Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks
|
|
- Brianne Paul
- 8 years ago
- Views:
Transcription
1 From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara Petrol b, Jason Red c a The Unversty of Texas at Dallas, Rchardson, T, U.S.A., fchlamtac,radhag@utdallas.edu b Unverstà d Roma La Sapenza, Italy, petrol@ds.unroma1.t c Boston Unversty, Boston, MA, U.S.A., red@bu.edu Abstract A myrad of applcatons such as rado frequency dentfcaton (RFID) and smart card networks are emergng n whch nodes are desgned for extremely low-cost, large scale applcatons such that the replacement of batteres s not feasble. Energy conservaton therefore becomes a major constrant. Classcal access protocols are ether not energy conservng or lead to unacceptable delays. In a prevous paper we presented three classes of energy-conservng protocols. In ths paper we descrbe analytc models to descrbe and evaluate ther performance. 1 Introducton Rado Frequency Identfcaton Devces (RFIDs), such as warehouse dentfcaton tags and ntellgent ID cards, referred to here as IDETs, are examples of a new world of applcatons whch use small, nexpensve devces for whch battery conservaton s a crtcal system parameter. A typcal IDET s composed of a number of nterconnected base statons communcatng over a shared wreless channel to a large number of small, low-cost, wreless nodes or tags. These tags usually contan some sort of mcroprocessor, power source n the form of a battery, capactor or solar cell, a rado frequency recever, possbly a transmtter, and some support logc. The range of potental uses for RFID tags s extremely large. By the year 2, the RFID market s expected to expand 2 fold to over $5 bllon [3]. Some examples of current uses for RFID tags are: tags attached to the ears or worn around the necks of lvestock for use n locaton trackng, smart tags used n warehouses to automatcally and quckly track nventory, and the numerous tag companes targetng the retal market for electronc shelf labels and automatc purchasng. There are four fundamental characterstcs of RFID wreless nodes whch make RFID networks dstnct from other wreless systems: 1. Scale: There may be a very large number, perhaps thousands, of wreless nodes per base staton. 2. Cost: Due to the large number of extremely nexpensve tems to tag, nodes must be extremely nexpensve, often on the order of only a few dollars. 3. Sze: odes must be very small. The sze of a pack of cards wll be the maxmum sze for many applcatons. 4. Traffc: Communcaton s typcally based on short, smple messages. Transmsson speeds are usually low, on the order of tens of klobts per second n order to mnmze cost and power of transmsson. From these characterstcs follow a number of mportant observatons whch further defne the unque constrants of an RFID network. Most mportantly, as n all moble computng applcatons, the battery s energy s a lmted and scarce resource, whch s not expected to ncrease n potental more than 3% n the near future [5]. Especally demandng of energy s any uplnk transmsson as t can typcally use twce as much energy as recepton [4]. It s possble to use spread spectrum modulaton such that the base staton ndrectly provdes the energy for lmted uplnk communcaton, but ths requres that any uplnk traffc be base staton ntated. Furthermore, lmted unlcensed bandwdth and smplcty of the tag means that all tags must share the same broadcast band. For all of the above consderatons, these types of systems requre new access protocols whch are desgned around these unque constrants and provde a combnaton of two mportant factors: low delay and low energy requrements. The allowable delay s an applcaton dependent constrant. For example, trackng the movement of tags across the cells wthn a system requres updates to be performed wthn a short, bounded, amount of tme. The system s already constraned by the speed of the shared channel and has to manage a potentally large number of tags. Therefore, t s extremely mportant for access protocols to not add sgnfcantly to the transmsson delay. Low energy consumpton s the second requrement that the access protocol must satsfy. The large number of nodes makes t economcally mpossble to replace or recharge the batteres. Therefore tags must be desgned so as to requre a mnmum of energy for operaton. In order to conserve battery lfe, the tag can enter a sleep state where the CPU s n a low power mode and rado recepton s dsabled. In contrast wth ths, the awake state, n whch the CPU operates at full energy and
