Energy Efficient Routing in Ad Hoc Disaster Recovery Networks

Size: px
Start display at page:

Download "Energy Efficient Routing in Ad Hoc Disaster Recovery Networks"

Transcription

1 Energy Effcent Routng n Ad Hoc Dsaster Recovery Networks Gl Zussman and Adran Segall Department of Electrcal Engneerng Technon Israel Insttute of Technology Hafa 32000, Israel {glz@tx, segall@ee}.technon.ac.l Abstract The terrorst attacks on September 11, 2001 have drawn attenton to the use of wreless technology n order to locate survvors of structural collapse. We propose to construct an ad hoc network of wreless smart badges n order to acqure nformaton from trapped survvors. We nvestgate the energy effcent routng problem that arses n such a network and show that snce smart badges have very lmted power sources and very low data rates, whch may be nadequate n an emergency stuaton, the soluton of the routng problem requres new protocols. The problem s formulated as an anycast routng problem n whch the objectve s to maxmze the tme untl the frst battery drans-out. We present teratve algorthms for obtanng the optmal soluton of the problem. Then, we derve an upper bound on the network lfetme for specfc topologes. Fnally, a polynomal algorthm for obtanng the optmal soluton n such topologes s descrbed. Keywords routng, energy effcent, energy conservng, power aware, dsaster recovery networks, ad hoc networks, smart badges, IEEE I. INTRODUCTION The terrorst attacks on the World Trade Center and the Pentagon on September 11, 2001 have drawn ever-ncreasng attenton to mprovng rescue efforts followng a dsaster. One of the technologes that can be effectvely deployed durng dsaster recovery s wreless ad hoc networkng [25]. For example, rescue forces can use a Moble Ad Hoc Network (MANET) n the lack of fxed communcaton systems. Furthermore, a wreless sensor network can be quckly deployed followng a chemcal or bologcal attack n order to dentfy areas affected by the chemcal/bologcal agents [2]. We propose another applcaton of an ad hoc network, whch can be used n order to gather nformaton from trapped survvors of structural collapse. There are varous possble reasons for structural collapse. The most frequent reasons are earthquakes, terror attacks, structural problems, and mssle attacks. Regardless of the reason, the consequences of a collapse are usually very tragc. For example, n 1995 alone, the Kobe earthquake resulted n the death of nearly 5,500 people, 168 people were klled n the Oklahoma Cty bombng, and more than 500 people were klled n the collapse of the Sampoong department store n Ths research was supported by a grant from the Mnstry of Scence, Israel. Seoul. Thus, the mportance of mprovng rescue technques requres no explanaton. There are a few technques for locatng survvors of structural collapse trapped n the rubble: fber optc scopes, senstve lstenng devces, sesmc sensors, search-and-rescue dogs, etc. [11]. Moreover, durng the rescue attempts n the World Trade Center dsaster ste, the Wreless Emergency Response Team (WERT) attempted to locate survvors through sgnals from ther moble phones [29]. We propose to extend these capabltes and to enable the locaton of survvors by acqurng nformaton from ther smart badges. Smart badges (a.k.a. RFID badges [30]) wll gan ncreased popularty n the near future and wll apparently be used n any modern offce buldng [27]. Snce the transmsson range of a badge s very short and snce rescue equpment can usually be deployed at the perphery of the dsaster scene, there s a need to construct an ad hoc network connectng vctms trapped n the debrs to the rescuers. In such a network, the nformaton acqured from the badges (such as last known locaton, body temperature, etc.) wll be repeatedly routed through other badges to wreless recevers deployed n the dsaster scene. The recevers wll forward the nformaton through wred or wreless lnks to a central unt. In the comng years, smart badges wll use a propretary technology (e.g. [28]) or the new IEEE standard for Low-Rate Wreless Personal Area Networks (LR-WPAN) [6], [17],[19]. Ether way they wll be smple devces wth very low data rates and very lmted power sources. These data rates and power sources are expected to be adequate for regular use. For example, the data rate of an IEEE devce wll be 20, 40 or 250 Kb/s [6]. A smart badge based on ths standard s expected to establsh about 20 connectons per day [27]. Thus, the average data rates are expected to be much lower than the possble data rate. Moreover, the duty cycle of such a devce s expected to be less than 1%, thereby enablng a long battery lfe. However, n an emergency network constructed after a collapse, whch may connect thousands of nodes and may route crtcal nformaton, the requred data rates and the consumed energy may be much hgher than n daly use. Thus, the low data rates and the lmted power sources are a major constrant on the performance of an emergency network. Furthermore, n

2 such a network depletng the battery of a node may have tragc results. Ths paper focuses on energy effcent routng protocols for emergency networks of badges. We note that snce wreless devces usually have a fnte power supply, there s an ncreasng nterest n research regardng energy conservng protocols (see Secton 2). Thus, our network model s based on the model for energy conservng routng n a wreless sensor network presented by Chang and Tassulas [8]. However, unlke a wreless sensor network n whch the avalable bandwdth s usually suffcent, n the emergency network there s a strct bandwdth restrcton along wth a strct energy restrcton. Hence, the soluton of the problem calls for the development of new protocols. We assume that snce the proposed network wll be composed of trapped survvors badges, the network topology and the requrements wll be rather statc. Therefore, our major nterest s n dstrbuted algorthms for quas-statc anycast routng n a statc network wth statonary requrements and unchangng topology. The objectve of the algorthms s to maxmze the tme untl the frst battery drans-out (.e. to solve a max-mn optmzaton problem). Ths objectve functon has been defned by Chang and Tassulas [8] and although t s controversal when appled to MANETs or sensor networks, t s approprate for an emergency network n whch every node s crtcal. In ths paper we formulate the problem and present teratve algorthms for obtanng ts optmal soluton. These algorthms are based on the formulaton of the problem as a concurrent max flow problem [21] and the complexty of one of them s logarthmc n the network lfetme. Then, we derve an upper bound on the network lfetme for specfc topologes that s based on the new noton of non-max capacty cut. Fnally, a polynomal algorthm for obtanng the optmal soluton n specfc topologes s descrbed. Due to space constrants, numercal results are not presented n ths paper and a few proofs are omtted. The results and the proofs can be found n [39]. The man contrbuton of ths paper s the extenson of the energy conservng routng model presented by Chang and Tassulas [8] to a network n whch some of the nodes have a very low data rate as well as a lmted battery. Another contrbuton s the dervaton of bounds on the network lfetme and the development of optmal algorthms, whch can be mplemented n a dstrbuted manner. Ths paper s organzed as follows. In Secton 2, we dscuss related work and n Secton 3, we present the model and formulate the routng problem. Algorthms for obtanng the soluton of the problem and an upper bound on the network lfetme are ntroduced n Secton 4. Secton 5 summarzes the man results and dscusses future research drectons. II. RELATED WORK In 1998, Bambos [4] revewed developments n power control n wreless networks and dentfed the need for mnmum-power routng protocols. Snce then, the ssue of energyconservaton n ad hoc and sensor networks has attracted a vast amount of research (see for example, [14],[20],[26], and references theren). Ths research deals wth all layers of the protocol stack and s mostly motvated by the fact that wreless devces usually have a very lmted power supply. In partcular, there s an ncreasng nterest n algorthms for the network layer, namely n energy effcent routng algorthms. A poneerng work regardng energy effcent routng was presented by Sngh et al. [32] who studed va smulaton the ssue of ncreasng node and network lfe by usng poweraware metrcs for routng. In [36] other power-aware metrcs are presented and ther performance s studed va smulaton. Some of the prevous work regardng energy effcent routng n moble ad-hoc networks (MANETs) focused on performance comparson of exstng ad hoc routng protocols (such as DSR, AODV, TORA, and DSDV [25]) wth respect to energy consumpton (e.g. [12]). Recently, new power-aware routng protocols for MANETs have been proposed. For example, n [15] a technque (named PARO) desgned as a power-aware enhancement for MANET routng protocols has been ntroduced. In addton, n [38] an algorthm (named GAF) that s desgned to reduce the energy consumpton n the network by turnng off unnecessary nodes and whch s ndependent of the underlyng routng protocol s ntroduced. We note that Weselther et al. have publshed numerous papers on energy-aware broadcastng and multcastng (see for example, [37] and references theren) and that ther work s closely related to the ssue of energy effcent routng. For example, Mchal and Ephremdes [23] study the problem of energy effcent routng of connecton orented traffc. Ths problem has some relatonshp to the problem studed n ths paper snce unlke other authors they take nto consderaton the fact that the nodes have fnte capacty. However, they provde heurstc algorthms whereas we attempt to develop optmal algorthms. The specal characterstcs of wreless sensor networks and energy conservng technques for such networks are descrbed n [2],[33], and n a number of papers related to the MIT s µamps project [24]. For nstance, n [18], an energy effcent routng algorthm based on clusterng s descrbed and n [5], a methodology for computng upper bounds on the lfetme of a sensor network s presented. Chang and Tassulas [7] ntroduced one of the frst models of energy conservng routng n sensor networks. They defned the energy conservng routng problem as an optmzaton problem n whch the performance objectve s to maxmze the lfetme of the network (.e. to maxmze the tme untl the frst battery drans-out). They proposed heurstc routng protocols for the soluton of the problem and evaluated ther performance by smulaton. The work of Chang and Tassulas [7] has been extended n several dfferent drectons. In [8], they have extended ther model for the case of multcommodty flow and n [9], they have proposed algorthms for obtanng an approxmate solu-

