Evaluation of Coordination Strategies for Heterogeneous Sensor Networks Aiming at Surveillance Applications

Size: px
Start display at page:

Download "Evaluation of Coordination Strategies for Heterogeneous Sensor Networks Aiming at Surveillance Applications"

Transcription

1 Evaluaton of Coordnaton Strateges for Heterogeneous Sensor Networs Amng at Survellance Applcatons Edson Pgnaton de Fretas, *, Tales Hemfarth*, Carlos Eduardo Perera*, Armando Morado Ferrera, Flávo Rech Wagner*, Tony Larsson IDE, Halmstad Unversty, Halmstad, Sweden. {edson.pgnaton, *Insttute of Informatcs, Federal Unversty of Ro Grande do Sul, Porto Alegre, Brazl. {themfarth, Electrcal Engneerng Department, Mltary Insttute of Engneerng, Ro de Janero, Brazl. Abstract A new challenge n the sensor networ area s the coordnaton of heterogeneous sensors (wth dfferent sensng, moblty and computng capabltes) n an ntegrated networ. Ths nd of sensor networs have clearly hgh relevance n survellance systems, n whch both low-end statc ground sensor nodes and more sophstcated sensors carred by moble platforms, such as Unmanned Aeral Vehcles (UAVs), cooperate. Ths paper provdes an analyss of two dfferent strateges to gude the collaboraton among the sensor nodes mentoned above, appled to area survellance systems. The frst analyzed problem s related to the choce of the UAV nstance that wll respond to a gven alarm ssued by a ground sensor node. The second ssue s the estmaton of the response tme untl any UAV can be engaged n handlng an alarm and effectvely handles t. Two strateges are ntroduced and compared: one based on a pheromone nspred approach and another based on utlty functons nspred on rs profles that models decsons of nvestors n the stoc maret. I. INTRODUCTION The use of UAVs n mltary mssons such as Suppresson of Enemy Ar Defense (SEAD) s beng studed by several research groups [1][2]. In addton, the advance of the Wreless Sensor Networ (WSN) technologes allows the utlzaton of UAVs equpped wth sophstcated sensors (e.g. radar, nfra-red cameras, etc) n conjuncton wth WSN nodes to perform survellance mssons [3]. However, the desgn of coordnaton strateges to mae these heterogeneous sensor networs wor effcently brngs new challenges to researchers. The coordnaton among these survellance nodes presents a hgher complexty f compared to tradtonal approaches, as for nstance, the ones used n SEAD mssons. Ths ncreasng complexty comes from concerns that range from energy consumpton of the low-end ground nodes to WSN communcaton ssues. The study of these dfferences and the adapton of strateges used to solve these coordnaton problems motvate ths wor, as descrbed further n the text. A frst motvaton for usng low-end ground sensor nodes n cooperaton wth more sophstcated sensors embedded n UAV platforms s to reduce the overall cost of the system, as the prce of ground sensor nodes s several tmes lower than the prce of UAVs, even tang nto account small UAV platforms such as MLB models [4]. Another motvaton s related to the ncrease n the system effcency, as the low-end nodes can provde nformaton about the surroundng envronment n advance to the UAVs, before they decde to move to a gven locaton. In a system n whch the UAVs have dfferent capabltes, ths nformaton can be used to support the decson about whch UAV s more sutable to a specfc stuaton, due to the types of sensors they carry, for nstance. The man contrbuton of ths paper s the ntroducton and comparson of two dfferent strateges to coordnate heterogeneous sensor networs composed by low-end wreless sensor nodes deployed on the ground and more sophstcated sensors embedded n UAV platforms, appled to area survellance systems. The frst approach uses a pheromone metaphor to drve the selecton of a UAV needed to respond an alarm ssued by a ground sensor node. The second approach uses a utlty-based functon, whch drves the negotaton among the UAVs to decde whch one s more sutable to respond a gven alarm, accordng to a rs analyss. These two approaches are then compared accordng to relevant effcency metrcs. The remander of ths paper s organzed as follows. Secton II presents the descrpton of the scenaro and the UAV model adopted n ths wor. Secton III ntroduces the pheromone-based coordnaton strategy, whle Secton IV provdes the descrpton of the utlty-based one. Secton V presents the evaluaton of the obtaned results and a dscusson on pros and cons of each strategy. Secton VI dscusses related wors, whle Secton VII concludes the paper, gvng the drectons of the future wors. Ths study s partally founded by the Brazlan CNPq (Natonal Research Councl), under a PNPD project, and by the KK- Foundaton n Sweden /09/$ IEEE 591 IEEE SENSORS 2009 Conference