2 From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, the rado frequency crcutry s actve, can typcally use 1 tmes as much energy. Among exstng protocols, classcal random access protocols are not energy conservng. Whle determnstc protocols lead to unacceptable delays. In [2], we addressed the problem of desgnng communcatons protocols whch operate under an energy constrant, n whch the fracton of tmeslots n whch tags need to be n the actve (awake) state s mnmzed and the access delay meets the applcatons constrants. We ntroduced three classes of protocols: grouped-tag TDMA, drectory and pseudo-random. In ths paper we present analytc models whch use nfnte Markov chans and the theory of M/D/1 queues wth vacatons for further evaluatng the performance of these protocols. All three classes of protocols represent a dramatc mprovement over classcal approaches. In the remander of the paper we frst descrbe the tag network model, followed by a descrpton of the protocols. In the ensung analyss of energy consumpton and access delay, we derve the system behavor for both unformly and nonunformly dstrbuted traffc destnatons. We follow wth a detaled evaluaton of the protocols and conclude wth a summary. 2 etwork Model and Protocols Descrpton We consder a sngle cell system where a base staton communcates wth tags through a rado channel of bandwdth B. The communcaton s packet-orented. We assume the tme to be slotted and the base staton s transmssons to be synchronzed to the begnnngs of slots. The packet length c s constant, and exactly one packet can be transmtted durng one slot. In ths analytc model, we do not explctly treat transmsson errors. We defne an access protocol as consstng of two components: a transmsson schedulng strategy at the base staton whch n each slot selects a packet for transmsson from the arrval queue, and a wake-up schedule at each tag whch determnes the slots n whch the tag s awake. In general, the transmsson schedulng strategy can take nto account dfferent parameters: the number of packets n the queue, the packets ages, as well as the wake-up schedules of ther destnatons. In the protocols dscussed here the oldest packet crteron s generally adopted to help meet the applcaton delay requrements. We next present and compare three classes of protocols for constructng effcent wake-up schedules: groupedtag TDMA protocols, drectory protocols, and pseudo-random protocols. 2.1 Grouped-Tag TDMA Protocols Classcal TDMA can be adapted for use n energy-conservng envronments n the followng way: we dvde tags nto m dsjont groups, wth the cardnalty of each group dfferng by at most one tag, and assgn (reserve) each slot of the TDMA cycle to a unque group. Ths ncreases the average energy consumpton per slot by the cardnalty of the groups, but decreases the average delay snce there s a greater probablty that a tag wll be awake soon after a packet for t has arrved at the base staton. The optmal selecton of ths group sze wll ensure the best energy and delay performance of ths class of protocols. 2.2 Drectory Protocols In our drectory protocol, the base staton always wats for a group of k packets n the queue to accumulate. The base staton then transmts a lst or drectory of the k packet destnatons before transmttng the packets n the subsequent slots. The tags are all awake durng the transmsson of the drectory, and can therefore schedule ther wake-up slots to concde wth the broadcast of ther packets. When there s no group beng currently transmtted, the tags wake up perodcally every v slots n order to gve the base staton an opportunty to start the transmsson of a new group. The choce of the parameter k depends on the load and must take nto account the trade-off between the ncrease n the delay due to a larger k and the energy savngs from more nfrequent broadcastng of drectores. Addtonally, the parameter v should depend upon k and the load. A tag system wth small value of v and a low load wll have the tags wakng up frequently untl enough packets have accumulated at the base staton, whle a large value of v wll ncur an ncrease n delay before the start of group s transmsson. 2.3 Pseudo-Random Protocols The pseudo-random protocols are a class of protocols based on determnstc (pseudo-random) schedules whch preserves the power of randomzaton for farness, whle provdng the advantages of determnsm,.e., the base staton s ablty to predct tags state n each slot. In ths class of protocols all tags run the same pseudo-random number generator and determne ther state (awake or asleep) at each slot based on a probablty p and the stored state of the random number generator. In order to avod a complete overlap of the wake-up schedules, the pseudo-random generator of each tag s ntalzed usng a unque seed, whch s known at the base staton. Therefore, by usng the same pseudo-random number generator t s possble for the base staton to determne the schedules of the tags t wants to transmt to. The base staton can ntate changes n the value of p as a functon of the load, the number of tags, etc. 3 Analyss To compare the performance of the varous protocols proposed, we consder the behavor of a sngle cell tag system. Snce the tme needed to successfully receve a packet, gven that the tag s awake, s exactly one slot, then the slot duraton s = b +, wth b denotng the packet transmsson tme ( c B ) and the propagaton delay. The presented evaluaton utlzes the followng defntons:
3 From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, T ; the average watng tme n slots experenced by a packet n the system from arrval at the base staton to successful recepton at the tag. E; the average percentage of slots n whch a tag s awake. L; the average number of packets n the system. The energy measure proposed does not take nto account the contrbuton durng slots where a tag s asleep. The energy used whle n ths state s consumed over the lfetme of the tag, whether the tag s beng used or not. Therefore only the percentage of awake slots s necessary for comparng dfferent energy-conservng access protocols. We assume that the packets arrve at the base staton accordng to a Posson process wth nterarrval rate. Each packet s addressed to a sngle destnaton selected from ether a unform or a Gaussan dstrbuton. The latter s ntroduced n order to model the heterogeneous nature of the traffc whch s common to many tag applcatons. We use the followng notatons: ; the mean arrval rate expressed n packets per slot ( = (b + )). ; the mean servce rate expressed n packets per slot. ; the utlzaton factor. 3.1 Analyss of the Grouped-Tag TDMA The access delay for packets whose destnatons are n dfferent groups s ndependent. Therefore, for each group, we can assocate a dfferent queung system whose Posson traffc stream has rate. Every tme the queue s empty, the server goes on vacaton for one TDMA cycle (m slots). Otherwse the servce tme of a packet s constant and equals 1. Thus, the average watng tme n the queue for a packet destned for group s equvalent to that of an M=D=1 queung system wth vacatons [1]: W = 2 + m (1;) 2 m = 2(1; m) Let T x denote the average number of slots, as a functon of the parameter x, durng whch a packet s watng n the system. Then: T x P m = =1 =1+ P m =1 (W +1) m 2(1; m) It remans to calculate the. These quanttes depend on the destnaton dstrbuton utlzed. Under a unform destnaton dstrbuton the percentage of the global traffc dedcated to each group s proportonal to the number of tags n that group. Thus, = < : d m e b m c modm > modm We next consder the case of when the packets destnatons are chosen accordng to a Gaussan dstrbuton wth a densty functon f x, average and varance 2. = p, where p denotes the probablty of choosng a packet n the -th group. p s the area of the regon bounded above by f x and the nterval assocated to the -th group, normalzed by the area of the usable part of the Gaussan (.e., the one correspondng to the nterval [1::: ]). So p = F x(d m e);f x((;1)d m e) F x();fx() modm F x(modmd m e+(;modm)b m c) F x();fx() ; > modm F x(modmd m e+(;1;modm)b m c) F x();fx() where F x (y) s the cumulatve dstrbuton functon of a Gaussan dstrbuton. 3.2 Analyss of the Drectory Protocol Let a = j c dloge k be the number of dfferent records whch ft nto a slot. Then, the servce tme of a group s k + k slots, where k ndcates the tme needed for transmttng the drectory and s gven by a k. When a cycle ends and no completed groups are n the queue, the tags go to sleep for an dle nterval of v slots. Thus, a server can start processng a new group f and only f there s at least one completed group n the queue and ether an dle or a servce cycle ended n the prevous slot. We compute the average watng tme T of a packet n the system as: T = W p + T g ; W s = k;1 2 + T g ; ( k;1 2 ) ;W p s the average watng tme of a packet n the queue before ts group s completed and s = k;1 2. ;T g s the average watng tme of a group n the system. ;W s s the average tme between the successful recepton of a packet and the completon of ts group s transmsson. W s = k;1 2. To compute T g we construct the followng analytc model. We observe the system at the regeneraton ponts embedded at the begnnng of each slot and model the system as a dscrete tme, nfnte Markov chan M =< S < j h> P < j h> < j h > >. Each state S < j h> denotes the number of completed groups n the system, the number j of non-grouped packets n the queue, and the ndex h of the current slot n ether the dle ( h v ; 1) or the servce (v h v + k + k ; 1) cycle. ote that wthn ether a servce or dle cycle we have only to ncrease the poston of the slot and keep track of the arrvals, whle durng the last slot of a cycle we also have to decde the nature (busy/dle) of the next nterval and possbly ndcate the ext of a group from the system. We obtan the followng transton probabltes:
4 From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, Case h 2 [:::v ; 1) S [v:::v + k + k ; 1) < : P < j h> < j h > = (h 6= h +1)_ ( <) A j ;j+( ;)k Case h = v ; 1 P < j v;1> < j h > = _(( = ) ^ (j <j)) otherwse ((h 6=)^ ( = )) _((h 6= v) ^ ( 1)) _( <) _ (( = ) ^ (j <j)) otherwse A j ;j+( ;)k Case h = v + k + k ; 1 P < j v+k+k ;1> < j h > = ((h 6=)^ ( = )) _((h 6= v) ^ ( 1)) _( <; 1) _ (( = ; 1) A j ;j+( ;)k+k ^(j <j)) otherwse ;A r s the probablty of r messages orgnated by a Posson process durng a slot and s gven by: ; ()r A r = e r! The steady state probablty < j h> of beng n the < j h > state s obtaned by solvng the followng system of equatons: =P T P P j P h =1 Let us denote g () the probablty of havng completed groups n the system: g () = j h < j h> The average number of completed groups n the system L g can then be gven by: L g = g () Fnally, applyng Lttle s theorem we can compute the average watng tme of a group n the system: T L gk g = The energy consumpton E can be computed as follows: E = Pr E + Pr b E b ;Pr s the percentage of slots belongng to dle cycles and s gven by: Pr = k;1 v;1 j= h= < j h> : ;Pr b s the percentage of busy slots, Pr b =1; Pr. ;E s the average energy consumpton per tag per slot durng an dle perod and s equal to 1 v. ;E b s the average energy consumpton per tag per slot durng a servce cycle. E b = k + k k + k : 3.3 Approxmate Analyss of the Pseudo- Random Protocol We analyze the protocol under the assumpton that all tags use the same awake probablty parameter p. To obtan an exact descrpton of the system behavor through a Markov chan, the states should nclude the number of packets addressed to each tag, snce the probablty of successfully transmttng depends on the number of unque packet destnatons n the queue. It s therefore mpossble to analyze systems of a realstc sze. We solve ths problem by makng use of Stern s ndependence assumpton [6], statng that at the begnnng of a tme slot each message draws a new destnaton from a gven unform dstrbuton. The Markov chan descrbng the system s then represented by the total number of packets at the begnnng of a slot. The transton probablty matrx P s gven, smlarly to the random access case, by P j P j = = A j P mn( ) j<; 1 k=1 R k (1 ; (1 ; p) k )A j = ; 1 P mn( ) k=1 R k (1 ; (1 ; p) k )A j;+1 + P mn( ) k=1 R k (1 ; p) k A j; otherwse ;R k s the probablty that packets are addressed to k dfferent destnatons and s gven by R k = k Pk;1 k j= (;1)j (k ; j) j : The steady-state probabltes are the solutons of the followng set of equatons =P T P =1 We can now compute the average number L of packets n the system L =
5 From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, l =.5 l =.1 l =.5 l =.5 l =.1 l = Fgure 1: Grouped TDMA Protocol, Unform Destnaton Dstrbuton, Optmal group sze Fgure 3: Pseudo-Random Protocol, Unform Destnaton Dstrbuton.5 l =.5 l =.1 l =.5 Grouped-Tag TDMA, l =.5 Grouped-Tag TDMA, l =.1 Grouped-Tag TDMA, l = Drectory, l =.5 Drectory, l =.1 Drectory, l = Fgure 2: Drectory Protocol, Unform Destnaton Dstrbuton Fgure 4: Energy conservng protocols, Gaussan destnaton dstrbuton ( = 2 2 =1) and, usng the Lttle s result: T = L Fnally, as n the prevous secton, the average energy consumpton s obvously E = p. 4 Performance Fgures 1 through 5 plot quanttatve results of the equatons derved n prevous sectons. These plots were all generated by assumng 1 tags wth consecutve sequental ds are assgned to a sngle base staton. All of the plots nclude sets of data wth nterarrval rate parameters equal to :5, :1 and :2 arrvals per slot. To show the effect of heterogeneous destnaton dstrbutons we use two Gaussans, wth mean and 2 varance 1 and respectvely. The nfnte Markov chan of the pseudo-random protocol was approxmated by truncatng the transton probablty matrx after the frst 1 states whle up to 25 states were consdered for the drectory protocol wth the lmtaton k 2f1 ::: 1g and v 2f1 ::: 25g. Fg.1,2, 3 compare the performance of the three protocols proposed usng a unform destnaton dstrbuton. Fg.1 shows the trade-off between energy and delay for optmum values of group sze usng the grouped-tag TDMA protocol. We note that the performance s better for low loads because there are fewer packets avalable for transmsson for the same slot n a cycle. Snce tags schedules are cyclc and ndependent of packets n the base staton s queue (a tag does not know when the base staton may have a packet destned to t) some unnecessary energy can be used due to tags contnung to wake up cyclcally. The performance of the drectory protocol (Fg.2) depends on the choce of the parameters k and v for each partcular arrval rate.
