Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks
|
|
|
- Margaret Burns
- 10 years ago
- Views:
Transcription
1 Reliability Constrained acket-sizing for inear Multi-hop Wireless Networks Ning Wen, and Randall A. Berry Departent of Electrical Engineering and Coputer Science Northwestern University, Evanston, Illinois 628 Eail: Abstract We consider optiizing the packet-sizes and the reuse factor to iniize the delay required to send a essage between two nodes in a linear ulti-hop wireless network subject to a reliability constraint. Initially assuing no re-use, we give a bound on the required delay. Next, in a infinite syste with re-use, we analyze the rate of growth of the delay as a function of the essage size. Two cases are considered: one in which packets are decoded/re-encoded on each hop and one in which this is concatenated with an end-to-end outer code. The later is shown to result in lower delays. I. INTRODUCTION Consider a wire-line network in which a essage is to be divided into several packets of equal size and sent over a sequence of error-free links with transission rate R. Furtherore, suppose that an entire packet ust be received over one link before it ay be sent over the next, and that the network is lightly loaded so that whenever this condition is true the packet ay be sent. Ignoring any overhead per packet, it is then well-known that the end-to-end delay of the essage is iniized by aking the packet-size as sall as possible so as to benefit fro pipelining. If overhead is not ignored, there is an optial packet-size which balances this pipelining effect with the aortization of overhead given by using larger packets. In this paper, we consider a siilar question in the context of a linear ulti-hop wireless network. Here, several new issues arise. First we assue that all nodes transit in a coon frequency-band and so ultiple links interfere with each other. Also, nodes are precluded fro sending and receiving at the sae tie i.e. they ust satisfy a half-duplex constraint. Finally, we assue that links are not error free and that a node has a constraint on the reliability i.e. probability of decoding error at which a essage ust be obtained. Given this odel we consider optiizing the packet-size as well as the schedule of transissions with the objective of iniizing the total delay for sending a packet fro a given source node to a given destination. In this setting for a given transission schedule packet sizes ust now balance the pipe-lining gains with both aortization of overhead as well as eeting the reliability constraint. We forulate a siple linear odel for a ulti-hop network in which all transissions transissions are sent hop-by-hop and interfering transissions are treated as noise. To odel the reliability constraint we use an error exponent odel derived fro the rando coding bound for a Gaussian channel. We initially consider a syste without spatial re-use, i.e. each link is scheduled in its own tie-slot, and derive an upper bound on the end-to-end delay. We then turn to a odel with spatial reuse consider the packet size and re-use distance which either axiize the throughput or iniize the total delay. In the later case, to gain insight we focus on the asyptotic growth of the total delay as the essage size increases to infinity. In this regie, we characterize the optial nuber of packets, for two different coding schees. In the first, each hop is coded individually. In the second, a concatenated coding schee is used to add end-to-end coding. In the first case, the optial nuber of packets satisfies 2 log = Θ, while in the second it satisfies 2 = Θ. In other words, with the concatenated coding schee we use saller packets. The delay under both schees grows at the sae first order rate, but the second order growth is saller with the concatenated schee. Finally we conclude with soe nuerical exaples. Related work includes [], which considers reliability bounds for ulti-hop networks but does not account for spatial reuse and thus pipe-lining as we do here, and [2], which addresses the re-use but focuses on throughput as opposed to delay. II. MODE We consider a one-diensional odel, where all nodes are regularly placed on a one-diensional line and labeled by an integer. One node x is assued to have nats of data to send to another node y. et D be the distance between node x and y, and let H be the nuber of nodes between x and y, each of which is assued to be a relay for the essage i.e. the nuber of hops is H. To siplify the analysis, we assue the queuing delay on each hop is zero. This is reasonable assuing that the given flow has higher priority over other flows in the network. All nodes are assued to transit in the sae frequency band with noralized bandwidth of and treat any interfering transission as noise. The channel between any pair of nodes is odeled by a distance dependent path-loss plus additive Gaussian noise. Furtherore, we assue that the nodes eploy a regular TDM-schedule of length so that In order to siplify the notations, we use nat as the unit for inforation in this paper.
