Topology Design in Time-Evolving Delay-Tolerant Networks with Unreliable Links

Size: px
Start display at page:

Download "Topology Design in Time-Evolving Delay-Tolerant Networks with Unreliable Links"

Transcription

1 Topology Design in Time-Eoling Dely-Tolernt Networks with Unrelile Links Minsu Hung Siyun Chen Fn Li Yu Wng Deprtment of Computer Science, Uniersity of North Crolin t Chrlotte, Chrlotte, NC 83, USA. School of Computer Science, Beijing Institute of Technology, Beijing, 8, Chin. Astrct With possile prticiption of lrge numer of wireless deices in dely tolernt networks (DTNs), how to mintin efficient nd dynmic topology ecomes crucil. In this pper, we study the topology design prolem in predictle DTN where the time-eoling network topology is known priori or cn e predicted. We model such network s weighted spce-time grph with oth spcil nd temporl informtion. Links inside the spce-time grph re unrelile due to either the dynmic nture of wireless communictions or the rough prediction of underlying humn/deice moility. The im of our topology design prolem is to uild sprse spce-time structure such tht () for ny pir of deices, there is spce-time pth connecting them with the reliility lrger thn required threshold; () the totl cost of the structure is minimized. We first show tht this prolem is NP-hrd, nd then propose seerl heuristics which cn significntly reduce the totl cost of the topology while mintin the relile connectiity oer time. I. INTRODUCTION In dely tolernt networks (DTNs), the lck of continuous connectiity, network prtitioning, long delys, unrelile time-rying links, nd dynmic topology pose new chllenges in design of DTN protocols. Recently, seerl DTN routing schemes [] [3] he een proposed to tke the intermittent connectiity nd time-rying topology into considertion. In ddition, different moility study [], [5] nd grph modeling [6], [7] he een conducted for DTNs to understnd the underlying socil nd temporl chrcteristics of the network prticipnts. Howeer, there is little reserch on how to mintin cost-efficient nd relile topology of DTNs. Network topology is lwys criticl issue in design of ny networking systems. For different network pplictions, network topology cn e designed or controlled under different ojecties (such s power efficiency, fult tolernce, nd throughput mximiztion). Topology control protocols he een well studied in wireless networks [8]. The focus of preious reserch is minly on how to construct cost-efficient structure from sttic nd connected topology. Howeer, in DTNs, the underlying topology is lck of continuous connectiity which mkes existing topology control lgorithms useless. Therefore, how to efficiently mintin dynmic The work of M. Hung, S. Chen, nd Y. Wng is supported in prt y the US Ntionl Science Foundtion (NSF) under Grnt No. CNS-9533 nd CNS The work of F. Li is prtilly supported y the Ntionl Nturl Science Foundtion of Chin under Grnt 6935, Beijing Nturl Science Foundtion under Grnt 7 nd Scientific Reserch Foundtion for the Returned Oerses Chinese Scholrs, Stte Eduction Ministry. Y. Wng (yu.wng@uncc.edu) is the corresponding uthor. topology in DTNs ecomes crucil, especilly with the prticiption of lrge numer of wireless deices. In this pper, we study the topology design prolem in time-eoling nd predictle DTN. DTNs often eole oer time: chnges of network topology cn occur if nodes moe round. For certin type of DTNs, the temporl chrcteristics of topology could e known priori or cn e predicted from historicl dt. For exmple, it is esy to discoery the temporl pttern of topology for DTN formed y either pulic uses [9] or stellites [] which he fixed tours nd schedules, or moile socil network [5] consisting of students who shre fixed clss schedules. A recent study [] on humn moility lso shows tht 93% potentil predictility cn e chieed in humn moility prediction. For this kind of time-eoling nd predictle DTNs, the spce-time grph model [], insted of the sttic grph model, cn e used to cpture oth the spce nd time dimensions of the dynmic network topology nd to enle the emultion of ny storend-forwrd DTN routing methods. Gien such spcetime grph including ll possile temporl nd spcil links, the topology design prolem ims to find sugrph which mintins the connectiity oer time etween ny two deices while minimizing the cost. In our recent study [3], [], we he proposed seerl heuristics for the sic topology design prolem in timeeoling nd predictle DTNs. Those methods ll ssume tht the prediction of future links re perfect nd links re relile for communictions, i.e., the pcket deliery oer these spcil or temporl links is gurnteed nd without errors. This is clerly too optimistic since in prctice, the wireless communictions re unrelile due to the lossy nture of wireless chnnels. In ddition, een though certin type of network moility could e predicted sed on user ehior or historicl dt, the link prediction could e inccurte sometime. Therefore, in this pper, we remoe the strong ssumptions on relile links nd perfect prediction. Insted, for ech spcil or temporl link in the spce-time grph, we ssume it hs proility to reflect its reliility, either sed on link qulity estimtion or moility prediction. Lrger the relile proility of link, higher chnce the DTN trnsmissions oer tht link to e successful. Therefore, gien the weighted spce-time grph, the new relile topology design prolem (RTDP) ims to find sugrph in which the reliility of DTN routing etween ny two deices is gurnteed lrger thn required threshold nd the totl cost

2 of topology is minimized. In this pper, we show tht this new topology design prolem is NP-hrd nd propose fie heuristics which cn significntly reduce the totl cost of network topology while mintining the DTN reliility oer time. For our est knowledge, this pper is the first ttempt to study topology design for time-eoling networks with unrelile links. spce t= t= t=3 t= () 5 time t= t= t=3 t= () Fig.. A time-eoling DTN nd its corresponding spce-time grph: () the time-eoling topology of DTN ( sequence of snpshots); () the corresponding spce-time grph G, where spce-time DTN pth from the source to the destintion 5 is highlighted in lue. II. MODELS, ASSUMPTIONS, AND THE PROBLEM A. Modeling Time-eoling Networks: Spce-time Grphs Assume tht V = {,, n } e the set of ll indiidul nodes (wireless deices) in the network oer period of time T. Here, time is diided into discrete nd equl time slots, e.g. {,, T }. Since positions of indiidul nodes nd the topology co-eole oer time, sequence of sttic grphs cn e defined oer V to model the interctions mong nodes in the time-eoling DTN during certin time slot. Fig. () illustrtes such n exmple. Let G t = (V t, E t ) e directed grph representing the snpshot of the network t time slot t nd link i tt j Et represents tht node i cn communicte to j t time t. Then, the dynmic network is descried y the union of ll snpshots {G t t = T }. Howeer, such sequence of sttic grphs is not directly usele in the nlysis of DTN routing protocols. Some of the snpshots my not e connected grphs t ll (e.g., the first three snpshots in Fig. ()), which mkes routing tsk oer them chllenging. In some existing DTN protocols, n ggregted grph oer {G t } is used, where n edge etween pir of nodes represents these two nodes he intercted t certin point during the time period T. The weight of such n edge could e the frction of the occurrence oer the historicl period of tht interction, i.e., contct proility. Seerl DTN routing protocols [], [3] estimte this contct proility sed on pst contct history nd use it to select rely nodes. Howeer, such ggregted iew discrds temporl informtion out the timing nd order of interctions, which my cuse filure of deliery or d performnces. In this pper, we dopt the spce-time grph [] to model the time-eoling DTNs. We conert the sequence of sttic grphs {G t } into spce-time grph G = (V, E), which is directed grph defined in oth 3 5 spcil nd temporl spces. Fig. () illustrtes the spcetime grph of the sme network in Fig. (). In the spcetime grph G, T + lyers of nodes re defined nd ech lyer hs n nodes, thus the whole ertex set V = {j t j =,, n nd t =,, T } nd there re n(t + ) nodes in G. Two kinds of links (sptil links nd temporl links) re dded etween consecutie lyers in E. A temporl link t j j t (those horizontl links in Fig. ()) connects the sme node j cross consecutie (t )th nd tth lyers, which represents the node crrying the messge in the tth time slot. A sptil link t j k t represents forwrding messge from one node j to its neighor k in the tth time slot (i.e., j k E t ). By defining the spce-time grph G, ny communiction opertion in the time-eoling network cn e simulted on this directed grph. As the lue pth shown in Fig. (), spce-time DTN pth from to 5 shows prticulr DTN routing strtegy to delier the pcket from to 5 in the network: holds the pcket for st time slot, then psses it to 3 t t =, etc. We cn define the connectiity of spce-time grph which is different from tht of sttic grph. Definition : A spce-time grph H is connected oer time period T if nd only if there exists t lest one directed pth for ech pir of nodes (i, T j ) (i nd j in [, n]). This gurntees tht ny pcket cn e deliered etween ny two nodes in the network oer the period of T. Note tht connected spce-time grph does not require the connectiity in eery snpshot. Herefter, we ssume tht the originl spce-time grph G is connected oer time period T. For ech direct link e E, we further ssume tht there is cost c(e), representing the cost ssocited with trnsiting messge oer tht link (trnsiting from one node to the other node oer spcil link or holding the messge within one node oer temporl link). The totl cost of spce-time grph c(h) is defined s the summtion of costs of ll links in H, i.e., c(h) = c(e). () e H The lest cost pth Pc H (u, ) is defined s the pth from u to in H with the minimum totl cost. Its totl cost is denoted y c H (u, ) = e Pc H (u,) c(e). B. Reliility of DTN Topology oer Unrelile Links To consider the reliility of lossy wireless links or unperfected link predictions, we lso define relile proility r(e) for ech link e E, which represents the proility of successful dt trnsmission oer link e. The unreliility of the link could come from either link filure due to lossy wireless signl or poor prediction of future links. Here, we ssume tht the relile proility of ech link cn e otined through link estimtion techniques t the link nd physicl lyers [5] or moility prediction techniques [6]. Fig. () illustrtes simple spce-time grph with just two deices. The lel of ech link e is the pir of cost nd reliility, i.e., (c(e), r(e)). For exmple, in the first time slot, the cost of spcil link is 3 nd its reliility is.6. Gien

