Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Size: px
Start display at page:

Download "Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks"

Transcription

1 From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara Petrol b, Jason Red c a The Unversty of Texas at Dallas, Rchardson, T, U.S.A., fchlamtac,radhag@utdallas.edu b Unverstà d Roma La Sapenza, Italy, petrol@ds.unroma1.t c Boston Unversty, Boston, MA, U.S.A., red@bu.edu Abstract A myrad of applcatons such as rado frequency dentfcaton (RFID) and smart card networks are emergng n whch nodes are desgned for extremely low-cost, large scale applcatons such that the replacement of batteres s not feasble. Energy conservaton therefore becomes a major constrant. Classcal access protocols are ether not energy conservng or lead to unacceptable delays. In a prevous paper we presented three classes of energy-conservng protocols. In ths paper we descrbe analytc models to descrbe and evaluate ther performance. 1 Introducton Rado Frequency Identfcaton Devces (RFIDs), such as warehouse dentfcaton tags and ntellgent ID cards, referred to here as IDETs, are examples of a new world of applcatons whch use small, nexpensve devces for whch battery conservaton s a crtcal system parameter. A typcal IDET s composed of a number of nterconnected base statons communcatng over a shared wreless channel to a large number of small, low-cost, wreless nodes or tags. These tags usually contan some sort of mcroprocessor, power source n the form of a battery, capactor or solar cell, a rado frequency recever, possbly a transmtter, and some support logc. The range of potental uses for RFID tags s extremely large. By the year 2, the RFID market s expected to expand 2 fold to over $5 bllon [3]. Some examples of current uses for RFID tags are: tags attached to the ears or worn around the necks of lvestock for use n locaton trackng, smart tags used n warehouses to automatcally and quckly track nventory, and the numerous tag companes targetng the retal market for electronc shelf labels and automatc purchasng. There are four fundamental characterstcs of RFID wreless nodes whch make RFID networks dstnct from other wreless systems: 1. Scale: There may be a very large number, perhaps thousands, of wreless nodes per base staton. 2. Cost: Due to the large number of extremely nexpensve tems to tag, nodes must be extremely nexpensve, often on the order of only a few dollars. 3. Sze: odes must be very small. The sze of a pack of cards wll be the maxmum sze for many applcatons. 4. Traffc: Communcaton s typcally based on short, smple messages. Transmsson speeds are usually low, on the order of tens of klobts per second n order to mnmze cost and power of transmsson. From these characterstcs follow a number of mportant observatons whch further defne the unque constrants of an RFID network. Most mportantly, as n all moble computng applcatons, the battery s energy s a lmted and scarce resource, whch s not expected to ncrease n potental more than 3% n the near future [5]. Especally demandng of energy s any uplnk transmsson as t can typcally use twce as much energy as recepton [4]. It s possble to use spread spectrum modulaton such that the base staton ndrectly provdes the energy for lmted uplnk communcaton, but ths requres that any uplnk traffc be base staton ntated. Furthermore, lmted unlcensed bandwdth and smplcty of the tag means that all tags must share the same broadcast band. For all of the above consderatons, these types of systems requre new access protocols whch are desgned around these unque constrants and provde a combnaton of two mportant factors: low delay and low energy requrements. The allowable delay s an applcaton dependent constrant. For example, trackng the movement of tags across the cells wthn a system requres updates to be performed wthn a short, bounded, amount of tme. The system s already constraned by the speed of the shared channel and has to manage a potentally large number of tags. Therefore, t s extremely mportant for access protocols to not add sgnfcantly to the transmsson delay. Low energy consumpton s the second requrement that the access protocol must satsfy. The large number of nodes makes t economcally mpossble to replace or recharge the batteres. Therefore tags must be desgned so as to requre a mnmum of energy for operaton. In order to conserve battery lfe, the tag can enter a sleep state where the CPU s n a low power mode and rado recepton s dsabled. In contrast wth ths, the awake state, n whch the CPU operates at full energy and