2 in tie-slot t, the nodes n + t od are allowed to transit, for n =...,,,,.... Figure illustrates this space-tie reuse odel. Tie slot Tie slot 2 Tie slot + Node Node 2 Node + Node Node 2 Node +... Node Node 2 Node + Fig.. Space-tie reuse schee. To begin consider a siple odel where all the nodes have the sae transission rate. Assue the nats of inforation are transitted in equal-size packets, and there are h additional nats of overhead in each packet. et RH, denote the transission rate in ters of nats per channel use under certain H and and assue that all transissions are reliable. It follows that +h RH, is the length of the tie-slot for one packet. The end-to-end delay in channel uses is then DH, = + h + H + h RH, RH,, where the first ter is the tie for the source to send all the nats over the first hops, and the second ter is the tie required for the last packet to traverse the reaining H hops. Essentially, this is a pipe-lining calculation as described in the introduction, only now a packet ust traverse hops before a new packet ay be transitted. If H and are fixed, and we ignore the integer constraint on, then the delay is iniized if takes the value: H H, =, 2 h and the optial delay is: 2 + H h D H, = RH,. 3 Notice that if the overhead h is negligible, then the optial / goes to infinity, and so the optial packet size of RH, channel uses goes to zero. We are also interested in the case where each packet ust also eet a reliability constraint, in addition to overhead considerations, this will also prevent the use of arbitrarily sall packets. We next extend our odel to account for this. Specifically we assue that the end-to-end essage error probability for delivering the nats ust be no greater than a constant η. Given this constraint, we then want to iniize the end-to-end delay. Assuing that each node uses a rando Gaussian code, then fro [3], [4], the block error probability b of code with a block-length of N b channel uses is bounded by: b exp N b E, SINR, 4 for any [, ], where b is the nuber of inforation nats contained in one block, SIN R is the Signal-to-Noise-plus- Interference ratio at receiver, and E, SINR is the error exponent deterined by and SINR. For a coplex Gaussian channel with unit bandwidth, a siple expression for the error exponent E, SINR is given by: E, SINR = log + SINR. 5 Given an upper bound η hb on the block error probability b for a single hop, the iniu N hb satisfying N hb log + SINR b log η 6 is the iniu delay for sending a block of b nats over that hop for which we can use 5 to guarantee that the reliability constraint is et. In the rest of the paper, we this value of N hb as the iniu delay for each hop. III. DEAY WITHOUT SATIA REUSE IN FINITE ENGTH SYSTEM Now we return to proble of sending nats of data between two nodes x and y over H equal length hops, but include the reliability constraint. We assue that the distance D between the source and destination is noralized to. 2. Furtherore, there is no other node beyond x and y, and no other interference present. Here we consider the siplest case where only one transission is possible in each tie slot. et N denote the noise power spectru density. Notice that there is exactly one active transitter in each tie slot, we assue the transission power is for each transitter. We consider what are the optial nuber of hops H and what is the nuber of blocks containing the original nats. Before going into the details, we introduce following basic result. ea : In an optiized syste, the delay for each hop is the sae for each packet. This follows directly fro the assuptions that each packet has the sae size and that the channel for each hop is the sae and thus so is its SINR. Thus we assue that the delay is the sae for each hop and we denote this by N hb. et SINR = N H α be the SINR for a hop, where α is the path-loss factor 3. Then, 6 can be rewritten as: N N hb log + H α + h log η hb, 7 2 Changing this distance is equivalent to changing the transission power. Since our results are suitable for any power, we use the noralized distance to siplify our notation. 3 Here, /N is also noralized
3 where η hb is the per hop per block error constraint. Assuing no retransissions, and that coding is done independently over each hop then η hb and the end-to-end error constraint η will satisfy η = η hb H. 8 Considering that η < and N, we have η H H η, 9 which eans that setting η hb = H guarantees the end-to-end essage error probability is less than η. et N = N hb H denote the total delay, then the iniu N satisfying η N H + Hh H log η H log + N H α can be guaranteed to satisfy the reliability constraint. roposition : Without an integer constraint on H, the total delay is upper bounded by H + H h H log η H, log + N H α where H = zα /N α, and zα is the solution to + z log + z = α. roof: Notice that H and are positive integers. The right-hand-side of is onotonically increases with. Thus any given H, the that iniizes is. Note that H + Hh H log η < H + Hh H log η H. 2 log + N H α log + N H α Miniizing, the left-hand side of 2 with respect to H yields the desired result. IV. INFINITE ENGTH SYSTEM Now we consider the situation where siultaneous transissions are enabled so that the SINR includes the effect of interference. To calculate the interference, the knowledge