3 (,.5) (,.5) (,.5) (,.5) (,.5) (,.5) (3,.6) (,.8) (3,.6) (,.8) (3,.6) (,.8) (3,.6) (,.8) (3,.6) (,.8) (3,.6) (,.8) (5,.) (5,.) (5,.) (5,.) (5,.) (5,.) () G () H (c) H Fig.. Exmples of relile topology design: () the originl spce-time grph G with cost nd reliility.36; () H with cost 6 nd reliility.5; nd (c) H with cost nd reliility.36. Here, links re leled y (cost, reliility), nd green links re remoed links from G. the reliility of ech link, we cn then define the reliility of pth P or structure H. In this pper, we only consider the reliility for single-copy DTN routing where only one copy of ech messge is propgted in the network. Thus, the resulting propgtion pth of messge is siclly single spce-time pth in G. Gien pth P (u, ) connecting nodes u nd, the reliility of P (u, ) is the production of reliility of ll links in tht pth. For exmple, the pth in Fig. () hs reliility of.5.8 =.. For gien routing topology H, we cn define the most relile pth Pr H (u, ) s the pth from u to in H with the highest reliility. Let r H (u, ) = Π e P H r (u,)r(e) e the reliility of pth Pr H (u, ). For exmple, etween nd in Fig. (), is the most relile pth with reliility of.6. =.6. Then the reliility of the topology H is defined s follows r(h) = min i,j n rh (i, j T ). () The reliility of structures shown in Fig. (), () nd (c) re.36,.5 nd.36 respectiely. Notice tht it is esy to clculte r(h) gien H y using ny shortest pth lgorithms. C. Relile Topology Design Prolem We now cn define the relile topology design prolem (RTDP) on weighted spce-time grphs s follows. Definition : Gien connected spce-time grph G, the im of relile topology design prolem (RTDP) is to construct sprse spce-time grph H, which is sugrph of the originl spce-time grph G, such tht () H is still connected oer the time period T ; () the reliility is lrger thn or equl to predefined threshold γ; nd (3) the totl cost of H is minimized. Notice tht generlly speking denser spce-time topology leds to etter connectiity nd reliility ut more expensie in term of totl cost. Therefore, the topology design ims to find topology with certin reliility gurntee while minimizing the cost. If the threshold γ is constnt, the reliility requirement itself coers the sic connectiity, since it is oiously much stronger requirement thn sic connectiity. Once gin, we ssume tht the originl spcetime grph G is connected nd hs reliility lrger thn γ. Fig. () nd (c) show two su-topologies of Fig. () with different costs nd reliility. Note tht these topologies re still connected oer time, i.e., eery node cn find spce-time pth to ny other node. Hrdness of RTDP: The topology design prolem for spce-time grph een without reliility requirement is much hrder thn the one for sttic grph. For sttic grph without time domin, minimum spnning tree cn chiee the gol of keeping connectiity with miniml cost. Howeer, simply pplying the spnning tree in ech snpshot or oer the entire spce-time grph is not direct solution. First, the grph in ech snpshot my not e connected t ll. On the other hnd, spnning tree or forest of the whole spce-time grph connects ech node in eery snpshot, which is not necessry nd wste of mny links. Plus the reliility requirement, the RTDP ecomes more chllenging. In [3], we he proed tht the topology design prolem without reliility requirement is NP-hrd. Since such topology design prolem is specil cse of RTDP when γ =, RTDP is lso NP-hrd. The RTDP is different with the stndrd spce-time routing [], [7], which only ims to find the most cost-efficient spce-time pth for pir of source nd destintion. The topology design prolem ims to mintin oth cost-efficient nd connected spce-time routing topology for supporting relile DTN trnsmissions etween ll pirs of nodes. III. HEURISTICS OF RELIABLE TOPOLOGY DESIGN Since RTDP oer spce-time grphs is NP-hrd, we now propose fie different heuristics to construct sprse structure tht fulfills the connectiity nd reliility requirements oer time. The first three heuristics re sed on minimum cost relile routing, while the other two re sed on greedy lgorithms. For ll lgorithms, the inputs re the originl grph G nd reliility requirement γ, nd the output is sugrph H of G. A. Heuristics Bsed on Min Cost Relile Pth One nturl ide to construct low-cost relile sugrph, which gurntees the route reliility etween ny two nodes oer the time period T, is keeping ll the minimum cost relile pths from i to T j for i, j =,, n in G. Here the minimum cost relile pth connecting u nd, denoted y P G cr(u, ), is the pth with the lest cost mong ll pths etween u nd which he reliility lrger thn or equl to γ. Oiously, if we cn find such pths for eery pir of source nd destintion, the union of ll of them stisfies the reliility requirement of our topology design prolem. Howeer, to find the shortest pth with dditionl constrins in grph itself is lso well known NP-hrd prolem, clled restricted shortest pth prolem [8]. Therefore, in this pper, we use one of