2 From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, the rado frequency crcutry s actve, can typcally use 1 tmes as much energy. Among exstng protocols, classcal random access protocols are not energy conservng. Whle determnstc protocols lead to unacceptable delays. In [2], we addressed the problem of desgnng communcatons protocols whch operate under an energy constrant, n whch the fracton of tmeslots n whch tags need to be n the actve (awake) state s mnmzed and the access delay meets the applcatons constrants. We ntroduced three classes of protocols: grouped-tag TDMA, drectory and pseudo-random. In ths paper we present analytc models whch use nfnte Markov chans and the theory of M/D/1 queues wth vacatons for further evaluatng the performance of these protocols. All three classes of protocols represent a dramatc mprovement over classcal approaches. In the remander of the paper we frst descrbe the tag network model, followed by a descrpton of the protocols. In the ensung analyss of energy consumpton and access delay, we derve the system behavor for both unformly and nonunformly dstrbuted traffc destnatons. We follow wth a detaled evaluaton of the protocols and conclude wth a summary. 2 etwork Model and Protocols Descrpton We consder a sngle cell system where a base staton communcates wth tags through a rado channel of bandwdth B. The communcaton s packet-orented. We assume the tme to be slotted and the base staton s transmssons to be synchronzed to the begnnngs of slots. The packet length c s constant, and exactly one packet can be transmtted durng one slot. In ths analytc model, we do not explctly treat transmsson errors. We defne an access protocol as consstng of two components: a transmsson schedulng strategy at the base staton whch n each slot selects a packet for transmsson from the arrval queue, and a wake-up schedule at each tag whch determnes the slots n whch the tag s awake. In general, the transmsson schedulng strategy can take nto account dfferent parameters: the number of packets n the queue, the packets ages, as well as the wake-up schedules of ther destnatons. In the protocols dscussed here the oldest packet crteron s generally adopted to help meet the applcaton delay requrements. We next present and compare three classes of protocols for constructng effcent wake-up schedules: groupedtag TDMA protocols, drectory protocols, and pseudo-random protocols. 2.1 Grouped-Tag TDMA Protocols Classcal TDMA can be adapted for use n energy-conservng envronments n the followng way: we dvde tags nto m dsjont groups, wth the cardnalty of each group dfferng by at most one tag, and assgn (reserve) each slot of the TDMA cycle to a unque group. Ths ncreases the average energy consumpton per slot by the cardnalty of the groups, but decreases the average delay snce there s a greater probablty that a tag wll be awake soon after a packet for t has arrved at the base staton. The optmal selecton of ths group sze wll ensure the best energy and delay performance of ths class of protocols. 2.2 Drectory Protocols In our drectory protocol, the base staton always wats for a group of k packets n the queue to accumulate. The base staton then transmts a lst or drectory of the k packet destnatons before transmttng the packets n the subsequent slots. The tags are all awake durng the transmsson of the drectory, and can therefore schedule ther wake-up slots to concde wth the broadcast of ther packets. When there s no group beng currently transmtted, the tags wake up perodcally every v slots n order to gve the base staton an opportunty to start the transmsson of a new group. The choce of the parameter k depends on the load and must take nto account the trade-off between the ncrease n the delay due to a larger k and the energy savngs from more nfrequent broadcastng of drectores. Addtonally, the parameter v should depend upon k and the load. A tag system wth small value of v and a low load wll have the tags wakng up frequently untl enough packets have accumulated at the base staton, whle a large value of v wll ncur an ncrease n delay before the start of group s transmsson. 2.3 Pseudo-Random Protocols The pseudo-random protocols are a class of protocols based on determnstc (pseudo-random) schedules whch preserves the power of randomzaton for farness, whle provdng the advantages of determnsm,.e., the base staton s ablty to predct tags state n each slot. In ths class of protocols all tags run the same pseudo-random number generator and determne ther state (awake or asleep) at each slot based on a probablty p and the stored state of the random number generator. In order to avod a complete overlap of the wake-up schedules, the pseudo-random generator of each tag s ntalzed usng a unque seed, whch s known at the base staton. Therefore, by usng the same pseudo-random number generator t s possble for the base staton to determne the schedules of the tags t wants to transmt to. The base staton can ntate changes n the value of p as a functon of the load, the number of tags, etc. 3 Analyss To compare the performance of the varous protocols proposed, we consder the behavor of a sngle cell tag system. Snce the tme needed to successfully receve a packet, gven that the tag s awake, s exactly one slot, then the slot duraton s = b +, wth b denotng the packet transmsson tme ( c B ) and the propagaton delay. The presented evaluaton utlzes the followng defntons:

3 From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, T ; the average watng tme n slots experenced by a packet n the system from arrval at the base staton to successful recepton at the tag. E; the average percentage of slots n whch a tag s awake. L; the average number of packets n the system. The energy measure proposed does not take nto account the contrbuton durng slots where a tag s asleep. The energy used whle n ths state s consumed over the lfetme of the tag, whether the tag s beng used or not. Therefore only the percentage of awake slots s necessary for comparng dfferent energy-conservng access protocols. We assume that the packets arrve at the base staton accordng to a Posson process wth nterarrval rate. Each packet s addressed to a sngle destnaton selected from ether a unform or a Gaussan dstrbuton. The latter s ntroduced n order to model the heterogeneous nature of the traffc whch s common to many tag applcatons. We use the followng notatons: ; the mean arrval rate expressed n packets per slot ( = (b + )). ; the mean servce rate expressed n packets per slot. ; the utlzaton factor. 3.1 Analyss of the Grouped-Tag TDMA The access delay for packets whose destnatons are n dfferent groups s ndependent. Therefore, for each group, we can assocate a dfferent queung system whose Posson traffc stream has rate. Every tme the queue s empty, the server goes on vacaton for one TDMA cycle (m slots). Otherwse the servce tme of a packet s constant and equals 1. Thus, the average watng tme n the queue for a packet destned for group s equvalent to that of an M=D=1 queung system wth vacatons [1]: W = 2 + m (1;) 2 m = 2(1; m) Let T x denote the average number of slots, as a functon of the parameter x, durng whch a packet s watng n the system. Then: T x P m = =1 =1+ P m =1 (W +1) m 2(1; m) It remans to calculate the. These quanttes depend on the destnaton dstrbuton utlzed. Under a unform destnaton dstrbuton the percentage of the global traffc dedcated to each group s proportonal to the number of tags n that group. Thus, = < : d m e b m c modm > modm We next consder the case of when the packets destnatons are chosen accordng to a Gaussan dstrbuton wth a densty functon f x, average and varance 2. = p, where p denotes the probablty of choosng a packet n the -th group. p s the area of the regon bounded above by f x and the nterval assocated to the -th group, normalzed by the area of the usable part of the Gaussan (.e., the one correspondng to the nterval [1::: ]). So p = F x(d m e);f x((;1)d m e) F x();fx() modm F x(modmd m e+(;modm)b m c) F x();fx() ; > modm F x(modmd m e+(;1;modm)b m c) F x();fx() where F x (y) s the cumulatve dstrbuton functon of a Gaussan dstrbuton. 3.2 Analyss of the Drectory Protocol Let a = j c dloge k be the number of dfferent records whch ft nto a slot. Then, the servce tme of a group s k + k slots, where k ndcates the tme needed for transmttng the drectory and s gven by a k. When a cycle ends and no completed groups are n the queue, the tags go to sleep for an dle nterval of v slots. Thus, a server can start processng a new group f and only f there s at least one completed group n the queue and ether an dle or a servce cycle ended n the prevous slot. We compute the average watng tme T of a packet n the system as: T = W p + T g ; W s = k;1 2 + T g ; ( k;1 2 ) ;W p s the average watng tme of a packet n the queue before ts group s completed and s = k;1 2. ;T g s the average watng tme of a group n the system. ;W s s the average tme between the successful recepton of a packet and the completon of ts group s transmsson. W s = k;1 2. To compute T g we construct the followng analytc model. We observe the system at the regeneraton ponts embedded at the begnnng of each slot and model the system as a dscrete tme, nfnte Markov chan M =< S < j h> P < j h> < j h > >. Each state S < j h> denotes the number of completed groups n the system, the number j of non-grouped packets n the queue, and the ndex h of the current slot n ether the dle ( h v ; 1) or the servce (v h v + k + k ; 1) cycle. ote that wthn ether a servce or dle cycle we have only to ncrease the poston of the slot and keep track of the arrvals, whle durng the last slot of a cycle we also have to decde the nature (busy/dle) of the next nterval and possbly ndcate the ext of a group from the system. We obtan the followng transton probabltes:

4 From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, Case h 2 [:::v ; 1) S [v:::v + k + k ; 1) < : P < j h> < j h > = (h 6= h +1)_ ( <) A j ;j+( ;)k Case h = v ; 1 P < j v;1> < j h > = _(( = ) ^ (j <j)) otherwse ((h 6=)^ ( = )) _((h 6= v) ^ ( 1)) _( <) _ (( = ) ^ (j <j)) otherwse A j ;j+( ;)k Case h = v + k + k ; 1 P < j v+k+k ;1> < j h > = ((h 6=)^ ( = )) _((h 6= v) ^ ( 1)) _( <; 1) _ (( = ; 1) A j ;j+( ;)k+k ^(j <j)) otherwse ;A r s the probablty of r messages orgnated by a Posson process durng a slot and s gven by: ; ()r A r = e r! The steady state probablty < j h> of beng n the < j h > state s obtaned by solvng the followng system of equatons: =P T P P j P h =1 Let us denote g () the probablty of havng completed groups n the system: g () = j h < j h> The average number of completed groups n the system L g can then be gven by: L g = g () Fnally, applyng Lttle s theorem we can compute the average watng tme of a group n the system: T L gk g = The energy consumpton E can be computed as follows: E = Pr E + Pr b E b ;Pr s the percentage of slots belongng to dle cycles and s gven by: Pr = k;1 v;1 j= h= < j h> : ;Pr b s the percentage of busy slots, Pr b =1; Pr. ;E s the average energy consumpton per tag per slot durng an dle perod and s equal to 1 v. ;E b s the average energy consumpton per tag per slot durng a servce cycle. E b = k + k k + k : 3.3 Approxmate Analyss of the Pseudo- Random Protocol We analyze the protocol under the assumpton that all tags use the same awake probablty parameter p. To obtan an exact descrpton of the system behavor through a Markov chan, the states should nclude the number of packets addressed to each tag, snce the probablty of successfully transmttng depends on the number of unque packet destnatons n the queue. It s therefore mpossble to analyze systems of a realstc sze. We solve ths problem by makng use of Stern s ndependence assumpton [6], statng that at the begnnng of a tme slot each message draws a new destnaton from a gven unform dstrbuton. The Markov chan descrbng the system s then represented by the total number of packets at the begnnng of a slot. The transton probablty matrx P s gven, smlarly to the random access case, by P j P j = = A j P mn( ) j<; 1 k=1 R k (1 ; (1 ; p) k )A j = ; 1 P mn( ) k=1 R k (1 ; (1 ; p) k )A j;+1 + P mn( ) k=1 R k (1 ; p) k A j; otherwse ;R k s the probablty that packets are addressed to k dfferent destnatons and s gven by R k = k Pk;1 k j= (;1)j (k ; j) j : The steady-state probabltes are the solutons of the followng set of equatons =P T P =1 We can now compute the average number L of packets n the system L =

5 From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, l =.5 l =.1 l =.5 l =.5 l =.1 l = Fgure 1: Grouped TDMA Protocol, Unform Destnaton Dstrbuton, Optmal group sze Fgure 3: Pseudo-Random Protocol, Unform Destnaton Dstrbuton.5 l =.5 l =.1 l =.5 Grouped-Tag TDMA, l =.5 Grouped-Tag TDMA, l =.1 Grouped-Tag TDMA, l = Drectory, l =.5 Drectory, l =.1 Drectory, l = Fgure 2: Drectory Protocol, Unform Destnaton Dstrbuton Fgure 4: Energy conservng protocols, Gaussan destnaton dstrbuton ( = 2 2 =1) and, usng the Lttle s result: T = L Fnally, as n the prevous secton, the average energy consumpton s obvously E = p. 4 Performance Fgures 1 through 5 plot quanttatve results of the equatons derved n prevous sectons. These plots were all generated by assumng 1 tags wth consecutve sequental ds are assgned to a sngle base staton. All of the plots nclude sets of data wth nterarrval rate parameters equal to :5, :1 and :2 arrvals per slot. To show the effect of heterogeneous destnaton dstrbutons we use two Gaussans, wth mean and 2 varance 1 and respectvely. The nfnte Markov chan of the pseudo-random protocol was approxmated by truncatng the transton probablty matrx after the frst 1 states whle up to 25 states were consdered for the drectory protocol wth the lmtaton k 2f1 ::: 1g and v 2f1 ::: 25g. Fg.1,2, 3 compare the performance of the three protocols proposed usng a unform destnaton dstrbuton. Fg.1 shows the trade-off between energy and delay for optmum values of group sze usng the grouped-tag TDMA protocol. We note that the performance s better for low loads because there are fewer packets avalable for transmsson for the same slot n a cycle. Snce tags schedules are cyclc and ndependent of packets n the base staton s queue (a tag does not know when the base staton may have a packet destned to t) some unnecessary energy can be used due to tags contnung to wake up cyclcally. The performance of the drectory protocol (Fg.2) depends on the choce of the parameters k and v for each partcular arrval rate.

