Utility-Based Flow Control for Sequential Imagery over Wireless Networks

Size: px
Start display at page:

Download "Utility-Based Flow Control for Sequential Imagery over Wireless Networks"

Transcription

1 Utility-Baed Flow Control for Sequential Imagery over Wirele Networ Tomer Kihoni, Sara Callaway, and Mar Byer Abtract Wirele enor networ provide a unique et of characteritic that mae them uitable for building urveillance, including their mall ize and unobtruivene and their capabilitie for rapid deployment, decentralized monitoring and control. Bandwidth utilization contrain the ucce of a wirele urveillance ytem, epecially when the networ erve to tranmit video imagery. Creating an effective information management policy will help to obtain an allocation of bandwidth that i bet from the end uer perpective. Thi paper preent a decentralized pricing-baed flow control method to allocate bandwidth acro multiple competing camera that are imultaneouly attempting to mae ue of a hared, low bit-rate wirele channel. At preent, thi flow control model i being integrated into a building urveillance ytem in which off-the-helf camera detect intruder and then tart treaming data according to uerpecified preference for quality, where variou component of the flow control ytem monitor bandwidth utilization and adjut the quality etting of image tream to maimize enduer utility. I. INTRODUCTION Wirele enor networ have provided the ability to monitor, collect, and analyze large volume of data in a variety of environment and application. However, wirele networ are ubject to limited reource, uch a bandwidth. Overloading the networ with information can caue networ error. A networ uage increae, a need arie to develop an efficient information management policy to allocate bandwidth to competing application. Information management i the deciion maing proce about the ue of networ reource. Succeful creation and implementation of an information management policy will provide benefit to all wirele enor networ application by allowing the enor to intelligently meet the need of it uer. Flow control, or the adjutment of tranmiion rate for individual traffic ource in a networ, form a core foundation for an efficient information management policy. Manucript received April 9, 007. Thi wor wa upported by the Sytem Technology Integration Lab of the Department of Sytem and Information Engineering at the Univerity of Virginia, Charlotteville, VA. T. Kihoni i with the Sytem and Information Engineering Department, Univerity of Virginia, Charlotteville, VA 90 USA ( [email protected]). S. Callaway i with the Sytem and Information Engineering Department, Univerity of Virginia, Charlotteville, VA 90 USA ( [email protected]). M. Byer i with the Sytem and Information Engineering Department, Univerity of Virginia, Charlotteville, VA 90 USA ( [email protected]). Inefficient flow control can lead to ource greedily uing bandwidth, overloading the ytem and cauing networ congetion. A congeted networ delay or loe information ent to the uer, which decreae the overall effectivene of the networ. Converely, an ideal flow control algorithm would allocate bandwidth o a to give higher priority (more bandwidth) to ource that the uer deem important. Thi paper develop a pricing-baed flow control method for a wirele urveillance ytem where variou area of a building vary in ignificance to the uer. The algorithm preented in thi paper adapted to a pecific building urveillance cenario. In thi ytem, a uer require image tream to mae accurate deciion regarding the action to tae againt intruder. Additionally, multiple tream limit the cognitive ability of the uer, which increae the difficulty the uer incur in maing an effective deciion. Therefore, the uer require accurate information that ha the neceary level of fidelity to mae deciion. II. LITERATURE REVIEW Price-Baed Flow Control (Economic Model) The method of flow control ued in thi paper revolve around a pricing model that i imilar to recent wor in the networing literature on optimal flow control. For eample, in [1], Kelly et al. eamine the tability and fairne of two interacting rate control algorithm, decompoing the problem into contituent primal and dual part olved independently by the networ and all uer, repectively. The networ algorithm erve to et a price for bandwidth utilization baed on networ congetion, while uer adjut tranmit rate o a to maimize net utility (utility for bit rate offet by cot). The bai for fairne derive from an earlier paper [], alo due to Kelly, which provide two common eample of fairne: ma-min fair and proportionally fair. The ma-min fairne criterion require that maller flow receive their requeted flow rate before larger flow and aert that increaing the rate of flow for larger ource at the epene of the maller flow i unfair. To conider flow rate proportionally fair, the rate mut be feaible and for any other feaible rate, the aggregate of proportional change i zero or negative []. In [3], Low and Lapley epand on [1]-[] by creating ynchronou and aynchronou verion of both algorithm. A ynchronou algorithm arie when update to flow ource and networ lin occur at the ame time interval. Their eperimental reult how that their prototype behaved a epected and that the algorithm trac the theoretical bandwidth allocation optimum [3].

