Heinz Nixdof Institute and Depatment of Mathematics & Compute Science adebon Univesity Gemany kueke@upb.de Haald Räcke Heinz Nixdof Institute

More information

An Introduction to Omega

An Introduction to Omega An Intoduction to Omega Con Keating and William F. Shadwick These distibutions have the same mean and vaiance. Ae you indiffeent to thei isk-ewad chaacteistics? The Finance Development Cente 2002 1 Fom

More information

An Energy Efficient and Accurate Slot Synchronization Scheme for Wireless Sensor Networks

An Energy Efficient and Accurate Slot Synchronization Scheme for Wireless Sensor Networks An Enegy Efficient and Accuate Slot Synchonization Scheme fo Wieless Senso Netwoks Lillian Dai Pithwish asu Jason Redi N Technologies, 0 Moulton St., Cambidge, MA 038 ldai@bbn.com pbasu@bbn.com edi@bbn.com

More information

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN*

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN* Automatic Testing of Neighbo Discovey Potocol Based on FSM and TTCN* Zhiliang Wang, Xia Yin, Haibin Wang, and Jianping Wu Depatment of Compute Science, Tsinghua Univesity Beijing, P. R. China, 100084 Email:

More information

YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH

YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH nd INTERNATIONAL TEXTILE, CLOTHING & ESIGN CONFERENCE Magic Wold of Textiles Octobe 03 d to 06 th 004, UBROVNIK, CROATIA YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH Jana VOBOROVA; Ashish GARG; Bohuslav

More information

Signal Processing in RFID

Signal Processing in RFID Signal Pocessing in RFID Makus Rupp, Jelena Kaitović, Robet Langwiese Institute of Telecommunications, Vienna Univesity of Technology Duisbug July 5, 202 Outline Intoduction Tag Collision Model Simple

More information

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available

More information

Supplementary Material for EpiDiff

Supplementary Material for EpiDiff Supplementay Mateial fo EpiDiff Supplementay Text S1. Pocessing of aw chomatin modification data In ode to obtain the chomatin modification levels in each of the egions submitted by the use QDCMR module

More information

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor > PNN05-P762 < Reduced Patten Taining Based on Task Decomposition Using Patten Distibuto Sheng-Uei Guan, Chunyu Bao, and TseNgee Neo Abstact Task Decomposition with Patten Distibuto (PD) is a new task

More information

An application of stochastic programming in solving capacity allocation and migration planning problem under uncertainty

An application of stochastic programming in solving capacity allocation and migration planning problem under uncertainty An application of stochastic pogamming in solving capacity allocation and migation planning poblem unde uncetainty Yin-Yann Chen * and Hsiao-Yao Fan Depatment of Industial Management, National Fomosa Univesity,

More information

2 r2 θ = r2 t. (3.59) The equal area law is the statement that the term in parentheses,

2 r2 θ = r2 t. (3.59) The equal area law is the statement that the term in parentheses, 3.4. KEPLER S LAWS 145 3.4 Keple s laws You ae familia with the idea that one can solve some mechanics poblems using only consevation of enegy and (linea) momentum. Thus, some of what we see as objects

More information

Does Full-Duplex Double the Capacity of Wireless Networks?

Does Full-Duplex Double the Capacity of Wireless Networks? Does Full-Duplex Double the Capacity of Wieless Netwoks? Xiufeng Xie and Xinyu Zhang Univesity of Wisconsin-Madison Email: {xiufeng, xyzhang}@ece.wisc.edu Abstact Full-duplex has emeged as a new communication

More information

An Approach to Optimized Resource Allocation for Cloud Simulation Platform

An Approach to Optimized Resource Allocation for Cloud Simulation Platform An Appoach to Optimized Resouce Allocation fo Cloud Simulation Platfom Haitao Yuan 1, Jing Bi 2, Bo Hu Li 1,3, Xudong Chai 3 1 School of Automation Science and Electical Engineeing, Beihang Univesity,

More information

Cloud Service Reliability: Modeling and Analysis

Cloud Service Reliability: Modeling and Analysis Cloud Sevice eliability: Modeling and Analysis Yuan-Shun Dai * a c, Bo Yang b, Jack Dongaa a, Gewei Zhang c a Innovative Computing Laboatoy, Depatment of Electical Engineeing & Compute Science, Univesity