6 From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, Grouped-Tag TDMA, l =.5 Grouped-Tag TDMA, l =.1 Grouped-Tag TDMA, l = Drectory, l =.5 Drectory, l =.1 Drectory, l = Fgure 5: Energy conservng protocols, Gaussan destnaton dstrbuton ( = 2 2 = ) If we assume an optmum value for v, an ncrease n the arrval rate wll reduce the amount of tme t takes for a complete group of K packets to arrve, reducng the average delay for the packets n that group. However, ths requres the tags to be awake more often n order to receve ths group, thereby ncreasng the energy. When and group sze k are large, the sze of the drectory becomes prohbtvely large, and therefore the amount of energy used by the tags just to read the drectory can become a major factor. Fg.3 shows the energy vs. delay graph for the pseudorandom protocol gven a unform destnaton dstrbuton. The performance acheved s better than that of the drectory protocol but slghtly worse than that of the grouped-tag TDMA although ths dfference decreases as ncreases. Fg.4, and 5 compare protocol performance for the case of heterogeneous traffc. The drectory protocol s not affected by the destnaton dstrbuton. Instead, we show how the performance of the grouped-tag TDMA degrades rapdly under heterogeneous traffc. Packets belongng to a group wth a hgh probablty of traffc are severely delayed due to the hgh volume of localzed destnatons. The reorganzaton of the groups, even f possble, can be extremely tme-consumng. Snce the number of packets n the queue addressed to the same group ncreases as ether the load ncreases or the Gaussan dstrbuton becomes narrower, the performance of the protocol decreases n both these cases. For nether of these Gaussans s the performance of the pseudo-random protocol dscussed. Intutvely, we do not expect the performance to change dramatcally from the case of a unform destnaton dstrbuton. Snce the tag s schedules are the same, the energy wll not change, and the probablty of at least one packet n the queue wth an awake destnaton should not sgnfcantly change. Ths ratonal s backed by the smulaton results n [2] whch shows only a slght ncrease n delay for even the tghter Gaussan dstrbuton. 5 Conclusons In ths paper, we addressed the analyss of three types of wreless access protocols whch nclude an energy constrant: grouped-tag TDMA, drectory and pseudo-random. Careful selecton of protocol parameters addresses the goal of mnmzng the energy requred for recepton of packets whle meetng the applcaton delay constrants. A detaled analyss and plots of quanttatve data from ths showed a varety of performances under varyng loads. In partcular, the groupedtag TDMA protocol acheves the best performance for ether a low traffc load or a unform destnaton dstrbuton. When the destnaton dstrbuton becomes more realstcally clustered, other protocols such as the drectory or pseudo-random protocols need to be adopted. The pseudo-random protocol consstently out-performs the drectory protocol n both energy and delay for all loads and most destnaton dstrbutons. However, for cases where the destnaton dstrbuton becomes extremely clustered, t s apparent that the drectory protocol s the best soluton, unless dynamc handlng of the protocol parameters s ntroduced. References [1] Bertsekas, D. and Gallager, R. Data etworks, Prentce Hall, [2] Chlamtac, I. and Petrol, C. and Red, J. Energy- Conservng Access Protocols for IDETs Techncal Report 96-6, Boston Unversty. [3] Dunn, D. RFID Engne Chugs Onto Scene. Electronc Buyer s ews, February 5, 1996, pp 14. [4] Harrs, E.P., Depp, S.W., Pence,E., Krkpatrck, S., Sr- Jayantha, M., and Troutman, R.R. Technology drectons for portable computers. Proceedngs of the IEEE, 3(4):636 5, Aprl [5] Powers, R.A. Batteres for low power electroncs. Proceedngs of the IEEE, 3(4):67 93, Aprl [6] Stern, T. E. Packet Schedulng protocols n mult-beam communcaton satelltes. Proceedngs of the Internatonal Symposum on Informaton Theory, Italy, June 1979, pp