6 From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, Grouped-Tag TDMA, l =.5 Grouped-Tag TDMA, l =.1 Grouped-Tag TDMA, l = Drectory, l =.5 Drectory, l =.1 Drectory, l = Fgure 5: Energy conservng protocols, Gaussan destnaton dstrbuton ( = 2 2 = ) If we assume an optmum value for v, an ncrease n the arrval rate wll reduce the amount of tme t takes for a complete group of K packets to arrve, reducng the average delay for the packets n that group. However, ths requres the tags to be awake more often n order to receve ths group, thereby ncreasng the energy. When and group sze k are large, the sze of the drectory becomes prohbtvely large, and therefore the amount of energy used by the tags just to read the drectory can become a major factor. Fg.3 shows the energy vs. delay graph for the pseudorandom protocol gven a unform destnaton dstrbuton. The performance acheved s better than that of the drectory protocol but slghtly worse than that of the grouped-tag TDMA although ths dfference decreases as ncreases. Fg.4, and 5 compare protocol performance for the case of heterogeneous traffc. The drectory protocol s not affected by the destnaton dstrbuton. Instead, we show how the performance of the grouped-tag TDMA degrades rapdly under heterogeneous traffc. Packets belongng to a group wth a hgh probablty of traffc are severely delayed due to the hgh volume of localzed destnatons. The reorganzaton of the groups, even f possble, can be extremely tme-consumng. Snce the number of packets n the queue addressed to the same group ncreases as ether the load ncreases or the Gaussan dstrbuton becomes narrower, the performance of the protocol decreases n both these cases. For nether of these Gaussans s the performance of the pseudo-random protocol dscussed. Intutvely, we do not expect the performance to change dramatcally from the case of a unform destnaton dstrbuton. Snce the tag s schedules are the same, the energy wll not change, and the probablty of at least one packet n the queue wth an awake destnaton should not sgnfcantly change. Ths ratonal s backed by the smulaton results n [2] whch shows only a slght ncrease n delay for even the tghter Gaussan dstrbuton. 5 Conclusons In ths paper, we addressed the analyss of three types of wreless access protocols whch nclude an energy constrant: grouped-tag TDMA, drectory and pseudo-random. Careful selecton of protocol parameters addresses the goal of mnmzng the energy requred for recepton of packets whle meetng the applcaton delay constrants. A detaled analyss and plots of quanttatve data from ths showed a varety of performances under varyng loads. In partcular, the groupedtag TDMA protocol acheves the best performance for ether a low traffc load or a unform destnaton dstrbuton. When the destnaton dstrbuton becomes more realstcally clustered, other protocols such as the drectory or pseudo-random protocols need to be adopted. The pseudo-random protocol consstently out-performs the drectory protocol n both energy and delay for all loads and most destnaton dstrbutons. However, for cases where the destnaton dstrbuton becomes extremely clustered, t s apparent that the drectory protocol s the best soluton, unless dynamc handlng of the protocol parameters s ntroduced. References [1] Bertsekas, D. and Gallager, R. Data etworks, Prentce Hall, [2] Chlamtac, I. and Petrol, C. and Red, J. Energy- Conservng Access Protocols for IDETs Techncal Report 96-6, Boston Unversty. [3] Dunn, D. RFID Engne Chugs Onto Scene. Electronc Buyer s ews, February 5, 1996, pp 14. [4] Harrs, E.P., Depp, S.W., Pence,E., Krkpatrck, S., Sr- Jayantha, M., and Troutman, R.R. Technology drectons for portable computers. Proceedngs of the IEEE, 3(4):636 5, Aprl [5] Powers, R.A. Batteres for low power electroncs. Proceedngs of the IEEE, 3(4):67 93, Aprl [6] Stern, T. E. Packet Schedulng protocols n mult-beam communcaton satelltes. Proceedngs of the Internatonal Symposum on Informaton Theory, Italy, June 1979, pp
Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,
More informationINVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS
21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS
More information1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)
6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes
More informationWhat is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
More informationThe Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationProject Networks With Mixed-Time Constraints
Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa
More informationbenefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
More informationData Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
More informationEfficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing
Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of
More informationRecurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
More informationCHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL
More informationOn File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network
On Fle Delay Mnmzaton for Content Uploadng to Meda Cloud va Collaboratve Wreless Network Ge Zhang and Yonggang Wen School of Computer Engneerng Nanyang Technologcal Unversty Sngapore Emal: {zh0001ge, ygwen}@ntu.edu.sg
More informationdenote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node
Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate
More information"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
More informationA 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks
: An Adaptve, Anycast MAC Protocol for Wreless Sensor Networks Hwee-Xan Tan and Mun Choon Chan Department of Computer Scence, School of Computng, Natonal Unversty of Sngapore {hweexan, chanmc}@comp.nus.edu.sg
More informationMAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11
Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 MAC Layer Servce Tme Dstrbuton of a Fxed Prorty Real Tme Scheduler over 80. Inès El Korb Ecole Natonale des Scences de
More informationChapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT
Chapter 4 ECOOMIC DISATCH AD UIT COMMITMET ITRODUCTIO A power system has several power plants. Each power plant has several generatng unts. At any pont of tme, the total load n the system s met by the
More informationPerformance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments
Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn
More informationAn Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
More informationPower-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts
Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)
More informationCooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing
Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;
More informationPSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12
14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed
More informationEnabling P2P One-view Multi-party Video Conferencing
Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P
More informationAn Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems
STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part
More informationEfficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ
Effcent Strpng Technques for Varable Bt Rate Contnuous Meda Fle Servers æ Prashant J. Shenoy Harrck M. Vn Department of Computer Scence, Department of Computer Scences, Unversty of Massachusetts at Amherst
More information1 Example 1: Axis-aligned rectangles
COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton
More informationEfficient Project Portfolio as a tool for Enterprise Risk Management
Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse
More informationAPPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho
More informationDistributed Optimal Contention Window Control for Elastic Traffic in Wireless LANs
Dstrbuted Optmal Contenton Wndow Control for Elastc Traffc n Wreless LANs Yalng Yang, Jun Wang and Robn Kravets Unversty of Illnos at Urbana-Champagn { yyang8, junwang3, rhk@cs.uuc.edu} Abstract Ths paper
More informationBrigid Mullany, Ph.D University of North Carolina, Charlotte
Evaluaton And Comparson Of The Dfferent Standards Used To Defne The Postonal Accuracy And Repeatablty Of Numercally Controlled Machnng Center Axes Brgd Mullany, Ph.D Unversty of North Carolna, Charlotte
More informationHow Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence
1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh
More informationRapid Estimation Method for Data Capacity and Spectrum Efficiency in Cellular Networks
Rapd Estmaton ethod for Data Capacty and Spectrum Effcency n Cellular Networs C.F. Ball, E. Humburg, K. Ivanov, R. üllner Semens AG, Communcatons oble Networs unch, Germany carsten.ball@semens.com Abstract
More informationCALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS
CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS Novella Bartoln 1, Imrch Chlamtac 2 1 Dpartmento d Informatca, Unverstà d Roma La Sapenza, Roma, Italy novella@ds.unroma1.t 2 Center for Advanced
More informationLuby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
More informationAn RFID Distance Bounding Protocol
An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not
More informationNetwork Aware Load-Balancing via Parallel VM Migration for Data Centers
Network Aware Load-Balancng va Parallel VM Mgraton for Data Centers Kun-Tng Chen 2, Chen Chen 12, Po-Hsang Wang 2 1 Informaton Technology Servce Center, 2 Department of Computer Scence Natonal Chao Tung