2 Kelly and Low provide a olid framewor for flow control uing a pricing cheme. Their thorough etup of a utility model provide the motivation to following a imilar pricing cheme. However, the pecific application dicued in thi paper concern that of tranmitting treaming image to the uer in a deciion critical cenario. Thi directly tranlate to a different et of objective a compared to Kelly and Low. Wherea in their wor they ought to efficiently allocate tranmiion rate while minimizing the ue of bandwidth, thi model require maimizing bandwidth in order to provide a much information a poible to the deciionmaing uer. Thi preent an intereting problem that require further dicuion and analyi a done in the remainder of thi paper. III. GENERAL UTILITY MODEL In thi ection we dicu the algorithm ued to allocate bandwidth to camera in the networ. Thi model preent a pricing model imilar to that of Kelly and Low in [1]-[3], with two new feature: multiple uer and dynamic utility. A. Utility Model Thi ection introduce the optimization problem and it tructure. A in [1]-[3], we can conider a networ that contain a unidirectional lin with a capacity c. Connected to the networ are K = (1,...,K) uer. The networ include a et S = {1,...,S} of camera that have the following characteritic: A ubet of uer L = ( K ) that receive tream from camera. The utility function U : R + R, which we aume to be trictly concave and increaing. Specifically, U (, t ) = w ( t ) u ( ) (1) w ( t ) = r d ( t ) () r = a L i L i : tranmiion rate of camera u ( ) : trictly concave and increaing utility function baed on the tranmiion rate r : aggregate tatic priority of a camera tream weighted by uer L a : uer tatic priority i : uer weighting level ( R ) + d(t): dynamic priority trictly decreaing in time Minimum and maimum tranmiion rate, m 0 and M <, repectively. The camera randomly activate for a random equence of time. Additionally, R = ( S ) repreent the ubet of camera that are active. Thi lead to the objective of the (3) problem, chooing tranmiion rate ( S ) to =, o a ma U (, t ) ().t. c (5) R = According to [3], a unique maimizer of aggregate utility eit becaue the objective function i trictly concave and the feaible et of olution i compact. Solving the optimization problem in a centralized fahion require coordination among all active camera and i impractical in real networ, leading to our propoal of a decentralized pricing-baed flow control algorithm. B. Pricing Algorithm for Flow Control In thi ubection, we preent two cae for flow control price. The firt cae introduce a ingle uer cenario that eclude the dynamic priority and build off the recurive model found in [1]-[3]. The econd cae provide a general model where quic repone are required due to the incluion of the dynamic priority. 1) Single Uer with Static Priority and Logarithmic Utility Function In thi cae, a ingle uer provide a tatic priority level to the camera. Additionally, all thee camera ehibit a logarithmic curve, which reduce (1) to U ( ) = a log( ) (6) Thi mimic the utility function by Kelly in [] and a imilar recurive method (7) olve the optimization problem. p ( t ) = p( t ) + γ c + 1 (7) R The camera allocate bandwidth baed on a greedy approach by maimizing their benefit (or utility minu cot). (We will dicu the allocation cheme more in depth in the general cae.) a () t = (8) p () t In fact, ince the optimization problem require full networ utilization at c, thi pecialized cae implifie to = a a R Additionally, the allocation in (9) provide proportional fairne and derive all the attribute decribed by Kelly in []. (9)