2 II. SCENARIO AND MODEL DESCRIPTION A. Scenaro Descrpton The operatonal scenaro studed n ths wor s composed by a large square area, dvded n equal number of contguous columns and rows, formng a grd. Each cell of ths grd s dentfed by ts Cartesan coordnates, x and y, coverng a untary part of the entre area. All elements of the scenaro (targets and sensors) are supposed to occupy only one cell of the grd at a tme. However, one cell may be occuped by more than one element at a tme. Targets are consdered as non-authorzed ndvdual vehcles or persons, or groups of vehcles or persons, whch appear n a non-determnstc way (modeled as a Posson dstrbuton P(r), where r s the number of new targets that enter n the survellance area at a gven nstant n tme t). A gven target τ s sad to be of nd and havng an dentfer, whch represents ts entrance order n the survellance area. There are K possble nds of targets that may appear n the survellance area, so = 1,, K. The movement of the targets s consdered to be performed wth a constant speed v τ, but dfferent targets may move wth dfferent speeds. Targets may randomly change the drecton of ther movement. The survellance system s composed by heterogeneous sensors, whch have dfferent sensng and movement capabltes. There are G statc sensors on the ground (sn, = 1,, G) and N UAVs flyng over the area (u, = 1,, N). It s assumed that a statc sensor node on the ground s capable of detectng a target when t passes n ts coverage area, also called sensor range. Ths range s tunable, dependng on the type of sensor used, but for smplcty t s assumed that the range s wthn the sensor cell. When a detecton s made, an alarm s ssued, and sent to all sensors nodes (statc or carred by UAVs) that are postoned wthn the communcaton range of the alarm ssuer node. Ths range s also a tunable parameter. An alarm s ept ssued untl at least one UAV receves t. B. UAV Model The UAVs move autonomously over the survellance area, accordng to a gven movement pattern descrbed by the user when establshng the msson. The focus of ths wor s not on the movement pattern tself; for more detals about dfferent approaches that may be applcable, nterested readers are referred to [5]. The dea s that UAVs move accordng to a predefned movement pattern and then send and respond to coordnaton events needed to handle targets, accordng to the adopted strategy. 1) Internal State: The nternal state S (t) of a UAV u at a gvng tme t s composed by three elements: Physcal State, Current Tas State and Alarm Lst. The Physcal State ncludes nformaton about ts current poston p (t)= (x (t), y (t)), speed (v (t)), headng angle (ψ (t)), sensor devce types and status (ς j (t)), whch descrbes the accuracy level provded by the sensor, and energy resources (e (t)). As for Current Tas State, UAVs can perform one of the followng tass: search, analyze or trac. The search tas mplements the sequence of actons that the UAV s performng to detect a new target. The analyze tas gathers detaled nformaton about the detected target, whle the trac tas maes the UAV capable of eepng trac of a target movement. When an UAV s engaged n a msson, the Current Tas State also ncludes nformaton about whch target ths tas s referred to. The Alarm Lst contans the alarms that an UAV has nowledge about, possbly wth the nformaton about whch UAV s handlng the target subject of that alarm. 2) Knematc Model: The UAV nematc model adopted n ths wor s almost the same as adopted by several others, such as [1] and [2], n whch the UAVs move on contnuous trajectores wth constant speed and wth a constraned varaton n the headng angle. In the present wor, the assumpton of a constant speed does not hold n order to mae possble the speed adjustment to allow target tracng. Assumng ths, the followng formulas descrbe the model: dx dt dy dt = v cosψ ; v snψ dψ = ; η. (1) dt where (x, y ) denotes the poston of the UAV u, v represents ts speed, and ψ s ts headng angle, whch has η as a constrant to ts varaton. A fourth assumpton s added to the model, namely that the UAVs maxmum speed may be hgher then the targets maxmum speed (targets of any nd ), dependng on the partcular characterstcs of a gven UAV. Ths assumpton allows the system to address the needs related to survellance of large areas wth a hgh-level of responsveness to handle new targets. v MAX > v MAX. (2) However, due to constrants le energy consumpton mnmzaton, the UAVs are assumed to mantan constant speeds almost all the tme. Varatons n speed only occur when a UAV engages n a tracng tas and has to tune ts speed to trac a target movng on the ground. 3) UAV Sensng Capablty Model: The sensors that equp the UAVs are supposed to detect members of the set of possble targets and precsely analyze and trac, only a subset of the varous types of targets. Whch and how many depends on the types of sensors and targets under concern. In case that a sensor, needed for analyss or tracng of a target, s mssng or does not match well, poor results wll be generated. Fgure 1. Sensor coverage area and ranges. 592

