Channel Assignment Strategies for Cellular Phone Systems

Size: px
Start display at page:

Download "Channel Assignment Strategies for Cellular Phone Systems"

Transcription

1 Channel Assignment Strategies for Cellular Phone Systems Wei Liu Yiping Han Hang Yu Zhejiang University Hangzhou, P. R. China Contat: 000 Mathematial Contest in Modeling (MCM) Meritorious Award Paper

2 Abstrat Nowadays people benefit a lot from mobile ommuniation systems. One of reent major breakthroughs in solving the problem of spetral ongestion is the ellular onept, whih means replaing a large transmitter with many little transmitters, eah providing overage to a small piee of the servie area. Neighboring transmitters are assigned different groups of hannels so that the interferene between transmitters is minimized. Eah ellular transmitter is assigned a radio hannel to be used within a small geographi area alled a ell. By limiting the overage area to within the boundaries of a ell, the same hannel may be used to over different ells that are separated from one another by distanes large enough to keep interferene levels within tolerable limits. The design proess of seleting and alloating hannel groups for all of the ellular transmitters in a system is alled frequeny reuse or frequeny planning. The hexagonal ell shape shown in the piture of the over is oneptual and is a simplisti model of radio overage for eah transmitter, but it has been universally adopted sine the hexagon permits easy and manageable analysis of a ellular system. Our team has made a omprehensive study on a pratial problem of designing mobile ommuniation systems. We know that there are several onstraints on frequeny assignment. First, any two transmitters within a distane four times as muh as the length of the hexagon side annot be assigned the same hannel. Seond, due to spetral spreading, transmitters within distane twie as muh as the length of the hexagon side must be assigned hannels whih differ by at least k. We have developed quite an effiient strategy dependent on k to assign hannels as few as possible to a given servie area aording to these rules. If we put our strategy into pratie under simple situations, we have hannels to be the fewest when k equals, hannels when k equals, and hannels when k equals. When the situation beomes ompliated as k >, we find the smallest number of hannels needed is a linear funtion k +, whih is a pretty simple solution. Thus we have the entire results as follows: k + 5, k =, span = k +, k = k +, k.

3 Patterns of our assignments are as follows: k+ k+ k+5 k+ k+5 k+ (a) (b) () (d) Figure : Channel assignment patterns. (a) k = ; (b) k = ; () k = ; (d) k. We also study several general problems with more onstraints. An algorithm aimed at getting a lower bound is devised through a branh-and-bound strategy. This algorithm is very useful as it suffies to provide a good estimate of the lower bound, whih may be a great help when we apply integer programming to solve this problem. We also developed a method to deal with the situation that the number of the hannels is fixed. A new strategy is devised to redue interferene as greatly as possible. We have first onverted this problem into a nonlinear program. A lot of algorithms are available, suh as SA (Simulated Annealing) and LG (Least Gradient). We hoose GA (Geneti Algorithm) to solve this problem. A simple proedure of the algorithm is given. Introdution The design objetive of early mobile radio systems was to ahieve a large overage area by using a single, high-powered transmitter with an antenna mounted on a tall tower. While this approah ahieved very good overage, it also meant that it was impossible to reuse those same frequenies throughout the system sine any attempts to frequeny reuse would result in interferene. For example, the Bell mobile system in New York City in the 0s ould only support a maximum of simultaneous alls over a thousand square miles []. Faed with the fat that government regulatory agenies ould not make spetrum alloations in proportion to the inreasing demand

4 for mobile servies, it beame imperative to restruture the radiotelephone system to ahieve high apaity with limited radio spetrum, and at the same time over very large areas. The ellular onept has been one of the revolutionary breakthroughs in developments of mobile ommuniation systems. Allowing a group of lower power transmitters (small ells) to replae a single, high power transmitter (large ell), the ellular system may provide good overage to only a small portion of a given area with a portion of the total number of hannels being alloated to eah base station. Here the design proess of seleting and alloating hannel groups for all of the ellular base stations in a system is very ritial, whih is alled frequeny reuse or frequeny planning []. Our task is to model the assignment of hannels to a symmetri network of transmitter loations over a large planar area, whih has been partitioned into hexagons. An interval of the frequeny spetrum is to be allotted for transmitter frequeny. The interval will be divided into regularly spaed hannels, represented by integer,,... Eah transmitter will be assigned one positive integer hannel. The same hannel an be reused at many loations, provided that interferene is avoided. Our goal is to minimize the width of the interval in the frequeny spetrum whih is needed to assign hannels subjet to some onstraints. This is ahieved by the onept of a span. The span is the minimum, over all assignments satisfying the onstraints, of the largest hannel used at any loation. It is not required that every hannel smaller than the span be used in an assignment that attains the span. Assumptions and Definitions Assumptions: The honeyomb-style is hexagon. In Solving Requirement B, C, D, we assume that the grid always extends to the infinity in all diretions. The reason is explained below. The hannels are regularly spaed.

5 All of the transmitter use omni-diretional antennas. All of the ells are idential. The transmitter is loated over a large planar area. Definitions: sp: the value of span. s: the length of a side of one of the hexagons. N: the number of ells in a single tile. tile: pre-assigned network piees, whih are desribed later. f(x): the hannel number assigned to the ell x. Preliminary Analysis 0 s.s 5.s 5 Figure : The first and seond loop. 5

6 . Distane Between Cells First, we aim to alulate the distane of two ertain ells. Look at Fig.. It is easy to work out the distane between ell and its adjaent ells,,, 5,,, whih is s. Furthermore, the distane between ell and ells, 0,,,, is s while the distane between ell and ells,,, 5,, are s. We all ells,,, 5,, surrounding ell the first loop and the ells - surrounding ell the seond loop. We may easily find that only ells in the first loop have a loser distane than s with ell. With the same reason only ells in the seond loop have a loser distane than s with ell. So when we onsider the s(s)-onstraint, we may only onentrate on those ells in the first (seond) loop. This makes our efforts to solve the problem muh easier.. Developments.. Tiling Tehnique It is obvious that the same frequeny annot be used in the adjaent ells beause of the sonstraint. In order to keep the ells assigned with the same frequeny far enough from eah other, several surrounding ells annot be assigned that frequeny too. We all these ells a tile. Only ells in different tiles an be frequeny-reused. Formation of the tile should satisfy the following two onditions:. Tiles and tiles an onnet without gaps between adjaent ells;. The distane between any two ells with the same frequeny should be larger than s. After we have overed the area with tiles, there are only ertain tile sizes and ell layouts whih are possible [], they an only have values whih satisfy equation: N = i + ij + j, where i and j are non-negative integers. All the tiles in our models satisfy the above equation. It is obvious that this tiling tehnique is always effetive no matter whether the region an be overed by a single basi blok or not. We now assume that the grid always extends to the infinity in all diretions.

7 .. sp = When k = If we have k = then we an use integer hannels,,,, 5,, to fill in a infinite grid with the following tile. Refer to Appendix B- for a more detailed piture. 5 Figure : sp = when k =, where N =, i =, j =. It is lear that integers are not enough to fill this tile. If not so, there must be repetitive integers in the tile, whih will surely violate the s-onstraint... sp = When k = It is very easy to prove that we annot satisfy both the onstraints if we try to assign hannels with a span of to the transmitters in a infinite grid. If this is not true, let us suppose that we used a ertain way of assignment with span to fill all the ells. Then we are sure to find an integer in one of the ells whih we alled ell A. If we annot find the integer in any of these ells, simply subtrat from every integer assigned to all the ells. Then we get a better assignment with a new span of that is smaller than the previous one. We know that annot be plaed in any of ell A s adjaent ells (in order to satisfy the s-onstraint). We name the A s adjaent ells B, C, D, E, F, G, shown in Fig.. So,, 5,,, must be used to be filled in these adjaent ells. We may notie that no repetitive integers an be used to fill these ells beause any two of these ells are within the distane of s, so the s-onstraint will not be satisfied if repetitive integers are used. Thus we know that integer must be used in one of the ells adjaent to ell A aompanying integer. But we may still notie that only, 5,,, are available to be filled in the adjaent ells of the ell filled with. Sine we are unable to assign these 5 integers into ells without repetition we learn that the span annot be ahieved. So at least hannels are needed. There are several ways to get the appropriate assignment of

8 5 B E C A G D F Figure : Adjaent ells. these hannels. After a few trials we have suessfully found a right assignment as shown in Fig. 5, a more detailed one also inluded in Appendix B-. Figure 5: sp = when k =, where N =, i = 0, j =... sp = When k = and Lower Bound of Span for k We have got sp = when k = and sp = when k =. Assuming that sp depends on k linearly we may guess that sp = k + 5, But when it applies to the situation k we find that k + 5 is not a tight lower bound for the span and k + is a tighter one. An effetive proof is inluded in Appendix A-. We also have designed a ertain pattern of assignment to show sp = = k + when k = (See Fig., a more detailed one is in Appendix B-). Sine we have got a realisti example we are sure to say sp = k + when k = and sp k + when k.