3 ) General Model of Pricing The idea from [1]-[3] and the pecialized cae do not depend on a dynamically changing variable. In the cae of a dynamically changing utility function, the ytem require quic repone, omething not guaranteed in a recurive model. The general cae we preent here provide a method to allocate bandwidth in a dynamic environment. In order for the networ operator to upply bandwidth properly, the lin mut monitor the aggregate utilization of bandwidth and calculate a price per unit of bandwidth conumed. We attribute to the lin a diutility aociated with bandwidth conumption, where the form of the diutility function reflect the effect of congetion at full networ utilization. Similar to a traffic jam where an additional car bring flow to a halt, an additional bit at full networ utilization may caue lo of information. In thi paper, we aume that, an eponential price curve accurately reflect the networ operator increaing diutility aociated congetion. Specifically, the lin determine the price uing a looup method (10), a oppoed to the numerical method in (7). P = b = b ( b) e (10) R Therefore, the two tep neceary for the lin to upply bandwidth involve (i) monitoring the networ utilization and (ii) calculating the price baed on the diutility at that utilization. Acting a a conumer, each active camera ee to conume the networ bandwidth, and it doe o on behalf of the end uer aociated with the camera. Uing it default behavior, each camera will attempt to maimize it private net benefit (1) according to the utility function et by it aociated uer. The point of maimization indicate the optimal bit rate for the camera. Each camera ue a imilar logarithmic utility function differentiated by priority etting a een in (1). The priority etting allow the uer to give bandwidth preference to certain camera. C ( ) = p (11) B ( ) = U (, t ) C ( ) (1) = arg ma( B ( )) (13) C: cot B: benefit p: price Change in bandwidth conumption propagate bac to the lin (networ operator) which then calculate a new price reflective of the new level of utilization. Thi upplierconumer relationhip iterate and produce a damped ocillation around an equilibrium price. Since the pacet ent by the camera contain time enitive information, a method to damp further the ocillation may be needed, a in the following price averaging cheme: p( t 1) + pc ( t) p( t) = (1) p c : current lin calculated price A drawbac of the price-etting formula of (10) i that the price and end uer utilitie are micalibrated, reulting in equilibrium bandwidth allocation that fail to conume all available bandwidth. To fully maimize aggregate utility (a in ()), an additional tep i required to enure that networ reource are fully utilized. The mechanim we adopt in thi paper i to end a proportional multiplier (a computed by the networ operator according to (15) below) to all camera when the bandwidth price have reached relative equilibrium (price vary by le than 5%). c m = (15) b When the equilibrium bandwidth allocation would otherwie ettle on a networ operating at le than full capacity, the normalization factor erve to increae the bandwidth allocation for each camera, while maintaining the proportional bandwidth allocation between the camera. Thi model decribe the general method to reach equilibrium in allocation. However, it remain to be een whether the allocation olve the optimization problem in (5). We plan to further invetigate thi model to tet for optimality, which will provide the focu of future paper. C. Simulation Proof of Concept In thi ubection, we preent imulation reult that provide a proof of concept for our ditributed pricing algorithm above. Rather than preenting a complete numerical evaluation of our approach, we illutrate the effect of the pricing cheme in a imple cenario. (We plan to document a more complete numerical evaluation of the cheme in a future publication.) The imulation reult below were computed in Matlab uing a ynchronou implementation of the price/bandwidth update of (10), (13), (1), and (15). To et the tage for the numerical reult, conider ingle wirele lin with 11 Mbp total capacity, of which 8 Mbp are to be allocated (o that the target bandwidth i 8 Mbp). We aume that there are five camera, which are either active or aleep in each of 10 round, where each round i 0 unit of time in length. Each price/bandwidth update conume one unit of time, o that there are up to 0 price update per round. We aume that all camera have the ame utility function, with different priority etting (a = 1,, or 3) and a dynamic priority decreaing each ubequent iteration. Fig 1 and how the effect of the imulation with and without the price averaging cheme.

4 Price ($) Pricing Simulation with Price Averaging Total Bit Rate (Right Ai) Price (Left Ai) Time Fig. 1: Pricing Simulation with Price Averaging. Active camera indeed by round = (1,, 3, 5,, 3,, 1, 0, 1) Price ($) Pricing Simulation without Price Averaging Total Bit Rate (Right Ai) Price (Left Ai) Total Bit Rate (Mb/) Total Bit Rate (Mb/) and a imulated environment to imulate the affect of monitoring multiple building [6]. The information management policy, implemented on the node of the networ (erver and camera), i ued to control information flow by adjuting the quality control of the image tream. Thi ection erve to decribe both the hardware and oftware apect of our pricing-baed flow control algorithm within the overall ytem. A. Implementation Architecture and Strategy 1) Hardware A laptop with the Linu laptop erve a a central erver. Thi erver provide all intance of the web-baed interface acce to available image tream o that they can be een by end uer. (While the web interface can be made available to any number of uer, it actually encode only one uer et of preference for video from individual camera.) The ame laptop alo erve to implement the lin functionality of our flow control algorithm. Specifically, the laptop monitor the bandwidth utilization in the networ and compute the prevailing price-per-unit-bandwidth according to (10). Camera (Logitech Quiccam Pro 000 [7]) are deployed throughout the building for urveillance and are attached to Stargate computer that run the change detection and image treaming application of []. (Stargate are mall wirele device which communicate uing a their wirele protocol [8].) The Stargate alo implement the bandwidth update functionality of our flow control algorithm, receiving price periodically from the laptop and adjuting image treaming parameter Time Fig. : Pricing Simulation without Price Averaging. Active camera indeed by round = (1,, 3, 5,, 3,, 1, 0, 1) A een in Fig. 1 and, the effect of the price averaging i ignificant. Thi imulated reult how that uer will have a relatively contant tream of fidelity uing thi cheme. IV. IMPLEMENTATION OF THE FLOW CONTROL ALGORITHM The reearch of thi paper wa conducted in the contet of a larger project on the development of ytem that ue wirele camera to provide facility video urveillance. An image-proceing application from [] provided the method to tream a equence of encoded image from camera. The encoding cheme ue a change detection algorithm to tream only the change relative to a bacground image, which then recontruct itelf on the interface uing the ame bacground image. Other component of the larger project are the development of a web-baed interface for etting up the urveillance networ and viewing motion detection [5], Fig. 3. Sytem Architecture ) Software A hown in Fig. 3, all communication will go through the central erver, which reide on the Linu laptop dicued previouly. When camera detect motion, they end the reulting image to the erver creating input traffic on the erver. When uer connect to the erver to view image tream, output traffic i created. The laptop alo upport the lin functionality of our pricing-baed flow control algorithm, and central to thi meaurement capability for aeing bandwidth utilization. At preent we are uing a Linu utility nown a iptable [9] to monitor the bandwidth utilization in the networ. Iptable i generally ued to create firewall on a machine [9]. In thi cae, it i ued to create a firewall that doe not actually bloc any networ traffic. Intead, rule about pacet being ent through the networ card are ued to monitor the networ uage [9]. Thee rule count the traffic in three categorie: input, output, and forward. Thi traffic