of the sets of transitters in each tie slot is necessary, which coplicated the proble. To siplify this we assue there are infinitely any nodes regularly placed in a one-diensional line that each node in the line always has traffic to send. Thus, for a given transission schedule each node will see the sae SINR. In this section, we noralize the distance between adjacent nodes to be 4 and assue the nuber of hops H between the source node x and the destination node y is a constant. The nodes follow the space-tie reuse schedule as in Fig., so that for a schedule of length the distance between two adjacent transitters is hops. Each user has an average 4 Notice this is a different assuption than the one in previous sections. power constraint of 5 and so transits with power when scheduled. We are still assuing that the essage fro x can be sent to y via ulti-hop transission without queuing delay and are priarily interested in the case where the essage size is large. A. Throughput Optiization Before considering the optial delay proble, we address the related proble of optiizing the end-to-end throughput given a fixed block size of b nats and an end-to-end error constraint of η. et N hb be the one-hop iniu delay for nats of inforation which eets the corresponding per-hop reliability constraint in 6 The average throughput can then be written as R = b. 3 N hb We next consider axiizing this over b and. et γ, be the received SINR at each node, where γ N, = N + i= i + α +.4 j= j α Now, the reliability constraint 6 can be written as γ N hb log +, b log η H. 5 Substituting 5 into 3 yields log + γ N R log η H,. 6 The right-hand side of 6 can be decoposed into two parts, denoted by R and R respectively, Assuing a fixed value of, the first part R = only depends on, and log η H N γ, log+ the second part R = only depends on. It is clear that R is axiized if takes the largest possible value, and a finite axiizes R. To gain soe insight, we consider the optial when takes extree values. In the low SINR regie, where goes to, γ, goes to and optial is the sallest possible. On the other hand, if goes to, then the syste is in interference liited region and the optial is a bounded constant deterined by the syste paraeters. B. Optial Delay The analysis in Section IV-A shows that longer block lengths are preferred to axiize throughput. However, this prohibits pipe-lining and introduces longer delay. Now we return to the proble of iniizing the delay to send a essage of nats of inforation over H hops. As before this essage can be divided blocks of equal size b = +h, h 5 Notice this is also a slightly different noralization than in the previous section.
4 denotes the additional overhead needed per packet. The delay D of sending one block over one hop ust now satisfy D + h log η H, 7 log + γ N, to ensure the reliability constraint is et. Note that D is also the length of one tie-slot. Fro the discussion in Section II, the nuber of tie slots fro x sending out the first block until y receives the last block is H +. Thus the total delay satisfies should satisfy [ ] H + + h log η H D. 8 log + γ N, To gain insight into the paraeters which optiize this we next consider an asyptotic regie, where goes to. V. ASYMTOTIC ANAYSIS In this section, we consider study the asyptotic behavior of the optial paraeters, and as the total inforation goes to. A. Optial orders of and The right-hand side of 8 can be rewritten as D, = log + γ N, + b + log + h + b 2 + b log + b h + b 2, 9 where b = H, and b 2 = log η H. We next consider the behavior of this as for a fixed. roposition 2: et and iniize 9 over and. If, then and satisfy,, and 2 log = Θ. roof: On the right-hand-side of 9, note that + γ N, is bounded, no atter what value is used. The highest order ter is, and all the other ters are of saller orders than. This iplies that, and log = o. The coefficient of the highest order ter,, is + γ N,. It requires to iniize the delay. Therefore,,, and log = o. Now the candidates for the second highest order ters are b and log. These two ters should be asyptotically equivalent to iniize the total delay. Thus which yields the desired result. b log, 2 roposition 2 shows that 2 log increases linearly with, if is fixed. Suppose that there is no reliability constraint, i.e. the transission rate is deterined by SIN R and is independent of. In this case, fro 2, it follows that should increase at the order of Θ 2. This iplies that grows faster without a reliability constraint than when one is present. In other words, with the reliability constraint, an order larger block-size is preferred. B. Optial Fro the proof of roposition 2, the highest order-ter of D, as inf is D, = log + γ N, Furtherore, is shown to go to in roposition 2. Thus the optial is given by log+γ N = arg in k,. log 2 + γ,. as. Thus the optial is a bounded constant. Notice that 2 is the inverse of R in Section IV-A, and so the sae results are valid for the extree values of in high and low SINR regies. VI. CONCATENATED CODING SCHEME reviously, we considered that a essage containing nats is divided into blocks, and the essage is successfully received when there is no error for every block on every hop. Next we relax this assuption and consider a concatenated coding schee as in [5], in which an outer code is also used to correct issing packets which do not arrive at the destination. Assue that the inner code length is N i channel uses, and the outer code length is N out. Assue the diensional rate of the outer code is r, then N out = r N i. 22 Now, consider the error probability per block per hop, it is given by bh exp + h γ N i log +,. 23 Then the end-to-end block error, which is also the inner code error, can be upper bounded as b H bh exp{ N i E i }, 24 where E i = log + γ N, N i h N i log H N i can be interpreted as the error exponent of the inner code. Based on [5], the error exponent of the outer code can be expressed as E o R o = ax re i R i, 25 rr i=r o