3 The range of the detecton, analyze and trac tas capabltes are tunable, accordng to the types of sensors that equp the UAVs n the fleet. Ths tunng s done by the adjustment of the number of cells around the UAV that are able to be detected and/or analyzed/traced. It s assumed that the ranges to detect and analyze/trac are defned by an actuaton range, whch s called r D for detecton and r A for analyss/tracng. Fgure 1 llustrates ths dea. It s mportant to hghlght that t s assumed that the cells nsde the range are only consdered f ther center ponts are nsde the respectve radus. In Fgure 1, cells 1, 2, 3 and 4 are out of the range (r D ). III. PHEROMONE-BASED COORDINATION As mentoned, ths paper descrbes two approaches to coordnate a networ composed by low-end ground sensor nodes and UAVs. In ths secton, the pheromone-based approach s presented. Artfcal pheromones are usually appled to dstrbuted coordnaton by means of stgmergy, the ndrect communcaton usng envronment cues [6]. A pheromone tral s deposted n the envronment when the enttes are movng. The pheromone provdes nformaton to other enttes when they pass over t. Artfcal pheromone also looses ts strength along the tme, modelng the evaporaton of the real pheromones. In the UAV research feld, pheromones are used to gude the movement of UAV swarms, for nstance n survellance and patrollng applcatons [5] [7]. Dfferently from the exstng approaches, n the present one, pheromones are used to gude the assgnment of an UAV to a gven target. When an alarm s ssued by the detecton of a target, the networ s responsble for selectng an approprate UAV to respond to the alarm. Ths s performed by routng a gven alarm to the UAV that has the strongest pheromone trace over the area. Havng ths nformaton, the UAVs would base ther movement decsons n a way to respond to the receved alarms. Ths strategy s called here heurstc-p. Followng the above outlned deas, the UAVs that are not engaged n the handlng of any target leave pheromone traces over the area whch they cross. Ths pheromone trace s represented by a pece of nformaton that s taen by the ground sensor nodes that are deployed n the area where the UAVs have passed. When a target s detected by a ground sensor node, t ssues an alarm, as already mentoned n the problem descrpton. The decson about whch UAV wll handle the target that refers to the ssued alarm wll be taen by the ground sensor nodes, by routng the alarm n the drecton that ponts to the UAV whch has the strongest pheromone trace over that area of the networ. Ths process does not consder any other condton, just the pheromone trace left by the UAVs. Ths means that the only parameter taen nto account s how long tme an UAV passed by that specfc locaton, and the strategy s to route the alarm nto the drecton that ponts to the UAVs that passed by that locaton more recently. Heurstc-P s nspred n [8], whch presents a pheromone-based strategy to mgrate servces n a sensor networ, n whch the pheromone concentraton determnes the places where the servces are requred. In heurstc-p, nstead of servces, alarms are moved through the networ followng the pheromone concentraton. When an alarm reaches the UAV ndcated by the pheromone trace, f t s not engaged n the handlng of another alarm t engages ths receved one and sends a confrmaton message to the node n the networ that had delvered the alarm. If the suggested UAV s already engaged n another alarm, the current alarm follows the second strongest pheromone trace to fnd another UAV to engage. When an dle UAV detects a new target, t taes the responsblty for handlng t. In case that the UAV s already busy wth another target, t ssues an alarm that wll be routed to another UAV, accordng to the pheromone-based heurstc- P strategy explaned above. In order to ncrease the robustness of the proposal, n case an alarm s ssued by a node that has no pheromone trace, a drecton s randomly chosen and the alarm s sent n that drecton untl t fnds a pheromone trace. When the trace s found, t follows the trace as explaned above. Ths stuaton s more lely to occur n the ntalzaton of the system, especally n cases n whch the number of UAVs deployed n the system s very low. IV. UTILITY-BASED COORDINATION The utlty-based coordnaton approach, called heurstc- U, totally transfers the decson mang responsblty related to the handlng of alarms to the UAVs nstead of leavng ths decson to the ground sensor nodes. Ths approach consders a larger range of varables f compared to the prevously presented heurstc-p based on pheromones. The decson concernng whch UAV that wll engage n a tas over a gven target s modeled by a maxmzaton of a mult-attrbute utlty functon, whch consders both the applcablty of the sensor carred by the UAV n order to engage n that tas, and a energy consumpton factor, whch s based on the dstance between the UAV and the target under concern. Ths modelng of the problem ncludes the three elements of a decson mang theory presented n [9], whch vews the problem: 1) as a game n whch the decson maer gathers nformaton about the envronment state, and 2) based on that nowledge then proposes an acton to be performed, whch fnally 3) s assessed n terms of the utlty,.e., the gans that are orgnated from the consequences of the decson maer s choce of acton. Ths s done by means of the assessment of the mult-attrbute utlty functon. Smlarly to heurstc-p, when an alarm s ssued by a ground sensor node, t s retransmtted untl t arrves to the frst UAV that s not engaged n the handlng of any target. The frst dfference s that n ths approach (U), there s no nformaton drvng the spread of the alarm over the networ le n heurstc-p. Moreover, when the alarm s receved by the UAV, t wll share ths alarm wth all UAVs n ts communcaton range, as well as ts capablty n handlng that alarm. Le ths, a negotaton taes place, n whch the best UAV to handle the alarm taes the responsblty. The two ey concepts of heurstc-u are thus the sensor applcablty factor and the utlty functon that uses t. 593