More information

Chapter 3 Savings, Present Value and Ricardian Equivalence

Chapter 3 Savings, Present Value and Ricardian Equivalence Chapte 3 Savings, Pesent Value and Ricadian Equivalence Chapte Oveview In the pevious chapte we studied the decision of households to supply hous to the labo maket. This decision was a static decision,

More information

Top K Nearest Keyword Search on Large Graphs

Top K Nearest Keyword Search on Large Graphs Top K Neaest Keywod Seach on Lage Gaphs Miao Qiao, Lu Qin, Hong Cheng, Jeffey Xu Yu, Wentao Tian The Chinese Univesity of Hong Kong, Hong Kong, China {mqiao,lqin,hcheng,yu,wttian}@se.cuhk.edu.hk ABSTRACT

More information

Pessu Behavior Analysis for Autologous Fluidations

Pessu Behavior Analysis for Autologous Fluidations EXPERIENCE OF USING A CFD CODE FOR ESTIMATING THE NOISE GENERATED BY GUSTS ALONG THE SUN- ROOF OF A CAR Liang S. Lai* 1, Geogi S. Djambazov 1, Choi -H. Lai 1, Koulis A. Peicleous 1, and Fédéic Magoulès

More information

Channel selection in e-commerce age: A strategic analysis of co-op advertising models

Channel selection in e-commerce age: A strategic analysis of co-op advertising models Jounal of Industial Engineeing and Management JIEM, 013 6(1):89-103 Online ISSN: 013-0953 Pint ISSN: 013-843 http://dx.doi.og/10.396/jiem.664 Channel selection in e-commece age: A stategic analysis of

More information

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION Page 1 STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION C. Alan Blaylock, Hendeson State Univesity ABSTRACT This pape pesents an intuitive appoach to deiving annuity fomulas fo classoom use and attempts

More information

UNIT CIRCLE TRIGONOMETRY

UNIT CIRCLE TRIGONOMETRY UNIT CIRCLE TRIGONOMETRY The Unit Cicle is the cicle centeed at the oigin with adius unit (hence, the unit cicle. The equation of this cicle is + =. A diagam of the unit cicle is shown below: + = - - -

More information

Research on Risk Assessment of the Transformer Based on Life Cycle Cost

Research on Risk Assessment of the Transformer Based on Life Cycle Cost ntenational Jounal of Smat Gid and lean Enegy eseach on isk Assessment of the Tansfome Based on Life ycle ost Hui Zhou a, Guowei Wu a, Weiwei Pan a, Yunhe Hou b, hong Wang b * a Zhejiang Electic Powe opoation,

More information

A Two-Step Tabu Search Heuristic for Multi-Period Multi-Site Assignment Problem with Joint Requirement of Multiple Resource Types

A Two-Step Tabu Search Heuristic for Multi-Period Multi-Site Assignment Problem with Joint Requirement of Multiple Resource Types Aticle A Two-Step Tabu Seach Heuistic fo Multi-Peiod Multi-Site Assignment Poblem with Joint Requiement of Multiple Resouce Types Siavit Swangnop and Paveena Chaovalitwongse* Depatment of Industial Engineeing,

More information

Optimal Peer Selection in a Free-Market Peer-Resource Economy

Optimal Peer Selection in a Free-Market Peer-Resource Economy Optimal Pee Selection in a Fee-Maket Pee-Resouce Economy Micah Adle, Rakesh Kuma, Keith Ross, Dan Rubenstein, David Tune and David D Yao Dept of Compute Science Univesity of Massachusetts Amhest, MA; Email:

More information

An Analysis of Manufacturer Benefits under Vendor Managed Systems

An Analysis of Manufacturer Benefits under Vendor Managed Systems An Analysis of Manufactue Benefits unde Vendo Managed Systems Seçil Savaşaneil Depatment of Industial Engineeing, Middle East Technical Univesity, 06531, Ankaa, TURKEY secil@ie.metu.edu.t Nesim Ekip 1