5 where R i and R o are the rate for the inner and outer codes, respectively. And R i = N i and R o = N out. roposition 3: et and iniizes the total delay over and. With the concatenated coding schee, if, then the optial and satisfy,, and 2 = Θ. roof: The total essage error can be expressed as 6 e { [ γ exp ax r log +, rr i=r o h log H ] } N out N i N i N i = exp γ Nout log +, } 2 + h + log H, 26 where the optial r in the final step is r + h + log H =. 27 N out log + γ N, To satisfy the end-to-end error requireent η, we have γ Nout log +, + h + log H + log η. 28 Using the sae arguent as the previous section, the total end-to-end delay is D, = H + rn out. 29 lugging 27 and 28 into 29, and using the sae technique as in roposition 2, yield the result. Notice that the total end-to-end delay still grows linearly with. However, the second highest order ters now grow at a slower rate than the schee without concatenated coding, which iplies that this schee will have a order saller endto-end delay. VII. NUMERICA RESUT To illustrate the asyptotic, soe nuerical results are provided in this section. Figure 2 shows the growth order of the inial delays for both the schees with and without concatenated coding. It is clear that the highest order ter doinates the total delay, when the aount of inforation goes to infinity. It also illustrates the changes of optial according to different. Figure 3 are the optial and. The results shown in these two figures are consistent with our analysis. In all of above figures, α = 3, η =., N / =, h =, and H =. Delay Optial Optial Optial 8 6 Optial Delay w/o CC 4 First Order w/o CC Optial Delay with CC First Order with CC Fig. 2. Optial w/o CC Optial with CC Miniu delays and optial s Optial w/o CC Optial with CC Fig. 3. Optial s and s. REFERENCES Optial w/o CC Optial with CC [] O. Oyan, Reliability bounds for delay-constrained ulti-hop networks, in 44th Annual Allerton Conference, Illinois, Sept. 26. [2] M. Sikora, J. N. anean, M. Haenggi, D. J. Costello, and T. Fuja, On the Optiu Nuber of Hops in inear Ad Hoc Networks, in IEEE Inforation Theory Workshop ITW 4, San Antonio, TX, Oct 24. [3] R. G. Gallager, Inforation Theory and Reliable Counication. New York, NY, USA: John Wiley & Sons, Inc., 968. [4] I. E. Telatar and R. G. Gallager, Cobining queueing theory with inforation theory for ultiaccess, IEEE Journal on Selected Areas in Counications, vol. 3, no. 6, pp , August 995. [5] G. D. Forney, Concatenated Codes. M.I.T. ress, Notice E o is the actual error exponent when r is close to. We use E o to calculate the error probability since r indeed approaches when is large.
Resource Allocation in Wireless Networks with Multiple Relays
Resource Allocation in Wireless Networks with Multiple Relays Kağan Bakanoğlu, Stefano Toasin, Elza Erkip Departent of Electrical and Coputer Engineering, Polytechnic Institute of NYU, Brooklyn, NY, 0
This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive
MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol., No. 3, Suer 28, pp. 429 447 issn 523-464 eissn 526-5498 8 3 429 infors doi.287/so.7.8 28 INFORMS INFORMS holds copyright to this article and distributed
The Application of Bandwidth Optimization Technique in SLA Negotiation Process
The Application of Bandwidth Optiization Technique in SLA egotiation Process Srecko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia
PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS
PREDICTIO OF POSSIBLE COGESTIOS I SLA CREATIO PROCESS Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia Tel +385 20 445-739,
Searching strategy for multi-target discovery in wireless networks
Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,
Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel
Recent Advances in Counications Adaptive odulation and Coding for Unanned Aerial Vehicle (UAV) Radio Channel Airhossein Fereidountabar,Gian Carlo Cardarilli, Rocco Fazzolari,Luca Di Nunzio Abstract In
Capacity of Multiple-Antenna Systems With Both Receiver and Transmitter Channel State Information
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO., OCTOBER 23 2697 Capacity of Multiple-Antenna Systes With Both Receiver and Transitter Channel State Inforation Sudharan K. Jayaweera, Student Meber,
Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation
Int J Counications, Network and Syste Sciences, 29, 5, 422-432 doi:14236/ijcns292547 Published Online August 29 (http://wwwscirporg/journal/ijcns/) Load Control for Overloaded MPLS/DiffServ Networks during
Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks
Cooperative Caching for Adaptive Bit Rate Streaing in Content Delivery Networs Phuong Luu Vo Departent of Coputer Science and Engineering, International University - VNUHCM, Vietna [email protected]
ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128
ON SELF-ROUTING IN CLOS CONNECTION NETWORKS BARRY G. DOUGLASS Electrical Engineering Departent Texas A&M University College Station, TX 778-8 A. YAVUZ ORUÇ Electrical Engineering Departent and Institute
Machine Learning Applications in Grid Computing
Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA [email protected], [email protected]
Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation
Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State
Halloween Costume Ideas for the Wii Game
Algorithica 2001) 30: 101 139 DOI: 101007/s00453-001-0003-0 Algorithica 2001 Springer-Verlag New York Inc Optial Search and One-Way Trading Online Algoriths R El-Yaniv, 1 A Fiat, 2 R M Karp, 3 and G Turpin
Reconnect 04 Solving Integer Programs with Branch and Bound (and Branch and Cut)
Sandia is a ultiprogra laboratory operated by Sandia Corporation, a Lockheed Martin Copany, Reconnect 04 Solving Integer Progras with Branch and Bound (and Branch and Cut) Cynthia Phillips (Sandia National
International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1
International Journal of Manageent & Inforation Systes First Quarter 2012 Volue 16, Nuber 1 Proposal And Effectiveness Of A Highly Copelling Direct Mail Method - Establishent And Deployent Of PMOS-DM Hisatoshi
Data Set Generation for Rectangular Placement Problems
Data Set Generation for Rectangular Placeent Probles Christine L. Valenzuela (Muford) Pearl Y. Wang School of Coputer Science & Inforatics Departent of Coputer Science MS 4A5 Cardiff University George
Online Bagging and Boosting
Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used
An Approach to Combating Free-riding in Peer-to-Peer Networks
An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008
Preference-based Search and Multi-criteria Optimization
Fro: AAAI-02 Proceedings. Copyright 2002, AAAI (www.aaai.org). All rights reserved. Preference-based Search and Multi-criteria Optiization Ulrich Junker ILOG 1681, route des Dolines F-06560 Valbonne [email protected]
Information Processing Letters
Inforation Processing Letters 111 2011) 178 183 Contents lists available at ScienceDirect Inforation Processing Letters www.elsevier.co/locate/ipl Offline file assignents for online load balancing Paul
Airline Yield Management with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN
Airline Yield Manageent with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN Integral Developent Corporation, 301 University Avenue, Suite 200, Palo Alto, California 94301 SHALER STIDHAM
How To Get A Loan From A Bank For Free
Finance 111 Finance We have to work with oney every day. While balancing your checkbook or calculating your onthly expenditures on espresso requires only arithetic, when we start saving, planning for retireent,
Equivalent Tapped Delay Line Channel Responses with Reduced Taps
Equivalent Tapped Delay Line Channel Responses with Reduced Taps Shweta Sagari, Wade Trappe, Larry Greenstein {shsagari, trappe, ljg}@winlab.rutgers.edu WINLAB, Rutgers University, North Brunswick, NJ
Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center
Markov Models and Their Use for Calculations of Iportant Traffic Paraeters of Contact Center ERIK CHROMY, JAN DIEZKA, MATEJ KAVACKY Institute of Telecounications Slovak University of Technology Bratislava
On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes
On Coputing Nearest Neighbors with Applications to Decoding of Binary Linear Codes Alexander May and Ilya Ozerov Horst Görtz Institute for IT-Security Ruhr-University Bochu, Gerany Faculty of Matheatics
6. Time (or Space) Series Analysis
ATM 55 otes: Tie Series Analysis - Section 6a Page 8 6. Tie (or Space) Series Analysis In this chapter we will consider soe coon aspects of tie series analysis including autocorrelation, statistical prediction,
RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure
RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION Henrik Kure Dina, Danish Inforatics Network In the Agricultural Sciences Royal Veterinary and Agricultural University
Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network
2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona
How To Balance Over Redundant Wireless Sensor Networks Based On Diffluent
Load balancing over redundant wireless sensor networks based on diffluent Abstract Xikui Gao Yan ai Yun Ju School of Control and Coputer Engineering North China Electric ower University 02206 China Received
Lecture L9 - Linear Impulse and Momentum. Collisions
J. Peraire, S. Widnall 16.07 Dynaics Fall 009 Version.0 Lecture L9 - Linear Ipulse and Moentu. Collisions In this lecture, we will consider the equations that result fro integrating Newton s second law,
Use of extrapolation to forecast the working capital in the mechanical engineering companies
ECONTECHMOD. AN INTERNATIONAL QUARTERLY JOURNAL 2014. Vol. 1. No. 1. 23 28 Use of extrapolation to forecast the working capital in the echanical engineering copanies A. Cherep, Y. Shvets Departent of finance
Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks
SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.