5 i monitored for a period of time. Thi period i an input that fit the need of the networ being monitored. A more volatile networ will require a longer interval to mooth out the obervation. The total monitored bandwidth i divided by the number of econd in the time interval to determine the average bit/ during the period. After each meaurement, the counter are reet to zero and the period retarted. The lin functionality implemented on the laptop ue thi meaured bandwidth utilization to compute price (per unit of bandwidth), which are then ent to the flow control algorithm running on the Stargate computer (to which the camera are attached). The bandwidth updating functionality of the flow control algorithm reide on the Stargate, where lin price and utility function are reconciled and new video encoding parameter are computed. When encoding parameter change, they are written to a configuration file for the encoding oftware, which alo reide on the Stargate, and the ytem end a meage to the encoder telling it to read the new configuration file. B. Component Detail Our pricing-baed flow control algorithm required eparate routine for the lin and camera, implemented in Java uing tandard librarie. Java portability and objectoriented tructure allow for traightforward algorithm implementation. 1) Lin Routine We refer to the price-etting mechanim that reide on the erver a the lin routine or imply the lin. Implementing the lin required developing a multithreaded program. Fig. preent the functional relationhip between the thread and the variou Java method we developed. ) Camera Routine We refer to the bandwidth updating mechanim of our flow control algorithm, which reide on the Stargate, a the camera routine or imply the camera. Similar to the lin routine, the camera routine implement a multithreaded application a een in Fig. 5. Fig. 5: Camera Routine a) Video Encoding Routine The output of the camera routing i a new et of encode parameter for the encoder developed in [], with the goal being to et encoding parameter to achieve the optimal bandwidth allocation computed by our flow control algorithm. The relevant encoding parameter include (i) frame per econd and (ii) change detection threhold. The frame per econd parameter greatly influence a camera bandwidth and erve a a coare bandwidth adjutment mechanim. The change detection threhold, which decribe the enitivity the program to change in the image, allow for more precie control of the bandwidth utilization. The combination of thee two parameter offer u a method to match the calculated tranmiion rate. b) Camera/Lin Initialization To initialize the ytem, each camera mut notify the lin that it ha entered it networ. Thi i the very firt tep done by every camera. Upon regitration of each camera, the lin aign and tranmit a multicat addre to the camera. After completing thee initial tep, each intance of the camera routine proceed a required by the flow control algorithm: litening for price and adjuting it imageproceing etting. Fig. : Lin Routine The function mared in the grey bo repreent concurrent thread. To tranmit the price from the lin the camera, a multicat UDP pacet i ent. Additionally, the lin liten for the uer et priority and relay the level to all camera in it networ. Although not dicued in thi paper, the lin routine i actually implemented in a way that allow it to be ued in the cae of a multilin environment. C. Statu At the time of thi writing, the eparate component of the larger facility video urveillance project are being combined into a ingle woring ytem. A demontration of the final ytem i cheduled to occur on April 16, 007 at the Nuclear Reactor Building at the Univerity of Virginia. V. CONCLUSIONS The model preented in thi paper provide a method to efficiently allocate bandwidth to camera with varying level

6 of importance to the uer. The pricing model ue a multiround proce to allocate bandwidth to the camera. In each round a lin monitor current bandwidth utilization and calculate a new price-per-unit-bandwidth. The camera receive thi price and elect the bandwidth that maimize it own benefit (net utility). Achieving thi new bandwidth allocation require adjutment to two video encoding parameter, frame-per-econd and change detection threhold, a pecified by the video encoding format of []. A encoding parameter are adjuted, the lin routine continue to monitor the bandwidth utilization by mean of the Linu utility, iptable. Thi allow the lin to calculate a new price for the net round, and the proce retart. The algorithm produce, in a decentralized fahion, an equilibrium bandwidth allocation for the camera tream maimizing aggregate utility. Invetigating the optimality of thi equilibrium provide the focu of future reearch. An effective information management policy amplifie the utility gained by ytem uer. The technique of thi paper alo apply to other application, uch a home networ bandwidth management. The importance of creating an effective utility-maimizing flow control algorithm increae with the addition of more and more Internetconnected conumer product. For eample, uer may download movie trailer to their televiion, play online video game, or watch treaming media. An effective information management policy will efficiently allocate bandwidth to all the uer according to prioritie (utilitie) et by the networ operator. REFERENCES [1] F. Kelly, A. Maulloo, & D. Tan, Rate control for communication networ: hadow price, proportional fairne and tability. Journal of the Operational Reearch Society, 9(5), 37-5, [] F. Kelly, Charging and rate control for elatic traffic. European Tranaction on Telecommunication, 8(1), [3] S. Low, & D. Lapely, Optimization flow control. I. Baic algorithm and convergence. Networing, IEEE/ACM Tranaction on, 7(1), , [] M. Farrell, Peronal Communication, 007. [5] F. Thompon, A. Vawani, B. Walthall, M. DeVore, Computer viion information ytem for wirele urveillance, 007. [6] D. Chao, K. Datt, J. Rehi, G. Learmonth, Human-in-the-loop imulation tetbed for wirele enor networing for infratructure urveillance, 007. [7] Logitech Homepage. [8] Crobow: Wirele Senor Technology: Homepage. [9] G. Beeman, Bandwidth monitoring with iptable. Linu.com.