9 5 0 Figure : sp = when k =, where N =, i =, j =...5 Preliminary Estimate of Upper Bound of The Span In order to avoid the situation that integers assigned to adjaent ells whih may violate the sonstraint we generate an integer sequene, k +, k +, k +, k +, 5k +, k +, in whih any two integers satisfy the s-onstraint beause the minimal differene of them is k. Assign these integers into the basi tile shown in Fig. (More detailed one is in Appendix B-), we may notie that the s-onstraint is satisfied. Sine we also adopt the tiling tehnique, we may be quite sure that this assignment satisfies the s-onstraint too. Thus we get a preliminary estimate of the upper bound of the span (sp k + ). +k +k +k +5k +k +k Figure : Upper bound of the span... sp = k + When k We an learly see that there are a great few of hannels wasted when we apply the tile in Fig.. So we managed to lower it to some extent. Considering the geometry atahresti of hexagon and

10 sp = k + when k =, we find that oloring algorithm in the graph theory an be used to prove that k + is the span when k. Before we proved it, we first use this algorithm to find the strategy that span = k + when k. (See Fig., a more detailed one is in Appendix B-5.) k+ k+ k+5 k+ k+5 k+ Figure : sp = k + when k. This speial ase tell us that k + is the upper bound of the span when k. So we only need to prove that k + is also the lower bound of span. The proof is inluded in Appendix A-. Now we know that k + is not only the upper bound of span but also the lower bound. Hene, sp = k + when k... Solution of The Span and Assignment Strategies Up to now we have ome up to the following onlusions:. sp = = k + 5 when k = (in setion..).. sp = = k + 5 when k = (in setion..).. sp k + when k, sp = when k = (in setion..).. sp = k + when k (in setion..). With these onlusions, we derive the span as a funtion of k as follows: k + 5, k =, span = k +, k = k +, k. () 0

11 Using tiling tehnique, we develop the strategies, whih are: When k =, we use the tile in Fig. (also inluded in Appendix B-). When k =, we use the tile in Fig. 5 (also inluded in Appendix B-). When k =, we use the tile in Fig. (also inluded in Appendix B-). When k, we use the tile in Fig. (also inluded in Appendix B-5). The above are the solutions for Requirement C, while Requirement A and B have been solved in the previous disussion. The span of Requirement A is, and the strategy is shown in Fig.. Sine we have adopted the tiling tehnique, The result when k = an also be applied to Requirement B assuming that the grid extends arbitrarily far in all diretions. The span of Requirement B is also Figure : Channel assignment strategy for requirement A.

12 Generalized Model Analysis. Generalize The Two-Level-Interferene Model As a most diret extension of the former hannel assignment problem, we have a more generalized s-onstraint that hannels for transmitters within distane s must differ by at least given integer e. So we have: s-onstraint: if d(u, v) s, f(u) f(v) e s-onstraint: if d(u, v) s, f(u) f(v) k k, e are integers. If d(u, v) s is satisfied then d(u, v) s will be surely satisfied so k e. Making a few adjustments to the former model we have the following results as the upper bound for the this problem: When k > e, sp = k + e +. When e < k e, sp = k + 5e +. When e < k e, sp = k + e +. The orresponding tiles are shown in Fig. 0. Figure 0: Two level interferene model. (a) e < k e; (b) k > e; () e < k e.

13 . Irregular Loations and Several Levels of Interferene.. One Level of Interferene and Irregular Loated Transmitters We use graph theory to model this hannel assignment problem with irregular loations of the transmitters. Let G(V ) be a graph with a vertex set V of points in the plane denoting the atual transmitters and with distint verties u and v adjaent whenever there may be interferene if the same hannel is assigned to u and v. The most simplified and basi version of the hannel assignment problem involves oloring suh proximity graphs. We need to assign radio hannels (olors) to transmitters (points in V ) to avoid interferene... Clique Configuration Method We use graph theory to model a ertain type of the hannel assignment problems with irregular loations of the transmitters. Given a set V of points in the plane and given d > 0, we use a funtion f to represent the assignment of hannels f: V {,,,, t}. If d(u, v) < d, we have f(u) f(v) k and sp = min f (t). Let G(V, d) be a graph with vertex set V of points in the plane denoting the atual transmitters and with distint verties u and v adjaent if the Eulidean distane d(u, v) between them is less than d. The weight of the edge (u, v) is the least allowed frequeny differene of u and v. We develop an algorithm based on the CLIQUE question as follows: I. Find the largest lique of the given graph. II. Work out the length of the shortest Hamiltonian path in this lique. Assume the number of the verties of the largest lique found is α. Find one of its Hamilton Path. Suppose that the optimal strategy has been found and the vertex sequene A α on this Hamilton Path are assigned with a weight f(a i )( i α). Sort f(a i ) in an asending way to get a new vertex sequene A i,, A i,,, A i,α. Sine the lique is a omplete sub graph, A i,j and A i,j+ must be adjaent. So sp f(a j,α ) f(a j,α )+k f(a j,α )+k f(a j, )+(α ) k +(α ) k. () Thus we get a lower bound. This result has beome known as the Traveling Salesman Bound. This is often tight for ellular problems, but may need improvement for other types of problem.

14 It is important that this bound is applied to a suitable lique or near lique and not to the whole graph, or the bound may be very weak. One the lique or near lique that give the best bound has been identified, a frequeny assignment algorithm may be more effetive if it is applied to this sub graph first. The assignment of the sub graph an then be fixed and the assignment an be extended to the full graph. If there are h levels of interferene, we have a vetor d = (d,, d h ) T and a vetor k = (k,, k h ) T. Apply the above algorithm to every (d i, k i ) to get a distane graph G i (V, d i ), then we have sp + (α i ) k i. Therefore we get: sp max i h { + (α i ) k i }. () A 5 A A 5 =5 A A Figure : An example of a lique (α = 5). The number adjaent to the vertex is f(a i ). This figure shows the Hamilton Path after sorting the verties by f(a i )... Lower Bounding with Integer Programming Lower bounding tehniques an be used both to give a measure of the quality of any given solution and to give a meaningful omparison of the quality of different algorithms. The hannel assignment problem an be formulated as an integer program and analyzed using polyhedral methods to obtain lower bounds. Lower bounds are important for the evaluation of heuristi methods, to identify bottleneks, and to provide uts for linear relaxations of integer programs.