3 ton of the routng problem. Moreover, n [22], approxmate onlne algorthms for the case n whch the message sequence s not known have been proposed. The problem of fndng a flow control strategy that maxmzes the sources utltes subject to a constrant on the network lfetme has been addressed n [34]. In [10], technques to maxmze the network lfetme n the case of cluster-based networks have been devsed. A scheme for energy aware routng n a network of pconodes [28] that chooses among possble paths based on a probablstc fashon has been ntroduced n [31]. Fnally, n ths paper, we ntroduce an extenson to the model of Chang and Tassulas for the case n whch the nodes have a very lmted bandwdth as well as a lmted battery. III. FORMULATION OF THE PROBLEM A. Model and Prelmnares Consder the connected drected network graph G = (N,L). N wll denote the collecton of nodes {1,2,,n}. A node could be a badge, a recever (the collecton of recevers s denoted by R), or the central unt (referred to as the destnaton and denoted by d). Recall that recevers are deployed at the perphery of the dsaster scene (ther role s to connect the badges network to the central unt). The collecton of the drectonal lnks wll be denoted by L. We assume that snce smart badges are ntended to be very smple and cheap devces they wll usually transmt at a constant power level. Thus, a unt j that s wthn the transmsson range of node s connected to by a drectonal lnk, denoted by (,j). For each node, Z() wll denote the collecton of ts neghborng nodes (nodes connected to node by a drectonal lnk). Let F j be the average flow on lnk (,j) (F j 0 (,j) L). We defne f j as the rato between F j and the maxmal possble flow on a lnk connectng smart badges 1 (0 f j 1). In the sequel, f j wll be referred to as the flow on lnk (,j). The rato between the rate n whch nformaton s generated at badge node and the maxmal possble flow on a lnk connectng smart badges, s denoted by r (0 r < 1). The transmsson energy requred by node to transmt an nformaton unt s denoted by e. Let each node have an ntal energy level E (we assume that E > 0 N). If a node s a recever or the destnaton, ts energy source s much larger than the energy source of a badge, and therefore, for such a node E =. For low-power devces operatng n the 2.4 GHz ISM band, the transmtter and recever currents are often smlar [17]. Thus, we assume that energy s consumed only when a node transmts nformaton (alternatvely, the energy consumed when t receves nformaton can be ncluded n e ). Moreover, snce the energy requred n order to receve a message s not neglgble, we assume that although a few nodes 1 For example, n IEEE the maxmal data rate (.e. the maxmal possble flow) s 20, 40 or 250Kb/s. are able to receve the same message, only the node to whch t s ntended wll receve the full message and forward t. The other nodes wll be n sleep mode or communcate wth ther other neghbors. We assume that the requrements (r ) are gven. The objectve of our energy effcent routng protocols s to obtan lnk flows (f j ) such that the tme untl the frst battery drans-out wll be maxmzed. Thus, followng the formulaton of [8] and usng the above assumptons, we defne the lfetme of a node and of the network as follows. Defnton 1: (Chang and Tassulas [8]) The lfetme of node under a gven flow s denoted by T and s gven by: E T = e f. (1) j j Z() Defnton 2: (Chang and Tassulas [8]): The lfetme of the network under a gven flow s the tme untl the frst battery drans-out, namely the mnmum lfetme over all nodes. It s denoted by T and s gven by: E T = mnt = mn N N e f. (2) j j Z() B. Problem Formulaton Badges wll generate nformaton that wll be routed through any of the recevers to the destnaton. Thus, the resultng problem s an anycast routng problem. Accordngly, the energy effcent routng problem can be formulated as follows. Problem EER: Gven: Topology and requrements (r ) Objectve: Maxmze the network lfetme: E maxt = max mn N e f (3) j j Z() Subject to: fj 0 (, j) L (4) f + r = f N { R, d} (5) k j k Z() j Z() f = f R (6) f + fj 1 N { R, d} (7) k j k Z() j Z() k k Z() j Z() Constrants (4) - (6) are the usual flow conservaton constrants. The meanng of (7) s that the total flow through a node cannot exceed the maxmal badge node capacty (.e. the maxmal data rate of a badge). C. Numercal Example Fg. 1 llustrates a smple network composed of fve badges, two recevers, and a sngle destnaton. In the optmal

4 r = E = 5 f = 0.35 r = 0.3 E = 5 f = f = r = 0.4 E = 10 f = 0.65 f = 0 f = 0.15 r = 0.4 E = 10 f = 0.7 Fgure 1. The requred transmsson rates (r ), the ntal energy values (E ), and the optmal flows (f j) n a network of badges (assumng that e = 1 ) soluton, the network lfetme s 7.69 tme unts (the batteres of nodes 1,2, and 4 are depleted after 7.69 tme unts). It can be seen that node 5, whose battery has remanng power at tme 7.69, utlzes ts full capacty throughout the operaton of the network. IV. ALGORITHMS AND BOUNDS In ths secton, we present an equvalent formulaton of Problem EER. Ths formulaton s requred n order to develop dstrbuted algorthms. Then, teratve algorthms for obtanng the optmal soluton of the problem are descrbed. We also derve an upper bound on the network lfetme for specfc topologes. Fnally, we descrbe a polynomal algorthm for obtanng the optmal soluton n these topologes. A. Lnear Programmng Formulaton The frst step towards obtanng a soluton to Problem EER s convertng t to a lnear programmng problem (Problem EER-LP). Followng the approach n [8], we frst defne f as j the amount of nformaton transmtted from node to node j untl tme T ( f j = f j T ). Then, we formulate Problem EER- LP as follows. Problem EER-LP: Gven: Topology and requrements (r ) Objectve: Maxmze the network lfetme: maxt (8) Subject to: fj 0 (, j) L (9) f + r T = f N { R, d} (10) k j k Z() j Z() f = f R (11) k j k Z() j Z() e f E N { R, d} (12) j j Z() f + fj T N { R, d} (13) k k Z() j Z() f = 0.33 r = 0.5 E = 5 f = 0.32 f = 0.98 f = 1.02 Badge Recever Destnaton Problem EER-LP s a lnear programmng problem, and therefore, t can be solved by well-known algorthms (e.g. Smplex [1, p. 810]). However, these algorthms cannot be easly modfed n order to allow dstrbuted mplementaton, whch s requred n an ad hoc network. Thus, analyzng the characterstcs of the problem s requred n order to develop dstrbuted algorthms. If the last set of constrants (13) s gnored, Problem EER- LP becomes a concurrent max-flow problem wth constrants on the flows at the nodes. A concurrent max-flow problem s a multcommodty flow problem n whch a demand s assocated wth each commodty and the objectve s to maxmze a common fracton of each demand wthout exceedng the capacty constrants [3],[16],[21]. Accordngly, we defne Problem CMF as follows (T s the common fracton of each demand). Problem CMF (Concurrent Max Flow): Gven: Topology and requrements (r ) Objectve: max T (as n (8)) Subject to: Flow conservaton constrants (such as (9)-(11)) Capacty constrants (such as (12)) In the sequel we shall defne dfferent nstances of Problem CMF by alterng ether the flow conservaton constrants or the capacty constrants. Addng (13) to Problem CMF means that T has to be maxmzed subject to the addtonal constrant that the flow through a node cannot exceed some percentage of the flow n the network. Recall that (13) results from the fact that the data rate of a badge mght be lower than the requred bandwdth n an emergency stuaton. In the followng subsectons, we shall dscuss two dfferent methods for dealng wth the complextes mposed by (13). B. Iteratve Algorthms An algorthm for obtanng the optmal soluton of Problem EER-LP can be based on repeated solutons of dfferent nstances of Problem CMF. Followng the soluton of an nstance of Problem CMF, the node capactes, whch depend both on the energy (12) and the value of the network lfetme (13), have to be recomputed accordng to the obtaned lfetme (T). Then, another nstance of Problem CMF (wth the new capactes) has to be solved. Ths process should be repeated untl the optmal soluton to Problem EER-LP s obtaned. In ths secton, we descrbe an algorthm (referred to as the Iteratve Algorthm) based on the above methodology. Then, we present an mproved verson of the algorthm whch utlzes bnary search (we shall refer to t as the Bnary Iteratve Algorthm). We note that both algorthms obtan an optmal soluton to Problem EER and that the complexty of the Bnary Iteratve Algorthm s logarthmc n the network lfetme. Snce there s a sngle destnaton node, an nstance of Problem CMF can be solved by usng bnary search wth a max flow algorthm (e.g. the preflow-push algorthm [13]). 1 1 Problem CMF can also be solved by usng bnary search wth a verson of the approxmate algorthm presented n [3].