Factor Model. Arbitrage Pricing Theory. Systematic Versus Non-Systematic Risk. Intuitive Argument
Ross [1],[]) presents the aritrage pricing theory. The idea is that the structure of asset returns leads naturally to a odel of risk preia, for otherwise there would exist an opportunity for aritrage profit.
Efficient Key Management for Secure Group Communications with Bursty Behavior
Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:
An Innovate Dynamic Load Balancing Algorithm Based on Task
An Innovate Dynaic Load Balancing Algorith Based on Task Classification Hong-bin Wang,,a, Zhi-yi Fang, b, Guan-nan Qu,*,c, Xiao-dan Ren,d College of Coputer Science and Technology, Jilin University, Changchun
Position Auctions and Non-uniform Conversion Rates
Position Auctions and Non-unifor Conversion Rates Liad Blurosen Microsoft Research Mountain View, CA 944 [email protected] Jason D. Hartline Shuzhen Nong Electrical Engineering and Microsoft AdCenter
SOME APPLICATIONS OF FORECASTING Prof. Thomas B. Fomby Department of Economics Southern Methodist University May 2008
SOME APPLCATONS OF FORECASTNG Prof. Thoas B. Foby Departent of Econoics Southern Methodist University May 8 To deonstrate the usefulness of forecasting ethods this note discusses four applications of forecasting
An Optimal Task Allocation Model for System Cost Analysis in Heterogeneous Distributed Computing Systems: A Heuristic Approach
An Optial Tas Allocation Model for Syste Cost Analysis in Heterogeneous Distributed Coputing Systes: A Heuristic Approach P. K. Yadav Central Building Research Institute, Rooree- 247667, Uttarahand (INDIA)
AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES
Int. J. Appl. Math. Coput. Sci., 2014, Vol. 24, No. 1, 133 149 DOI: 10.2478/acs-2014-0011 AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES PIOTR KULCZYCKI,,
Real Time Target Tracking with Binary Sensor Networks and Parallel Computing
Real Tie Target Tracking with Binary Sensor Networks and Parallel Coputing Hong Lin, John Rushing, Sara J. Graves, Steve Tanner, and Evans Criswell Abstract A parallel real tie data fusion and target tracking
Optimal Resource-Constraint Project Scheduling with Overlapping Modes
Optial Resource-Constraint Proect Scheduling with Overlapping Modes François Berthaut Lucas Grèze Robert Pellerin Nathalie Perrier Adnène Hai February 20 CIRRELT-20-09 Bureaux de Montréal : Bureaux de
Models and Algorithms for Stochastic Online Scheduling 1
Models and Algoriths for Stochastic Online Scheduling 1 Nicole Megow Technische Universität Berlin, Institut für Matheatik, Strasse des 17. Juni 136, 10623 Berlin, Gerany. eail: [email protected]
Image restoration for a rectangular poor-pixels detector
Iage restoration for a rectangular poor-pixels detector Pengcheng Wen 1, Xiangjun Wang 1, Hong Wei 2 1 State Key Laboratory of Precision Measuring Technology and Instruents, Tianjin University, China 2
Implementation of Active Queue Management in a Combined Input and Output Queued Switch
pleentation of Active Queue Manageent in a obined nput and Output Queued Switch Bartek Wydrowski and Moshe Zukeran AR Special Research entre for Ultra-Broadband nforation Networks, EEE Departent, The University
Exercise 4 INVESTIGATION OF THE ONE-DEGREE-OF-FREEDOM SYSTEM
Eercise 4 IVESTIGATIO OF THE OE-DEGREE-OF-FREEDOM SYSTEM 1. Ai of the eercise Identification of paraeters of the euation describing a one-degree-of- freedo (1 DOF) atheatical odel of the real vibrating
arxiv:0805.1434v1 [math.pr] 9 May 2008
Degree-distribution stability of scale-free networs Zhenting Hou, Xiangxing Kong, Dinghua Shi,2, and Guanrong Chen 3 School of Matheatics, Central South University, Changsha 40083, China 2 Departent of
Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy
Vol. 9, No. 5 (2016), pp.303-312 http://dx.doi.org/10.14257/ijgdc.2016.9.5.26 Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou
An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking
International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15), pp. 197-4 http://d.doi.org/1.1457/ijfgcn.15.8.6.19 An Integrated Approach for Monitoring Service Level Paraeters
CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY
CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY Y. T. Chen Departent of Industrial and Systes Engineering Hong Kong Polytechnic University, Hong Kong [email protected]
Impact of Processing Costs on Service Chain Placement in Network Functions Virtualization
Ipact of Processing Costs on Service Chain Placeent in Network Functions Virtualization Marco Savi, Massio Tornatore, Giacoo Verticale Dipartiento di Elettronica, Inforazione e Bioingegneria, Politecnico