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection

More information

Performance of Multiple TFRC in Heterogeneous Wireless Networks

Performance of Multiple TFRC in Heterogeneous Wireless Networks Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, [email protected] *2,Correponding

More information

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: [email protected]

More information

A technical guide to 2014 key stage 2 to key stage 4 value added measures

A technical guide to 2014 key stage 2 to key stage 4 value added measures A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool

More information

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic

More information

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare

More information

Cluster-Aware Cache for Network Attached Storage *

Cluster-Aware Cache for Network Attached Storage * Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,

More information

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International

More information

SCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: [email protected] Itituto

More information

CASE STUDY BRIDGE. www.future-processing.com

CASE STUDY BRIDGE. www.future-processing.com CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION

More information

A note on profit maximization and monotonicity for inbound call centers

A note on profit maximization and monotonicity for inbound call centers A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an

More information

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4

More information

Algorithms for Advance Bandwidth Reservation in Media Production Networks

Algorithms for Advance Bandwidth Reservation in Media Production Networks Algorithm for Advance Bandwidth Reervation in Media Production Network Maryam Barhan 1, Hendrik Moen 1, Jeroen Famaey 2, Filip De Turck 1 1 Department of Information Technology, Ghent Univerity imind Gaton

More information

Performance of a Browser-Based JavaScript Bandwidth Test

Performance of a Browser-Based JavaScript Bandwidth Test Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further

More information

A Note on Profit Maximization and Monotonicity for Inbound Call Centers

A Note on Profit Maximization and Monotonicity for Inbound Call Centers OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright

More information

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1. International Journal of Advanced Technology & Engineering Reearch (IJATER) REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND Abtract TAGUCHI METHODOLOGY Mr.

More information

Project Management Basics

Project Management Basics Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management

More information

Assessing the Discriminatory Power of Credit Scores

Assessing the Discriminatory Power of Credit Scores Aeing the Dicriminatory Power of Credit Score Holger Kraft 1, Gerald Kroiandt 1, Marlene Müller 1,2 1 Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Gottlieb-Daimler-Str. 49, 67663 Kaierlautern,

More information

DUE to the small size and low cost of a sensor node, a

DUE to the small size and low cost of a sensor node, a 1992 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 10, OCTOBER 2015 A Networ Coding Baed Energy Efficient Data Bacup in Survivability-Heterogeneou Senor Networ Jie Tian, Tan Yan, and Guiling Wang

More information

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal How Enterprie Can Build Integrated Digital Marketing Experience Uing Drupal acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 How Enterprie Can Build Integrated Digital Marketing

More information

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations Proceeding of the 0 Indutrial Engineering Reearch Conference T. Doolen and E. Van Aken, ed. Profitability of Loyalty Program in the Preence of Uncertainty in Cutomer Valuation Amir Gandomi and Saeed Zolfaghari

More information

Socially Optimal Pricing of Cloud Computing Resources

Socially Optimal Pricing of Cloud Computing Resources Socially Optimal Pricing of Cloud Computing Reource Ihai Menache Microoft Reearch New England Cambridge, MA 02142 [email protected] Auman Ozdaglar Laboratory for Information and Deciion Sytem Maachuett

More information

Bi-Objective Optimization for the Clinical Trial Supply Chain Management

Bi-Objective Optimization for the Clinical Trial Supply Chain Management Ian David Lockhart Bogle and Michael Fairweather (Editor), Proceeding of the 22nd European Sympoium on Computer Aided Proce Engineering, 17-20 June 2012, London. 2012 Elevier B.V. All right reerved. Bi-Objective

More information

A New Optimum Jitter Protection for Conversational VoIP

A New Optimum Jitter Protection for Conversational VoIP Proc. Int. Conf. Wirele Commun., Signal Proceing (Nanjing, China), 5 pp., Nov. 2009 A New Optimum Jitter Protection for Converational VoIP Qipeng Gong, Peter Kabal Electrical & Computer Engineering, McGill