5 Specfcally, f for a gven set of demands (.e. for a gven T) there exsts a feasble flow (e.g. flow satsfyng (8)-(12)), t can be found by a max flow algorthm. Thus, n order to check the feasblty of a gven T as a soluton to an nstance Problem CMF, the network graph should be converted such that every badge node s connected to a super orgn by a lnk whose capacty s r T. The max flow algorthm should be used n order to maxmze the flow from the super orgn to the destnaton. If n the obtaned soluton the flow outgong from the super orgn s rt, (14) N { R, d} then T s feasble. Accordngly, we defne the process of bnary search for the soluton of Problem CMF as follows. Defnton 3: Algorthm BMF (Bnary Max Flow) A bnary search algorthm for the soluton of Problem CMF (.e. for obtanng T). At each teraton of the bnary search (.e. for a gven T), a max flow algorthm s executed. It s executed n a network wth a super orgn node whch s connected to every badge node by a lnk whose capacty s r T. Snce the complexty of a max flow algorthm s O(n 3 ) [1, p.240],[13], the number of steps requred to fnd a soluton to Problem CMF by Algorthm BMF s 3 ( log max ) O n T, (15) where T max s the maxmal possble value of network lfetme (T). It can be shown that for a network of badges and the resultng Problem CMF, the value of T max s bounded by n tmes the maxmal lfetme of a sngle node (recall that n s the number of nodes). Consequently, assumng that the requred tolerance of the soluton s n seconds and that regardless of the traffc, the lfetme of a battery s bounded by about 10 years, O(log T max ) s actually O(log n). As mentoned before, the soluton of Problem EER-LP can be based on solutons of dfferent nstances of Problem CMF. Problem EER-LP ncludes constrants on the node flows. Thus, n order to enable the executon a max flow algorthm (requred for the soluton of Problem CMF), the network graph should be converted as descrbed n the followng. Snce the capactes mposed by (12) and (13) are node capactes, each badge node should be dvded nto two subnodes ( and o ) connected by an nternal lnk. If node generates nformaton, we assume t s generated at. Accordngly, for a gven T, the capacty of the nternal lnk (, o ) s defned as: E T(1 + r) c = mn, N { R, d} o. (16) e 2 Followng the dvson of the nodes, every drectonal lnk (,j) connectng badge nodes should be replaced by a drectonal lnk ( o,j ). The capactes of all these lnks should be set to. Notce that drectonal lnks connectng a badge node to recever node j should be replaced by a drectonal lnk ( o,j) wth nfnte capacty. In the frst teraton of the Iteratve Algorthm, the value of T at all the nternal lnks should be set to. A soluton to the resultng Problem CMF n the converted network should be obtaned by Algorthm BMF. 1 We shall denote the value of T obtaned at ths stage by T 1. Then, the nternal lnk capactes should be updated accordng to (16) and the value of T 1. A soluton to the resultng Problem CMF n the converted network should be obtaned by Algorthm BMF. Ths process s repeated untl the flow values computed by Algorthm BMF satsfy all the nternal lnk capactes (16) computed accordng to the obtaned T. The complexty of the Iteratve Algorthm s not necessarly polynomal n the number of nodes or lnks. Specfcally, the number of executons of Algorthm BMF, whose complexty s gven n (15), s not necessarly polynomal n the number of nodes or lnks. A straghtforward mprovement s the use of bnary search n order to obtan the value of the optmal T. Namely, after obtanng T 1, a max flow algorthm should be used n order to check whether the lfetme of T 1 /2 s feasble when the nternal lnk capactes are computed accordng to (16) and T = T 1 /2. If t s, the feasblty of 3T 1 /4 should be checked n a smlar manner. Otherwse, the feasblty of T 1 /4 should be checked. The algorthm termnates when the dfference between the feasble and non-feasble T s wthn the requred tolerance. We refer to the algorthm based on the above methodology as the Bnary Iteratve Algorthm and descrbe t n Fg. 2. Recall that checkng the feasblty of a gven network lfetme requres O(n 3 ) steps. Thus, the complexty of ths algorthm s gven by (15). 1 transform the node-capactated network to a lnk capactated network 2 set c = E / e N { R, d} o T 1 = T max (.e. n max lfetme of a battery) 3 execute bnary search untl feasble T 1 non-feasble T 1 < tolerance 4 check feasbly of T 1 (by a max flow algorthm) 5 update T 1 (accordng to the bnary search) 6 set ( ) c = mn E / e, T (1 + r) / 2 N { R, d} o 1 T = T 1 7 execute bnary search untl feasble T non-feasble T < tolerance 8 check feasbly of T (by a max flow algorthm) 9 update T (accordng to the bnary search) c = mn E / e, T(1 + r) / 2 N { R, d} 10 set ( ) o 11 obtan the flow values ( f (, j) L) 12 set f = f / T (, j) L j j Fgure 2. The Bnary Iteratve Algorthm for obtanng the optmal soluton of Problem EER 1 Notce that snce T s set to n (16), Problem CMF s equvalent to the problem defned by (8)-(12). j