15 We now establish a model for hannel assignment problems using integer programming. There exists a matrix of separation onstraint C = ( i,j ) n n (n is the number of transmitters). We still use a funtion f to represent the assignment of hannels f : V {0,, t} f(v i ) f(v j ) i,j. Obviously C is a symmetri matrix and all the elements on the diagonal are zeros. Suppose x i = f(v i )( i n), we formulate the following integer program Min z = t + Subjet to x i x j i,j, i < j n x i t, i n () x i, t 0, i n x i, t are integers There are n(n )/ separation onstraints x i x j i,j in this integer programming. Eah x i x j i,j an be replaed by two inequalities: x i x j i,j and x j x i i,j. Considering the binary tree in Fig., we notie that eah leaf is orresponded with one lower bound for the problem, and eah level of nodes in the tree are assoiated with a onstraint respetively. To every node of the tree, we use the above two inequalities to ut the urrent available-domain into two available-domains for its two son nodes respetively. We apply linear searh algorithm to eah node of the tree to get a non-integer lower bound respetively. This tree is generated by the sequene shown in the matrix below. 0, n,,, n, 0,, n, n,, 0 0 n. n n, n, n, n n, n 0 n, n, n, n n, n n, n 0 We searh the entire tree adopting the Branh-and-Bound strategy to find the largest lower bound Φ of the entire solution spae, whih is non-integer. At last we get an integral lower bound Ψ = Φ for the problem. 5

16 x-x, x-x, x -x, n n x-x, x -x, x-x, x-x, x-x, x -x, x-x, x-x, x -x, x-x, xn--xn n-,n Figure : Binary searh tree... Geneti Algorithm: What If Channels Are Fixed In some situations there may not be enough hannels to be assigned to the mobile phone network. A bandwidth of a ertain size is alloated for the mobile phone use. What s more, a real hannel will take up some ertain spae in the spetrum so the maximal number of the hannels available must be a fixed one. For instane if a total bandwidth of MHZ is alloated for mobile phone usage and a single hannel oupies 5KHZ, then we may work out that at most 00 hannels are available. But applying our model we may get a span of 0, so under suh irumstanes, the above models seem a little weak. Considering this, we must sarifie the quality of the system bearing a little interferene to fulfill the fixed-hannels onstraint. Under suh irumstanes, we want to find an assignment with whih the interferene an be redued as greatly as possible. Suppose there are N transmitters dotted throughout a distrit. We have only M( N) frequeny hannels available to utilize and we need to assign eah transmitter with one hannel. Our requirement is that their mutual interferene be minimized. The further away we reuse a ertain frequeny hannel the better, but this is not always the ase. The harateristi of the whole transmitter network an be represented by a Mutual Interferene Matrix A = (a i,j )(i, j N) where a i,j is the mutual interferene between transmitters i and j if they are assigned with the same hannel. Usually this number is getting larger as the transmitters are plaed loser. We an use some figures of merit to evaluate a ertain

17 frequeny assignment sheme (for instane, sum up the interferene values in the matrix for all o-frequeny pairs), and try to minimize that figure by hanging the frequeny assignments. An iterative algorithm is needed to give us the best hannel assignment (global minimum of that figure of merit). Let x i,j equals if transmitter i is assigned to frequeny f and if not x i,j equals 0. The objetivity funtion F is defined below: i,j=n,f=m F = min a i,j x i,f x j,f (5) i,j=,f= Subjet to: for i =,, N, for f =,, M, Mf= x i,f = Ni= x i,f K f for i =,, N, f =,, M, x i,j {0, }. K f is the maximum number of transmitters you an assign to frequeny f, it may be vauous. In our ase this onstraint may not work. Having set up the above model, we now adopt the Geneti Algorithm taking the following steps: Step. Coding: We use a binary number to denote a ertain way of assignment. Call it an individual. Step. Initiate a group ontaining n individuals. Create every individual D i randomly. Notie that D i is a matrix. Step. Calulate F (D i ) for every i. Let f old be the smallest value in this group. Step. Generate new individuals by Reprodution and Mutation to get n offsprings. (Reprodution and Mutation are ertain binary operations suh as Or, And, ExlusiveOr, et.) Step 5. Selet the best n of the n offsprings whih have the lowest values of F. Let f new be the smallest value in this new group. Step. If f new f old > ε (whih is a pre-set little non-negative number ), then goto Step. Step. End.

18 5 Strengths and Weaknesses Our model works exellently under the onditions of this problem. The strategies of our basi model depend heavily on the speial geometri harater of hexagons and the s, s onstraints. Our basi model gives an aurate desription of the relationship between k and the span as a funtion of k, and it also gives us a very simple and effetive strategy to assign hannels, whih is learly demonstrated in Appendix B. Furthermore we have also onsidered some more general forms of the hannel assignment problem. As most of them are NP-Complete, we developed a way to find a lower bound, whih uses linear programming instead of the traditional way of integer programming to find the lower bound fast, and these lower bounds are ritial to the branh-and-ut algorithm. When the situations hange, suh as that the interferene level exeeds two or that the transmitters are plaed irregularly, it is lear that the omplexities of these problems are not polynomial, beause they are NP-Complete. So all of our algorithms dealing with these problems will only give sub-optimal answers in most ases. But we an use these algorithms to find lower bounds for ertain ases. With the limitation of time we annot arry on a deeper study on this problem. For instane Simulated Annealing and Heuristi Searh are also good methods to solve the fixed hannel problem, but it is a pity that we don t have enough time to implement them. Summary We develop a model for solving the hannel assignment problem. With a tiling tehnique a simple yet effiient strategy is provided to assign hannels to the given regions. Our model is based on number theory and oloring theory. We try to onstrain the span in an interval as small as possible, by inreasing the lower bound and dereasing the upper bound for the span. We find that the upper bound and the lower bound meet at some ertain value whih is a funtion of k. Our model an be suessfully applied to the situation in whih there are only two levels of interferene and the transmitters are loated regularly. We also examine some general situations, in whih the hannel assignment problem beomes a NP-Complete problem. Be aware of this, we design

19 several models to find a good lower bound. Integer programming and lique onfiguration are proposed. A situation is also onerned that there might not be enough hannels to be assigned to satisfy all the separation onstraints in real pratie. Under suh irumstanes, we want to find an assignment with whih the interferene an be redued as greatly as possible. We think that the Geneti Algorithm is an effetive alternative, whih is inluded in our models. Finally, strengths and weaknesses are disussed. Referenes [] A. Gibbons, Algorithmi Graph Theory, Cambridge University Press, 5. [] G. Calhoun, Digital Cellular Radio, Arteh House,. [] C. Berge, Graphs, North-Holland, 5. [] H. J. Walther, Ten Appliations of Graph Theory, Reidel,. [5] J. D. Parsons, Propagation and Interferene in Cellular Radio Systems, In IEE Conferene Publiations, -5, Sep.. [] V. H. MaDonald, The Cellular Conepts, The Bell System Tehnial Journal, 5():5-, Jan.. [] T. Rappaport, Wireless Communiations: Priniple and Pratie, st edition, IEEE Press,.

20 Appendix A: Rationales and Proofs A-. k + Is A Lower Bound for The Span When k Proof. Definition of symbol: Ω(i): Define the available set of integer i as a set that holds all the available integers that an be assigned adjaent to the ell of i. In other words any n is in the available set of i if it satisfies the onstraint n i k. Denote this set as Ω(i). Obviously, if integer i is used, Ω(i) must have elements. d min (i) = min f(p j ) f(p k ) where p j, p k are two adjaent ells around ell i. If integer i is used, there are different numbers adjaent to ell i. The s-onstraint requires d min (i) k. First let us suppose that integer k + is used in this assignment. We remove any integer n in the sequene,,, k + 5 if it satisfies n (k + ) < k, leaving those integers as the available set of k +. Ω(k +) = {,,,, 5, }. The s-onstraint requires that the integers used to be plaed exatly around k + to be different from eah other. Obviously integer must be plaed adjaent to k +. But only an be plaed adjaent to sine,,, 5 all have too lose a distane with. Sine two different integers are needed to fill the two ells adjaent to integer, a single integer is not enough. So we may assert that integer k + is not used in this assignment. Seond we suppose that integer is used in this assignment. We also remove any integer n in the sequene,,, k + 5 if it satisfies n < k, leaving those integers as the available set of. If k then Ω() = {k +, k +, k +,, k + 5}(k + is not used as we have just proved in the above paragraph). This means d min () (k + 5) (k + ) = k, it ontradits with d min (i) k. So is not used. If k then Ω() = {,, k, k +, k +,, k + 5}. Notie that there are atually 5 elements in Ω() whih is not enough to be plaed around integer onsidering the s-onstraint. So we may assert that is not used in this assignment. Third we suppose that integer k + is used in this assignment. Ω(k + ) = {,,,, 5, } ( is not used as we have just proved). Still the s-onstraint requires that the integers whih are used to be plaed exatly around k + to be different from eah other. Obviously is used. But only an be plaed adjaent to sine,,, 5 all have too lose a distane with. There are two adjaent 0