4 the existing heuristics for restricted shortest pth, Bckwrd- Forwrd method (BFM) y Reees nd Slm [9]. The sic ide of Bckwrd-Forwrd method is quite simple. Assume we wnt to find relile pth from s to t. BFM first determines the lest-cost pth (LCP) nd the most relile pth (MRP) from eery node u to t. It then strts from s nd explores the grph y conctenting two segments: () the sofr explored pth from s to n intermedite node u, nd () the LCP or the MRP from node u to t. BFM simply uses Dijkstrs lgorithm with the following modifiction in the relxtion procedure: link u is relxed if it reduces the totl cost from s to while its pproximted end-to-end reliility oeys the reliility constrint. The computtionl complexity of the BFM is siclly three times tht of Dijkstr s lgorithm. Let P G BF M (u, ) e the resulting pth from u to sed on BFM. Notice tht P G BF M (u, ) is not optiml for restricted shortest pth. Howeer, sed on simultion study y Kuipers et l. [], BFM is one of the most efficient methods mong ll existing methods, it hs smll execution time nd often genertes good qulity pth compred with the optiml. Algorithm Union of Min Cost Relile Pth () : H φ; X = {(i, T j )} for ll integer i, j n. : for ll pirs (i, T j ) X do 3: Find the minimum cost relile pth P G BF M ( i, T j ) in G using Bckwrd-Forwrd method. : if e P G BF M ( i, T j ) nd e / H then 5: H = H {e}. 6: return H Algorithm Greedy with Min Cost Relile Pth () : H φ; X = {(i, T j )} for ll i nd j in [, n]. : while X φ do 3: Find the minimum cost relile pths for eery pir nodes in X using BFM in G, nd ssume P BF M (i, T j ) hs the lest cost mong these pths. : if e P BF M (i, T j ) then 5: H e; c(e). 6: X X (i, T j ). 7: return H Algorithm 3 Lest Cost Pth or Min Cost Relile Pth () : H φ; X = {(i, T j )} for ll integer i, j n. : for ll pirs (i, T j ) X do 3: Find the lest cost pth Pc G (i, T j ) in G. : if e Pc G (i, T j ) nd e / H then 5: H = H {e}. 6: for ll pirs (i, T j ) X do 7: if r H (i, T j ) < γ then 8: Add ll links e P G BF M ( i, T j ) into H if e / H. 9: return H With Bckwrd-Fowrd method, our first heuristic pproch is to find minimum cost relile pth for ech pir of source nd destintion nd tke the union of them to form the sugrph which gurntee the oerll reliility. Algorithm shows the detiled lgorithm. Its time complexity is O(n T (log(nt ) + n)) since we only need to compute minimum cost relile pths of G (with O(nT ) nodes nd t most O(n T ) links). This cn e esily chieed y running 3n times of Dijkstr s lgorithm whose complexity is O(nT (log(nt ) + n)). Herefter, we refer this method s union of minimum cost relile pth lgorithm (). Howeer, the structure uilt y the oe method my contin more links thn necessry. Therefore, we propose new greedy lgorithm (s shown in Algorithm ) to further improe the performnce. The sic ide is s follows. We im to connect n pir of nodes in X. In ech round we pick the minimum cost relile pth etween pir nodes in X which is the minimum mong ll minimum cost relile pths connecting ny pir of nodes in X. Then we dd ll links in this pth into H, cler the costs of these links to zeros, nd remoe this pir from X. This procedure is repeted until ll n pir nodes (i, T j ) re gurnteed to e connected y relile pths in H. It is oious tht the output of this method is much sprser thn the one of method. We refer this method s greedy method sed on minimum cost relile pth (). The time complexity is O(T n 5 + T n log(t n)) since 3n times of Dijkstr s lgorithm re running on the spce-time grph in ech round for n rounds. The third method siclly comines the lest cost pth nd the minimum cost relile pth. It includes two steps. In the first step, we connect n pir of nodes in X = {(i, T j )} for ll integer i, j n y dding ll of the lest cost pths etween them. After this step, we he structure H which connects ll pirs of (i, T j ) ut my not stisfy the reliility requirements yet. In the second step, for ech pir (i, T j ), we clculte its reliility in H. If the cost of r H (i, T j ) is less thn γ, we directly dd the links in the minimum cost relile pth etween this two nodes in G into H. See Algorithm 3 for detil. Herefter, we denote this method s. Both steps of need n O(n T (log(nt )+n)) time since they oth run computtion of shortest pths for O(n ) rounds. Therefore, the totl time complexity is O(n T (log(nt )+n)). B. Greedy-sed Heuristics Both the fourth nd fifth lgorithms re sed on the sme greedy principle, deleting or dding edges in order nd checking whether the reliility is chieed or oid. The sic ide of the fourth method is deleting edges from input grph (either the originl grph G or the output grph from the first two lgorithms) in decresing order sed on link cost. Link i tt+ j is remoed if the sugrph H without this link cn still chiee reliility of γ. Algorithm shows the detiled lgorithm, nd we denote it s herefter. The time complexity nlysis is strightforwrd. The sorting could e done in O(n T log(n T )) with O(n T ) links. The for-loop includes n T rounds of computtions of shortest pths. Thus,

5 Algorithm Greedy Algorithm to Delete Links () : H G. : Sort ll links in link set E of G sed on their costs. 3: for ll e E (processed in decresing order of costs) do : if r(h {e}) γ then 5: H = H {e}. 6: return H Algorithm 5 Greedy Algorithm to Add Links () : H φ; X = {(i, T j )} for ll integer i, j n. : for ll pirs (i, T j ) X do 3: Find the lest cost pth Pc G (i, T j ) in G. : if e Pc G (i, T j ) nd e / H then 5: H = H {e}. 6: for ll e G H (in incresing order of costs) do 7: if r(h) < γ then 8: H = H + {e}. 9: return H the time complexity of this prt is O(n T (log(nt ) + n)). Therefore, totl time complexity of is lso in order of O(n T (log(nt ) + n)), which is much higher thn those of methods sed on minimum cost relile pth. Note tht since the outputs of our first two lgorithms re much sprser thn the originl grph ut cn gurntee the reliility, if we use them s the input of it cn se certin computtion cost. The fifth lgorithm is lso greedy lgorithm ut processes links in the reerse order compred with the fourth lgorithm. It strts with uilding connected sprse structure nd then dds more links to stisfy the reliility requirement. It lso includes two steps. In the first step, gin we tke the union of ll lest cost pths etween (i, T j ) for ll integer i, j n s H. In the second step, remining links re processed in the incresing order of cost. Link i tt+ j is dded to H if the current sugrph H cnnot chiee reliility of γ yet. See Algorithm 5 for detil. Herefter, we denote this method s. The complexity of is the sme s the one of (O(n T (log(nt ) + n))) since the second step is lmost the sme with nd the first step cost less time. IV. SIMULATIONS To elute our proposed lgorithms deoted to the RTDP prolem we he conducted extensie simultions oer rndomly generted networks. We implement nd test the following six lgorithms: (Alg ), (Alg. ), (Alg. 3), (Alg. ), (Alg. 5), nd. Here, is the union of lest cost pths from i to j T for i, j =,, n), which mintins the connectiity oer time ut cnnot gurntee the reliility. We use s reference. In ll simultions, we tke three metrics s the performnce mesurement for ny lgorithm deoted to RTDP: Totl Cost: the totl cost of the constructed topology H (output of the lgorithm), i.e., c(h) = e H c(e). Totl Numer of Edges: the totl numer of edges in H, i.e., H. Here, G denotes totl edge numer of G. Reliility: r(h) = min i,j n r H (i, T j ). The ojectie of topology design is to construct topologies with smll totl cost, smll edge numer nd lrger reliility. The underlying time-eoling networks re rndomly generted from rndom grph model. We first generte sequence of sttic rndom grphs {G t } with nodes, spreding oer time slots. For ech time slot t, the sttic grph G t is generted using the clssicl rndom grph genertor. For ech pir of nodes i nd j, we insert edge i j with fixed proility δ into G t. Smll lue of δ leds to sprse DTN, nd δ =. implies tht the topology in ech time slot is complete grph. After generting the sequence of {G t }, we conert it into the corresponding spce-time grph G. The cost nd reliility of ech inserted edge re rndomly chosen from to 5 nd from.8 to, respectiely. For ech setting, we generte rndom time-eoling networks nd report the erge performnce of our lgorithms mong them. For the first set of simultions, we increse the network density y rising δ from. to.8, nd keep reliility requirement γ t.6. Fig. 3() nd 3() show the rtios etween the totl cost/numer-edges of the generted grph H nd tht of the originl grph G with incresing δ. This rtio implies how much sing chieed y the topology design lgorithm, compred with the originl network. From the results, ll lgorithms cn significntly reduce the cost of mintining the connectiity. Een with the lest density (δ =.), ll lgorithms except for cn se more thn 7% cost nd round 65% edges. When the network is denser, the sing of topology design is lrger. For δ =.8, more thn 85% cost is sed. Compring ll methods, we cn find the following osertions. () hs the lest cost since it only gurntee the connectiity while other proposed lgorithms gurntee the reliility; () hs the lrgest cost due to simply dding mny low-cost links; (3) chiees smller cost thn since it reuse some links in preious rounds; () s cost is etween s nd s since it comines oth LCP nd MCRP; (5) Oerll, nd he the est costs mong the proposed fie methods. Fig. 3(c) shows the reliility of ech structure generted y ll methods. Clerly, LCP is the only lgorithm tht cnnot stisfy the reliility requirement γ =.6. It is n lgorithm only for mintining the connectiity oer time. All other fie lgorithms cn lwys chiee the desired reliility, nd they he ery close performnce in term of reliility. But considering their costs,,, re etter choices. When G is sprse (e.g. δ =.), its reliility is just oer.6. In tht cse, our proposed lgorithms remoe round 7% edges ut still keep the reliility t the desired leel. This clerly demonstrtes the power of topology design. In the second set of simultions, we fixed the network density δ =.5 nd run our lgorithms with different reliility requirement γ incresing from.3 to.6. From results shown in Fig., we cn osere tht tighter reliility requirement results in higher cost nd lrger numer of