More information

Financing Terms in the EOQ Model

Financing Terms in the EOQ Model Financing Tems in the EOQ Model Habone W. Stuat, J. Columbia Business School New Yok, NY 1007 hws7@columbia.edu August 6, 004 1 Intoduction This note discusses two tems that ae often omitted fom the standad

More information

High Availability Replication Strategy for Deduplication Storage System

High Availability Replication Strategy for Deduplication Storage System Zhengda Zhou, Jingli Zhou College of Compute Science and Technology, Huazhong Univesity of Science and Technology, *, zhouzd@smail.hust.edu.cn jlzhou@mail.hust.edu.cn Abstact As the amount of digital data

More information

SUPPORT VECTOR MACHINE FOR BANDWIDTH ANALYSIS OF SLOTTED MICROSTRIP ANTENNA

SUPPORT VECTOR MACHINE FOR BANDWIDTH ANALYSIS OF SLOTTED MICROSTRIP ANTENNA Intenational Jounal of Compute Science, Systems Engineeing and Infomation Technology, 4(), 20, pp. 67-7 SUPPORT VECTOR MACHIE FOR BADWIDTH AALYSIS OF SLOTTED MICROSTRIP ATEA Venmathi A.R. & Vanitha L.

More information

who supply the system vectors for their JVM products. 1 HBench:Java will work best with support from JVM vendors

who supply the system vectors for their JVM products. 1 HBench:Java will work best with support from JVM vendors Appeaed in the ACM Java Gande 2000 Confeence, San Fancisco, Califonia, June 3-5, 2000 HBench:Java: An Application-Specific Benchmaking Famewok fo Java Vitual Machines Xiaolan Zhang Mago Seltze Division

More information

Semipartial (Part) and Partial Correlation

Semipartial (Part) and Partial Correlation Semipatial (Pat) and Patial Coelation his discussion boows heavily fom Applied Multiple egession/coelation Analysis fo the Behavioal Sciences, by Jacob and Paticia Cohen (975 edition; thee is also an updated

More information

Mining Relatedness Graphs for Data Integration

Mining Relatedness Graphs for Data Integration Mining Relatedness Gaphs fo Data Integation Jeemy T. Engle (jtengle@indiana.edu) Ying Feng (yingfeng@indiana.edu) Robet L. Goldstone (goldsto@indiana.edu) Indiana Univesity Bloomington, IN. 47405 USA Abstact

More information

A Capacitated Commodity Trading Model with Market Power

A Capacitated Commodity Trading Model with Market Power A Capacitated Commodity Tading Model with Maket Powe Victo Matínez-de-Albéniz Josep Maia Vendell Simón IESE Business School, Univesity of Navaa, Av. Peason 1, 08034 Bacelona, Spain VAlbeniz@iese.edu JMVendell@iese.edu

More information

Converting knowledge Into Practice

Converting knowledge Into Practice Conveting knowledge Into Pactice Boke Nightmae srs Tend Ride By Vladimi Ribakov Ceato of Pips Caie 20 of June 2010 2 0 1 0 C o p y i g h t s V l a d i m i R i b a k o v 1 Disclaime and Risk Wanings Tading

More information

NUCLEAR MAGNETIC RESONANCE

NUCLEAR MAGNETIC RESONANCE 19 Jul 04 NMR.1 NUCLEAR MAGNETIC RESONANCE In this expeiment the phenomenon of nuclea magnetic esonance will be used as the basis fo a method to accuately measue magnetic field stength, and to study magnetic

More information

Energy Efficient Cache Invalidation in a Mobile Environment

Energy Efficient Cache Invalidation in a Mobile Environment Enegy Efficient Cache Invalidation in a Mobile Envionment Naottam Chand, Ramesh Chanda Joshi, Manoj Misa Electonics & Compute Engineeing Depatment Indian Institute of Technology, Rookee - 247 667. INDIA

More information

Over-encryption: Management of Access Control Evolution on Outsourced Data

Over-encryption: Management of Access Control Evolution on Outsourced Data Ove-encyption: Management of Access Contol Evolution on Outsouced Data Sabina De Capitani di Vimecati DTI - Univesità di Milano 26013 Cema - Italy decapita@dti.unimi.it Stefano Paaboschi DIIMM - Univesità