6 Although max flow algorthms (as the preflow-push algorthm) can be used n envronments where decsons have to be made locally, the dstrbuted mplementaton of the Bnary Iteratve Algorthm, descrbed n Fg. 2, requres some coordnaton mechansm. Ths mechansm s requred snce the nodes should be aware of the bnary search and the value of T, whch determnes the nternal lnk capactes (see steps 6 and 10 n Fg. 2). The defnton of the exact procedure n whch a dstrbuted teratve algorthm has to be executed s subject for further research. C. Upper Bound on the Network Lfetme In ths secton, we derve an upper bound on the network lfetme. It s based on a few observatons regardng the relatonshp between the optmal network lfetme and the capactes of dfferent cuts n the network. The bound can be computed usng a max flow algorthm (e.g. the preflow-push algorthm [13]). In the next secton, we shall show that n a network wth a sngle orgn node, the bound s equal to the optmal soluton and outlne an O(n 4 ) algorthm for obtanng the optmal soluton. In ths secton, we focus on the case n whch only a subset of the badges generates nformaton (we shall refer to these badges as the orgn nodes and denote the collecton of orgn nodes by A). Moreover, we assume that these nodes do not forward nformaton generated by other nodes. 1 The resultng network graph s descrbed n Fg. 3. In the future, we ntend to extend the bound for the case n whch all the badges may generate nformaton and forward nformaton of other badges. Moreover, we conjecture that the bound s tght when there s more than a sngle orgn node. We shall now redefne the transformaton of a nodecapactated network to a lnk-capactated network and restate well-known defntons of a cut and related notons [1, p. 177]. In order to ncorporate node capactes, the network graph s transformed n a smlar manner to the transformaton descrbed n the prevous secton. However, there are two major Orgn nodes (A) Badges Recevers (R) Destnaton (d) Fgure 3. A network graph n whch nformaton s generated only by orgn nodes. These nodes are not able to forward nformaton generated by other nodes 1 We note that n [35], a smlar network topology s studed n the context of routng and schedulng n packet rado networks. dfferences. Frst, n some cases, whch wll be descrbed below, there s no need to separate orgn nodes nto subnodes. Second, the nternal lnk capactes do not take nto account the value of T. Accordngly, we defne the nternal lnk capactes of badges that are not orgns as: E c = N { A, R, d}. (17) o e Smlarly, n case orgn nodes have to be dvded nto subnodes, ther nternal lnk capactes are defned as: E =. (18) c A o e Notce that accordng to the context, n the rest of ths secton, N, whch orgnally denotes the collecton of nodes, sometmes denotes all the subnodes ( and o ). Defnton 4: A cut s dentfed by a par [O,D] of complementary subsets of nodes ( D = N O). The capacty of the cut [O,D] s denoted by C[O,D] and s the sum of the capactes of all the lnks whch are drected from O to D. The set of lnks drected from O to D are denoted by (O,D). We shall now defne the new noton of non-max capacty of a cut, whch s requred n order to determne the upper bound on the network lfetme. Defnton 5: The non-max capacty of the cut [O,D] s the sum of the capactes of the lnks drected from O to D not ncludng the lnk wth the hghest capacty. It s denoted by Y[O,D] and t s gven by: YOD [, ] = COD [, ] max ( c). (19) (, j) ( O, D) The next proposton provdes an upper bound on the optmal lfetme of the network (T ). Proposton 1: If there exsts O N n the transformed network wth the lnk capactes determned by (17) that satsfes: d O (20) r > 0.5 (21) then: O (, j) ( O, D) s an nternal lnk, (22) T mn O N: O satsfes (20)-(22) j 2 YOD [, ]. (23) 2 r 1 O The proof appears n the appendx. The network lfetme s also bounded by the soluton of Problem CMF n the transformed network wth the lnk capactes determned by (17) and (18). It s well known [21] that ths soluton s bounded by the sparsest cut (a.k.a. mn cut), whch shall be denoted by C: COD [, ] C = mn O N: d O r. (24) O

7 We note that n a network wth multple orgns and a sngle destnaton, the soluton to Problem CMF s equal to the sparsest cut (24) [16]. Notce also that the value of C s computed accordng to the transformed network determned by (17) and (18), whereas the bound descrbed n Proposton 1 s computed accordng to the transformed network determned only by (17). The next theorem combnes the results of Proposton 1 and (24). The proof can be found n [39]. It s mostly based on Proposton 1 and Lemma 2 whch appears n the appendx. Theorem 1: = C r 0.5 N T 2 YOD [, ] C r O N: O satsfes 2 r 1 (20)-(22) N O mn mn, > 0.5 (25) As mentoned before, the value of C s the soluton to Problem CMF, and therefore, t can be computed by Algorthm BMF, defned n Defnton 3. We shall now show that n addton, the computaton of the bound on T, descrbed n Theorem 1, requres several teratons of a max flow algorthm. Furthermore, Corollary 1 wll show that n a network wth a sngle orgn node, the optmal network lfetme (T ) can be computed by O(n) teratons of a max flow algorthm. Consder a subgroup of orgn nodes (denoted wthout loss of generalty by { 1,, k }) such that { 1,, k } A and r > 0.5. (26) { 1, K, k } For such a group there may be a few possble cuts [O,D] such that { 1,, k } O and {d,a { 1,, k }} D. Snce the sum of r s equal for all these cuts, obtanng the bound descrbed n Proposton 1 (23), s equvalent to obtanng Y {, K, } = mn Y[ O, D] (27) mn 1 k O N: O satsfes (22) { 1, K, k} O,{ d, A { 1, K, k}} D for every subgroup { 1,, k }. Namely, for every subgroup of orgn nodes satsfyng (26), the mnmum of the non-max capactes of the cuts that separate { 1,, k } and {d,a { 1,, k }}, and whch are composed of nternal lnks should be computed. We shall now defne the noton of an nternal-zero Graph, whch s requred n order to compute Y mn { 1,, k } (27). Defnton 6: The nternal-zero Graph G ( N {A,R,d}) s dentcal to the Graph G except that the capacty c of the nternal lnk ( o, o ) s taken to be 0. Accordng to the followng proposton, Y mn { 1,, k } s equal to the mnmum of the values of mnmal capacty of an [O,D] cut (mn C[O,D]) separatng { 1,, k } and {d,a { 1,, k }} n O(n) dfferent nternal-zero Graphs (G ). The proof of the proposton s by contradcton and t can be found n [39]. Proposton 2: Ymn{, 1 K, k } = mn mn C[ O, D] (28) G: N { A, R, d} O N:{ 1, K, k} O, { d, A { 1, K, k }} D Consequently, for every subgroup { 1,, k } A satsfyng (26), there s a need to obtan the capacty of the mnmum cut n O(n) dfferent graphs 1. Accordng to the Max-Flow Mn- Cut Theorem [1, p. 185], for each of the O(n) graphs the soluton of a max flow problem s equal to the mn cut. The max flow problem should be solved when the subgroup of orgn nodes s connected to a super orgn and the objectve s to maxmze the flow from super orgn to the destnaton. To conclude, the bound defned n Theorem 1 can be computed by Algorthm BMF and by O(n) executons of a max flow algorthm (e.g. the preflow-push algorthm) for every subgroup of orgn nodes satsfyng (26). Although the complexty of a max flow algorthm s O(n 3 ) [1, p.240],[13], the computaton of the bound becomes mpractcal for very large sets of orgns. However, n the next secton we use the methodology descrbed above for developng an O(n 4 ) optmal algorthm for a network wth a sngle orgn node. D. Non-max Capacty Algorthm We have mentoned that the complexty of the Bnary Iteratve Algorthm, descrbed n Secton 4-B, s not necessarly polynomal n the number of nodes or lnks. Thus, we have developed an optmal energy effcent routng algorthm wth polynomal complexty. The algorthm s based on the upper bound derved n Theorem 1 and on the noton of non-max capacty, defned n Defnton 5. Therefore, t s referred to as the Non-max Capacty Algorthm. In the followng theorem we shall show that n a network wth a sngle orgn node (.e. only a sngle badge generates nformaton), the upper bound descrbed n Theorem 1 s equal to the optmal soluton. Ths observaton wll be used n order to develop an O(n 4 ) algorthm for obtanng the optmal flow values. We emphasze that a complexty of O(n 4 ) s usually much lower than the complexty of executng a lnear programmng algorthm, such as the Smplex. Theorem 2: If { N, r 0} = 1, the optmal network lfetme (T ) s equal to the upper bound defned n (25). The proof appears n the appendx. Accordngly, t s obvous that f r 0.5 (where s the orgn node), the optmal soluton to Problem EER-LP s the sparsest cut (C defned n (24)). Snce there s only a sngle orgn, the value of C can be obtaned by a max flow algorthm. Thus, n ths case the Non-max Capacty Algorthm reduces to a sngle executon of the max flow algorthm n the transformed network wth the lnk capactes determned by (17) and (18). On the other hand, f r > 0.5, the Non-max Capacty Algorthm conssts of O(n) executons of the max flow algorthm n 1 The graphs are actually the same. The only dfference s n the lnk capactes.