6 rtio of totl cost rtio of edge numer unicsting reliility G δ δ () c(h)/c(g) () H / G (c) r(h) Fig. 3. Simultion results on rndom networks with different density nd γ =.6. ()-(): The cost (or edge numer) of H is diided y the cost (or edge numer) of G, which shows how much sing chieed y proposed methods. (c): The reliility r(h) shows the reliility of H. δ rtio of totl cost rtio of edge numer unicsting reliility G γ γ () c(h)/c(g) () H / G (c) r(h) Fig.. Simultion results on rndom networks with fixed network density δ =.5 nd rying reliility requirement γ. γ edge-usge of our topology lgorithms. When the reliility requirement ecomes looser, the restriction on remoing links ecomes weker. In the extreme cse with γ =, our RTDP conerges to the sic topology design prolem [3] which only preseres the connectiity. Notice tht performnces of LCP do not ffect y the reliility requirement. In ddition, performs etter when the reliility requirement is smll. V. CONCLUSION We study relile topology design prolem in predictle time-eoling DTN with unrelile links modeled y proilistic spce-time grph. We propose set of new heuristics which cn not only mintin the connectiity nd reliility of pths oer time ut lso significntly reduce the cost of topology. Simultion results from rndom networks demonstrte the efficiency of our methods. We eliee tht this pper presents the first step in exploiting topology design for time-eoling DTNs with unrelile links. REFERENCES [] Q. Yun, I. Crdei, nd J. Wu, Predict nd rely: n efficient routing in disruption-tolernt networks, in ACM MoiHoc 9, 9. [] T. Spyropoulos, et l., Spry nd wit: n efficient routing scheme for intermittently connected moile networks, in ACM WDTN 5, 5. [3] A. Lindgren, A. Dori, O. Schelén, Proilistic routing in intermittently connected networks, Mo. Comp. Comm. Re., 7(3):9, 3. [] J. Leguy, T. Friedmn, nd V. Conn, Eluting moility pttern spce routing for DTNs, in IEEE INFOCOM, 6. [5] V. Srinisn, et l., Anlysis nd implictions of student contct ptterns deried from cmpus schedules, in ACM Moicom, 6. [6] E.M. Dly nd M. Hhr, Socil network nlysis for routing in disconnected dely-tolernt mnets, in ACM MoiHoc, 7. [7] T. Hossmnn, et l., Know thy neighor: towrds optiml mpping of contcts to socil grphs for DTN routing, in IEEE INFOCOM, 9. [8] Y. Wng, Topology control for wireless sensor networks, ook chpter, Sensor Networks & Applictions (eds. Y. Li et l.), Springer, 7. [9] X. Zhng, J. Kurose, B.N. Leine, D. Towsley, nd H. Zhng, Study of us-sed disruption-tolernt network: moility modeling nd impct on routing, in ACM MoiCom 7, 7. [] S. Burleigh nd A. Hooke, Dely-tolernt networking: n pproch to interplnetry internet, IEEE Commun. Mg., (6):8 36, 3. [] C. Song, Z. Qu, N. Blumm, nd A.-L. Brsi, Limits of predictility in humn moility, Science, 37:8,. [] S. Merugu, M. Ammr, nd E. Zegur, Routing in spce nd time in networks with predictle moility, GIT, Tech. Rep., CC--7,. [3] M. Hung, S. Chen, Y. Zhu, et l., Topology control for time-eoling nd predictle dely-tolernt networks, in IEEE MASS,. [] M. Hung, S. Chen, et l., Cost-efficient topology design prolem in time-eoling dely-tolernt networks, in IEEE Gloecom,. [5] N. Bccour, et l., A comprtie simultion study of link qulity estimtors in wireless sensor networks, in IEEE MASCOTS, 9. [6] W. Su, S. Lee, nd M. Gerl, Moility prediction in wireless networks, in IEEE MILCOM,. [7] B.B. Xun, A. Ferreir, nd A. Jrry, Computing shortest, fstest, nd foremost journeys in dynmic networks, Int l J. of Foundtions of Computer Science, ():67 85, 3. [8] F. A. Kuipers, An oeriew of constrint-sed pth selection lgorithms for QoS routing, IEEE Communictions Mgzine, 5 56,. [9] D. S. Reees nd H. F. Slm, A distriuted lgorithm for delyconstrined unicst routing, IEEE/ACM Trns. Netw., 8:39 5,. [] F. Kuipers, T. Korkmz, et l., Performnce elution of constrintsed pth selection lgorithms, IEEE Network, 8:6 3,.

A New Algorithm to Compute Alternate Paths in Reliable OSPF (ROSPF)

A New Algorithm to Compute Alternate Paths in Reliable OSPF (ROSPF) A New Algorithm to Compute Alternte Pths in Relile OSPF (ROSPF) Jin Pu *, Eric Mnning, Gholmli C. Shoj, Annd Srinivsn ** PANDA Group, Computer Science Deprtment University of Victori Victori, BC, Cnd Astrct

More information

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES Romn V. Tyshchuk Informtion Systems Deprtment, AMI corportion, Donetsk, Ukrine E-mil: rt_science@hotmil.com 1 INTRODUCTION During the considertion

More information

Multi-beam antennas in a broadband wireless access system

Multi-beam antennas in a broadband wireless access system Multi-em ntenns in rodnd wireless ccess system Ulrik Engström, Mrtin Johnsson, nders Derneryd nd jörn Johnnisson ntenn Reserch Center Ericsson Reserch Ericsson SE-4 84 Mölndl Sweden E-mil: ulrik.engstrom@ericsson.com,

More information

Travel Prediction-based Data Forwarding for Sparse Vehicular Networks. Technical Report

Travel Prediction-based Data Forwarding for Sparse Vehicular Networks. Technical Report Trvel Prediction-sed Dt Forwrding for Sprse Vehiculr Networks Technicl Report Deprtment of Computer Science nd Engineering University of Minnesot 4-192 Keller Hll 200 Union Street SE Minnepolis, MN 55455-0159

More information

CHAPTER 2 LITERATURE STUDY

CHAPTER 2 LITERATURE STUDY CHAPTER LITERATURE STUDY. Introduction Multipliction involves two bsic opertions: the genertion of the prtil products nd their ccumultion. Therefore, there re two possible wys to speed up the multipliction:

More information

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 1 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment Roerto Di Pietro, Luigi V. Mncini, nd Alessndro

More information

Mixed CMOS PTL Adders

Mixed CMOS PTL Adders Anis do XXVI Congresso d SBC WCOMPA l I Workshop de Computção e Aplicções 14 20 de julho de 2006 Cmpo Grnde, MS Mixed CMOS PTL Adders Déor Mott, Reginldo d N. Tvres Engenhri em Sistems Digitis Universidde

More information

CHAPTER 3 AMPLIFIER DESIGN TECHNIQUES

CHAPTER 3 AMPLIFIER DESIGN TECHNIQUES CHAPTER 3 AMPLIFIER DEIGN TECHNIQUE 3.0 Introduction olid-stte microwve mplifiers ply n importnt role in communiction where it hs different pplictions, including low noise, high gin, nd high power mplifiers.