4 A. Sensor Applcablty The sensor applcablty s a number calculated by the UAV u that estmates the value of applyng a gven type of sensor (type j) to the handlng of a gven type of target () nformed by an alarm, n a specfc tme nstant. j ς ( t) We, j ( t), f κ j κ θ, ( t) =. (3) 0, otherwse where We,j (t) s a functon that estmates the degree of degradaton n the measurements offered by a sensor of type j, due to the weather condtons at tme t, and κ j s the subset of all types of targets contanng those that match the sensor type j. In ths model of the heurstc-u, poor results offered by sensors that do not match the type of target, are mapped to a value zero. B. Utlty Functon The utlty functon s used to evaluate the tas to be performed over a target subject of an alarm, whch s defned by the commands establshed n the msson drectons. Then the results provded by the utlty functon calculated by each UAV are compared. Tang the one that has the maxmum value, t s decded whch UAV that wll engage n the alarm and perform the requred tas. In the long run, ths wll maxmze the usage of the entre system. Ths reduces the problem to the maxmzaton problem: U max ( U ( θ ( t), C( e ( t), p ( t), p ))) ( t) = max, j. (4) where C s the cost n terms of energy consumpton requred to tae the UAV from the current poston p (t) to the target poston p j reported n the alarm, based on the current energy resource status (provded by e (t)). It s mportant to hghlght that the computaton of (3) carres a certan degree of uncertanty due to the possble mprecson or ncomplete nformaton about the weather condtons. Ths s also true for the computaton of C used n (4), whch carres an uncertanty about the locaton of the target, due to ts unpredctable (unnown) movement pattern. The uncertanty n the proposed approach s translated nto a rs of a wrong estmaton accordng the model of rs profles presented n [10]. Accordng to the referred wor n [10], whch models the behavour of nvestors n the stoc maret usng utlty functons, the nvestors can be classfed n dfferent rs profles. These profles can represent nvestors more or less prone to rs when performng ther trades. Dfferent types of functons are used to represent these profles, as a mappng of the how prone to rs the nvestor s. The complete theory ncludes addtonal detals, such as coeffcents to tune the degree of rs averson and concerns about the most sutable types of functons dependng on other factors. However, n the present approach a smplfed model s adopted wthout all the elements presented n the orgnal theory. The metaphor used to defne heurstc-u s to assocate the dea of rs profles of the nvestors to profles that can be assgned to the UAVs n the sense that they can be more or 594 less prone to tae rss when estmatng ther utlty to handle a gven target. The UAVs that have better resource condtons and more powerful capabltes are more lely to tae rs n computng ther utlty, whle consderng the uncertanty of the nput data, as they expect to have good results,.e. to be really useful n handlng a gven target. On the other hand, UAVs that are weaer n the sense of havng less capabltes and lower resources are more lely to use a more conservatve utlty functon. The choce of whch type to use s based on threshold values of the consdered capabltes. Ths study consders the use of two functons to express the profles for the UAVs, a logarthmc one for the rs tolerant UAVs and a quadratc one for the conservatve ones. Moreover, dfferent weghts can be attrbuted to the two components of the utlty functon used n (4), namely sensor applcablty and the energy cost, by means of a parameter α that tunes whch part wll contrbute more wth the utlty computaton. Equaton (5) shows the verson for the more rs tolerant UAVs, whle (6) presents the one for those less rs tolerant. The assumed vald ntervals for θ, and C s [0, 1], whle for α t s (0, 1). U U, C) = ( θ (e-1))+1) α ln + f 0, otherwse, ( ) ( C ) ( θ, 1 α ln (e-1))+1, θ, 2 ( θ ) + ( 1 α ) > 0. (5) 2 α C f C = >, j,, θ, 0 ( θ,, ). (6) 0, otherwse V. EVALUATION AND COMPARISON The evaluaton and comparson s based on smulatons conducted usng ShoX [11], whch s a powerful wreless networ smulator mplemented n Java that provdes easy extenson mechansms. The metrcs evaluated n the smulatons were the mean response tme to the alarms generated n the system, the tme to handle a target, and the relatve utlty, n terms of how sutable the assgned UAV s to handle a gven target. The followng subsectons detals the setup of the smulaton and provdes a dscusson about the obtaned results for the two coordnaton approaches. A. Smulaton Setup The survellance area has dmensons 10 Km x 10 Km, n whch ground sensor nodes are randomly deployed wth ndependent unform probablty (homogeneous Posson pont process n two dmensons, whch generates a geometrcal random graph). Ths dstrbuton gves around 70% of probablty that the nodes n the networ form a connected graph [12], for a communcaton range of 500 meters. Sx UAVs of three dfferent types, equally dstrbuted, patrol the area, havng a communcaton range of 1,5 Km and are flyng at speeds from 100 Km/h up to 120 Km/h. Four dfferent runs were smulated, wth one, three, and fve targets for both heurstcs. The targets can be of fve dfferent types, randomly chosen. The energy resources start randomly dstrbuted between 90% and 100% for all UAVs. These resources are consumed accordng to a decreasng lnear functon per part, havng the