More information

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,

More information

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems, MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS

More information

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad

More information

Software Engineering Management: strategic choices in a new decade

Software Engineering Management: strategic choices in a new decade Software Engineering : trategic choice in a new decade Barbara Farbey & Anthony Finkeltein Univerity College London, Department of Computer Science, Gower St. London WC1E 6BT, UK {b.farbey a.finkeltein}@ucl.ac.uk

More information

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds Acceleration-Diplacement Crah Pule Optimiation A New Methodology to Optimie Vehicle Repone for Multiple Impact Speed D. Gildfind 1 and D. Ree 2 1 RMIT Univerity, Department of Aeropace Engineering 2 Holden

More information

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE Progre In Electromagnetic Reearch Letter, Vol. 3, 51, 08 BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE S. H. Zainud-Deen Faculty of Electronic Engineering Menoufia

More information

Support Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data.

Support Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data. The Sixth International Power Engineering Conference (IPEC23, 27-29 November 23, Singapore Support Vector Machine Baed Electricity Price Forecating For Electricity Maret utiliing Projected Aement of Sytem

More information

Simulation of Sensorless Speed Control of Induction Motor Using APFO Technique

Simulation of Sensorless Speed Control of Induction Motor Using APFO Technique International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, Augut 2012 Simulation of Senorle Speed Control of Induction Motor Uing APFO Technique T. Raghu, J. Sriniva Rao, and S. Chandra

More information

Laureate Network Products & Services Copyright 2013 Laureate Education, Inc.

Laureate Network Products & Services Copyright 2013 Laureate Education, Inc. Laureate Network Product & Service Copyright 2013 Laureate Education, Inc. KEY Coure Name Laureate Faculty Development...3 Laureate Englih Program...9 Language Laureate Signature Product...12 Length Laureate

More information

A Spam Message Filtering Method: focus on run time

A Spam Message Filtering Method: focus on run time , pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department

More information

6. Friction, Experiment and Theory

6. Friction, Experiment and Theory 6. Friction, Experiment and Theory The lab thi wee invetigate the rictional orce and the phyical interpretation o the coeicient o riction. We will mae ue o the concept o the orce o gravity, the normal

More information

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE RAVI KUMAR G 1, C.MUTHUSAMY 2 & A.VINAYA BABU 3 1 HP Bangalore, Reearch Scholar JNTUH, Hyderabad, India, 2 Yahoo, Bangalore,

More information

Return on Investment and Effort Expenditure in the Software Development Environment

Return on Investment and Effort Expenditure in the Software Development Environment International Journal of Applied Information ytem (IJAI) IN : 2249-0868 Return on Invetment and Effort Expenditure in the oftware Development Environment Dineh Kumar aini Faculty of Computing and IT, ohar

More information

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC

More information

Control Theory based Approach for the Improvement of Integrated Business Process Interoperability

Control Theory based Approach for the Improvement of Integrated Business Process Interoperability www.ijcsi.org 201 Control Theory baed Approach for the Improvement of Integrated Buine Proce Interoperability Abderrahim Taoudi 1, Bouchaib Bounabat 2 and Badr Elmir 3 1 Al-Qualadi Reearch & Development

More information

Cost Models for Selecting Materialized Views in Public Clouds

Cost Models for Selecting Materialized Views in Public Clouds International Journal of Data Warehouing and Mining, 0(4), -25, October-December 204 Cot Model for Selecting Materialized View in ublic Cloud Romain erriot, Clermont Univerité, Univerité Blaie acal, Aubière

More information

License & SW Asset Management at CES Design Services

License & SW Asset Management at CES Design Services Licene & SW Aet Management at CES Deign Service [email protected] www.ces-deignservice.com 2003 Siemen AG Öterreich Overview 1. Introduction CES Deign Service 2. Objective and Motivation 3. What

More information

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms Rik Management for a Global Supply Chain Planning under Uncertainty: Model and Algorithm Fengqi You 1, John M. Waick 2, Ignacio E. Gromann 1* 1 Dept. of Chemical Engineering, Carnegie Mellon Univerity,

More information

Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn

Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Ditributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Jonathan Ledlie and Margo Seltzer Diviion of Engineering and Applied Science Harvard Univerity Abtract Numerou propoal exit for load

More information

Four Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations

Four Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations Four Way Companie Can Ue Open Source Social Publihing Tool to Enhance Their Buine Operation acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Four Way Companie Can Ue Open

More information

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL Excerpt from the Proceeding of the COMSO Conference 0 India Two Dimenional FEM Simulation of Ultraonic Wave Propagation in Iotropic Solid Media uing COMSO Bikah Ghoe *, Krihnan Balaubramaniam *, C V Krihnamurthy