IN THIS PAPER, we study the delay and capacity trade-offs
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness
A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS
A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS Isaac Zafrany and Sa BenYaakov Departent of Electrical and Coputer Engineering BenGurion University of the Negev P. O. Box
Applying Multiple Neural Networks on Large Scale Data
0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree
PREDICTION OF MILKLINE FILL AND TRANSITION FROM STRATIFIED TO SLUG FLOW
PREDICTION OF MILKLINE FILL AND TRANSITION FROM STRATIFIED TO SLUG FLOW ABSTRACT: by Douglas J. Reineann, Ph.D. Assistant Professor of Agricultural Engineering and Graee A. Mein, Ph.D. Visiting Professor
Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model
Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary
A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries
Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries
CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS
641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC [email protected] Abstract Custoer relationship
Endogenous Credit-Card Acceptance in a Model of Precautionary Demand for Money
Endogenous Credit-Card Acceptance in a Model of Precautionary Deand for Money Adrian Masters University of Essex and SUNY Albany Luis Raúl Rodríguez-Reyes University of Essex March 24 Abstract A credit-card
Presentation Safety Legislation and Standards
levels in different discrete levels corresponding for each one to a probability of dangerous failure per hour: > > The table below gives the relationship between the perforance level (PL) and the Safety
Budget-optimal Crowdsourcing using Low-rank Matrix Approximations
Budget-optial Crowdsourcing using Low-rank Matrix Approxiations David R. Karger, Sewoong Oh, and Devavrat Shah Departent of EECS, Massachusetts Institute of Technology Eail: {karger, swoh, devavrat}@it.edu
Managing Complex Network Operation with Predictive Analytics
Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory
Method of supply chain optimization in E-commerce
MPRA Munich Personal RePEc Archive Method of supply chain optiization in E-coerce Petr Suchánek and Robert Bucki Silesian University - School of Business Adinistration, The College of Inforatics and Manageent
Partitioned Elias-Fano Indexes
Partitioned Elias-ano Indexes Giuseppe Ottaviano ISTI-CNR, Pisa [email protected] Rossano Venturini Dept. of Coputer Science, University of Pisa [email protected] ABSTRACT The Elias-ano
Markovian inventory policy with application to the paper industry
Coputers and Cheical Engineering 26 (2002) 1399 1413 www.elsevier.co/locate/copcheeng Markovian inventory policy with application to the paper industry K. Karen Yin a, *, Hu Liu a,1, Neil E. Johnson b,2
Energy Proportionality for Disk Storage Using Replication
Energy Proportionality for Disk Storage Using Replication Jinoh Ki and Doron Rote Lawrence Berkeley National Laboratory University of California, Berkeley, CA 94720 {jinohki,d rote}@lbl.gov Abstract Energy
2. FINDING A SOLUTION
The 7 th Balan Conference on Operational Research BACOR 5 Constanta, May 5, Roania OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS
Modeling operational risk data reported above a time-varying threshold
Modeling operational risk data reported above a tie-varying threshold Pavel V. Shevchenko CSIRO Matheatical and Inforation Sciences, Sydney, Locked bag 7, North Ryde, NSW, 670, Australia. e-ail: [email protected]
SAMPLING METHODS LEARNING OBJECTIVES
6 SAMPLING METHODS 6 Using Statistics 6-6 2 Nonprobability Sapling and Bias 6-6 Stratified Rando Sapling 6-2 6 4 Cluster Sapling 6-4 6 5 Systeatic Sapling 6-9 6 6 Nonresponse 6-2 6 7 Suary and Review of
Quality evaluation of the model-based forecasts of implied volatility index
Quality evaluation of the odel-based forecasts of iplied volatility index Katarzyna Łęczycka 1 Abstract Influence of volatility on financial arket forecasts is very high. It appears as a specific factor
Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks
Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks Jia-Qi Jin, Tracey Ho California Institute of Technology Pasadena, CA Email: {jin,tho}@caltech.edu Harish Viswanathan
Software Quality Characteristics Tested For Mobile Application Development
Thesis no: MGSE-2015-02 Software Quality Characteristics Tested For Mobile Application Developent Literature Review and Epirical Survey WALEED ANWAR Faculty of Coputing Blekinge Institute of Technology
HW 2. Q v. kt Step 1: Calculate N using one of two equivalent methods. Problem 4.2. a. To Find:
HW 2 Proble 4.2 a. To Find: Nuber of vacancies per cubic eter at a given teperature. b. Given: T 850 degrees C 1123 K Q v 1.08 ev/ato Density of Fe ( ρ ) 7.65 g/cc Fe toic weight of iron ( c. ssuptions:
ASIC Design Project Management Supported by Multi Agent Simulation
ASIC Design Project Manageent Supported by Multi Agent Siulation Jana Blaschke, Christian Sebeke, Wolfgang Rosenstiel Abstract The coplexity of Application Specific Integrated Circuits (ASICs) is continuously
Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks
Protecting Sall Keys in Authentication Protocols for Wireless Sensor Networks Kalvinder Singh Australia Developent Laboratory, IBM and School of Inforation and Counication Technology, Griffith University
Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2
Exploiting Hardware Heterogeneity within the Sae Instance Type of Aazon EC2 Zhonghong Ou, Hao Zhuang, Jukka K. Nurinen, Antti Ylä-Jääski, Pan Hui Aalto University, Finland; Deutsch Teleko Laboratories,
ADJUSTING FOR QUALITY CHANGE
ADJUSTING FOR QUALITY CHANGE 7 Introduction 7.1 The easureent of changes in the level of consuer prices is coplicated by the appearance and disappearance of new and old goods and services, as well as changes
Fuzzy Sets in HR Management
Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic [email protected] Jana Talašová Faculty of Science, Palacký Univerzity,
Chapter 5. Principles of Unsteady - State Heat Transfer
Suppleental Material for ransport Process and Separation Process Principles hapter 5 Principles of Unsteady - State Heat ransfer In this chapter, we will study cheical processes where heat transfer is
Multiple-relay selection in amplify-and-forward cooperative wireless networks with multiple source nodes
Wu et al. EURASIP Journal on Wireless Counications and Networing 202, 202:256 RESEARCH Open Access Multiple-relay selection in aplify-and-forward cooperative wireless networs with ultiple source nodes
Pricing Asian Options using Monte Carlo Methods
U.U.D.M. Project Report 9:7 Pricing Asian Options using Monte Carlo Methods Hongbin Zhang Exaensarbete i ateatik, 3 hp Handledare och exainator: Johan Tysk Juni 9 Departent of Matheatics Uppsala University
Factored Models for Probabilistic Modal Logic
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence (2008 Factored Models for Probabilistic Modal Logic Afsaneh Shirazi and Eyal Air Coputer Science Departent, University of Illinois
Calculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance
Calculating the Return on nvestent () for DMSMS Manageent Peter Sandborn CALCE, Departent of Mechanical Engineering (31) 45-3167 [email protected] www.ene.ud.edu/escml/obsolescence.ht October 28, 21
The Fundamentals of Modal Testing
The Fundaentals of Modal Testing Application Note 243-3 Η(ω) = Σ n r=1 φ φ i j / 2 2 2 2 ( ω n - ω ) + (2ξωωn) Preface Modal analysis is defined as the study of the dynaic characteristics of a echanical
Modified Latin Hypercube Sampling Monte Carlo (MLHSMC) Estimation for Average Quality Index
Analog Integrated Circuits and Signal Processing, vol. 9, no., April 999. Abstract Modified Latin Hypercube Sapling Monte Carlo (MLHSMC) Estiation for Average Quality Index Mansour Keraat and Richard Kielbasa
A quantum secret ballot. Abstract
A quantu secret ballot Shahar Dolev and Itaar Pitowsky The Edelstein Center, Levi Building, The Hebrerw University, Givat Ra, Jerusale, Israel Boaz Tair arxiv:quant-ph/060087v 8 Mar 006 Departent of Philosophy
A Study on the Chain Restaurants Dynamic Negotiation Games of the Optimization of Joint Procurement of Food Materials
International Journal of Coputer Science & Inforation Technology (IJCSIT) Vol 6, No 1, February 2014 A Study on the Chain estaurants Dynaic Negotiation aes of the Optiization of Joint Procureent of Food
Dynamic right-sizing for power-proportional data centers Extended version
1 Dynaic right-sizing for power-proportional data centers Extended version Minghong Lin, Ada Wieran, Lachlan L. H. Andrew and Eno Thereska Abstract Power consuption iposes a significant cost for data centers
Modeling Nurse Scheduling Problem Using 0-1 Goal Programming: A Case Study Of Tafo Government Hospital, Kumasi-Ghana
Modeling Nurse Scheduling Proble Using 0-1 Goal Prograing: A Case Study Of Tafo Governent Hospital, Kuasi-Ghana Wallace Agyei, Willia Obeng-Denteh, Eanuel A. Andaa Abstract: The proble of scheduling nurses
- 265 - Part C. Property and Casualty Insurance Companies
Part C. Property and Casualty Insurance Copanies This Part discusses proposals to curtail favorable tax rules for property and casualty ("P&C") insurance copanies. The syste of reserves for unpaid losses