5 tme as parameter and weghted by the current speed of the UAV n each of ts parts. Sensor status s randomly started for each UAV, startng from values between 70% and 90%, and may decrease after the utlzaton of the UAV n handlng a target. Ths decrease s randomly chosen, smulatng some possble damage due to hostle target attacs, for nstance. For the smulatons of heurstc-u, t was consdered that UAVs wth less than 30% of remanng energy resources or less then 30% of sensor capablty use the utlty functon presented n (6), whle the others use the one presented n (5). The value of α n (5) and (6) s randomly chosen between 0.1 and 0.5 f the sensor status s lower than the percentage of remanng energy and between 0.5 and 0.9 n the other case. Table I presents the summary of the man setup parameters. targets) and the mean values are plotted n the fgure. It s possble to observe that the results provded by the pheromone-based strategy, heurstc-p, are slghtly better than the ones provded by heurstc-u. An explanaton for ths behavor s that the pheromone approach provdes an easer way to the sensor networ to fnd an UAV and delver an alarm to be handled, by mang the alarm follow the pheromone traces, wthout requrng a negotaton. On the other hand, n the utlty-based approach the sensor nodes have no ndcaton regardng to where t s better to retransmt the alarms n order to fnd a sutable UAV, so a controlled floodng s done. TABLE I. SIMULATION PARAMETERS Parameter Value Scenaro Area 10Km x 10Km Number of UAVs 6 Types of UAVs 3 UAV Speed 100Km/h 120Km/h UAV Communcaton Range 1,5Km Number Ground Statc Nodes Ground Nodes Communcaton Range 500m Number of targets 1, 3 and 5 Types of targets 5 Target speed 50 Km/h 80Km/h B. Results and Dscusson The results of the three metrcs provded n ths secton present the assessment of the effcency of each strategy ntroduced before. The frst metrc provdes a comparson between the two heurstcs n terms of tme to assgn a UAV to handle a target that s the subject of an ssued alarm. The second measures the tme to handle a gven target. These two metrcs are mportant assessment parameters, as t s desred that the system respond to the alarms and handle the targets as faster as possble. The sutablty n usng an adequate UAV to handle an alarm s also an mportant parameter, as t represents the effcency n the resource allocaton n the system and the qualty of the nformaton provded to the users. Fgure 3. Tme to handle targets for the two consdered approaches. Fgure 3 presents the values obtaned for the tme to handle targets metrc. It s possble to see that heurstc-p presents better values, whch can be explaned because t just follows the pheromone traces to the nearest UAV, wthout consderng ts utlty, whle n heurstc-u the utlty s the bass upon whch t s decded whch UAV wll handle the target. Even consderng that the utlty functon taes the dstance between UAV and target nto account, t happens that a UAV that s far from the target may wn the negotaton and go to handle the target, snce t can be better than other UAV n the other crtera evaluated by the utlty functon. Fgure 4. Normalzed utlty for each approach. Fgure 2. Tme to respond the alarms for the two consdered approaches. Fgure 2 presents the smulaton results for the two approaches n terms of tme to respond to the alarms. Both raw data from each run (total of 20 runs for each number of Fgure 4 presents the results of the measurements of the utlty values, whch are normalzed by the optmum soluton (the best assgnment UAV-target that could be done). As expected, heurstc-u provdes the best results. Ths s explaned frstly because t consders addtonal parameters when compared to the pheromone approach used n heurstc- P, whch mplctly taes nto account only the postons of the 595