More information

PAN STABILITY TESTING OF DC CIRCUITS USING VARIATIONAL METHODS XVIII - SPETO - 1995. pod patronatem. Summary

PAN STABILITY TESTING OF DC CIRCUITS USING VARIATIONAL METHODS XVIII - SPETO - 1995. pod patronatem. Summary PCE SEMINIUM Z PODSTW ELEKTOTECHNIKI I TEOII OBWODÓW 8 - TH SEMIN ON FUNDMENTLS OF ELECTOTECHNICS ND CICUIT THEOY ZDENĚK BIOLEK SPŠE OŽNO P.., CZECH EPUBLIC DLIBO BIOLEK MILITY CDEMY, BNO, CZECH EPUBLIC

More information

Modal Characteristics study of CEM-1 Single-Layer Printed Circuit Board Using Experimental Modal Analysis

Modal Characteristics study of CEM-1 Single-Layer Printed Circuit Board Using Experimental Modal Analysis Available online at www.sciencediect.com Pocedia Engineeing 41 (2012 ) 1360 1366 Intenational Symposium on Robotics and Intelligent Sensos 2012 (IRIS 2012) Modal Chaacteistics study of CEM-1 Single-Laye

More information

Secure Smartcard-Based Fingerprint Authentication

Secure Smartcard-Based Fingerprint Authentication Secue Smatcad-Based Fingepint Authentication [full vesion] T. Chales Clancy Compute Science Univesity of Mayland, College Pak tcc@umd.edu Nega Kiyavash, Dennis J. Lin Electical and Compute Engineeing Univesity

More information

Uncertain Version Control in Open Collaborative Editing of Tree-Structured Documents

Uncertain Version Control in Open Collaborative Editing of Tree-Structured Documents Uncetain Vesion Contol in Open Collaboative Editing of Tee-Stuctued Documents M. Lamine Ba Institut Mines Télécom; Télécom PaisTech; LTCI Pais, Fance mouhamadou.ba@ telecom-paistech.f Talel Abdessalem

More information

Alarm transmission through Radio and GSM networks

Alarm transmission through Radio and GSM networks Alam tansmission though Radio and GSM netwoks 2015 Alam tansmission though Radio netwok RR-IP12 RL10 E10C E10C LAN RL1 0 R11 T10 (T10U) Windows MONAS MS NETWORK MCI > GNH > GND > +E > DATA POWER DATA BUS

More information

METHODOLOGICAL APPROACH TO STRATEGIC PERFORMANCE OPTIMIZATION

METHODOLOGICAL APPROACH TO STRATEGIC PERFORMANCE OPTIMIZATION ETHODOOGICA APPOACH TO STATEGIC PEFOANCE OPTIIZATION ao Hell * Stjepan Vidačić ** Željo Gaača *** eceived: 4. 07. 2009 Peliminay communication Accepted: 5. 0. 2009 UDC 65.02.4 This pape pesents a matix

More information

Scheduling Hadoop Jobs to Meet Deadlines

Scheduling Hadoop Jobs to Meet Deadlines Scheduling Hadoop Jobs to Meet Deadlines Kamal Kc, Kemafo Anyanwu Depatment of Compute Science Noth Caolina State Univesity {kkc,kogan}@ncsu.edu Abstact Use constaints such as deadlines ae impotant equiements

More information

Gravitational Mechanics of the Mars-Phobos System: Comparing Methods of Orbital Dynamics Modeling for Exploratory Mission Planning

Gravitational Mechanics of the Mars-Phobos System: Comparing Methods of Orbital Dynamics Modeling for Exploratory Mission Planning Gavitational Mechanics of the Mas-Phobos System: Compaing Methods of Obital Dynamics Modeling fo Exploatoy Mission Planning Alfedo C. Itualde The Pennsylvania State Univesity, Univesity Pak, PA, 6802 This

More information

The Impact of Radio Propagation Models on Ad Hoc Networks Performances

The Impact of Radio Propagation Models on Ad Hoc Networks Performances Jounal of Compute Science 8 (5): 752-760, 2012 ISSN 1549-3636 2012 Science Publications The Impact of Radio Popagation Models on Ad Hoc Netwoks Pefomances 1 Rhattoy, A. and 2 A. Zatni 1 Depatment of Compute,