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network On Fle Delay Mnmzaton for Content Uploadng to Meda Cloud va Collaboratve Wreless Network Ge Zhang and Yonggang Wen School of Computer Engneerng Nanyang Technologcal Unversty Sngapore Emal: {zh0001ge, ygwen}@ntu.edu.sg

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks : An Adaptve, Anycast MAC Protocol for Wreless Sensor Networks Hwee-Xan Tan and Mun Choon Chan Department of Computer Scence, School of Computng, Natonal Unversty of Sngapore {hweexan, chanmc}@comp.nus.edu.sg

More information

MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11

MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11 Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 MAC Layer Servce Tme Dstrbuton of a Fxed Prorty Real Tme Scheduler over 80. Inès El Korb Ecole Natonale des Scences de

More information

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT Chapter 4 ECOOMIC DISATCH AD UIT COMMITMET ITRODUCTIO A power system has several power plants. Each power plant has several generatng unts. At any pont of tme, the total load n the system s met by the

More information

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part

More information

Efficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ

Efficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ Effcent Strpng Technques for Varable Bt Rate Contnuous Meda Fle Servers æ Prashant J. Shenoy Harrck M. Vn Department of Computer Scence, Department of Computer Scences, Unversty of Massachusetts at Amherst

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

Distributed Optimal Contention Window Control for Elastic Traffic in Wireless LANs

Distributed Optimal Contention Window Control for Elastic Traffic in Wireless LANs Dstrbuted Optmal Contenton Wndow Control for Elastc Traffc n Wreless LANs Yalng Yang, Jun Wang and Robn Kravets Unversty of Illnos at Urbana-Champagn { yyang8, junwang3, rhk@cs.uuc.edu} Abstract Ths paper

More information

Brigid Mullany, Ph.D University of North Carolina, Charlotte

Brigid Mullany, Ph.D University of North Carolina, Charlotte Evaluaton And Comparson Of The Dfferent Standards Used To Defne The Postonal Accuracy And Repeatablty Of Numercally Controlled Machnng Center Axes Brgd Mullany, Ph.D Unversty of North Carolna, Charlotte

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

Rapid Estimation Method for Data Capacity and Spectrum Efficiency in Cellular Networks

Rapid Estimation Method for Data Capacity and Spectrum Efficiency in Cellular Networks Rapd Estmaton ethod for Data Capacty and Spectrum Effcency n Cellular Networs C.F. Ball, E. Humburg, K. Ivanov, R. üllner Semens AG, Communcatons oble Networs unch, Germany carsten.ball@semens.com Abstract

More information

CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS

CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS Novella Bartoln 1, Imrch Chlamtac 2 1 Dpartmento d Informatca, Unverstà d Roma La Sapenza, Roma, Italy novella@ds.unroma1.t 2 Center for Advanced

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

Network Aware Load-Balancing via Parallel VM Migration for Data Centers

Network Aware Load-Balancing via Parallel VM Migration for Data Centers Network Aware Load-Balancng va Parallel VM Mgraton for Data Centers Kun-Tng Chen 2, Chen Chen 12, Po-Hsang Wang 2 1 Informaton Technology Servce Center, 2 Department of Computer Scence Natonal Chao Tung

More information

Schedulability Bound of Weighted Round Robin Schedulers for Hard Real-Time Systems

Schedulability Bound of Weighted Round Robin Schedulers for Hard Real-Time Systems Schedulablty Bound of Weghted Round Robn Schedulers for Hard Real-Tme Systems Janja Wu, Jyh-Charn Lu, and We Zhao Department of Computer Scence, Texas A&M Unversty {janjaw, lu, zhao}@cs.tamu.edu Abstract

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

Analysis of the Delay and Jitter of Voice Traffic Over the Internet

Analysis of the Delay and Jitter of Voice Traffic Over the Internet Analyss of the Delay and Jtter of Voce Traffc Over the Internet Mansour J. Karam, Fouad A. Tobag Abstract In the future, voce communcaton s expected to mgrate from the Publc Swtched Telephone Network (PSTN)