21 ells of integer whih means that one available integer is not enough. So we may assert that integer k + is not used in this assignment. Fourth we suppose that the integer is used in this assignment. If k then Ω() = {k +, k +,, k + 5}(k + is not used as we have just proved before). This means d min () (k + 5) (k + ) = k, it ontradits with d min (i) k. So is not used. If k then Ω() = {,, k, k +,, k + 5}. Notie that there are atually 5 elements in Ω() whih is not enough to be plaed around integer onsidering the s-onstraint. So we may assert that is not used in this assignment. Using the same tehnique we may assert that none of k+,, k+,, k+0, 0,, k+5, k+5 exist in the assignment, so only integers,,, or 5 an be used in this assignment whih is, in fat, impossible. The only reason for this is that our presumption is wrong. We annot fill the grid with only,, k +, k + 5. In other words at least k + integers are needed to fill the grid. So at least a span of k + is neessary when k. A-. k + Is A Lower Bound for The Span When k Proof. Consider an arbitrary ell a and another ells a, a,, a nearby on an infinite grid, as shown in piture A-. a a a a a a a a5 a Piture A- We onstrut a adjaent graph G with these ells. V (G) = {a, a,, a }. If a i and a j are adjaent, there is an edge in G between the vertex a i and a j. G is shown in piture A-. Aording to Coloring Algorithm we need three olors to olor the graph G. Here we olor a, a, a with olor A, olor a, a 5, a with olor B and olor a, a, a with olor C. Cells of the

22 C a a B a A A a C a C a a B B a5 A Piture A- a same olor annot be assigned with repetitive hannels beause of the s-onstraint. We an use onseutive integers to assign the ells of the same olor in order not to waste any integer hannel among the ells of the same olor. There are three olors and eah olor is assigned to three ells, so at least hannels are needed to fill these ells. Obviously, a is adjaent to a,, a, so we know that a has a different olor from all its adjaent ells. Sine a is an arbitrary ell on the infinite grid, every ell on the infinite grid should have the same harater with a aording to the symmetry. We an say that a,, a, also have this harater. That means every ell has a different olor from its adjaent ells. If two ells a i, a j are painted different olors then it is true f(a j ) f(a i ) k. Divide a,, a aording to their olors: set A = {a, a, a 5 }, set B = {a, a, a }, and set C = {a, a, a }. We suppose: f(a ) < f(a ) < f(a 5 ), f(a ) < f(a ) < f(a ), f(a ) < f(a ) < f(a ), and f(a ) < f(a ) < f(a ). There exist three situations: (i) If f(a ) < f(a ) < f(a ), then f(a ) < f(a ) < f(a ) < f(a ) < f(a ) < f(a 5 ).

23 Otherwise we may get an inequality: f(a ) < f(a ) < f(a ) < f(a i ), i = or. Insert a into this inequality and we now have a new one in an asending way. Sine any two onseutive integer hannels belong to two different olor sets, so sp f(a ) + k + k + k + k > + k + = k +, k >. It is known that sp k +, it leads to a ontradition. Insert f(a ) to (i), there are 5 plaes for f(a ), suh as f(a ) < f(a ) < f(a ) < f(a ) < f(a ) < f(a 5 ) < f(a ). Thus, sp f(a ) k + f(a 5 ) k + + f(a ) + f(a ) + k > + k + f(a ) + k + + f(a ) + k k + + = k + + k > k + +, k >. The result is idential if we assert a into the other 5 plaes. Therefore the assumption a < a < a leads to sp > k +. It ontradits with sp k +, so the assumption is atually wrong. (ii) If a < a < a 5, the same proof as above an be given again to show that the assumption is wrong. (iii) a 5 < a. This inequality holds forever. The proof as above shows f(a ) < f(a ). Then we have f(a ) < f(a ) < f(a 5 ) < f(a ) < f(a ) < f(a ) < f(a ) < f(a ) < f(a ), sp f(a ) f(a ) + f(a ) + k + f(a ) + k + f(a 5 ) + k + f(a ) + k + k +. So sp = k +. A feasible assignment strategy is: f(a ) =, f(a ) =, f(a 5 ) =, f(a ) = k +, f(a ) = k +, f(a ) = k + 5, f(a ) = k + 5, f(a ) = k +, f(a ) = k +.

24 Appendix B: Strategies N= i= j= k= 5 Appendix B- N= i=0 j= k= Appendix B-

25 N= i= j= k= Appendix B k +k +k +k +k +k +5k +k +k +k +5k +k +k +k +k +k +k +k +5k +k +k +5k +k +k Appendix B- N= i= j= +k +k +k +5k +k +k 5

26 k+ k+ k+ k+5 k+ k+ k+ k+5 k+ k+ k+5 k+ k+ k+5 k+ k+5 k+ k+ k+5 k+ k+5 k+ k+5 k+ Appendix B- 5 N= i= j=0 k> k+ k+ k+5 k+ k+5 k+

Computer Networks Framing

Computer Networks Framing Computer Networks Framing Saad Mneimneh Computer Siene Hunter College of CUNY New York Introdution Who framed Roger rabbit? A detetive, a woman, and a rabbit in a network of trouble We will skip the physial

More information

5.2 The Master Theorem

5.2 The Master Theorem 170 CHAPTER 5. RECURSION AND RECURRENCES 5.2 The Master Theorem Master Theorem In the last setion, we saw three different kinds of behavior for reurrenes of the form at (n/2) + n These behaviors depended

More information

Sebastián Bravo López

Sebastián Bravo López Transfinite Turing mahines Sebastián Bravo López 1 Introdution With the rise of omputers with high omputational power the idea of developing more powerful models of omputation has appeared. Suppose that

More information

Static Fairness Criteria in Telecommunications

Static Fairness Criteria in Telecommunications Teknillinen Korkeakoulu ERIKOISTYÖ Teknillisen fysiikan koulutusohjelma 92002 Mat-208 Sovelletun matematiikan erikoistyöt Stati Fairness Criteria in Teleommuniations Vesa Timonen, e-mail: vesatimonen@hutfi

More information

1.3 Complex Numbers; Quadratic Equations in the Complex Number System*

1.3 Complex Numbers; Quadratic Equations in the Complex Number System* 04 CHAPTER Equations and Inequalities Explaining Conepts: Disussion and Writing 7. Whih of the following pairs of equations are equivalent? Explain. x 2 9; x 3 (b) x 29; x 3 () x - 2x - 22 x - 2 2 ; x

More information

Chapter 6 A N ovel Solution Of Linear Congruenes Proeedings NCUR IX. (1995), Vol. II, pp. 708{712 Jerey F. Gold Department of Mathematis, Department of Physis University of Utah Salt Lake City, Utah 84112

More information

A Holistic Method for Selecting Web Services in Design of Composite Applications

A Holistic Method for Selecting Web Services in Design of Composite Applications A Holisti Method for Seleting Web Servies in Design of Composite Appliations Mārtiņš Bonders, Jānis Grabis Institute of Information Tehnology, Riga Tehnial University, 1 Kalu Street, Riga, LV 1658, Latvia,

More information

Weighting Methods in Survey Sampling

Weighting Methods in Survey Sampling Setion on Survey Researh Methods JSM 01 Weighting Methods in Survey Sampling Chiao-hih Chang Ferry Butar Butar Abstrat It is said that a well-designed survey an best prevent nonresponse. However, no matter

More information

) ( )( ) ( ) ( )( ) ( ) ( ) (1)