6 UAVs and targets. Moreover, even dscardng UAVs that are completely unable to handle the type of target of a gven alarm, the heurstc-p soluton looses because the negotaton among the UAVs, comparng ther utltes n the heurstc-u soluton avods poor assgnments, whch s a feature that does not exst n the pheromone-based soluton used n heurstc-p. The results presented express a tradeoff between tme and utlty n selectng one of the proposed solutons. The pheromone-based approach was more effectve n terms of tme to respond to an alarm and to handle a target. However, the utlty evaluaton of the second approach provdes a better ft UAV-target. Moreover, the pheromone approach uses sgnfcantly less messages than the utlty-based one, whch uses a controlled floodng that s more costly n terms of networ resource usage. VI. RELATED WORKS Jn et al. [1] provde a very consstent proposal to handle the problem of balance between target search and response by a team of UAVs. The wor evaluates the tradeoff between search and response wthn the framewor, presentng a predctve algorthm that provdes a good balance between these tass. The frst dfference between our approach and ths wor s that we handle only the alarm response, abstractng the UAVs movement plannng to perform the search for new targets. Ths dfference s due to the pecularty of the dstnct msson addressed by each one. We focus on area survellance, whle they focus on target acquston. In our case, the whole area must be covered, wthout the assumpton of preferred locatons to move to, whch s true n the target acquston they address. Another dfference s that we use the UAVs n coordnaton wth ground sensor nodes. Besdes, the assumpton of a centralzed nformaton base consdered n that wor s not used n our proposal. The ntal centralzed off-lne tas assgnment s another premse that s not vald n our wor but holds n ther proposal. The AWARE project s presented n [3]. Ths project ams at ntegratng a sensor networ of resource constraned ground nodes wth moble sensors, both on the ground and carred by UAVs. In the large sense ths wor s closely related to ours. The common dea presented n both wors s to use ground sensors and UAVs tang part of the same sensor networ, cooperatng n order to acheve the msson goals. In our paper, the focus s to descrbe how the UAVs cooperate among them, after the alert emtted by the ground nodes usng ad hoc communcaton. Compared wth our approach, AWARE does not provde the same flexblty n relaton to the coordnaton among nodes. In AWARE, the nodes mae part of a group that s lned to a gven tas, or set of tass, and to change ths formaton, new commands must be sent explctly from a central control base. Instead, n our approach, the coordnaton s done autonomously by the nodes. VII. CONCLUSION AND FUTURE WORKS Ths paper presented two dfferent strateges to drve the coordnaton among heterogeneous sensor networs appled n survellance systems. A detaled problem formulaton was also provded to support the assumptons done n each of the proposed strateges. An assessment of the effcency of both 596 approaches was done, by means of three metrcs of nterest and a crtcal analyss of the resultng data was performed. Our study ponted out the strengths and weanesses of each strategy. A combnaton of both strateges, n whch a pheromone-based alarm routng s used to search for UAVs accordng ther capabltes, transferrng part of the negotaton to the pheromone trals n the ground sensors, wll be developed. The selecton of most sutable tral to route an alarm n ts search for an UAV wll reduce dramatcally the amount of messages when compared to the controlled floodng used n heurstc-u, and at the same tme, wll select a hghly sutable UAV to a gven target, by means of ts utlty. ACKNOWLEDGMENT E. P. Fretas thans the Brazlan Army for the grant to follow the PhD program n Embedded Real-tme Systems at Halmstad Unversty n Sweden, n cooperaton wth UFRGS n Brazl. T. Hemfarth thans the Brazlan CNPq (Natonal Research Councl) for the fundng provded to hs research, whch s developed at UFRGS under a PNPD project. REFERENCES [1] Y. Jn, Y. Lao, A.A. Mna, M.M. Polycarpou, Balancng Search and Target Response n Cooperatve Unmanned Aeral Vehcle (UAV) Teams, IEEE Transactons on System, Man, Cybernetcs-Part B: Cybernetcs, vol. 36, nr. 3, p , [2] Y. Ben-Asher, S. Feldman, P. Gurfl, M. Feldman, "Dstrbuted Decson and Control for Cooperatve UAVs Usng Ad Hoc Communcaton", IEEE Transactons on Control Systems Technology, vol. 16, nr. 3, p , [3] A.T. Erman, L. Hoesel, P. Havnga, Enablng Moblty n Heterogeneous Wreless Sensor Networs Cooperatng wth UAVs for Msson-Crtcal Management, IEEE Wreless Communcatons, vol. 15, s. 6, p , [4] MLB Co. web ste. Submeter-scale arcraft, [5] P. Gaudno, B. Schargel, E. Bonabeu, B.T Clough, Swarm Intellgence: a New C2 paradgm wth an Applcaton to Control of Swarms of UAVs Proceedngs of 8 th Internatonal Command and Control Research and Technology Symposum, [6] E. Bonabeau, M. Dorgo, G. Theraulaz, Swarm Intellgence: From Natural to Artfcal Systems, Oxford Unversty Press, Santa Fe Insttute Studes n the Scences of Complexty, NY, [7] J.A. Sauter, R. Matthews, H.V.D. Paruna, S.A. Bruecner, Performance of Dgtal Pheromones for Swarmng Vehcle Control, Proceedngs of 4 th Internatonal Jont Conference on Autonomous Agents and Mult-Agent Systems, ACM Press, p , [8] T. Hemfarth, P. Janac, "Experments wth Bologcally-Inspred Methods for Servce Assgnment n Wreless Sensor Networs", IFIP Intl Federaton for Informaton Processng, vol. 268; Bologcally- Inspred Collaboratve Computng; M. Hnchey, A. Pagnon, F. J. Rammg, and H. Schmec, Eds. Boston: Sprnger, 2008, p [9] R.L. Keeney, H. Raffa. Decson wth Multple Objectves: Preferences and Value Trade-offs John Wley & Sons, [10] D. Luemberger, Investment Scence, Oxford, [11] J. Lessmann, T. Hemfarth, P. Janac, ShoX: An Easy to Use Smulaton Platform for Wreless Networs, n Proceedngs of 10 th Internatonal Conference on Computer Modelng and Smulaton, 2008, p [12] C. Bettstetter, On the Mnmum Node Degree and Connectvty of a Wreless Multhop Networ, n Proceedngs of the 3 rd ACM Internatonal Symposum on Moble Ad Hoc Networng & Computng, ACM, New Yor, NY, USA, 2002, p

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks 2007 Internatonal Conference on Convergence Informaton Technology An Adaptve and Dstrbuted Clusterng Scheme for Wreless Sensor Networs Xnguo Wang, Xnmng Zhang, Guolang Chen, Shuang Tan Department of Computer

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services When Network Effect Meets Congeston Effect: Leveragng Socal Servces for Wreless Servces aowen Gong School of Electrcal, Computer and Energy Engeerng Arzona State Unversty Tempe, AZ 8587, USA xgong9@asuedu

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Distributed Multi-Target Tracking In A Self-Configuring Camera Network

Distributed Multi-Target Tracking In A Self-Configuring Camera Network Dstrbuted Mult-Target Trackng In A Self-Confgurng Camera Network Crstan Soto, B Song, Amt K. Roy-Chowdhury Department of Electrcal Engneerng Unversty of Calforna, Rversde {cwlder,bsong,amtrc}@ee.ucr.edu

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

A DATA MINING APPLICATION IN A STUDENT DATABASE

A DATA MINING APPLICATION IN A STUDENT DATABASE JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul

More information

A Dynamic Energy-Efficiency Mechanism for Data Center Networks

A Dynamic Energy-Efficiency Mechanism for Data Center Networks A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

Enterprise Master Patient Index

Enterprise Master Patient Index Enterprse Master Patent Index Healthcare data are captured n many dfferent settngs such as hosptals, clncs, labs, and physcan offces. Accordng to a report by the CDC, patents n the Unted States made an

More information

Realistic Image Synthesis

Realistic Image Synthesis Realstc Image Synthess - Combned Samplng and Path Tracng - Phlpp Slusallek Karol Myszkowsk Vncent Pegoraro Overvew: Today Combned Samplng (Multple Importance Samplng) Renderng and Measurng Equaton Random

More information

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement An Enhanced Super-Resoluton System wth Improved Image Regstraton, Automatc Image Selecton, and Image Enhancement Yu-Chuan Kuo ( ), Chen-Yu Chen ( ), and Chou-Shann Fuh ( ) Department of Computer Scence