More information

Math Circles Finite Automata Question Sheet 3 (Solutions)

Math Circles Finite Automata Question Sheet 3 (Solutions) Mth Circles Finite Automt Question Sheet 3 (Solutions) Nickols Rollick nrollick@uwterloo.c Novemer 2, 28 Note: These solutions my give you the nswers to ll the prolems, ut they usully won t tell you how

More information

Algorithms for Memory Hierarchies Lecture 14

Algorithms for Memory Hierarchies Lecture 14 Algorithms for emory Hierrchies Lecture 4 Lecturer: Nodri Sitchinv Scribe: ichel Hmnn Prllelism nd Cche Obliviousness The combintion of prllelism nd cche obliviousness is n ongoing topic of reserch, in

More information

Dataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1)

Dataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1) The slides contin revisited mterils from: Peter Mrwedel, TU Dortmund Lothr Thiele, ETH Zurich Frnk Vhid, University of liforni, Riverside Dtflow Lnguge Model Drsticlly different wy of looking t computtion:

More information

Kirchhoff s Rules. Kirchhoff s Laws. Kirchhoff s Rules. Kirchhoff s Laws. Practice. Understanding SPH4UW. Kirchhoff s Voltage Rule (KVR):

Kirchhoff s Rules. Kirchhoff s Laws. Kirchhoff s Rules. Kirchhoff s Laws. Practice. Understanding SPH4UW. Kirchhoff s Voltage Rule (KVR): SPH4UW Kirchhoff s ules Kirchhoff s oltge ule (K): Sum of voltge drops round loop is zero. Kirchhoff s Lws Kirchhoff s Current ule (KC): Current going in equls current coming out. Kirchhoff s ules etween

More information

Network-coded Cooperation for Multi-unicast with Non-Ideal Source-Relay Channels

Network-coded Cooperation for Multi-unicast with Non-Ideal Source-Relay Channels This full text pper ws peer reviewed t the direction of IEEE Communictions Society suject mtter experts for puliction in the IEEE ICC 2010 proceedings Network-coded Coopertion for Multi-unicst with Non-Idel

More information

On the Description of Communications Between Software Components with UML

On the Description of Communications Between Software Components with UML On the Description of Communictions Between Softwre Components with UML Zhiwei An Dennis Peters Fculty of Engineering nd Applied Science Memoril University of Newfoundlnd St. John s NL A1B 3X5 zhiwei@engr.mun.c

More information

Genetic Representations for Evolutionary Minimization of Network Coding Resources

Genetic Representations for Evolutionary Minimization of Network Coding Resources Genetic Representtions for Evolutionry Minimiztion of Network Coding Resources Minkyu Kim 1, Vrun Aggrwl 2, Un-My O Reilly 2, Muriel Médrd 1, nd Wonsik Kim 1 1 Lortory for Informtion nd Decision Systems

More information

Information-Coupled Turbo Codes for LTE Systems

Information-Coupled Turbo Codes for LTE Systems Informtion-Coupled Turbo Codes for LTE Systems Lei Yng, Yixun Xie, Xiowei Wu, Jinhong Yun, Xingqing Cheng nd Lei Wn rxiv:709.06774v [cs.it] 20 Sep 207 Abstrct We propose new clss of informtion-coupled

More information

Interference Cancellation Method without Feedback Amount for Three Users Interference Channel

Interference Cancellation Method without Feedback Amount for Three Users Interference Channel Open Access Librry Journl 07, Volume, e57 ISSN Online: -97 ISSN Print: -9705 Interference Cncelltion Method without Feedbc Amount for Three Users Interference Chnnel Xini Tin, otin Zhng, Wenie Ji School

More information

A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Radio Networks

A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Radio Networks Globecom 04 - Wireless Networking Symposium A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Rdio Networks Xingy Liu nd Jing Xie Deprtment of Electricl nd Computer Engineering

More information

Area-Time Efficient Digit-Serial-Serial Two s Complement Multiplier

Area-Time Efficient Digit-Serial-Serial Two s Complement Multiplier Are-Time Efficient Digit-Seril-Seril Two s Complement Multiplier Essm Elsyed nd Htem M. El-Boghddi Computer Engineering Deprtment, Ciro University, Egypt Astrct - Multipliction is n importnt primitive

More information

Discontinued AN6262N, AN6263N. (planed maintenance type, maintenance type, planed discontinued typed, discontinued type)

Discontinued AN6262N, AN6263N. (planed maintenance type, maintenance type, planed discontinued typed, discontinued type) ICs for Cssette, Cssette Deck ANN, ANN Puse Detection s of Rdio Cssette, Cssette Deck Overview The ANN nd the ANN re the puse detection integrted circuits which select the progrm on the cssette tpe. In

More information

Understanding Basic Analog Ideal Op Amps

Understanding Basic Analog Ideal Op Amps Appliction Report SLAA068A - April 2000 Understnding Bsic Anlog Idel Op Amps Ron Mncini Mixed Signl Products ABSTRACT This ppliction report develops the equtions for the idel opertionl mplifier (op mp).

More information

Solutions to exercise 1 in ETS052 Computer Communication

Solutions to exercise 1 in ETS052 Computer Communication Solutions to exercise in TS52 Computer Communiction 23 Septemer, 23 If it occupies millisecond = 3 seconds, then second is occupied y 3 = 3 its = kps. kps If it occupies 2 microseconds = 2 6 seconds, then

More information

10.4 AREAS AND LENGTHS IN POLAR COORDINATES

10.4 AREAS AND LENGTHS IN POLAR COORDINATES 65 CHAPTER PARAMETRIC EQUATINS AND PLAR CRDINATES.4 AREAS AND LENGTHS IN PLAR CRDINATES In this section we develop the formul for the re of region whose oundry is given y polr eqution. We need to use the

More information

Sequential Logic (2) Synchronous vs Asynchronous Sequential Circuit. Clock Signal. Synchronous Sequential Circuits. FSM Overview 9/10/12

Sequential Logic (2) Synchronous vs Asynchronous Sequential Circuit. Clock Signal. Synchronous Sequential Circuits. FSM Overview 9/10/12 9//2 Sequentil (2) ENGG5 st Semester, 22 Dr. Hden So Deprtment of Electricl nd Electronic Engineering http://www.eee.hku.hk/~engg5 Snchronous vs Asnchronous Sequentil Circuit This Course snchronous Sequentil

More information

Energy Harvesting Two-Way Channels With Decoding and Processing Costs

Energy Harvesting Two-Way Channels With Decoding and Processing Costs IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, VOL., NO., MARCH 07 3 Energy Hrvesting Two-Wy Chnnels With Decoding nd Processing Costs Ahmed Arf, Student Member, IEEE, Abdulrhmn Bknin, Student

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad Hll Ticket No Question Pper Code: AEC009 INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigl, Hyderd - 500 043 MODEL QUESTION PAPER Four Yer B.Tech V Semester End Exmintions, Novemer - 2018 Regultions:

More information

Regular languages can be expressed as regular expressions.