More informationSchedulability Bound of Weighted Round Robin Schedulers for Hard Real-Time Systems
Schedulablty Bound of Weghted Round Robn Schedulers for Hard Real-Tme Systems Janja Wu, Jyh-Charn Lu, and We Zhao Department of Computer Scence, Texas A&M Unversty {janjaw, lu, zhao}@cs.tamu.edu Abstract
More informationHow To Understand The Results Of The German Meris Cloud And Water Vapour Product
Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller
More informationThe Greedy Method. Introduction. 0/1 Knapsack Problem
The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton
More informationAnalysis of the Delay and Jitter of Voice Traffic Over the Internet
Analyss of the Delay and Jtter of Voce Traffc Over the Internet Mansour J. Karam, Fouad A. Tobag Abstract In the future, voce communcaton s expected to mgrate from the Publc Swtched Telephone Network (PSTN)
More informationHow To Solve An Onlne Control Polcy On A Vrtualzed Data Center
Dynamc Resource Allocaton and Power Management n Vrtualzed Data Centers Rahul Urgaonkar, Ulas C. Kozat, Ken Igarash, Mchael J. Neely urgaonka@usc.edu, {kozat, garash}@docomolabs-usa.com, mjneely@usc.edu
More informationThe OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
More informationFuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks
Fuzzy Set Approach To Asymmetrcal Load Balancng n Dstrbuton Networks Goran Majstrovc Energy nsttute Hrvoje Por Zagreb, Croata goran.majstrovc@ehp.hr Slavko Krajcar Faculty of electrcal engneerng and computng
More informationConferencing protocols and Petri net analysis
Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre
More informationCalculating the high frequency transmission line parameters of power cables
< ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,
More informationA Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More informationRelay Secrecy in Wireless Networks with Eavesdropper
Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,
More informationFrequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters
Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,
More informationMultiple-Period Attribution: Residuals and Compounding
Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens
More informationEfficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. XX, MONTH 2XX 1 Effcent On-Demand Data Servce Delvery to Hgh-Speed Trans n Cellular/Infostaton Integrated Networks Hao Lang, Student Member,
More informationDynamic Fleet Management for Cybercars
Proceedngs of the IEEE ITSC 2006 2006 IEEE Intellgent Transportaton Systems Conference Toronto, Canada, September 17-20, 2006 TC7.5 Dynamc Fleet Management for Cybercars Fenghu. Wang, Mng. Yang, Ruqng.
More informationAvailability-Based Path Selection and Network Vulnerability Assessment
Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationModule 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
More informationActivity Scheduling for Cost-Time Investment Optimization in Project Management
PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng
More informationRetailers must constantly strive for excellence in operations; extremely narrow profit margins
Managng a Retaler s Shelf Space, Inventory, and Transportaton Gerard Cachon 300 SH/DH, The Wharton School, Unversty of Pennsylvana, Phladelpha, Pennsylvana 90 cachon@wharton.upenn.edu http://opm.wharton.upenn.edu/cachon/
More informationDEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
More informationTHE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek
HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo
More informationForecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems
More informationOn the Optimal Control of a Cascade of Hydro-Electric Power Stations
On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;
More informationAn Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
More informationJoint Scheduling of Processing and Shuffle Phases in MapReduce Systems
Jont Schedulng of Processng and Shuffle Phases n MapReduce Systems Fangfe Chen, Mural Kodalam, T. V. Lakshman Department of Computer Scence and Engneerng, The Penn State Unversty Bell Laboratores, Alcatel-Lucent
More informationivoip: an Intelligent Bandwidth Management Scheme for VoIP in WLANs
VoIP: an Intellgent Bandwdth Management Scheme for VoIP n WLANs Zhenhu Yuan and Gabrel-Mro Muntean Abstract Voce over Internet Protocol (VoIP) has been wdely used by many moble consumer devces n IEEE 802.11
More informationQoS-based Scheduling of Workflow Applications on Service Grids
QoS-based Schedulng of Workflow Applcatons on Servce Grds Ja Yu, Rakumar Buyya and Chen Khong Tham Grd Computng and Dstrbuted System Laboratory Dept. of Computer Scence and Software Engneerng The Unversty
More informationJ. Parallel Distrib. Comput.