More information

) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance

) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance Calbraton Method Instances of the Cell class (one nstance for each FMS cell) contan ADC raw data and methods assocated wth each partcular FMS cell. The calbraton method ncludes event selecton (Class Cell

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

Conversion between the vector and raster data structures using Fuzzy Geographical Entities

Conversion between the vector and raster data structures using Fuzzy Geographical Entities Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks Master s Thess Ttle Confgurng robust vrtual wreless sensor networks for Internet of Thngs nspred by bran functonal networks Supervsor Professor Masayuk Murata Author Shnya Toyonaga February 10th, 2014

More information

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;

More information

Complex Service Provisioning in Collaborative Cloud Markets

Complex Service Provisioning in Collaborative Cloud Markets Melane Sebenhaar, Ulrch Lampe, Tm Lehrg, Sebastan Zöller, Stefan Schulte, Ralf Stenmetz: Complex Servce Provsonng n Collaboratve Cloud Markets. In: W. Abramowcz et al. (Eds.): Proceedngs of the 4th European

More information

Return decomposing of absolute-performance multi-asset class portfolios. Working Paper - Nummer: 16

Return decomposing of absolute-performance multi-asset class portfolios. Working Paper - Nummer: 16 Return decomposng of absolute-performance mult-asset class portfolos Workng Paper - Nummer: 16 2007 by Dr. Stefan J. Illmer und Wolfgang Marty; n: Fnancal Markets and Portfolo Management; March 2007; Volume

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and

More information

A Novel Auction Mechanism for Selling Time-Sensitive E-Services

A Novel Auction Mechanism for Selling Time-Sensitive E-Services A ovel Aucton Mechansm for Sellng Tme-Senstve E-Servces Juong-Sk Lee and Boleslaw K. Szymansk Optmaret Inc. and Department of Computer Scence Rensselaer Polytechnc Insttute 110 8 th Street, Troy, Y 12180,

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,

More information

Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks

Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks The Scentfc World Journal Volume 3, Artcle ID 43796, pages http://dx.do.org/.55/3/43796 Research Artcle QoS and Energy Aware Cooperatve Routng Protocol for Wldfre Montorng Wreless Sensor Networks Mohamed

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

An Ad Hoc Network Load Balancing Energy- Efficient Multipath Routing Protocol

An Ad Hoc Network Load Balancing Energy- Efficient Multipath Routing Protocol 246 JOURNA OF SOFTWAR, VO. 9, NO. 1, JANUARY 2014 An Ad Hoc Network oad alancng nergy- ffcent Multpath Routng Protocol De-jn Kong Shanx Fnance and Taxaton College, Tayuan, Chna mal: dejnkong@163.com Xao-lng

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

Vehicle Detection and Tracking in Video from Moving Airborne Platform

Vehicle Detection and Tracking in Video from Moving Airborne Platform Journal of Computatonal Informaton Systems 10: 12 (2014) 4965 4972 Avalable at http://www.jofcs.com Vehcle Detecton and Trackng n Vdeo from Movng Arborne Platform Lye ZHANG 1,2,, Hua WANG 3, L LI 2 1 School

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

Research of Network System Reconfigurable Model Based on the Finite State Automation

Research of Network System Reconfigurable Model Based on the Finite State Automation JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang

More information

A Simple Approach to Clustering in Excel

A Simple Approach to Clustering in Excel A Smple Approach to Clusterng n Excel Aravnd H Center for Computatonal Engneerng and Networng Amrta Vshwa Vdyapeetham, Combatore, Inda C Rajgopal Center for Computatonal Engneerng and Networng Amrta Vshwa

More information

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part

More information

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center Dynamc Resource Allocaton and Power Management n Vrtualzed Data Centers Rahul Urgaonkar, Ulas C. Kozat, Ken Igarash, Mchael J. Neely urgaonka@usc.edu, {kozat, garash}@docomolabs-usa.com, mjneely@usc.edu

More information

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan

More information

Brigid Mullany, Ph.D University of North Carolina, Charlotte

Brigid Mullany, Ph.D University of North Carolina, Charlotte Evaluaton And Comparson Of The Dfferent Standards Used To Defne The Postonal Accuracy And Repeatablty Of Numercally Controlled Machnng Center Axes Brgd Mullany, Ph.D Unversty of North Carolna, Charlotte

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

A Dynamic Load Balancing for Massive Multiplayer Online Game Server A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,

More information

An Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks

An Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks An Adaptve Cross-layer Bandwdth Schedulng Strategy for the Speed-Senstve Strategy n erarchcal Cellular Networks Jong-Shn Chen #1, Me-Wen #2 Department of Informaton and Communcaton Engneerng ChaoYang Unversty

More information

2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet

2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet 2008/8 An ntegrated model for warehouse and nventory plannng Géraldne Strack and Yves Pochet CORE Voe du Roman Pays 34 B-1348 Louvan-la-Neuve, Belgum. Tel (32 10) 47 43 04 Fax (32 10) 47 43 01 E-mal: corestat-lbrary@uclouvan.be

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng Envronment Congcong Xong, Long Feng, Lxan Chen A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

Response Coordination of Distributed Generation and Tap Changers for Voltage Support