8 order to obtan the optmal soluton to Problem EER-LP. Accordng to Theorems 1 and 2, obtanng the optmal lfetme (T ) requres computng the values of the sparsest cut (C) and the value of Y mn {} (defned n (27)). We have already mentoned that the value of C can be obtaned usng a max flow algorthm. Moreover, accordng to Proposton 2, Y mn {} can be obtaned by O(n) executons of a max flow algorthm n the transformed network wth the lnk capactes determned by (17). In each of these executons, c = 0 for a dfferent nternal lnk of a badge node. o Once the optmal network lfetme (T ) s obtaned, the nternal capactes of the nodes should be updated: E T c = mn, N { A, R, d} o (29) e 2 E = (30) c A o e Then, a max flow algorthm should be executed n the resultng transformed network n order to derve the flow values ( f j ). In the course of the proof of Theorem 2, we have shown that the flow values derved n ths procedure yeld the optmal network lfetme (T ). The optmal flow values ( f j ), correspondng to the orgnal problem (Problem EER), can be easly derved from the values of f j. The Non-max Capacty Algorthm, whch s based on the above methodology, s descrbed n Fg. 4. It can be seen that t requres O(n) executons of a max flow algorthm. Hence, the followng corollary results from the fact that the complexty of a max flow algorthm s O(n 3 ). Corollary 1: If { N, r 0} = 1, the value of the network lfetme can be computed by an O(n 4 ) algorthm. The Non-max Capacty Algorthm requres O(n) executons of a max flow algorthm such as the preflow-push algorthm [13]. As descrbed n steps 6-9 n Fg. 4, most of these executons can be performed n parallel. After the value of T s obtaned, there s a need to execute a max flow algorthm once more (step 11 n Fg. 4). Snce the preflow-push algorthm can be executed n a dstrbuted manner and snce the Non-max Capacty Algorthm requres runnng O(n) nstances of the preflow-push algorthm n parallel, the Non-max Capacty Algorthm can be mplemented as a dstrbuted algorthm. Fnally, we note that the scalablty of the Non-max Capacty Algorthm to a network wth multple orgn nodes requres further research. V. CONCLUSIONS AND FUTURE RESEARCH We have proposed to enable the formaton of a network composed of smart badges n order to acqure nformaton from survvors of structural collapse. The two man aspects that affect the performance of such a network are the lmted batteres of the badges and ther very low data rates (relatvely to the requrements n a dsaster scene). 1 transform the node-capactated network to a lnk capactated network 2 set c = E / e N { R, d} o 3 obtan the max flow values ( f (, j) L) 4 f r k > 0.5 k A (k s the orgn node) 5 set T = f / r k kko k 6 l N {A,R,d} 7 set c = 0 ll o 8 obtan the max flow value ( f kk ) o 9 set T = 2 f /( 2r 1) 10 set T kko k cll = E / o l el = mn T N { R, d} ( ) c = mn E / e, T / 2 N { A, R, d} o c = E / e kk o k k 11 obtan the max flow values ( f (, j) L) 12 set f = f r / f (, j) L j j k kko Fgure 4. The Non-max Capacty Algorthm for obtanng the optmal soluton of Problem EER n a network wth a sngle orgn node Accordngly, an energy effcent routng problem n such a network has been formulated as an anycast routng problem. The problem has been formulated such that the objectve functon s to maxmze the tme untl the frst battery drans-out and the flow through the badges s bounded by ther data rates. We have presented teratve algorthms for obtanng the optmal soluton of the problem. These algorthms are based on the formulaton of the problem as a concurrent max flow problem and the complexty of one of them s logarthmc n the network lfetme. Then, we have derved an upper bound on the network lfetme for specfc topologes. The bound s based on the new noton of non-max capacty of a cut and s the bass for optmal algorthms. Fnally, an O(n 4 ) dstrbuted algorthm for obtanng the optmal soluton n a network wth a sngle orgn node has been descrbed. Several numercal examples can be found n [39]. The work presented here s the frst approach towards an analyss of the routng problem n an emergency network of smart badges. Hence, there are stll many open problems to deal wth. For example, we would lke to nvestgate the tghtness of the upper bound, derved n ths paper, and to evaluate the scalablty of the Non-max Capacty Algorthm to networks wth several orgn nodes. We also wsh to utlze methods developed for fractonal packng problems n order to develop fast approxmate algorthms. In addton, future study wll focus on the dstrbuted mplementaton of the proposed algorthms. For nstance, we wsh to study how much energy and how many messages are requred n order to obtan the optmal soluton. Fnally, we note that despte the theoretcal mportance of the optmal algorthms and bounds, n an emergency stuaton j j

9 there s a need for low complexty heurstc algorthms. Thus, a major future research drecton s the development of approxmate and heurstc algorthms that wll deal wth the specal characterstcs of a smart badges network operated n a dsaster ste. ACKNOWLEDGMENT We would lke to thank Dr. Oktay Gunluk for nsghtful comments. We would lke to thank the anonymous revewers for ther helpful comments. APPENDIX In ths appendx, we outlne the proofs of some of the results presented n the paper. The full detals appear n [39]. The followng lemma s requred for the proof of Proposton 1. Lemma 1: Assume that there exsts a feasble flow n the network (.e. a flow f satsfyng (9)-(13)). Every cut [O,D] n j the transformed network (wth the lnk capactes determned by (17)) that satsfes (20)-(22) must nclude at least 2 nternal lnks. Proof: Accordng to the Max-Flow Mn-Cut Theorem [1, p. 185], the flow through the cut [O,D] s at least T r. (31) O Thus, accordng to (21), the flow through the cut s bgger than T/2. Assume that the cut ncludes only a sngle nternal lnk (, o ). Then, n the orgnal network: fk + fj > T. (32) k Z() j Z() Equaton (32) does not satsfy (13) and contradcts the assumpton that there exsts a feasble flow n the network. Proof of Proposton 1: We assume that there exsts a feasble flow n the network and consder the transformed network (wth the lnk capactes determned by (17)). Accordng to Lemma 1, every cut [O,D] satsfyng (20)-(22) ncludes at least 2 nternal lnks. For a cut [O,D], the flow through the lnk wth the hghest capacty cannot exceed T/2. Namely: f mm o r T = 2 2 O A k Z() O f k (33) where (m,m o ) s the nternal lnk wth the maxmum capacty n the cut. Thus, the flow through the rest of the lnks n the cut satsfes: 2 ( 1) k 2 1 ( ) r f r T O O A k Z() O fll = o ( l, lo) ( O, D), r ( l, lo) ( m, mo) O 2 2 (34) Hence, (23) results from the fact that the non-max capacty of a cut s at least the flow through the lnks composng the cut, not ncludng the flow through the lnk wth the hghest capacty. Namely for every cut [O,D]: 1. YOD [, ] fll (35) o ( l, lo) ( O, D), ( l, lo) ( m, mo) The followng lemma s requred for the proof of Theorem Lemma 2: T = C (C defned n (24)), f r 0.5. (36) N Proof: Assumng that the flow s loop free, f (36) holds, the maxmal possble flow through an nternal lnk cannot exceed T. Thus, (13) becomes redundant and Problem EER- LP reduces to Problem CMF, whose optmal soluton s C. The proof of Theorem 2 s based on the followng lemma. Provng the lemma requres consderng varous cases regardng the capactes of cuts composed of nternal lnks. In partcular, the relatonshps between the capacty of the hghest capacty lnk n a cut and the capactes of the rest of the lnks as well as the capactes of other cuts are consdered. The proofs are omtted and can be found n [39]. Lemma 3: If { N, r 0} = 1, (36) does not hold, and 2 YOD [, ] C < mn, (37) O N: O satsfes2 r 1 (20)-(22) O then T = C. Lemma 4: If { N, r 0} = 1, (36) does not hold, and (37) does not hold, then: 2 YOD [, ] T = mn. (38) O N: O satsfes 2 r 1 (20)-(22) O Proof of Theorem 2: If (36) holds the theorem s derved from Lemma 2. Consder the case that (36) does not holds and there s a drect lnk from the orgn to a recever. The orgn can transmt drectly to the recever and (13) becomes redundant. Thus, Problem EER-LP reduces to Problem CMF, whose optmal soluton s C. Notce that n ths case the value defned n (38) does not exst snce there s no cut [O,D] that satsfes (20)-(22). If (36) does not hold and there s no drect lnk from the orgn to a recever, T s derved from the results of lemmas 3 and 4. REFERENCES [1] R. K. Ahuja, T. L. Magnant, and J. B. Orln, Network Flows, Prentce Hall, [2] I. F. Akyldz, W. Su, Y. Sankarasubramanam, and E. Cayrc, Wreless Sensor Networks: a Survey, Computer Networks, Vol. 38, pp , Mar