More information

Distributed Monitoring and Aggregation in Wireless Sensor Networks

Distributed Monitoring and Aggregation in Wireless Sensor Networks Ditributed Monitoring and Aggregation in Wirele Senor Network Changlei Liu and Guohong Cao Department of Computer Science & Engineering The Pennylvania State Univerity E-mail: {chaliu, gcao}@ce.pu.edu

More information

A Review On Software Testing In SDlC And Testing Tools

A Review On Software Testing In SDlC And Testing Tools www.ijec.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Iue -9 September, 2014 Page No. 8188-8197 A Review On Software Teting In SDlC And Teting Tool T.Amruthavalli*,

More information

TRADING rules are widely used in financial market as

TRADING rules are widely used in financial market as Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a

More information

Pekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T

Pekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T Pekka Helkiö, 58490K Antti Seppälä, 63212W Oi Syd, 63513T Table of Content 1. Abtract...1 2. Introduction...2 2.1 Background... 2 2.2 Objective and Reearch Problem... 2 2.3 Methodology... 2 2.4 Scoping

More information

Research Article An (s, S) Production Inventory Controlled Self-Service Queuing System

Research Article An (s, S) Production Inventory Controlled Self-Service Queuing System Probability and Statitic Volume 5, Article ID 558, 8 page http://dxdoiorg/55/5/558 Reearch Article An (, S) Production Inventory Controlled Self-Service Queuing Sytem Anoop N Nair and M J Jacob Department

More information

Unit 11 Using Linear Regression to Describe Relationships

Unit 11 Using Linear Regression to Describe Relationships Unit 11 Uing Linear Regreion to Decribe Relationhip Objective: To obtain and interpret the lope and intercept of the leat quare line for predicting a quantitative repone variable from a quantitative explanatory

More information

CASE STUDY ALLOCATE SOFTWARE

CASE STUDY ALLOCATE SOFTWARE CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT

More information

Performance Evaluation and Delay Modelling of VoIP Traffic over 802.11 Wireless Mesh Network

Performance Evaluation and Delay Modelling of VoIP Traffic over 802.11 Wireless Mesh Network International Journal of Computer Application (975 8887) Volume 1 No.9, May 11 Performance Evaluation and Delay Modelling of VoIP Traffic over 8.11 Wirele Meh Network Amit Chhabra Dept. of CSE SDDIET,

More information

Auction-Based Resource Allocation for Sharing Cloudlets in Mobile Cloud Computing

Auction-Based Resource Allocation for Sharing Cloudlets in Mobile Cloud Computing 1 Auction-Baed Reource Allocation for Sharing Cloudlet in Mobile Cloud Computing A-Long Jin, Wei Song, Senior Member, IEEE, and Weihua Zhuang, Fellow, IEEE Abtract Driven by pervaive mobile device and

More information

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation Proceeding on Privacy Enhancing Technologie 2015; 2015 (2):1 17 Reza Shokri* Privacy Game: Optimal Uer-Centric Data Obfucation Abtract: Conider uer who hare their data (e.g., location) with an untruted

More information

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring Redeigning Rating: Aeing the Dicriminatory Power of Credit Score under Cenoring Holger Kraft, Gerald Kroiandt, Marlene Müller Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Thi verion: June

More information

Availability of WDM Multi Ring Networks

Availability of WDM Multi Ring Networks Paper Availability of WDM Multi Ring Network Ivan Rado and Katarina Rado H d.o.o. Motar, Motar, Bonia and Herzegovina Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, Univerity

More information

Senior Thesis. Horse Play. Optimal Wagers and the Kelly Criterion. Author: Courtney Kempton. Supervisor: Professor Jim Morrow

Senior Thesis. Horse Play. Optimal Wagers and the Kelly Criterion. Author: Courtney Kempton. Supervisor: Professor Jim Morrow Senior Thei Hore Play Optimal Wager and the Kelly Criterion Author: Courtney Kempton Supervior: Profeor Jim Morrow June 7, 20 Introduction The fundamental problem in gambling i to find betting opportunitie

More information

Scheduling of Jobs and Maintenance Activities on Parallel Machines

Scheduling of Jobs and Maintenance Activities on Parallel Machines Scheduling of Job and Maintenance Activitie on Parallel Machine Chung-Yee Lee* Department of Indutrial Engineering Texa A&M Univerity College Station, TX 77843-3131 [email protected] Zhi-Long Chen** Department

More information

Simulation of Power Systems Dynamics using Dynamic Phasor Models. Power Systems Laboratory. ETH Zürich Switzerland

Simulation of Power Systems Dynamics using Dynamic Phasor Models. Power Systems Laboratory. ETH Zürich Switzerland X SEPOPE 2 a 25 de maio de 26 May 2 rt to 25 th 26 FLORIANÓPOLIS (SC) BRASIL X SIMPÓSIO DE ESPECIALISTAS EM PLANEJAMENTO DA OPERAÇÃO E EXPANSÃO ELÉTRICA X SYMPOSIUM OF SPECIALISTS IN ELECTRIC OPERATIONAL