Regular languages can be expressed as regular expressions. Regulr lnguges cn e expressed s regulr expressions. A generl nondeterministic finite utomton (GNFA) is kind of NFA such tht: There is unique strt stte nd is unique ccept stte. Every pir of nodes re connected

More information

The Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center

The Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center Resource Overview Quntile Mesure: Skill or Concept: 300Q Model the concept of ddition for sums to 10. (QT N 36) Model the concept of sutrction using numers less thn or equl to 10. (QT N 37) Write ddition

More information

CHARACTERISTICS OF THE GPS SIGNAL SCINTILLATIONS DURING IONOSPHERIC IRREGULARITIES AND THEIR EFFECTS OVER THE GPS SYSTEM

CHARACTERISTICS OF THE GPS SIGNAL SCINTILLATIONS DURING IONOSPHERIC IRREGULARITIES AND THEIR EFFECTS OVER THE GPS SYSTEM CHRCTERISTICS OF THE GPS SIGNL SCINTILLTIONS DURING IONOSPHERIC IRREGULRITIES ND THEIR EFFECTS OVER THE GPS SYSTEM Eurico R. de Paula, I.J.Kantor, L.F.C. de Rezende ERONOMY DIVISION NTIONL INSTITUTE FOR

More information

Redundancy Data Elimination Scheme Based on Stitching Technique in Image Senor Networks

Redundancy Data Elimination Scheme Based on Stitching Technique in Image Senor Networks Sensors & Trnsducers 204 by IFSA Publishing, S. L. http://www.sensorsportl.com Redundncy Dt Elimintion Scheme Bsed on Stitching Technique in Imge Senor Networks hunling Tng hongqing Technology nd Business

More information

A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE

A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE Mster Thesis Division of Electronic Devices Deprtment of Electricl Engineering Linköping University y Timmy Sundström LITH-ISY-EX--05/3698--SE

More information

Design and implementation of a high-speed bit-serial SFQ adder based on the binary decision diagram

Design and implementation of a high-speed bit-serial SFQ adder based on the binary decision diagram INSTITUTE OFPHYSICS PUBLISHING Supercond. Sci. Technol. 16 (23) 1497 152 SUPERCONDUCTORSCIENCE AND TECHNOLOGY PII: S953-248(3)67111-3 Design nd implementtion of high-speed it-seril SFQ dder sed on the

More information

MOS Transistors. Silicon Lattice

MOS Transistors. Silicon Lattice rin n Width W chnnel p-type (doped) sustrte MO Trnsistors n Gte Length L O 2 (insultor) ource Conductor (poly) rin rin Gte nmo trnsistor Gte ource pmo trnsistor licon sustrte doped with impurities dding

More information

Adaptive Network Coding for Wireless Access Networks

Adaptive Network Coding for Wireless Access Networks Adptive Network Coding for Wireless Access Networks Tun Trn School of Electricl Engineering nd Computer Science Oregon Stte University, Corvllis, Oregon 9733 Emil: trntu@eecs.orst.edu Thinh Nguyen School

More information

High-speed Simulation of the GPRS Link Layer

High-speed Simulation of the GPRS Link Layer 989 High-speed Simultion of the GPRS Link Lyer J Gozlvez nd J Dunlop Deprtment of Electronic nd Electricl Engineering, University of Strthclyde 204 George St, Glsgow G-lXW, Scotlnd Tel: +44 4 548 206,

More information

ABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC

ABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC User Mnul ntelligent nstlltion Systems A B 1 2 3 4 5 6 7 8 30 ma 30 ma n = AC Un = 230 V AC 30 ma 9 10 11 12 C ABB STOTZ-KONTAKT Appliction Softwre Current Vlue Threshold/1 Contents Pge 1 Device Chrcteristics...

More information

arxiv: v1 [cs.cc] 29 Mar 2012

arxiv: v1 [cs.cc] 29 Mar 2012 Solving Mhjong Solitire ords with peeking Michiel de Bondt rxiv:1203.6559v1 [cs.cc] 29 Mr 2012 Decemer 22, 2013 Astrct We first prove tht solving Mhjong Solitire ords with peeking is NPcomplete, even if

More information

RT-Link: A Time-Synchronized Link Protocol for Energy Constrained Multi-hop Wireless Networks

RT-Link: A Time-Synchronized Link Protocol for Energy Constrained Multi-hop Wireless Networks RT-Link: A Time-Synchronized Link Protocol for Energy Constrined Multi-hop Wireless Networks Anthony Rowe, Rhul Mnghrm, Rj Rjkumr Electricl nd Computer Engineering Deprtment, Crnegie Mellon University,

More information

A Novel Back EMF Zero Crossing Detection of Brushless DC Motor Based on PWM

A Novel Back EMF Zero Crossing Detection of Brushless DC Motor Based on PWM A ovel Bck EMF Zero Crossing Detection of Brushless DC Motor Bsed on PWM Zhu Bo-peng Wei Hi-feng School of Electricl nd Informtion, Jingsu niversity of Science nd Technology, Zhenjing 1003 Chin) Abstrct:

More information

Simulation of Transformer Based Z-Source Inverter to Obtain High Voltage Boost Ability

Simulation of Transformer Based Z-Source Inverter to Obtain High Voltage Boost Ability Interntionl Journl of cience, Engineering nd Technology Reserch (IJETR), olume 4, Issue 1, October 15 imultion of Trnsformer Bsed Z-ource Inverter to Obtin High oltge Boost Ability A.hnmugpriy 1, M.Ishwry

More information

Chapter 2 Literature Review

Chapter 2 Literature Review Chpter 2 Literture Review 2.1 ADDER TOPOLOGIES Mny different dder rchitectures hve een proposed for inry ddition since 1950 s to improve vrious spects of speed, re nd power. Ripple Crry Adder hve the simplest

More information

Analysis of Coding-aware MAC Protocols based on Reverse Direction Protocol for IEEE based Wireless Networks using Network Coding*

Analysis of Coding-aware MAC Protocols based on Reverse Direction Protocol for IEEE based Wireless Networks using Network Coding* Anlysis of oding-wre MA Protocols sed on Reverse irection Protocol for IEEE 8.-sed Wireless Networks using Network oding* Rul Plcios, Htegereil Kssye Hile, Jesus Alonso-Zrte nd Frizio Grnelli {plciostrujillo,

More information

Geometric quantities for polar curves

Geometric quantities for polar curves Roerto s Notes on Integrl Clculus Chpter 5: Bsic pplictions of integrtion Section 10 Geometric quntities for polr curves Wht you need to know lredy: How to use integrls to compute res nd lengths of regions

More information

Experiment 3: Non-Ideal Operational Amplifiers

Experiment 3: Non-Ideal Operational Amplifiers Experiment 3: Non-Idel Opertionl Amplifiers Fll 2009 Equivlent Circuits The bsic ssumptions for n idel opertionl mplifier re n infinite differentil gin ( d ), n infinite input resistnce (R i ), zero output

More information

Two-layer slotted-waveguide antenna array with broad reflection/gain bandwidth at millimetre-wave frequencies

Two-layer slotted-waveguide antenna array with broad reflection/gain bandwidth at millimetre-wave frequencies Two-lyer slotted-wveguide ntenn rry with rod reflection/gin ndwidth t millimetre-wve frequencies S.-S. Oh, J.-W. Lee, M.-S. Song nd Y.-S. Kim Astrct: A 24 24 slotted-wveguide rry ntenn is presented in

More information

Publication [P5] 2007 ISMA07. Reprinted, with permission.

Publication [P5] 2007 ISMA07. Reprinted, with permission. Publiction [P5] L. Eriksson T. Oksnen PID Controller Tuning for Integrting Processes: Anlysis nd New Design Approch in Proc. ourth Interntionl Symposium on Mechtronics nd its Applictions (ISMA7 Shrjh UAE

More information

Make Your Math Super Powered

Make Your Math Super Powered Mke Your Mth Super Powered: Use Gmes, Chllenges, nd Puzzles Where s the fun? Lern Mth Workshop model by prticipting in one nd explore fun nocost/low-cost gmes nd puzzles tht you cn esily bring into your

More information

Lecture 20. Intro to line integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts.