10 [3] B. Awerbuch and T. Leghton, Improved Approxmaton Algorthms for the Mult-Commodty Flow Problem and Local Compettve Routng n Dynamc Networks, Proc. ACM STOC 94, May [4] N. Bambos, Toward Power-Senstve Network Archtectures n Wreless Communcatons: Concepts, Issues, and Desgn Aspects, IEEE Personal Comm., Vol. 5, pp , June [5] M. Bhardwaj, T. Garnett, and A. P. Chandrakasan, Upper Bounds on the Lfetme of Sensor Networks, Proc. ICC 01, June [6] E. Callaway, P. Gorday, L. Hester, J. A. Guterrez, M. Naeve, B. Hele, and V. Bahl, Home Networkng wth IEEE : A Developng Standard for Low-Rate Wreless Personal Area Networks, IEEE Comm., Vol. 40, pp , Aug [7] J. H. Chang and L. Tassulas, Routng for Maxmum System Lfetme n Wreless Ad-hoc Networks, Proc. 37th Annual Allerton Conf. on Comm., Control, and Comp., Sep [8] J. H. Chang and L. Tassulas, Energy Conservng Routng n Wreless Ad-hoc Networks, Proc. IEEE INFOCOM 00, Mar [9] J. H. Chang and L. Tassulas, Fast Approxmate Algorthms for Maxmum Lfetme Routng n Wreless Ad-hoc Networks, Proc. IFIP-TC6 Networkng 2000, LNCS, Vol. 1815, Sprnger, May [10] C. F. Chassern, I. Chlamtac, P. Mont, and A. Nucc, Energy Effcent Desgn of Wreless Ad Hoc Networks, Proc. IFIP-TC6 Networkng 2002, LNCS, Vol. 2345, Sprnger, May [11] Federal Emergency Management Agency (FEMA) - The Natonal Urban Search and Rescue Response System, Documentaton avalable at URL Dec [12] L. M. Feeney, An Energy Consumpton Model for Performance Analyss of Routng Protocols for Moble Ad Hoc Networks, Moble Networks and Applcatons, Vol. 6, pp , June [13] A. V. Goldberg and R. E. Tarjan, A New Approach to the Maxmum Flow Problem, J. of the ACM, Vol. 35, pp , Oct [14] A. Goldsmth and S. B. Wcker (eds.), Specal Issue: Energy-Aware Ad Hoc Wreless Networks, IEEE Wreless comm., Vol. 9, Aug [15] J. Gomez, A.T. Campbell, M. Naghshneh, and C. Bsdkan, Conservng Transmsson Power n Wreless Ad Hoc Networks, Proc. ICNP 01, Nov [16] O. Gunluk, A New Mn-cut Max-flow Rato for Multcommodty Flows, Proc. IPCO 2002, LNCS, Vol. 2337, Sprnger, May [17] J. A. Guterrez, M. Naeve, E. Callaway, M. Bourgeos, V. Mtter, and B. Hele, IEEE : A Developng Standard for Low-Power Low- Cost Wreless Personal Area Networks, IEEE Network, Vol. 15, pp , Sep./Oct [18] W. R. Henzelman, A. Chandrakasan, and H. Balakrshnan, Energy- Effcent Communcaton Protocol for Wreless Mcrosensor Networks, Proc. HICSS-33, Jan [19] IEEE Standard, Documentaton avalable at URL Dec [20] C. E. Jones, K. M. Svalngam, P. Agrawal, and J. C. Chen, A Survey of Energy Effcent Network Protocols for Wreless Networks, Wreless Networks, Vol. 7, pp , July [21] T. Leghton and S. Rao, Multcommodty Max-Flow Mn-Cut Theorems and Ther Use n Desgnng Approxmaton Algorthms, J. of the ACM, Vol. 46, pp , Nov [22] Q. L, J. Aslam, and D. Rus, Onlne Power-aware Routng n Ad-hoc Networks, Proc. ACM MOBICOM 01, July [23] A. Mchal and A. Ephremdes, Energy Effcent Routng for Connecton-Orented Traffc n Ad-Hoc Wreless Networks, Proc. IEEE PIMRC 00, Sep [24] The MIT µamps Project, Documentaton avalable at URL Dec [25] C. E. Perkns, Ad Hoc Networkng, Addson-Wesley, [26] C. Petrol, R. R. Rao, and J. Red (eds.), Specal Issue: Energy Conservng Protocols, Moble Networks and Applcatons, Vol. 6, June [27] D. Pokrajac, Smart Badge Usage Model, doc. no. IEEE /039r0, Submtted Jan [28] J. M. Rabaey, M. J. Ammer, J. L. daslva Jr., D. Patel, and S. Roundy, PcoRado Supprorts AD Hoc Ultra-Low Power Wreless Networkng, IEEE Computer, Vol. 33, pp , July [29] K. F. Rauscher, Wreless Emergency Response Team Fnal Report for the Sep NYC WTC Terrorst Attack, Oct [30] The RFID page (AIM-AIDC), Documentaton avalable at URL Dec [31] R. C. Shah and J. M. Rabaey, Energy Aware routng for Low Energy Ad Hoc Sensor Networks, Proc. IEEE WCNC 02, Mar [32] S. Sngh, M. Woo, and C.S. Raghavendra, Power-Aware Routng n Moble Ad Hoc Networks, Proc. ACM/IEEE MOBICOM 98, Oct [33] K. Sohrab, J. Gao, V. Alawadh, and G. J. Potte, Protocols for Self- Organzaton of a Wreless Sensor Network, IEEE Personal Comm., Vol. 7, pp , Oct [34] V. Srnvasan, C. F. Chassern, P. Nuggehall, and R. Rao, Optmal Rate Allocaton and Traffc Splts for Energy Effcent Routng n Ad Hoc Networks, Proc. IEEE INFOCOM 02, June [35] L. Tassulas and A. Ephremdes, Jontly Optmal Routng and Schedulng n Packet Rado Networks, IEEE Tran. on Informaton Theory, Vol. 38, pp , Jan [36] C. K. Toh, Maxmum Battery Lfe Routng to Support Ubqutous Moble Computng n Wreless Ad Hoc Networks, IEEE Comm., Vol. 39, pp , June [37] J. E. Weselther, G. D. Nguyen, and A. Ephremdes, Resource Management n Energy-Lmted, Bandwdth-Lmted, Transcever-Lmted Wreless Networks for Sesson-Based Multcastng, Computer Networks, Vol. 39, pp , June [38] Y. Xu, J. Hedemann, and D. Estrn, Geography-nformed Energy Conservaton for Ad-hoc Routng, Proc. ACM MOBICOM 01, July [39] G. Zussman and A. Segall, Energy Effcent Routng n Ad Hoc Dsaster Recovery Networks, CCIT Report 392, Technon Dept. of Electrcal Engneerng, July Avalable at URL

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Energy Conserving Routing in Wireless Ad-hoc Networks

Energy Conserving Routing in Wireless Ad-hoc Networks Energy Conservng Routng n Wreless Ad-hoc Networks Jae-Hwan Chang and Leandros Tassulas Department of Electrcal and Computer Engneerng & Insttute for Systems Research Unversty of Maryland at College ark

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

Availability-Based Path Selection and Network Vulnerability Assessment

Availability-Based Path Selection and Network Vulnerability Assessment Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

An MILP model for planning of batch plants operating in a campaign-mode

An MILP model for planning of batch plants operating in a campaign-mode An MILP model for plannng of batch plants operatng n a campagn-mode Yanna Fumero Insttuto de Desarrollo y Dseño CONICET UTN yfumero@santafe-concet.gov.ar Gabrela Corsano Insttuto de Desarrollo y Dseño

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

To Fill or not to Fill: The Gas Station Problem

To Fill or not to Fill: The Gas Station Problem To Fll or not to Fll: The Gas Staton Problem Samr Khuller Azarakhsh Malekan Julán Mestre Abstract In ths paper we study several routng problems that generalze shortest paths and the Travelng Salesman Problem.