) ( )( ) ( ) ( )( ) ( ) ( ) (1) OPEN CHANNEL FLOW Open hannel flow is haraterized by a surfae in ontat with a gas phase, allowing the fluid to take on shapes and undergo behavior that is impossible in a pipe or other filled onduit. Examples

More information

Asymmetric Error Correction and Flash-Memory Rewriting using Polar Codes

Asymmetric Error Correction and Flash-Memory Rewriting using Polar Codes 1 Asymmetri Error Corretion and Flash-Memory Rewriting using Polar Codes Eyal En Gad, Yue Li, Joerg Kliewer, Mihael Langberg, Anxiao (Andrew) Jiang and Jehoshua Bruk Abstrat We propose effiient oding shemes

More information

Chapter 1 Microeconomics of Consumer Theory

Chapter 1 Microeconomics of Consumer Theory Chapter 1 Miroeonomis of Consumer Theory The two broad ategories of deision-makers in an eonomy are onsumers and firms. Eah individual in eah of these groups makes its deisions in order to ahieve some

More information

Classical Electromagnetic Doppler Effect Redefined. Copyright 2014 Joseph A. Rybczyk

Classical Electromagnetic Doppler Effect Redefined. Copyright 2014 Joseph A. Rybczyk Classial Eletromagneti Doppler Effet Redefined Copyright 04 Joseph A. Rybzyk Abstrat The lassial Doppler Effet formula for eletromagneti waves is redefined to agree with the fundamental sientifi priniples

More information

A Keyword Filters Method for Spam via Maximum Independent Sets

A Keyword Filters Method for Spam via Maximum Independent Sets Vol. 7, No. 3, May, 213 A Keyword Filters Method for Spam via Maximum Independent Sets HaiLong Wang 1, FanJun Meng 1, HaiPeng Jia 2, JinHong Cheng 3 and Jiong Xie 3 1 Inner Mongolia Normal University 2

More information

Capacity at Unsignalized Two-Stage Priority Intersections

Capacity at Unsignalized Two-Stage Priority Intersections Capaity at Unsignalized Two-Stage Priority Intersetions by Werner Brilon and Ning Wu Abstrat The subjet of this paper is the apaity of minor-street traffi movements aross major divided four-lane roadways

More information

On the Characteristics of Spectrum-Agile Communication Networks

On the Characteristics of Spectrum-Agile Communication Networks 1 On the Charateristis of Spetrum-Agile Communiation Networks Xin Liu Wei Wang Department of Computer Siene University of California, Davis, CA 95616 Email:{liu,wangw}@s.udavis.edu Abstrat Preliminary

More information

In order to be able to design beams, we need both moments and shears. 1. Moment a) From direct design method or equivalent frame method

In order to be able to design beams, we need both moments and shears. 1. Moment a) From direct design method or equivalent frame method BEAM DESIGN In order to be able to design beams, we need both moments and shears. 1. Moment a) From diret design method or equivalent frame method b) From loads applied diretly to beams inluding beam weight

More information

A Context-Aware Preference Database System

A Context-Aware Preference Database System J. PERVASIVE COMPUT. & COMM. (), MARCH 005. TROUBADOR PUBLISHING LTD) A Context-Aware Preferene Database System Kostas Stefanidis Department of Computer Siene, University of Ioannina,, kstef@s.uoi.gr Evaggelia

More information

Wireless Transmission Systems. Instructor

Wireless Transmission Systems. Instructor Teleommuniation Engineering Tehnology, Texas A&M University Wireless Transmission Systems Leture Notes - Copyright Jeff M. MDougall 2 Wireless Transmission Systems Teleommuniation Engineering Tehnology,

More information

State of Maryland Participation Agreement for Pre-Tax and Roth Retirement Savings Accounts

State of Maryland Participation Agreement for Pre-Tax and Roth Retirement Savings Accounts State of Maryland Partiipation Agreement for Pre-Tax and Roth Retirement Savings Aounts DC-4531 (08/2015) For help, please all 1-800-966-6355 www.marylandd.om 1 Things to Remember Complete all of the setions

More information

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS Virginia Department of Taxation INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS www.tax.virginia.gov 2614086 Rev. 07/14 * Table of Contents Introdution... 1 Important... 1 Where to Get Assistane... 1 Online

More information

An integrated optimization model of a Closed- Loop Supply Chain under uncertainty

An integrated optimization model of a Closed- Loop Supply Chain under uncertainty ISSN 1816-6075 (Print), 1818-0523 (Online) Journal of System and Management Sienes Vol. 2 (2012) No. 3, pp. 9-17 An integrated optimization model of a Closed- Loop Supply Chain under unertainty Xiaoxia

More information

USA Mathematical Talent Search. PROBLEMS / SOLUTIONS / COMMENTS Round 3 - Year 12 - Academic Year 2000-2001

USA Mathematical Talent Search. PROBLEMS / SOLUTIONS / COMMENTS Round 3 - Year 12 - Academic Year 2000-2001 USA Mathematial Talent Searh PROBLEMS / SOLUTIONS / COMMENTS Round 3 - Year - Aademi Year 000-00 Gene A. Berg, Editor /3/. Find the smallest positive integer with the property that it has divisors ending

More information

Hierarchical Clustering and Sampling Techniques for Network Monitoring

Hierarchical Clustering and Sampling Techniques for Network Monitoring S. Sindhuja Hierarhial Clustering and Sampling Tehniques for etwork Monitoring S. Sindhuja ME ABSTRACT: etwork monitoring appliations are used to monitor network traffi flows. Clustering tehniques are

More information

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS Virginia Department of Taxation INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS www.tax.virginia.gov 2614086 Rev. 01/16 Table of Contents Introdution... 1 Important... 1 Where to Get Assistane... 1 Online File

More information

How To Fator

How To Fator CHAPTER hapter 4 > Make the Connetion 4 INTRODUCTION Developing seret odes is big business beause of the widespread use of omputers and the Internet. Corporations all over the world sell enryption systems

More information

DSP-I DSP-I DSP-I DSP-I

DSP-I DSP-I DSP-I DSP-I DSP-I DSP-I DSP-I DSP-I Digital Signal Proessing I (8-79) Fall Semester, 005 IIR FILER DESIG EXAMPLE hese notes summarize the design proedure for IIR filters as disussed in lass on ovember. Introdution:

More information

User s Guide VISFIT: a computer tool for the measurement of intrinsic viscosities

User s Guide VISFIT: a computer tool for the measurement of intrinsic viscosities File:UserVisfit_2.do User s Guide VISFIT: a omputer tool for the measurement of intrinsi visosities Version 2.a, September 2003 From: Multiple Linear Least-Squares Fits with a Common Interept: Determination

More information

Recovering Articulated Motion with a Hierarchical Factorization Method

Recovering Articulated Motion with a Hierarchical Factorization Method Reovering Artiulated Motion with a Hierarhial Fatorization Method Hanning Zhou and Thomas S Huang University of Illinois at Urbana-Champaign, 405 North Mathews Avenue, Urbana, IL 680, USA {hzhou, huang}@ifpuiuedu

More information

Chapter 5 Single Phase Systems

Chapter 5 Single Phase Systems Chapter 5 Single Phase Systems Chemial engineering alulations rely heavily on the availability of physial properties of materials. There are three ommon methods used to find these properties. These inlude

More information

In this chapter, we ll see state diagrams, an example of a different way to use directed graphs.