Response Coordination of Distributed Generation and Tap Changers for Voltage Support Response Coordnaton of Dstrbuted Generaton and Tap Changers for Voltage Support An D.T. Le, Student Member, IEEE, K.M. Muttaq, Senor Member, IEEE, M. Negnevtsky, Member, IEEE,and G. Ledwch, Senor Member,

More information

Activity Scheduling for Cost-Time Investment Optimization in Project Management

Activity Scheduling for Cost-Time Investment Optimization in Project Management PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

The Application of Fractional Brownian Motion in Option Pricing

The Application of Fractional Brownian Motion in Option Pricing Vol. 0, No. (05), pp. 73-8 http://dx.do.org/0.457/jmue.05.0..6 The Applcaton of Fractonal Brownan Moton n Opton Prcng Qng-xn Zhou School of Basc Scence,arbn Unversty of Commerce,arbn zhouqngxn98@6.com

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

A heuristic task deployment approach for load balancing

A heuristic task deployment approach for load balancing Xu Gaochao, Dong Yunmeng, Fu Xaodog, Dng Yan, Lu Peng, Zhao Ja Abstract A heurstc task deployment approach for load balancng Gaochao Xu, Yunmeng Dong, Xaodong Fu, Yan Dng, Peng Lu, Ja Zhao * College of

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School Robust Desgn of Publc Storage Warehouses Yemng (Yale) Gong EMLYON Busness School Rene de Koster Rotterdam school of management, Erasmus Unversty Abstract We apply robust optmzaton and revenue management

More information

AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION

AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION The Medterranean Journal of Computers and Networks, Vol. 2, No. 1, 2006 57 AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION L. Bada 1,*, M. Zorz 2 1 Department of Engneerng,

More information

Multi-Robot Tracking of a Moving Object Using Directional Sensors

Multi-Robot Tracking of a Moving Object Using Directional Sensors Mult-Robot Trackng of a Movng Object Usng Drectonal Sensors Xaomng Hu, Karl H. Johansson, Manuel Mazo Jr., Alberto Speranzon Dept. of Sgnals, Sensors & Systems Royal Insttute of Technology, SE- 44 Stockholm,

More information

On the Interaction between Load Balancing and Speed Scaling

On the Interaction between Load Balancing and Speed Scaling On the Interacton between Load Balancng and Speed Scalng Ljun Chen, Na L and Steven H. Low Engneerng & Appled Scence Dvson, Calforna Insttute of Technology, USA Abstract Speed scalng has been wdely adopted

More information

Risk Model of Long-Term Production Scheduling in Open Pit Gold Mining

Risk Model of Long-Term Production Scheduling in Open Pit Gold Mining Rsk Model of Long-Term Producton Schedulng n Open Pt Gold Mnng R Halatchev 1 and P Lever 2 ABSTRACT Open pt gold mnng s an mportant sector of the Australan mnng ndustry. It uses large amounts of nvestments,

More information

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008 Rsk-based Fatgue Estmate of Deep Water Rsers -- Course Project for EM388F: Fracture Mechancs, Sprng 2008 Chen Sh Department of Cvl, Archtectural, and Envronmental Engneerng The Unversty of Texas at Austn

More information

Allocating Collaborative Profit in Less-than-Truckload Carrier Alliance

Allocating Collaborative Profit in Less-than-Truckload Carrier Alliance J. Servce Scence & Management, 2010, 3: 143-149 do:10.4236/jssm.2010.31018 Publshed Onlne March 2010 (http://www.scrp.org/journal/jssm) 143 Allocatng Collaboratve Proft n Less-than-Truckload Carrer Allance

More information

Learning the Best K-th Channel for QoS Provisioning in Cognitive Networks

Learning the Best K-th Channel for QoS Provisioning in Cognitive Networks 000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050

More information

Resource Scheduling Based on Dynamic Dependence Injection in Virtualization-based Simulation Grid

Resource Scheduling Based on Dynamic Dependence Injection in Virtualization-based Simulation Grid Proceedngs of the 200 4th Internatonal Conference on Computer Supported Cooperatve Work n Desgn Resource Schedulng Based on Dynamc Dependence Injecton n Vrtualzaton-based Smulaton Grd Hanbng Lu,Hongy Su,

More information

Inter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007.

Inter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. Inter-Ing 2007 INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. UNCERTAINTY REGION SIMULATION FOR A SERIAL ROBOT STRUCTURE MARIUS SEBASTIAN

More information

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent

More information

Design and Development of a Security Evaluation Platform Based on International Standards

Design and Development of a Security Evaluation Platform Based on International Standards Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School

More information

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems Jont Schedulng of Processng and Shuffle Phases n MapReduce Systems Fangfe Chen, Mural Kodalam, T. V. Lakshman Department of Computer Scence and Engneerng, The Penn State Unversty Bell Laboratores, Alcatel-Lucent

More information

Resource Scheduling in Desktop Grid by Grid-JQA

Resource Scheduling in Desktop Grid by Grid-JQA The 3rd Internatonal Conference on Grd and Pervasve Computng - Worshops esource Schedulng n Destop Grd by Grd-JQA L. Mohammad Khanl M. Analou Assstant professor Assstant professor C.S. Dept.Tabrz Unversty

More information