More information

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center Dynamc Resource Allocaton and Power Management n Vrtualzed Data Centers Rahul Urgaonkar, Ulas C. Kozat, Ken Igarash, Mchael J. Neely urgaonka@usc.edu, {kozat, garash}@docomolabs-usa.com, mjneely@usc.edu

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks Fuzzy Set Approach To Asymmetrcal Load Balancng n Dstrbuton Networks Goran Majstrovc Energy nsttute Hrvoje Por Zagreb, Croata goran.majstrovc@ehp.hr Slavko Krajcar Faculty of electrcal engneerng and computng

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Relay Secrecy in Wireless Networks with Eavesdropper

Relay Secrecy in Wireless Networks with Eavesdropper Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. XX, MONTH 2XX 1 Effcent On-Demand Data Servce Delvery to Hgh-Speed Trans n Cellular/Infostaton Integrated Networks Hao Lang, Student Member,

More information

Dynamic Fleet Management for Cybercars

Dynamic Fleet Management for Cybercars Proceedngs of the IEEE ITSC 2006 2006 IEEE Intellgent Transportaton Systems Conference Toronto, Canada, September 17-20, 2006 TC7.5 Dynamc Fleet Management for Cybercars Fenghu. Wang, Mng. Yang, Ruqng.

More information

Availability-Based Path Selection and Network Vulnerability Assessment

Availability-Based Path Selection and Network Vulnerability Assessment Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Activity Scheduling for Cost-Time Investment Optimization in Project Management

Activity Scheduling for Cost-Time Investment Optimization in Project Management PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng

More information

Retailers must constantly strive for excellence in operations; extremely narrow profit margins

Retailers must constantly strive for excellence in operations; extremely narrow profit margins Managng a Retaler s Shelf Space, Inventory, and Transportaton Gerard Cachon 300 SH/DH, The Wharton School, Unversty of Pennsylvana, Phladelpha, Pennsylvana 90 cachon@wharton.upenn.edu http://opm.wharton.upenn.edu/cachon/

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems Jont Schedulng of Processng and Shuffle Phases n MapReduce Systems Fangfe Chen, Mural Kodalam, T. V. Lakshman Department of Computer Scence and Engneerng, The Penn State Unversty Bell Laboratores, Alcatel-Lucent

More information

ivoip: an Intelligent Bandwidth Management Scheme for VoIP in WLANs

ivoip: an Intelligent Bandwidth Management Scheme for VoIP in WLANs VoIP: an Intellgent Bandwdth Management Scheme for VoIP n WLANs Zhenhu Yuan and Gabrel-Mro Muntean Abstract Voce over Internet Protocol (VoIP) has been wdely used by many moble consumer devces n IEEE 802.11

More information

QoS-based Scheduling of Workflow Applications on Service Grids

QoS-based Scheduling of Workflow Applications on Service Grids QoS-based Schedulng of Workflow Applcatons on Servce Grds Ja Yu, Rakumar Buyya and Chen Khong Tham Grd Computng and Dstrbuted System Laboratory Dept. of Computer Scence and Software Engneerng The Unversty

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

An Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks

An Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks An Adaptve Cross-layer Bandwdth Schedulng Strategy for the Speed-Senstve Strategy n erarchcal Cellular Networks Jong-Shn Chen #1, Me-Wen #2 Department of Informaton and Communcaton Engneerng ChaoYang Unversty

More information

An MILP model for planning of batch plants operating in a campaign-mode

An MILP model for planning of batch plants operating in a campaign-mode An MILP model for plannng of batch plants operatng n a campagn-mode Yanna Fumero Insttuto de Desarrollo y Dseño CONICET UTN yfumero@santafe-concet.gov.ar Gabrela Corsano Insttuto de Desarrollo y Dseño

More information

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays VoIP Playout Buffer Adjustment usng Adaptve Estmaton of Network Delays Mroslaw Narbutt and Lam Murphy* Department of Computer Scence Unversty College Dubln, Belfeld, Dubln, IRELAND Abstract The poor qualty

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com G. G. Md. Nawaz Al 1,2, Rajb Chakraborty 2, Md. Shhabul Alam 2 and Edward Chan 1 1 Cty Unversty of Hong Kong, Hong Kong, Chna taposh_kuet20@yahoo.comcsedchan@ctyu.edu.hk 2 Khulna Unversty of Engneerng