J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n
More informationAn Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks
An Adaptve Cross-layer Bandwdth Schedulng Strategy for the Speed-Senstve Strategy n erarchcal Cellular Networks Jong-Shn Chen #1, Me-Wen #2 Department of Informaton and Communcaton Engneerng ChaoYang Unversty
More informationAn MILP model for planning of batch plants operating in a campaign-mode
An MILP model for plannng of batch plants operatng n a campagn-mode Yanna Fumero Insttuto de Desarrollo y Dseño CONICET UTN yfumero@santafe-concet.gov.ar Gabrela Corsano Insttuto de Desarrollo y Dseño
More informationVoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays
VoIP Playout Buffer Adjustment usng Adaptve Estmaton of Network Delays Mroslaw Narbutt and Lam Murphy* Department of Computer Scence Unversty College Dubln, Belfeld, Dubln, IRELAND Abstract The poor qualty
More informationSurvey on Virtual Machine Placement Techniques in Cloud Computing Environment
Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center
More informationtaposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com
G. G. Md. Nawaz Al 1,2, Rajb Chakraborty 2, Md. Shhabul Alam 2 and Edward Chan 1 1 Cty Unversty of Hong Kong, Hong Kong, Chna taposh_kuet20@yahoo.comcsedchan@ctyu.edu.hk 2 Khulna Unversty of Engneerng
More informationJ. Parallel Distrib. Comput. Environment-conscious scheduling of HPC applications on distributed Cloud-oriented data centers
J. Parallel Dstrb. Comput. 71 (2011) 732 749 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. ournal homepage: www.elsever.com/locate/pdc Envronment-conscous schedulng of HPC applcatons
More informationA DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña
Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION
More informationTraffic State Estimation in the Traffic Management Center of Berlin
Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,
More informationAn Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks
2007 Internatonal Conference on Convergence Informaton Technology An Adaptve and Dstrbuted Clusterng Scheme for Wreless Sensor Networs Xnguo Wang, Xnmng Zhang, Guolang Chen, Shuang Tan Department of Computer
More informationA New Paradigm for Load Balancing in Wireless Mesh Networks
A New Paradgm for Load Balancng n Wreless Mesh Networks Abstract: Obtanng maxmum throughput across a network or a mesh through optmal load balancng s known to be an NP-hard problem. Desgnng effcent load
More informationA role based access in a hierarchical sensor network architecture to provide multilevel security
1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty
More informationAn Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services
An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao
More informationFeature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
More informationInter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007.
Inter-Ing 2007 INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. UNCERTAINTY REGION SIMULATION FOR A SERIAL ROBOT STRUCTURE MARIUS SEBASTIAN
More informationComputer Networks 55 (2011) 3503 3516. Contents lists available at ScienceDirect. Computer Networks. journal homepage: www.elsevier.
Computer Networks 55 (2011) 3503 3516 Contents lsts avalable at ScenceDrect Computer Networks journal homepage: www.elsever.com/locate/comnet Bonded defct round robn schedulng for mult-channel networks
More informationCase Study: Load Balancing
Case Study: Load Balancng Thursday, 01 June 2006 Bertol Marco A.A. 2005/2006 Dmensonamento degl mpant Informatc LoadBal - 1 Introducton Optmze the utlzaton of resources to reduce the user response tme
More informationPAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign
PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng
More information2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet
2008/8 An ntegrated model for warehouse and nventory plannng Géraldne Strack and Yves Pochet CORE Voe du Roman Pays 34 B-1348 Louvan-la-Neuve, Belgum. Tel (32 10) 47 43 04 Fax (32 10) 47 43 01 E-mal: corestat-lbrary@uclouvan.be
More informationA DATA MINING APPLICATION IN A STUDENT DATABASE
JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul
More informationA GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS
A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu
More informationExtending Probabilistic Dynamic Epistemic Logic
Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set
More informationVoIP over Multiple IEEE 802.11 Wireless LANs
SUBMITTED TO IEEE TRANSACTIONS ON MOBILE COMPUTING 1 VoIP over Multple IEEE 80.11 Wreless LANs An Chan, Graduate Student Member, IEEE, Soung Chang Lew, Senor Member, IEEE Abstract IEEE 80.11 WLAN has hgh
More informationNumber of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000
Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from
More informationA Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks
Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton
More informationCalculation of Sampling Weights
Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample
More informationA Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture
A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton
More informationMinimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures
Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng
More informationFault tolerance in cloud technologies presented as a service
Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance
More informationRisk Model of Long-Term Production Scheduling in Open Pit Gold Mining
Rsk Model of Long-Term Producton Schedulng n Open Pt Gold Mnng R Halatchev 1 and P Lever 2 ABSTRACT Open pt gold mnng s an mportant sector of the Australan mnng ndustry. It uses large amounts of nvestments,
More informationForecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
More informationA Performance Analysis of View Maintenance Techniques for Data Warehouses
A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao
More informationInstitute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
More informationOpen Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1
Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,
More informationEconomic-Robust Transmission Opportunity Auction in Multi-hop Wireless Networks
Economc-Robust Transmsson Opportunty Aucton n Mult-hop Wreless Networks Mng L, Pan L, Mao Pan, and Jnyuan Sun Department of Electrcal and Computer Engneerng, Msssspp State Unversty, Msssspp State, MS 39762
More informationSecure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks
Secure Walkng GPS: A Secure Localzaton and Key Dstrbuton Scheme for Wreless Sensor Networks Q M, John A. Stankovc, Radu Stoleru 2 Department of Computer Scence, Unversty of Vrgna, USA 2 Department of Computer
More information