In this chapter, we ll see state diagrams, an example of a different way to use directed graphs. Chapter 19 State Diagrams In this hapter, we ll see state diagrams, an example of a different way to use direted graphs. 19.1 Introdution State diagrams are a type of direted graph, in whih the graph nodes

More information

A novel active mass damper for vibration control of bridges

A novel active mass damper for vibration control of bridges IABMAS 08, International Conferene on Bridge Maintenane, Safety and Management, 3-7 July 008, Seoul, Korea A novel ative mass damper for vibration ontrol of bridges U. Starossek & J. Sheller Strutural

More information

CIS570 Lecture 4 Introduction to Data-flow Analysis 3

CIS570 Lecture 4 Introduction to Data-flow Analysis 3 Introdution to Data-flow Analysis Last Time Control flow analysis BT disussion Today Introdue iterative data-flow analysis Liveness analysis Introdue other useful onepts CIS570 Leture 4 Introdution to

More information

10.1 The Lorentz force law

10.1 The Lorentz force law Sott Hughes 10 Marh 2005 Massahusetts Institute of Tehnology Department of Physis 8.022 Spring 2004 Leture 10: Magneti fore; Magneti fields; Ampere s law 10.1 The Lorentz fore law Until now, we have been

More information

HEAT EXCHANGERS-2. Associate Professor. IIT Delhi E-mail: prabal@mech.iitd.ac.in. P.Talukdar/ Mech-IITD

HEAT EXCHANGERS-2. Associate Professor. IIT Delhi E-mail: prabal@mech.iitd.ac.in. P.Talukdar/ Mech-IITD HEA EXHANGERS-2 Prabal alukdar Assoiate Professor Department of Mehanial Engineering II Delhi E-mail: prabal@meh.iitd.a.in Multipass and rossflow he subsripts 1 and 2 represent the inlet and outlet, respetively..

More information

Optimal Allocation of Filters against DDoS Attacks

Optimal Allocation of Filters against DDoS Attacks Optimal Alloation of Filters against DDoS Attaks Karim El Defrawy ICS Dept. University of California, Irvine Email: keldefra@ui.edu Athina Markopoulou EECS Dept. University of California, Irvine Email:

More information

Dispersion in Optical Fibres

Dispersion in Optical Fibres Introdution Optial Communiations Systems Dispersion in Optial Fibre (I) Dispersion limits available bandwidth As bit rates are inreasing, dispersion is beoming a ritial aspet of most systems Dispersion

More information

AUDITING COST OVERRUN CLAIMS *

AUDITING COST OVERRUN CLAIMS * AUDITING COST OVERRUN CLAIMS * David Pérez-Castrillo # University of Copenhagen & Universitat Autònoma de Barelona Niolas Riedinger ENSAE, Paris Abstrat: We onsider a ost-reimbursement or a ost-sharing

More information

JEFFREY ALLAN ROBBINS. Bachelor of Science. Blacksburg, Virginia

JEFFREY ALLAN ROBBINS. Bachelor of Science. Blacksburg, Virginia A PROGRAM FOR SOLUtiON OF LARGE SCALE VEHICLE ROUTING PROBLEMS By JEFFREY ALLAN ROBBINS Bahelor of Siene Virginia Polytehni Institute and State University Blaksburg, Virginia 1974 II Submitted to the Faulty

More information

Open and Extensible Business Process Simulator

Open and Extensible Business Process Simulator UNIVERSITY OF TARTU FACULTY OF MATHEMATICS AND COMPUTER SCIENCE Institute of Computer Siene Karl Blum Open and Extensible Business Proess Simulator Master Thesis (30 EAP) Supervisors: Luiano Garía-Bañuelos,

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1: Introdution 1.1 Pratial olumn base details in steel strutures 1.1.1 Pratial olumn base details Every struture must transfer vertial and lateral loads to the supports. In some ases, beams or

More information

Srinivas Bollapragada GE Global Research Center. Abstract

Srinivas Bollapragada GE Global Research Center. Abstract Sheduling Commerial Videotapes in Broadast Television Srinivas Bollapragada GE Global Researh Center Mihael Bussiek GAMS Development Corporation Suman Mallik University of Illinois at Urbana Champaign

More information

OpenScape 4000 CSTA V7 Connectivity Adapter - CSTA III, Part 2, Version 4.1. Developer s Guide A31003-G9310-I200-1-76D1

OpenScape 4000 CSTA V7 Connectivity Adapter - CSTA III, Part 2, Version 4.1. Developer s Guide A31003-G9310-I200-1-76D1 OpenSape 4000 CSTA V7 Connetivity Adapter - CSTA III, Part 2, Version 4.1 Developer s Guide A31003-G9310-I200-1-76 Our Quality and Environmental Management Systems are implemented aording to the requirements

More information

cos t sin t sin t cos t

cos t sin t sin t cos t Exerise 7 Suppose that t 0 0andthat os t sin t At sin t os t Compute Bt t As ds,andshowthata and B ommute 0 Exerise 8 Suppose A is the oeffiient matrix of the ompanion equation Y AY assoiated with the

More information

An Enhanced Critical Path Method for Multiple Resource Constraints

An Enhanced Critical Path Method for Multiple Resource Constraints An Enhaned Critial Path Method for Multiple Resoure Constraints Chang-Pin Lin, Hung-Lin Tai, and Shih-Yan Hu Abstrat Traditional Critial Path Method onsiders only logial dependenies between related ativities

More information

Optimal Online Buffer Scheduling for Block Devices *

Optimal Online Buffer Scheduling for Block Devices * Optimal Online Buffer Sheduling for Blok Devies * ABSTRACT Anna Adamaszek Department of Computer Siene and Centre for Disrete Mathematis and its Appliations (DIMAP) University of Warwik, Coventry, UK A.M.Adamaszek@warwik.a.uk

More information

REDUCTION FACTOR OF FEEDING LINES THAT HAVE A CABLE AND AN OVERHEAD SECTION

REDUCTION FACTOR OF FEEDING LINES THAT HAVE A CABLE AND AN OVERHEAD SECTION C I E 17 th International Conferene on Eletriity istriution Barelona, 1-15 May 003 EUCTION FACTO OF FEEING LINES THAT HAVE A CABLE AN AN OVEHEA SECTION Ljuivoje opovi J.. Elektrodistriuija - Belgrade -

More information

i_~f e 1 then e 2 else e 3

i_~f e 1 then e 2 else e 3 A PROCEDURE MECHANISM FOR BACKTRACK PROGRAMMING* David R. HANSON + Department o Computer Siene, The University of Arizona Tuson, Arizona 85721 One of the diffiulties in using nondeterministi algorithms

More information

Supply chain coordination; A Game Theory approach

Supply chain coordination; A Game Theory approach aepted for publiation in the journal "Engineering Appliations of Artifiial Intelligene" 2008 upply hain oordination; A Game Theory approah Jean-Claude Hennet x and Yasemin Arda xx x LI CNR-UMR 668 Université

More information

HEAT CONDUCTION. q A q T

HEAT CONDUCTION. q A q T HEAT CONDUCTION When a temperature gradient eist in a material, heat flows from the high temperature region to the low temperature region. The heat transfer mehanism is referred to as ondution and the

More information

A Three-Hybrid Treatment Method of the Compressor's Characteristic Line in Performance Prediction of Power Systems

A Three-Hybrid Treatment Method of the Compressor's Characteristic Line in Performance Prediction of Power Systems A Three-Hybrid Treatment Method of the Compressor's Charateristi Line in Performane Predition of Power Systems A Three-Hybrid Treatment Method of the Compressor's Charateristi Line in Performane Predition

More information

UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE

UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE September 8, 2009 Table of Contents 1 Home 2 University 3 Your 4 Add 5 Managing 6 How 7 Viewing 8 Closing 9 Reposting Page 1 and Work-Study Employers

More information

Intuitive Guide to Principles of Communications By Charan Langton www.complextoreal.com

Intuitive Guide to Principles of Communications By Charan Langton www.complextoreal.com Intuitive Guide to Priniples of Communiations By Charan Langton www.omplextoreal.om Understanding Frequeny Modulation (FM), Frequeny Shift Keying (FSK), Sunde s FSK and MSK and some more The proess of

More information

Trade Information, Not Spectrum: A Novel TV White Space Information Market Model

Trade Information, Not Spectrum: A Novel TV White Space Information Market Model Trade Information, Not Spetrum: A Novel TV White Spae Information Market Model Yuan Luo, Lin Gao, and Jianwei Huang 1 Abstrat In this paper, we propose a novel information market for TV white spae networks,