More information

J. Parallel Distrib. Comput. Environment-conscious scheduling of HPC applications on distributed Cloud-oriented data centers

J. Parallel Distrib. Comput. Environment-conscious scheduling of HPC applications on distributed Cloud-oriented data centers J. Parallel Dstrb. Comput. 71 (2011) 732 749 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. ournal homepage: www.elsever.com/locate/pdc Envronment-conscous schedulng of HPC applcatons

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks 2007 Internatonal Conference on Convergence Informaton Technology An Adaptve and Dstrbuted Clusterng Scheme for Wreless Sensor Networs Xnguo Wang, Xnmng Zhang, Guolang Chen, Shuang Tan Department of Computer

More information

A New Paradigm for Load Balancing in Wireless Mesh Networks

A New Paradigm for Load Balancing in Wireless Mesh Networks A New Paradgm for Load Balancng n Wreless Mesh Networks Abstract: Obtanng maxmum throughput across a network or a mesh through optmal load balancng s known to be an NP-hard problem. Desgnng effcent load

More information

A role based access in a hierarchical sensor network architecture to provide multilevel security

A role based access in a hierarchical sensor network architecture to provide multilevel security 1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Inter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007.

Inter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. Inter-Ing 2007 INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. UNCERTAINTY REGION SIMULATION FOR A SERIAL ROBOT STRUCTURE MARIUS SEBASTIAN

More information

Computer Networks 55 (2011) 3503 3516. Contents lists available at ScienceDirect. Computer Networks. journal homepage: www.elsevier.

Computer Networks 55 (2011) 3503 3516. Contents lists available at ScienceDirect. Computer Networks. journal homepage: www.elsevier. Computer Networks 55 (2011) 3503 3516 Contents lsts avalable at ScenceDrect Computer Networks journal homepage: www.elsever.com/locate/comnet Bonded defct round robn schedulng for mult-channel networks

More information

Case Study: Load Balancing

Case Study: Load Balancing Case Study: Load Balancng Thursday, 01 June 2006 Bertol Marco A.A. 2005/2006 Dmensonamento degl mpant Informatc LoadBal - 1 Introducton Optmze the utlzaton of resources to reduce the user response tme

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet

2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet 2008/8 An ntegrated model for warehouse and nventory plannng Géraldne Strack and Yves Pochet CORE Voe du Roman Pays 34 B-1348 Louvan-la-Neuve, Belgum. Tel (32 10) 47 43 04 Fax (32 10) 47 43 01 E-mal: corestat-lbrary@uclouvan.be

More information

A DATA MINING APPLICATION IN A STUDENT DATABASE

A DATA MINING APPLICATION IN A STUDENT DATABASE JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

VoIP over Multiple IEEE 802.11 Wireless LANs

VoIP over Multiple IEEE 802.11 Wireless LANs SUBMITTED TO IEEE TRANSACTIONS ON MOBILE COMPUTING 1 VoIP over Multple IEEE 80.11 Wreless LANs An Chan, Graduate Student Member, IEEE, Soung Chang Lew, Senor Member, IEEE Abstract IEEE 80.11 WLAN has hgh

More information

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000 Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from

More information

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Risk Model of Long-Term Production Scheduling in Open Pit Gold Mining

Risk Model of Long-Term Production Scheduling in Open Pit Gold Mining Rsk Model of Long-Term Producton Schedulng n Open Pt Gold Mnng R Halatchev 1 and P Lever 2 ABSTRACT Open pt gold mnng s an mportant sector of the Australan mnng ndustry. It uses large amounts of nvestments,

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

Economic-Robust Transmission Opportunity Auction in Multi-hop Wireless Networks

Economic-Robust Transmission Opportunity Auction in Multi-hop Wireless Networks Economc-Robust Transmsson Opportunty Aucton n Mult-hop Wreless Networks Mng L, Pan L, Mao Pan, and Jnyuan Sun Department of Electrcal and Computer Engneerng, Msssspp State Unversty, Msssspp State, MS 39762

More information

Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks

Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks Secure Walkng GPS: A Secure Localzaton and Key Dstrbuton Scheme for Wreless Sensor Networks Q M, John A. Stankovc, Radu Stoleru 2 Department of Computer Scence, Unversty of Vrgna, USA 2 Department of Computer

More information