Lecture 20. Intro to line integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts. Lecture 2 Intro to line integrls Dn Nichols nichols@mth.umss.edu MATH 233, Spring 218 University of Msschusetts April 12, 218 (2) onservtive vector fields We wnt to determine if F P (x, y), Q(x, y) is

More information

A Stochastic Geometry Approach to the Modeling of DSRC for Vehicular Safety Communication

A Stochastic Geometry Approach to the Modeling of DSRC for Vehicular Safety Communication A Stochstic Geometry Approch to the Modeling of DSRC for Vehiculr Sfety Communiction Zhen Tong, Student Member, IEEE, Hongsheng Lu 2, Mrtin Henggi, Fellow, IEEE, nd Christin Poellbuer 2, Senior Member,

More information

Throughput of Wireless Relay Networks with Interference Processing

Throughput of Wireless Relay Networks with Interference Processing NCC 2009, Jnury 16-18, IIT Guwhti 170 Throughput of Wireless Rely Networks with Interference Processing M. Bm, rikrishn Bhshym nd Andrew Thngrj, eprtment of Electricl Engineering, Indin Institute of Technology,

More information

Experiment 3: Non-Ideal Operational Amplifiers

Experiment 3: Non-Ideal Operational Amplifiers Experiment 3: Non-Idel Opertionl Amplifiers 9/11/06 Equivlent Circuits The bsic ssumptions for n idel opertionl mplifier re n infinite differentil gin ( d ), n infinite input resistnce (R i ), zero output

More information

Study on SLT calibration method of 2-port waveguide DUT

Study on SLT calibration method of 2-port waveguide DUT Interntionl Conference on Advnced Electronic cience nd Technology (AET 206) tudy on LT clibrtion method of 2-port wveguide DUT Wenqing Luo, Anyong Hu, Ki Liu nd Xi Chen chool of Electronics nd Informtion

More information

On the Effectivity of Different Pseudo-Noise and Orthogonal Sequences for Speech Encryption from Correlation Properties

On the Effectivity of Different Pseudo-Noise and Orthogonal Sequences for Speech Encryption from Correlation Properties On the Effectivity of Different Pseudo-Noise nd Orthogonl Sequences for Speech Encryption from Correltion Properties V. Anil Kumr, Ahijit Mitr nd S. R. Mhdev Prsnn Astrct We nlyze the effectivity of different

More information

Open Access A Novel Parallel Current-sharing Control Method of Switch Power Supply

Open Access A Novel Parallel Current-sharing Control Method of Switch Power Supply Send Orders for Reprints to reprints@enthmscience.e 170 The Open Electricl & Electronic Engineering Journl, 2014, 8, 170-177 Open Access A Novel Prllel Current-shring Control Method of Switch Power Supply

More information

Experimental Application of H Output-Feedback Controller on Two Links of SCARA Robot

Experimental Application of H Output-Feedback Controller on Two Links of SCARA Robot INTERNATIONAL JOURNAL OF CONTROL, AUTOMATION AND SYSTEMS VOL.5 NO. Jnury 6 ISSN 65-877 (Print) ISSN 65-885 (Online) http://www.reserchpu.org/journl/jc/jc.html Experimentl Appliction of H Output-Feedck

More information

Implementation of Different Architectures of Forward 4x4 Integer DCT For H.264/AVC Encoder

Implementation of Different Architectures of Forward 4x4 Integer DCT For H.264/AVC Encoder Implementtion of Different Architectures of Forwrd 4x4 Integer DCT For H.64/AVC Encoder Bunji Antoinette Ringnyu, Ali Tngel, Emre Krulut 3 Koceli University, Institute of Science nd Technology, Koceli,

More information

METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin

METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN Inventor: Brin L. Bskin 1 ABSTRACT The present invention encompsses method of loction comprising: using plurlity of signl trnsceivers to receive one or

More information

Color gamut reduction techniques for printing with custom inks

Color gamut reduction techniques for printing with custom inks Color gmut reduction techniques for printing with custom inks Sylvin M. CHOSSON *, Roger D. HERSCH * Ecole Polytechnique Fédérle de usnne (EPF) STRCT Printing with custom inks is of interest oth for rtistic

More information

A Cluster-based TDMA System for Inter-Vehicle Communications *

A Cluster-based TDMA System for Inter-Vehicle Communications * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 30, 213-231 (2014) A Cluster-bsed TDMA System for Inter-Vehicle Communictions * Deprtment of Electricl Engineering Ntionl Sun Yt-Sen University Kohsiung,

More information

CSI-SF: Estimating Wireless Channel State Using CSI Sampling & Fusion

CSI-SF: Estimating Wireless Channel State Using CSI Sampling & Fusion CSI-SF: Estimting Wireless Chnnel Stte Using CSI Smpling & Fusion Riccrdo Crepldi, Jeongkeun Lee, Rul Etkin, Sung-Ju Lee, Robin Krvets University of Illinois t Urbn-Chmpign Hewlett-Pckrd Lbortories Emil:{rcrepl,rhk}@illinoisedu,

More information

Performance Monitoring Fundamentals: Demystifying Performance Assessment Techniques

Performance Monitoring Fundamentals: Demystifying Performance Assessment Techniques Simplifying PID Control. Optimizing Plnt Performnce. Performnce Monitoring Fundmentls: Demystifying Performnce Assessment Techniques Roert C. Rice, PhD Rchelle R. Jyringi Dougls J. Cooper, PhD Control

More information

A New Stochastic Inner Product Core Design for Digital FIR Filters

A New Stochastic Inner Product Core Design for Digital FIR Filters MATEC Web of Conferences, (7) DOI:./ mtecconf/7 CSCC 7 A New Stochstic Inner Product Core Design for Digitl FIR Filters Ming Ming Wong,, M. L. Dennis Wong, Cishen Zhng, nd Ismt Hijzin Fculty of Engineering,

More information

DIGITAL multipliers [1], [2] are the core components of

DIGITAL multipliers [1], [2] are the core components of World Acdemy of Science, Engineering nd Technology 9 8 A Reduced-Bit Multipliction Algorithm for Digitl Arithmetic Hrpreet Singh Dhillon nd Ahijit Mitr Astrct A reduced-it multipliction lgorithm sed on

More information

A Development of Earthing-Resistance-Estimation Instrument

A Development of Earthing-Resistance-Estimation Instrument A Development of Erthing-Resistnce-Estimtion Instrument HITOSHI KIJIMA Abstrct: - Whenever erth construction work is done, the implnted number nd depth of electrodes hve to be estimted in order to obtin

More information

THE STUDY OF INFLUENCE CORE MATERIALS ON TECHNOLOGICAL PROPERTIES OF UNIVERSAL BENTONITE MOULDING MATERIALS. Matej BEZNÁK, Vladimír HANZEN, Ján VRABEC

THE STUDY OF INFLUENCE CORE MATERIALS ON TECHNOLOGICAL PROPERTIES OF UNIVERSAL BENTONITE MOULDING MATERIALS. Matej BEZNÁK, Vladimír HANZEN, Ján VRABEC THE STUDY OF INFLUENCE CORE MATERIALS ON TECHNOLOGICAL PROPERTIES OF UNIVERSAL BENTONITE MOULDING MATERIALS Mtej BEZNÁK, Vldimír HANZEN, Ján VRABEC Authors: Mtej Beznák, Assoc. Prof. PhD., Vldimír Hnzen,

More information

Proceedings of Meetings on Acoustics

Proceedings of Meetings on Acoustics Proceedings of Meetings on Acoustics Volume 19, 2013 http://cousticlsociety.org/ ICA 2013 Montrel Montrel, Cnd 2-7 June 2013 Signl Processing in Acoustics Session 4SP: Sensor Arry Bemforming nd Its Applictions

More information

CS2204 DIGITAL LOGIC & STATE MACHINE DESIGN SPRING 2005

CS2204 DIGITAL LOGIC & STATE MACHINE DESIGN SPRING 2005 CS2204 DIGITAL LOGIC & STATE MACHINE DESIGN SPRING 2005 EXPERIMENT 1 FUNDAMENTALS 1. GOALS : Lern how to develop cr lrm digitl circuit during which the following re introduced : CS2204 l fundmentls, nd