More information

Ilona V. Tregub, ScD., Professor

Ilona V. Tregub, ScD., Professor Investment Potfolio Fomation fo the Pension Fund of Russia Ilona V. egub, ScD., Pofesso Mathematical Modeling of Economic Pocesses Depatment he Financial Univesity unde the Govenment of the Russian Fedeation

More information

Optimizing Content Retrieval Delay for LT-based Distributed Cloud Storage Systems

Optimizing Content Retrieval Delay for LT-based Distributed Cloud Storage Systems Optimizing Content Retieval Delay fo LT-based Distibuted Cloud Stoage Systems Haifeng Lu, Chuan Heng Foh, Yonggang Wen, and Jianfei Cai School of Compute Engineeing, Nanyang Technological Univesity, Singapoe

More information

Memory-Aware Sizing for In-Memory Databases

Memory-Aware Sizing for In-Memory Databases Memoy-Awae Sizing fo In-Memoy Databases Kasten Molka, Giuliano Casale, Thomas Molka, Laua Mooe Depatment of Computing, Impeial College London, United Kingdom {k.molka3, g.casale}@impeial.ac.uk SAP HANA

More information

THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION

THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION IADIS Intenational Confeence Applied Computing 2006 THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION Jög Roth Univesity of Hagen 58084 Hagen, Gemany Joeg.Roth@Fenuni-hagen.de ABSTRACT

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations By Victo Avela White Pape #48 Executive Summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance the availability

More information

Review Graph based Online Store Review Spammer Detection

Review Graph based Online Store Review Spammer Detection Review Gaph based Online Stoe Review Spamme Detection Guan Wang, Sihong Xie, Bing Liu, Philip S. Yu Univesity of Illinois at Chicago Chicago, USA gwang26@uic.edu sxie6@uic.edu liub@uic.edu psyu@uic.edu

More information

Chris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment

Chris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment Chis J. Skinne The pobability of identification: applying ideas fom foensic statistics to disclosue isk assessment Aticle (Accepted vesion) (Refeeed) Oiginal citation: Skinne, Chis J. (2007) The pobability

More information

How To Find The Optimal Stategy For Buying Life Insuance

How To Find The Optimal Stategy For Buying Life Insuance Life Insuance Puchasing to Reach a Bequest Ehan Bayakta Depatment of Mathematics, Univesity of Michigan Ann Abo, Michigan, USA, 48109 S. David Pomislow Depatment of Mathematics, Yok Univesity Toonto, Ontaio,

More information

Database Management Systems

Database Management Systems Contents Database Management Systems (COP 5725) D. Makus Schneide Depatment of Compute & Infomation Science & Engineeing (CISE) Database Systems Reseach & Development Cente Couse Syllabus 1 Sping 2012

More information

Financial Planning and Risk-return profiles

Financial Planning and Risk-return profiles Financial Planning and Risk-etun pofiles Stefan Gaf, Alexande Kling und Jochen Russ Pepint Seies: 2010-16 Fakultät fü Mathematik und Witschaftswissenschaften UNIERSITÄT ULM Financial Planning and Risk-etun

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations White Pape 48 Revision by Victo Avela > Executive summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance

More information

Manual ultrasonic inspection of thin metal welds

Manual ultrasonic inspection of thin metal welds Manual ultasonic inspection of thin metal welds Capucine Capentie and John Rudlin TWI Cambidge CB1 6AL, UK Telephone 01223 899000 Fax 01223 890689 E-mail capucine.capentie@twi.co.uk Abstact BS EN ISO 17640

More information

The Detection of Obstacles Using Features by the Horizon View Camera

The Detection of Obstacles Using Features by the Horizon View Camera The Detection of Obstacles Using Featues b the Hoizon View Camea Aami Iwata, Kunihito Kato, Kazuhiko Yamamoto Depatment of Infomation Science, Facult of Engineeing, Gifu Univesit aa@am.info.gifu-u.ac.jp

More information

MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION

MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION K.C. CHANG AND TAN ZHANG In memoy of Pofesso S.S. Chen Abstact. We combine heat flow method with Mose theoy, supe- and subsolution method with