More information

Electrician'sMathand BasicElectricalFormulas

Electrician'sMathand BasicElectricalFormulas Eletriian'sMathand BasiEletrialFormulas MikeHoltEnterprises,In. 1.888.NEC.CODE www.mikeholt.om Introdution Introdution This PDF is a free resoure from Mike Holt Enterprises, In. It s Unit 1 from the Eletrial

More information

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks Performane Analysis of IEEE 80.11 in Multi-hop Wireless Networks Lan Tien Nguyen 1, Razvan Beuran,1, Yoihi Shinoda 1, 1 Japan Advaned Institute of Siene and Tehnology, 1-1 Asahidai, Nomi, Ishikawa, 93-19

More information

Isaac Newton. Translated into English by

Isaac Newton. Translated into English by THE MATHEMATICAL PRINCIPLES OF NATURAL PHILOSOPHY (BOOK 1, SECTION 1) By Isaa Newton Translated into English by Andrew Motte Edited by David R. Wilkins 2002 NOTE ON THE TEXT Setion I in Book I of Isaa

More information

Course 8-9 DSL type digital access techniques (Digital Subscriber Line)

Course 8-9 DSL type digital access techniques (Digital Subscriber Line) Course 8-9 DSL type digital aess tehniques (Digital Subsriber Line) o The term refers to the tehnologies and equipments used in a telephone network to ensure the aess to a high speed digital network on

More information

3 Game Theory: Basic Concepts

3 Game Theory: Basic Concepts 3 Game Theory: Basi Conepts Eah disipline of the soial sienes rules omfortably ithin its on hosen domain: : : so long as it stays largely oblivious of the others. Edard O. Wilson (1998):191 3.1 and and

More information

Granular Problem Solving and Software Engineering

Granular Problem Solving and Software Engineering Granular Problem Solving and Software Engineering Haibin Zhu, Senior Member, IEEE Department of Computer Siene and Mathematis, Nipissing University, 100 College Drive, North Bay, Ontario, P1B 8L7, Canada

More information

CHAPTER J DESIGN OF CONNECTIONS

CHAPTER J DESIGN OF CONNECTIONS J-1 CHAPTER J DESIGN OF CONNECTIONS INTRODUCTION Chapter J of the addresses the design and heking of onnetions. The hapter s primary fous is the design of welded and bolted onnetions. Design requirements

More information

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection Behavior Analysis-Based Learning Framework for Host Level Intrusion Detetion Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit Eletrial and Computer Engineering Department University of Arizona

More information

THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES

THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES Proeedings of FEDSM 98 998 ASME Fluids Engineering Division Summer Meeting June 2-25, 998 Washington DC FEDSM98-529 THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES John D. Wright Proess

More information

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator nternational Journal of Computer and Eletrial Engineering, Vol. 1, No. 1, April 2009 Neural network-based Load Balaning and Reative Power Control by Stati VAR Compensator smail K. Said and Marouf Pirouti

More information

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero FE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero Robotis, Computer Vision and Intelligent Control Group. University

More information

SLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments

SLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments 2 th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing SLA-based Resoure Alloation for Software as a Servie Provider (SaaS) in Cloud Computing Environments Linlin Wu, Saurabh Kumar

More information

Improved SOM-Based High-Dimensional Data Visualization Algorithm

Improved SOM-Based High-Dimensional Data Visualization Algorithm Computer and Information Siene; Vol. 5, No. 4; 2012 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Siene and Eduation Improved SOM-Based High-Dimensional Data Visualization Algorithm Wang

More information

Downlink Scheduling and Radio Resource Allocation in Adaptive OFDMA Wireless Communication Systems for User-Individual QoS

Downlink Scheduling and Radio Resource Allocation in Adaptive OFDMA Wireless Communication Systems for User-Individual QoS Downlin Sheduling and Radio Resoure Alloation in Adaptive OFDMA Wireless Communiation Systems for User-Individual QoS Lu Yanhui, Wang Chunming, Yin Changhuan, and Yue Guangxin Abstrat In this paper, we

More information

Henley Business School at Univ of Reading. Pre-Experience Postgraduate Programmes Chartered Institute of Personnel and Development (CIPD)

Henley Business School at Univ of Reading. Pre-Experience Postgraduate Programmes Chartered Institute of Personnel and Development (CIPD) MS in International Human Resoure Management For students entering in 2012/3 Awarding Institution: Teahing Institution: Relevant QAA subjet Benhmarking group(s): Faulty: Programme length: Date of speifiation:

More information

Deadline-based Escalation in Process-Aware Information Systems

Deadline-based Escalation in Process-Aware Information Systems Deadline-based Esalation in Proess-Aware Information Systems Wil M.P. van der Aalst 1,2, Mihael Rosemann 2, Marlon Dumas 2 1 Department of Tehnology Management Eindhoven University of Tehnology, The Netherlands

More information

arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA

arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA LBNL-52402 Marh 2003 On the Speed of Gravity and the v/ Corretions to the Shapiro Time Delay Stuart Samuel 1 arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrene Berkeley National Laboratory

More information

Programming Basics - FORTRAN 77 http://www.physics.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html

Programming Basics - FORTRAN 77 http://www.physics.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html CWCS Workshop May 2005 Programming Basis - FORTRAN 77 http://www.physis.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html Program Organization A FORTRAN program is just a sequene of lines of plain text.

More information

Decimal numbers. Chapter

Decimal numbers. Chapter Chapter 6 Deimal numbers Contents: A B C D E F G H I Plae value Ordering deimal numbers Adding and subtrating deimal numbers Multiplying and dividing by powers of 0 Multiplying deimal numbers Dividing

More information

Modeling and analyzing interference signal in a complex electromagnetic environment

Modeling and analyzing interference signal in a complex electromagnetic environment Liu et al. EURASIP Journal on Wireless Communiations and Networking (016) 016:1 DOI 10.1186/s13638-015-0498-8 RESEARCH Modeling and analyzing interferene signal in a omplex eletromagneti environment Chun-tong

More information

Interpretable Fuzzy Modeling using Multi-Objective Immune- Inspired Optimization Algorithms

Interpretable Fuzzy Modeling using Multi-Objective Immune- Inspired Optimization Algorithms Interpretable Fuzzy Modeling using Multi-Objetive Immune- Inspired Optimization Algorithms Jun Chen, Mahdi Mahfouf Abstrat In this paper, an immune inspired multi-objetive fuzzy modeling (IMOFM) mehanism

More information

Outline. Planning. Search vs. Planning. Search vs. Planning Cont d. Search vs. planning. STRIPS operators Partial-order planning.

Outline. Planning. Search vs. Planning. Search vs. Planning Cont d. Search vs. planning. STRIPS operators Partial-order planning. Outline Searh vs. planning Planning STRIPS operators Partial-order planning Chapter 11 Artifiial Intelligene, lp4 2005/06, Reiner Hähnle, partly based on AIMA Slides Stuart Russell and Peter Norvig, 1998

More information

A Comparison of Default and Reduced Bandwidth MR Imaging of the Spine at 1.5 T

A Comparison of Default and Reduced Bandwidth MR Imaging of the Spine at 1.5 T 9 A Comparison of efault and Redued Bandwidth MR Imaging of the Spine at 1.5 T L. Ketonen 1 S. Totterman 1 J. H. Simon 1 T. H. Foster 2. K. Kido 1 J. Szumowski 1 S. E. Joy1 The value of a redued bandwidth

More information

Deduplication with Block-Level Content-Aware Chunking for Solid State Drives (SSDs)

Deduplication with Block-Level Content-Aware Chunking for Solid State Drives (SSDs) 23 IEEE International Conferene on High Performane Computing and Communiations & 23 IEEE International Conferene on Embedded and Ubiquitous Computing Dedupliation with Blok-Level Content-Aware Chunking

More information

Impedance Method for Leak Detection in Zigzag Pipelines

Impedance Method for Leak Detection in Zigzag Pipelines 10.478/v10048-010-0036-0 MEASUREMENT SCIENCE REVIEW, Volume 10, No. 6, 010 Impedane Method for Leak Detetion in igzag Pipelines A. Lay-Ekuakille 1, P. Vergallo 1, A. Trotta 1 Dipartimento d Ingegneria