More information

Analysis of Mesostructure Unit Cells Comprised of Octet-truss Structures

Analysis of Mesostructure Unit Cells Comprised of Octet-truss Structures Analyi of Meotructure Unit Cell Compried of Octet-tru Structure Scott R. Johnton *, Marque Reed *, Hongqing V. Wang, and David W. Roen * * The George W. Woodruff School of Mechanical Engineering, Georgia

More information

Wireless and Battery-less Sensor Using RF Energy Harvesting

Wireless and Battery-less Sensor Using RF Energy Harvesting DOI.56/etc4/. Wirele and Battery-le Senor Uing RF Energy Harveting Chritian Merz, Gerald Kupri, Maximilian Niedernhuber 3 Deggendorf Intitute of Technology, Edlmairtr. 6 + 8, 94469 Deggendorf, Germany

More information

Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS

Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS Chapter Stoc and Their Valuation ANSWERS TO EN-OF-CHAPTER QUESTIONS - a. A proxy i a document giving one peron the authority to act for another, typically the power to vote hare of common toc. If earning

More information

International Journal of Heat and Mass Transfer

International Journal of Heat and Mass Transfer International Journal of Heat and Ma Tranfer 5 (9) 14 144 Content lit available at ScienceDirect International Journal of Heat and Ma Tranfer journal homepage: www.elevier.com/locate/ijhmt Technical Note

More information

Network Architecture for Joint Failure Recovery and Traffic Engineering

Network Architecture for Joint Failure Recovery and Traffic Engineering Network Architecture for Joint Failure Recovery and Traffic Engineering Martin Suchara Dept. of Computer Science Princeton Univerity, NJ 08544 [email protected] Dahai Xu AT&T Lab Reearch Florham Park,

More information

Health Insurance and Social Welfare. Run Liang. China Center for Economic Research, Peking University, Beijing 100871, China,

Health Insurance and Social Welfare. Run Liang. China Center for Economic Research, Peking University, Beijing 100871, China, Health Inurance and Social Welfare Run Liang China Center for Economic Reearch, Peking Univerity, Beijing 100871, China, Email: [email protected] and Hao Wang China Center for Economic Reearch, Peking

More information

Bidding for Representative Allocations for Display Advertising

Bidding for Representative Allocations for Display Advertising Bidding for Repreentative Allocation for Diplay Advertiing Arpita Ghoh, Preton McAfee, Kihore Papineni, and Sergei Vailvitkii Yahoo! Reearch. {arpita, mcafee, kpapi, ergei}@yahoo-inc.com Abtract. Diplay

More information

CHAPTER 5 BROADBAND CLASS-E AMPLIFIER

CHAPTER 5 BROADBAND CLASS-E AMPLIFIER CHAPTER 5 BROADBAND CLASS-E AMPLIFIER 5.0 Introduction Cla-E amplifier wa firt preented by Sokal in 1975. The application of cla- E amplifier were limited to the VHF band. At thi range of frequency, cla-e

More information

Improving the Performance of Web Service Recommenders Using Semantic Similarity

Improving the Performance of Web Service Recommenders Using Semantic Similarity Improving the Performance of Web Service Recommender Uing Semantic Similarity Juan Manuel Adán-Coello, Carlo Miguel Tobar, Yang Yuming Faculdade de Engenharia de Computação, Pontifícia Univeridade Católica

More information

Progress 8 measure in 2016, 2017, and 2018. Guide for maintained secondary schools, academies and free schools

Progress 8 measure in 2016, 2017, and 2018. Guide for maintained secondary schools, academies and free schools Progre 8 meaure in 2016, 2017, and 2018 Guide for maintained econdary chool, academie and free chool July 2016 Content Table of figure 4 Summary 5 A ummary of Attainment 8 and Progre 8 5 Expiry or review

More information

Growing Self-Organizing Maps for Surface Reconstruction from Unstructured Point Clouds

Growing Self-Organizing Maps for Surface Reconstruction from Unstructured Point Clouds Growing Self-Organizing Map for Surface Recontruction from Untructured Point Cloud Renata L. M. E. do Rêgo, Aluizio F. R. Araújo, and Fernando B.de Lima Neto Abtract Thi work introduce a new method for

More information

QUANTIFYING THE BULLWHIP EFFECT IN THE SUPPLY CHAIN OF SMALL-SIZED COMPANIES

QUANTIFYING THE BULLWHIP EFFECT IN THE SUPPLY CHAIN OF SMALL-SIZED COMPANIES Sixth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2008) Partnering to Succe: Engineering, Education, Reearch and Development June 4 June 6 2008,

More information