More information

30 H. N. CHIU 1. INTRODUCTION. Recherche opérationnelle/operations Research

30 H. N. CHIU 1. INTRODUCTION. Recherche opérationnelle/operations Research RAIRO Rech. Opé. (vol. 33, n 1, 1999, pp. 29-45) A GOOD APPROXIMATION OF THE INVENTORY LEVEL IN A(Q ) PERISHABLE INVENTORY SYSTEM (*) by Huan Neng CHIU ( 1 ) Communicated by Shunji OSAKI Abstact. This

More information

UNIVERSIDAD DE CANTABRIA TESIS DOCTORAL

UNIVERSIDAD DE CANTABRIA TESIS DOCTORAL UNIVERSIDAD DE CANABRIA Depatamento de Ingenieía de Comunicaciones ESIS DOCORAL Cyogenic echnology in the Micowave Engineeing: Application to MIC and MMIC Vey Low Noise Amplifie Design Juan Luis Cano de

More information

Risk Sensitive Portfolio Management With Cox-Ingersoll-Ross Interest Rates: the HJB Equation

Risk Sensitive Portfolio Management With Cox-Ingersoll-Ross Interest Rates: the HJB Equation Risk Sensitive Potfolio Management With Cox-Ingesoll-Ross Inteest Rates: the HJB Equation Tomasz R. Bielecki Depatment of Mathematics, The Notheasten Illinois Univesity 55 Noth St. Louis Avenue, Chicago,

More information

An Infrastructure Cost Evaluation of Single- and Multi-Access Networks with Heterogeneous Traffic Density

An Infrastructure Cost Evaluation of Single- and Multi-Access Networks with Heterogeneous Traffic Density An Infastuctue Cost Evaluation of Single- and Multi-Access Netwoks with Heteogeneous Taffic Density Andes Fuuskä and Magnus Almgen Wieless Access Netwoks Eicsson Reseach Kista, Sweden [andes.fuuska, magnus.almgen]@eicsson.com

More information

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo (

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo ( Hubs, Bidges, and Switches Used fo extending LANs in tems of geogaphical coveage, numbe of nodes, administation capabilities, etc. Diffe in egads to: m collision domain isolation m laye at which they opeate

More information

Spirotechnics! September 7, 2011. Amanda Zeringue, Michael Spannuth and Amanda Zeringue Dierential Geometry Project

Spirotechnics! September 7, 2011. Amanda Zeringue, Michael Spannuth and Amanda Zeringue Dierential Geometry Project Spiotechnics! Septembe 7, 2011 Amanda Zeingue, Michael Spannuth and Amanda Zeingue Dieential Geomety Poject 1 The Beginning The geneal consensus of ou goup began with one thought: Spiogaphs ae awesome.

More information

Figure 2. So it is very likely that the Babylonians attributed 60 units to each side of the hexagon. Its resulting perimeter would then be 360!

Figure 2. So it is very likely that the Babylonians attributed 60 units to each side of the hexagon. Its resulting perimeter would then be 360! 1. What ae angles? Last time, we looked at how the Geeks intepeted measument of lengths. Howeve, as fascinated as they wee with geomety, thee was a shape that was much moe enticing than any othe : the

More information

Gauss Law. Physics 231 Lecture 2-1

Gauss Law. Physics 231 Lecture 2-1 Gauss Law Physics 31 Lectue -1 lectic Field Lines The numbe of field lines, also known as lines of foce, ae elated to stength of the electic field Moe appopiately it is the numbe of field lines cossing

More information

Load Balancing in Processor Sharing Systems

Load Balancing in Processor Sharing Systems Load Balancing in ocesso Shaing Systems Eitan Altman INRIA Sophia Antipolis 2004, oute des Lucioles 06902 Sophia Antipolis, Fance altman@sophia.inia.f Utzi Ayesta LAAS-CNRS Univesité de Toulouse 7, Avenue

More information

Load Balancing in Processor Sharing Systems

Load Balancing in Processor Sharing Systems Load Balancing in ocesso Shaing Systems Eitan Altman INRIA Sophia Antipolis 2004, oute des Lucioles 06902 Sophia Antipolis, Fance altman@sophia.inia.f Utzi Ayesta LAAS-CNRS Univesité de Toulouse 7, Avenue