More information

WORKFLOW CONTROL-FLOW PATTERNS A Revised View

WORKFLOW CONTROL-FLOW PATTERNS A Revised View WORKFLOW CONTROL-FLOW PATTERNS A Revised View Nik Russell 1, Arthur H.M. ter Hofstede 1, 1 BPM Group, Queensland University of Tehnology GPO Box 2434, Brisbane QLD 4001, Australia {n.russell,a.terhofstede}@qut.edu.au

More information

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu

More information

i e AT 8 of 1938 THE PERSONAL INJURIES (EMERGENCY PROVISIONS) ACT 1939

i e AT 8 of 1938 THE PERSONAL INJURIES (EMERGENCY PROVISIONS) ACT 1939 i e AT 8 of 1938 THE PERSONAL INJURIES (EMERGENCY PROVISIONS) ACT 1939 The Personal Injuries (Emergeny Provisions) At 1939 Index i e THE PERSONAL INJURIES (EMERGENCY PROVISIONS) ACT 1939 Index Setion

More information

Using Live Chat in your Call Centre

Using Live Chat in your Call Centre Using Live Chat in your Call Centre Otober Key Highlights Yesterday's all entres have beome today's ontat entres where agents deal with multiple queries from multiple hannels. Live Chat hat is one now

More information

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF ' R :::i:. ATIONAL :'.:::::: RETENTION ':: Compliane with the way you work, PRODUCT BRIEF In-plae Management of Unstrutured Data The explosion of unstrutured data ombined with new laws and regulations

More information

Marker Tracking and HMD Calibration for a Video-based Augmented Reality Conferencing System

Marker Tracking and HMD Calibration for a Video-based Augmented Reality Conferencing System Marker Traking and HMD Calibration for a Video-based Augmented Reality Conferening System Hirokazu Kato 1 and Mark Billinghurst 2 1 Faulty of Information Sienes, Hiroshima City University 2 Human Interfae

More information

Picture This: Molecular Maya Puts Life in Life Science Animations

Picture This: Molecular Maya Puts Life in Life Science Animations Piture This: Moleular Maya Puts Life in Life Siene Animations [ Data Visualization ] Based on the Autodesk platform, Digizyme plug-in proves aestheti and eduational effetiveness. BY KEVIN DAVIES In 2010,

More information

A Design Environment for Migrating Relational to Object Oriented Database Systems

A Design Environment for Migrating Relational to Object Oriented Database Systems To appear in: 1996 International Conferene on Software Maintenane (ICSM 96); IEEE Computer Soiety, 1996 A Design Environment for Migrating Relational to Objet Oriented Database Systems Jens Jahnke, Wilhelm

More information

Wireless Networking Guide 2007 www.lexmark.com

Wireless Networking Guide 2007 www.lexmark.com Wireless Networking Guide 2007 www.lexmark.om P/N 13L0828 E.C. 3L0101 Contents Installing the printer on a wireless network...4 Wireless network ompatiility...4 Information you will need to set up the

More information

Algorithm of Removing Thin Cloud-fog Cover from Single Remote Sensing Image

Algorithm of Removing Thin Cloud-fog Cover from Single Remote Sensing Image Journal of Information & Computational Siene 11:3 (2014 817 824 February 10, 2014 Available at http://www.jois.om Algorithm of Removing Thin Cloud-fog Cover from Single Remote Sensing Image Yinqi Xiong,

More information

Robust Classification and Tracking of Vehicles in Traffic Video Streams

Robust Classification and Tracking of Vehicles in Traffic Video Streams Proeedings of the IEEE ITSC 2006 2006 IEEE Intelligent Transportation Systems Conferene Toronto, Canada, September 17-20, 2006 TC1.4 Robust Classifiation and Traking of Vehiles in Traffi Video Streams

More information

The Optimal Deterrence of Tax Evasion: The Trade-off Between Information Reporting and Audits

The Optimal Deterrence of Tax Evasion: The Trade-off Between Information Reporting and Audits The Optimal Deterrene of Tax Evasion: The Trade-off Between Information Reporting and Audits Yulia Paramonova Department of Eonomis, University of Mihigan Otober 30, 2014 Abstrat Despite the widespread

More information

Analysis of micro-doppler signatures

Analysis of micro-doppler signatures Analysis of miro-doppler signatures V.C. Chen, F. Li, S.-S. Ho and H. Wehsler Abstrat: Mehanial vibration or rotation of a target or strutures on the target may indue additional frequeny modulations on

More information

Labeling outerplanar graphs with maximum degree three

Labeling outerplanar graphs with maximum degree three Labeling outerplanar graphs with maximum degree three Xiangwen Li 1 and Sanming Zhou 2 1 Department of Mathematics Huazhong Normal University, Wuhan 430079, China 2 Department of Mathematics and Statistics

More information

Nodal domains on graphs - How to count them and why?

Nodal domains on graphs - How to count them and why? Proeedings of Symposia in Pure Mathematis Nodal domains on graphs - How to ount them and why? Ram Band, Idan Oren and Uzy Smilansky, Abstrat. The purpose of the present manusript is to ollet known results

More information

A Survey of Usability Evaluation in Virtual Environments: Classi cation and Comparison of Methods

A Survey of Usability Evaluation in Virtual Environments: Classi cation and Comparison of Methods Doug A. Bowman bowman@vt.edu Department of Computer Siene Virginia Teh Joseph L. Gabbard Deborah Hix [ jgabbard, hix]@vt.edu Systems Researh Center Virginia Teh A Survey of Usability Evaluation in Virtual

More information

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds Intelligent Measurement Proesses in 3D Optial Metrology: Produing More Aurate Point Clouds Charles Mony, Ph.D. 1 President Creaform in. mony@reaform3d.om Daniel Brown, Eng. 1 Produt Manager Creaform in.

More information

Henley Business School at Univ of Reading. Chartered Institute of Personnel and Development (CIPD)

Henley Business School at Univ of Reading. Chartered Institute of Personnel and Development (CIPD) MS in International Human Resoure Management (full-time) For students entering in 2015/6 Awarding Institution: Teahing Institution: Relevant QAA subjet Benhmarking group(s): Faulty: Programme length: Date

More information

Customer Reporting for SaaS Applications. Domain Basics. Managing my Domain

Customer Reporting for SaaS Applications. Domain Basics. Managing my Domain Produtivity Marketpla e Software as a Servie Invoiing Ordering Domains Customer Reporting for SaaS Appliations Domain Basis Managing my Domain Managing Domains Helpful Resoures Managing my Domain If you

More information

Findings and Recommendations

Findings and Recommendations Contrating Methods and Administration Findings and Reommendations Finding 9-1 ESD did not utilize a formal written pre-qualifiations proess for seleting experiened design onsultants. ESD hose onsultants

More information

THERMAL TO MECHANICAL ENERGY CONVERSION: ENGINES AND REQUIREMENTS Vol. I - Thermodynamic Cycles of Reciprocating and Rotary Engines - R.S.

THERMAL TO MECHANICAL ENERGY CONVERSION: ENGINES AND REQUIREMENTS Vol. I - Thermodynamic Cycles of Reciprocating and Rotary Engines - R.S. THERMAL TO MECHANICAL ENERGY CONVERSION: ENGINES AND REQUIREMENTS Vol. I - Thermodynami Cyles of Reiproating and Rotary Engines - R.S.Kavtaradze THERMODYNAMIC CYCLES OF RECIPROCATING AND ROTARY ENGINES

More information

A Comparison of Service Quality between Private and Public Hospitals in Thailand

A Comparison of Service Quality between Private and Public Hospitals in Thailand International Journal of Business and Soial Siene Vol. 4 No. 11; September 2013 A Comparison of Servie Quality between Private and Hospitals in Thailand Khanhitpol Yousapronpaiboon, D.B.A. Assistant Professor

More information