More information

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. XX, MONTH 2XX 1 Effcent On-Demand Data Servce Delvery to Hgh-Speed Trans n Cellular/Infostaton Integrated Networks Hao Lang, Student Member,

More information

A New Paradigm for Load Balancing in Wireless Mesh Networks

A New Paradigm for Load Balancing in Wireless Mesh Networks A New Paradgm for Load Balancng n Wreless Mesh Networks Abstract: Obtanng maxmum throughput across a network or a mesh through optmal load balancng s known to be an NP-hard problem. Desgnng effcent load

More information

How To Solve A Problem In A Powerline (Powerline) With A Powerbook (Powerbook)

How To Solve A Problem In A Powerline (Powerline) With A Powerbook (Powerbook) MIT 8.996: Topc n TCS: Internet Research Problems Sprng 2002 Lecture 7 March 20, 2002 Lecturer: Bran Dean Global Load Balancng Scrbe: John Kogel, Ben Leong In today s lecture, we dscuss global load balancng

More information

Dynamic Fleet Management for Cybercars

Dynamic Fleet Management for Cybercars Proceedngs of the IEEE ITSC 2006 2006 IEEE Intellgent Transportaton Systems Conference Toronto, Canada, September 17-20, 2006 TC7.5 Dynamc Fleet Management for Cybercars Fenghu. Wang, Mng. Yang, Ruqng.

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

Formulating & Solving Integer Problems Chapter 11 289

Formulating & Solving Integer Problems Chapter 11 289 Formulatng & Solvng Integer Problems Chapter 11 289 The Optonal Stop TSP If we drop the requrement that every stop must be vsted, we then get the optonal stop TSP. Ths mght correspond to a ob sequencng

More information

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks : An Adaptve, Anycast MAC Protocol for Wreless Sensor Networks Hwee-Xan Tan and Mun Choon Chan Department of Computer Scence, School of Computng, Natonal Unversty of Sngapore {hweexan, chanmc}@comp.nus.edu.sg

More information

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center Dynamc Resource Allocaton and Power Management n Vrtualzed Data Centers Rahul Urgaonkar, Ulas C. Kozat, Ken Igarash, Mchael J. Neely urgaonka@usc.edu, {kozat, garash}@docomolabs-usa.com, mjneely@usc.edu

More information

Period and Deadline Selection for Schedulability in Real-Time Systems

Period and Deadline Selection for Schedulability in Real-Time Systems Perod and Deadlne Selecton for Schedulablty n Real-Tme Systems Thdapat Chantem, Xaofeng Wang, M.D. Lemmon, and X. Sharon Hu Department of Computer Scence and Engneerng, Department of Electrcal Engneerng

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

8 Algorithm for Binary Searching in Trees

8 Algorithm for Binary Searching in Trees 8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

Ad-Hoc Games and Packet Forwardng Networks

Ad-Hoc Games and Packet Forwardng Networks On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

LAMOR: Lifetime-Aware Multipath Optimized Routing Algorithm for Video Transmission over Ad Hoc Networks

LAMOR: Lifetime-Aware Multipath Optimized Routing Algorithm for Video Transmission over Ad Hoc Networks LAMOR: Lfetme-Aware Multpath Optmzed Routng Algorthm for Vdeo ransmsson over Ad Hoc Networks 1 Lansheng an, Lng Xe, Kng-m Ko, Mng Le and Moshe Zukerman Abstract Multpath routng s a key technque to support

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET)

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET) Renforcement Learnng for Qualty of Servce n Moble Ad Hoc Network (MANET) *T.KUMANAN AND **K.DURAISWAMY *Meenaksh College of Engneerng West K.K Nagar, Cheena-78 **Dean/academc,K.S.R College of Technology,Truchengode

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Relay Secrecy in Wireless Networks with Eavesdropper

Relay Secrecy in Wireless Networks with Eavesdropper Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,

More information

Multi-Resource Fair Allocation in Heterogeneous Cloud Computing Systems

Multi-Resource Fair Allocation in Heterogeneous Cloud Computing Systems 1 Mult-Resource Far Allocaton n Heterogeneous Cloud Computng Systems We Wang, Student Member, IEEE, Ben Lang, Senor Member, IEEE, Baochun L, Senor Member, IEEE Abstract We study the mult-resource allocaton

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告

行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告 行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告 畫 類 別 : 個 別 型 計 畫 半 導 體 產 業 大 型 廠 房 之 設 施 規 劃 計 畫 編 號 :NSC 96-2628-E-009-026-MY3 執 行 期 間 : 2007 年 8 月 1 日 至 2010 年 7 月 31 日 計 畫 主 持 人 : 巫 木 誠 共 同

More information

A Lyapunov Optimization Approach to Repeated Stochastic Games

A Lyapunov Optimization Approach to Repeated Stochastic Games PROC. ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, OCT. 2013 1 A Lyapunov Optmzaton Approach to Repeated Stochastc Games Mchael J. Neely Unversty of Southern Calforna http://www-bcf.usc.edu/

More information

) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance

) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance Calbraton Method Instances of the Cell class (one nstance for each FMS cell) contan ADC raw data and methods assocated wth each partcular FMS cell. The calbraton method ncludes event selecton (Class Cell

More information

How To Plan A Network Wide Load Balancing Route For A Network Wde Network (Network)

How To Plan A Network Wide Load Balancing Route For A Network Wde Network (Network) Network-Wde Load Balancng Routng Wth Performance Guarantees Kartk Gopalan Tz-cker Chueh Yow-Jan Ln Florda State Unversty Stony Brook Unversty Telcorda Research kartk@cs.fsu.edu chueh@cs.sunysb.edu yjln@research.telcorda.com

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Optimization of network mesh topologies and link capacities for congestion relief

Optimization of network mesh topologies and link capacities for congestion relief Optmzaton of networ mesh topologes and ln capactes for congeston relef D. de Vllers * J.M. Hattngh School of Computer-, Statstcal- and Mathematcal Scences Potchefstroom Unversty for CHE * E-mal: rwddv@pu.ac.za

More information

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization Hndaw Publshng Corporaton Mathematcal Problems n Engneerng Artcle ID 867836 pages http://dxdoorg/055/204/867836 Research Artcle Enhanced Two-Step Method va Relaxed Order of α-satsfactory Degrees for Fuzzy

More information

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services When Network Effect Meets Congeston Effect: Leveragng Socal Servces for Wreless Servces aowen Gong School of Electrcal, Computer and Energy Engeerng Arzona State Unversty Tempe, AZ 8587, USA xgong9@asuedu

More information

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

Activity Scheduling for Cost-Time Investment Optimization in Project Management

Activity Scheduling for Cost-Time Investment Optimization in Project Management PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and

More information

Software project management with GAs

Software project management with GAs Informaton Scences 177 (27) 238 241 www.elsever.com/locate/ns Software project management wth GAs Enrque Alba *, J. Francsco Chcano Unversty of Málaga, Grupo GISUM, Departamento de Lenguajes y Cencas de

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks Master s Thess Ttle Confgurng robust vrtual wreless sensor networks for Internet of Thngs nspred by bran functonal networks Supervsor Professor Masayuk Murata Author Shnya Toyonaga February 10th, 2014

More information

Dominant Resource Fairness in Cloud Computing Systems with Heterogeneous Servers

Dominant Resource Fairness in Cloud Computing Systems with Heterogeneous Servers 1 Domnant Resource Farness n Cloud Computng Systems wth Heterogeneous Servers We Wang, Baochun L, Ben Lang Department of Electrcal and Computer Engneerng Unversty of Toronto arxv:138.83v1 [cs.dc] 1 Aug