More information

Physics 235 Chapter 5. Chapter 5 Gravitation

Physics 235 Chapter 5. Chapter 5 Gravitation Chapte 5 Gavitation In this Chapte we will eview the popeties of the gavitational foce. The gavitational foce has been discussed in geat detail in you intoductoy physics couses, and we will pimaily focus

More information

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers Concept and Expeiences on using a Wiki-based System fo Softwae-elated Semina Papes Dominik Fanke and Stefan Kowalewski RWTH Aachen Univesity, 52074 Aachen, Gemany, {fanke, kowalewski}@embedded.wth-aachen.de,

More information

Real Time Tracking of High Speed Movements in the Context of a Table Tennis Application

Real Time Tracking of High Speed Movements in the Context of a Table Tennis Application Real Time Tacking of High Speed Movements in the Context of a Table Tennis Application Stephan Rusdof Chemnitz Univesity of Technology D-09107, Chemnitz, Gemany +49 371 531 1533 stephan.usdof@infomatik.tu-chemnitz.de

More information

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years.

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years. 9.2 Inteest Objectives 1. Undestand the simple inteest fomula. 2. Use the compound inteest fomula to find futue value. 3. Solve the compound inteest fomula fo diffeent unknowns, such as the pesent value,

More information

Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication

Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication I²MTC 2008 IEEE Intenational Instumentation and Measuement Technology Confeence Victoia, Vancouve Island, Canada, May 12 15, 2008 Powe Monitoing and Contol fo Electic Home Appliances Based on Powe Line

More information

CONCEPTUAL FRAMEWORK FOR DEVELOPING AND VERIFICATION OF ATTRIBUTION MODELS. ARITHMETIC ATTRIBUTION MODELS

CONCEPTUAL FRAMEWORK FOR DEVELOPING AND VERIFICATION OF ATTRIBUTION MODELS. ARITHMETIC ATTRIBUTION MODELS CONCEPUAL FAMEOK FO DEVELOPING AND VEIFICAION OF AIBUION MODELS. AIHMEIC AIBUION MODELS Yui K. Shestopaloff, is Diecto of eseach & Deelopment at SegmentSoft Inc. He is a Docto of Sciences and has a Ph.D.

More information

Promised Lead-Time Contracts Under Asymmetric Information

Promised Lead-Time Contracts Under Asymmetric Information OPERATIONS RESEARCH Vol. 56, No. 4, July August 28, pp. 898 915 issn 3-364X eissn 1526-5463 8 564 898 infoms doi 1.1287/ope.18.514 28 INFORMS Pomised Lead-Time Contacts Unde Asymmetic Infomation Holly

More information

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates 9:6.4 INITIAL PUBLIC OFFERINGS 9:6.4 Sample Questions/Requests fo Managing Undewite Candidates Recent IPO Expeience Please povide a list of all completed o withdawn IPOs in which you fim has paticipated

More information

The impact of migration on the provision. of UK public services (SRG.10.039.4) Final Report. December 2011

The impact of migration on the provision. of UK public services (SRG.10.039.4) Final Report. December 2011 The impact of migation on the povision of UK public sevices (SRG.10.039.4) Final Repot Decembe 2011 The obustness The obustness of the analysis of the is analysis the esponsibility is the esponsibility

More information

Magnetic Bearing with Radial Magnetized Permanent Magnets

Magnetic Bearing with Radial Magnetized Permanent Magnets Wold Applied Sciences Jounal 23 (4): 495-499, 2013 ISSN 1818-4952 IDOSI Publications, 2013 DOI: 10.5829/idosi.wasj.2013.23.04.23080 Magnetic eaing with Radial Magnetized Pemanent Magnets Vyacheslav Evgenevich

More information

Seshadri constants and surfaces of minimal degree

Seshadri constants and surfaces of minimal degree Seshadi constants and sufaces of minimal degee Wioletta Syzdek and Tomasz Szembeg Septembe 29, 2007 Abstact In [] we showed that if the multiple point Seshadi constants of an ample line bundle on a smooth

More information