More information

Economic-Robust Transmission Opportunity Auction in Multi-hop Wireless Networks

Economic-Robust Transmission Opportunity Auction in Multi-hop Wireless Networks Economc-Robust Transmsson Opportunty Aucton n Mult-hop Wreless Networks Mng L, Pan L, Mao Pan, and Jnyuan Sun Department of Electrcal and Computer Engneerng, Msssspp State Unversty, Msssspp State, MS 39762

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks Fuzzy Set Approach To Asymmetrcal Load Balancng n Dstrbuton Networks Goran Majstrovc Energy nsttute Hrvoje Por Zagreb, Croata goran.majstrovc@ehp.hr Slavko Krajcar Faculty of electrcal engneerng and computng

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

v a 1 b 1 i, a 2 b 2 i,..., a n b n i.

v a 1 b 1 i, a 2 b 2 i,..., a n b n i. SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are

More information

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network On Fle Delay Mnmzaton for Content Uploadng to Meda Cloud va Collaboratve Wreless Network Ge Zhang and Yonggang Wen School of Computer Engneerng Nanyang Technologcal Unversty Sngapore Emal: {zh0001ge, ygwen}@ntu.edu.sg

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Logical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem

Logical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME, ISSUE, FEBRUARY ISSN 77-866 Logcal Development Of Vogel s Approxmaton Method (LD- An Approach To Fnd Basc Feasble Soluton Of Transportaton

More information

Sngle Snk Buy at Bulk Problem and the Access Network

Sngle Snk Buy at Bulk Problem and the Access Network A Constant Factor Approxmaton for the Sngle Snk Edge Installaton Problem Sudpto Guha Adam Meyerson Kamesh Munagala Abstract We present the frst constant approxmaton to the sngle snk buy-at-bulk network

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

An Intelligent Policy System for Channel Allocation of Information Appliance

An Intelligent Policy System for Channel Allocation of Information Appliance Tamkang Journal of Scence and Engneerng, Vol. 5, No., pp. 63-68 (2002) 63 An Intellgent Polcy System for Channel Allocaton of Informaton Applance Cheng-Yuan Ku, Chang-Jnn Tsao 2 and Davd Yen 3 Department

More information

DISTRIBUTED storage systems have been becoming increasingly

DISTRIBUTED storage systems have been becoming increasingly 268 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 28, NO. 2, FEBRUARY 2010 Cooperatve Recovery of Dstrbuted Storage Systems from Multple Losses wth Network Codng Yuchong Hu, Ynlong Xu, Xaozhao

More information

On the Interaction between Load Balancing and Speed Scaling

On the Interaction between Load Balancing and Speed Scaling On the Interacton between Load Balancng and Speed Scalng Ljun Chen and Na L Abstract Speed scalng has been wdely adopted n computer and communcaton systems, n partcular, to reduce energy consumpton. An

More information

2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet

2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet 2008/8 An ntegrated model for warehouse and nventory plannng Géraldne Strack and Yves Pochet CORE Voe du Roman Pays 34 B-1348 Louvan-la-Neuve, Belgum. Tel (32 10) 47 43 04 Fax (32 10) 47 43 01 E-mal: corestat-lbrary@uclouvan.be

More information

Downlink Power Allocation for Multi-class. Wireless Systems

Downlink Power Allocation for Multi-class. Wireless Systems Downlnk Power Allocaton for Mult-class 1 Wreless Systems Jang-Won Lee, Rav R. Mazumdar, and Ness B. Shroff School of Electrcal and Computer Engneerng Purdue Unversty West Lafayette, IN 47907, USA {lee46,

More information

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems Jont Schedulng of Processng and Shuffle Phases n MapReduce Systems Fangfe Chen, Mural Kodalam, T. V. Lakshman Department of Computer Scence and Engneerng, The Penn State Unversty Bell Laboratores, Alcatel-Lucent

More information

WAN Network Design. David Tipper Graduate Telecommunications and Networking Program. Slides 10 Telcom 2110 Network Design. WAN Network Design

WAN Network Design. David Tipper Graduate Telecommunications and Networking Program. Slides 10 Telcom 2110 Network Design. WAN Network Design WAN Network Desgn Davd Tpper Graduate Telecommuncatons and Networkng Program Unversty t of Pttsburgh Sldes 10 Telcom 2110 Network Desgn WAN Network Desgn Gven Node locatons (or potental locatons) Traffc

More information

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng

More information

Virtual Network Embedding with Coordinated Node and Link Mapping

Virtual Network Embedding with Coordinated Node and Link Mapping Vrtual Network Embeddng wth Coordnated Node and Lnk Mappng N. M. Mosharaf Kabr Chowdhury Cherton School of Computer Scence Unversty of Waterloo Waterloo, Canada Emal: nmmkchow@uwaterloo.ca Muntasr Rahan

More information

Cloud-based Social Application Deployment using Local Processing and Global Distribution

Cloud-based Social Application Deployment using Local Processing and Global Distribution Cloud-based Socal Applcaton Deployment usng Local Processng and Global Dstrbuton Zh Wang *, Baochun L, Lfeng Sun *, and Shqang Yang * * Bejng Key Laboratory of Networked Multmeda Department of Computer

More information

On the Interaction between Load Balancing and Speed Scaling

On the Interaction between Load Balancing and Speed Scaling On the Interacton between Load Balancng and Speed Scalng Ljun Chen, Na L and Steven H. Low Engneerng & Appled Scence Dvson, Calforna Insttute of Technology, USA Abstract Speed scalng has been wdely adopted

More information

Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process

Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process Dsadvantages of cyclc TDDB47 Real Tme Systems Manual scheduler constructon Cannot deal wth any runtme changes What happens f we add a task to the set? Real-Tme Systems Laboratory Department of Computer

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

An Efficient Recovery Algorithm for Coverage Hole in WSNs

An Efficient Recovery Algorithm for Coverage Hole in WSNs An Effcent Recover Algorthm for Coverage Hole n WSNs Song Ja 1,*, Wang Balng 1, Peng Xuan 1 School of Informaton an Electrcal Engneerng Harbn Insttute of Technolog at Weha, Shanong, Chna Automatc Test

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION

AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION The Medterranean Journal of Computers and Networks, Vol. 2, No. 1, 2006 57 AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION L. Bada 1,*, M. Zorz 2 1 Department of Engneerng,

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

Price Competition in an Oligopoly Market with Multiple IaaS Cloud Providers

Price Competition in an Oligopoly Market with Multiple IaaS Cloud Providers Prce Competton n an Olgopoly Market wth Multple IaaS Cloud Provders Yuan Feng, Baochun L, Bo L Department of Computng, Hong Kong Polytechnc Unversty Department of Electrcal and Computer Engneerng, Unversty

More information

Feasibility of Using Discriminate Pricing Schemes for Energy Trading in Smart Grid

Feasibility of Using Discriminate Pricing Schemes for Energy Trading in Smart Grid Feasblty of Usng Dscrmnate Prcng Schemes for Energy Tradng n Smart Grd Wayes Tushar, Chau Yuen, Bo Cha, Davd B. Smth, and H. Vncent Poor Sngapore Unversty of Technology and Desgn, Sngapore 138682. Emal:

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000 Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from

More information

A Dynamic Energy-Efficiency Mechanism for Data Center Networks

A Dynamic Energy-Efficiency Mechanism for Data Center Networks A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,

More information

An ILP Formulation for Task Mapping and Scheduling on Multi-core Architectures

An ILP Formulation for Task Mapping and Scheduling on Multi-core Architectures An ILP Formulaton for Task Mappng and Schedulng on Mult-core Archtectures Yng Y, We Han, Xn Zhao, Ahmet T. Erdogan and Tughrul Arslan Unversty of Ednburgh, The Kng's Buldngs, Mayfeld Road, Ednburgh, EH9

More information

How To Improve Delay Throughput In Wireless Networks With Multipath Routing And Channel Codeing

How To Improve Delay Throughput In Wireless Networks With Multipath Routing And Channel Codeing Delay-Throughput Enhancement n Wreless Networs wth Mult-path Routng and Channel Codng Kevan Ronas, Student Member, IEEE, Amr-Hamed Mohsenan-Rad, Member, IEEE, Vncent W.S. Wong, Senor Member, IEEE, Sathsh

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information