More information

Fair Coalitions for Power-Aware Routing in Wireless Networks

Fair Coalitions for Power-Aware Routing in Wireless Networks Fir Colitions for Power-Awre Routing in Wireless Networks Rtul K. Guh, Crl A. Gunter nd Sswti Srkr University of Pennsylvni {rguh@ses, gunter@.cis, swti@.ee }.upenn.edu Astrct Severl power wre routing

More information

Y9.ET1.3 Implementation of Secure Energy Management against Cyber/physical Attacks for FREEDM System

Y9.ET1.3 Implementation of Secure Energy Management against Cyber/physical Attacks for FREEDM System Y9.ET1.3 Implementtion of Secure Energy ngement ginst Cyber/physicl Attcks for FREED System Project Leder: Fculty: Students: Dr. Bruce cillin Dr. o-yuen Chow Jie Dun 1. Project Gols Develop resilient cyber-physicl

More information

Use of compiler optimization of software bypassing as a method to improve energy efficiency of exposed data path architectures

Use of compiler optimization of software bypassing as a method to improve energy efficiency of exposed data path architectures Guzm et l. EURASIP Journl on Emedded Systems 213, 213:9 RESEARCH Open Access Use of compiler optimiztion of softwre ypssing s method to improve energy efficiency of exposed dt pth rchitectures Vldimír

More information

Available online at ScienceDirect. Procedia Engineering 89 (2014 )

Available online at   ScienceDirect. Procedia Engineering 89 (2014 ) Aville online t www.sciencedirect.com ScienceDirect Procedi Engineering 89 (2014 ) 411 417 16th Conference on Wter Distriution System Anlysis, WDSA 2014 A New Indictor for Rel-Time Lek Detection in Wter

More information

To provide data transmission in indoor

To provide data transmission in indoor Hittite Journl of Science nd Engineering, 2018, 5 (1) 25-29 ISSN NUMBER: 2148-4171 DOI: 10.17350/HJSE19030000074 A New Demodultor For Inverse Pulse Position Modultion Technique Mehmet Sönmez Osmniye Korkut

More information

ISSCC 2006 / SESSION 21 / ADVANCED CLOCKING, LOGIC AND SIGNALING TECHNIQUES / 21.5

ISSCC 2006 / SESSION 21 / ADVANCED CLOCKING, LOGIC AND SIGNALING TECHNIQUES / 21.5 21.5 A 1.1GHz Chrge-Recovery Logic Visvesh Sthe, Jung-Ying Chueh, Mrios Ppefthymiou University of Michign, Ann Aror, MI Boost Logic is chrge-recovery circuit fmily cple of operting t GHz-clss frequencies

More information

CAL. NX15 DUO-DISPLAY QUARTZ

CAL. NX15 DUO-DISPLAY QUARTZ L. NX15 UO-ISPLY QURTZ l nlogue time disply l igitl time nd clendr l hronogrph l Tchymeter l t recll function l lrm l Illuminting light (Electroluminescent pnel) ENGLISH Illuminting light (TIME/LENR mode

More information

Module 9. DC Machines. Version 2 EE IIT, Kharagpur

Module 9. DC Machines. Version 2 EE IIT, Kharagpur Module 9 DC Mchines Version EE IIT, Khrgpur esson 40 osses, Efficiency nd Testing of D.C. Mchines Version EE IIT, Khrgpur Contents 40 osses, efficiency nd testing of D.C. mchines (esson-40) 4 40.1 Gols

More information

Algebra Practice. Dr. Barbara Sandall, Ed.D., and Travis Olson, M.S.

Algebra Practice. Dr. Barbara Sandall, Ed.D., and Travis Olson, M.S. By Dr. Brr Sndll, Ed.D., Dr. Melfried Olson, Ed.D., nd Trvis Olson, M.S. COPYRIGHT 2006 Mrk Twin Medi, Inc. ISBN 978-1-58037-754-6 Printing No. 404042-EB Mrk Twin Medi, Inc., Pulishers Distriuted y Crson-Dellos

More information

Student Book SERIES. Fractions. Name

Student Book SERIES. Fractions. Name D Student Book Nme Series D Contents Topic Introducing frctions (pp. ) modelling frctions frctions of collection compring nd ordering frctions frction ingo pply Dte completed / / / / / / / / Topic Types

More information

High Speed On-Chip Interconnects: Trade offs in Passive Termination

High Speed On-Chip Interconnects: Trade offs in Passive Termination High Speed On-Chip Interconnects: Trde offs in Pssive Termintion Rj Prihr University of Rochester, NY, USA prihr@ece.rochester.edu Abstrct In this pper, severl pssive termintion schemes for high speed

More information

Postprint. This is the accepted version of a paper presented at IEEE PES General Meeting.

Postprint.   This is the accepted version of a paper presented at IEEE PES General Meeting. http://www.div-portl.org Postprint This is the ccepted version of pper presented t IEEE PES Generl Meeting. Cittion for the originl published pper: Mhmood, F., Hooshyr, H., Vnfretti, L. (217) Sensitivity

More information

Timing Macro-modeling of IP Blocks with Crosstalk

Timing Macro-modeling of IP Blocks with Crosstalk Timing Mcro-modeling of IP Blocks with Crosstlk Ruiming Chen nd Hi Zhou Electricl nd Computer Engineering Northwestern Universit Evnston, IL 60208 Astrct With the increse of design compleities nd the decrese

More information

Homework #1 due Monday at 6pm. White drop box in Student Lounge on the second floor of Cory. Tuesday labs cancelled next week

Homework #1 due Monday at 6pm. White drop box in Student Lounge on the second floor of Cory. Tuesday labs cancelled next week Announcements Homework #1 due Mondy t 6pm White drop ox in Student Lounge on the second floor of Cory Tuesdy ls cncelled next week Attend your other l slot Books on reserve in Bechtel Hmley, 2 nd nd 3

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-297 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

Localization of Latent Image in Heterophase AgBr(I) Tabular Microcrystals

Localization of Latent Image in Heterophase AgBr(I) Tabular Microcrystals Interntionl ymposium on ilver Hlide Technology Locliztion of Ltent Imge in Heterophse AgBr(I) Tulr Microcrystls Elen V. Prosvirkin, Aigul B. Aishev, Timothy A. Lrichev, Boris A. echkrev Kemerovo tte University,

More information

& Y Connected resistors, Light emitting diode.

& Y Connected resistors, Light emitting diode. & Y Connected resistors, Light emitting diode. Experiment # 02 Ojectives: To get some hndson experience with the physicl instruments. To investigte the equivlent resistors, nd Y connected resistors, nd

More information

Performance Comparison between Network Coding in Space and Routing in Space

Performance Comparison between Network Coding in Space and Routing in Space Performnce omprison etween Network oding in Spce nd Routing in Spce Yunqing Ye, Xin Hung, Ting Wen, Jiqing Hung nd lfred Uwitonze eprtment of lectronics nd Informtion ngineering, Huzhong University of

More information

Network Theorems. Objectives 9.1 INTRODUCTION 9.2 SUPERPOSITION THEOREM

Network Theorems. Objectives 9.1 INTRODUCTION 9.2 SUPERPOSITION THEOREM M09_BOYL3605_13_S_C09.indd Pge 359 24/11/14 1:59 PM f403 /204/PH01893/9780133923605_BOYLSTAD/BOYLSTAD_NTRO_CRCUT_ANALYSS13_S_978013... Network Theorems Ojectives Become fmilir with the superposition theorem

More information

Computing Logic-Stage Delays Using Circuit Simulation and Symbolic Elmore Analysis

Computing Logic-Stage Delays Using Circuit Simulation and Symbolic Elmore Analysis Computing Logic-Stge Delys Using Circuit Simultion nd Symolic Elmore Anlysis Clyton B. McDonld Rndl E. Brynt Deprtment of Electricl nd Computer Engineering Crnegie Mellon University, Pittsurgh, PA 15213

More information

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks BP-PP: Belief Propgtion-Bsed Trust nd Reputtion Mngement for PP Networs Ermn Aydy School of Electricl nd Comp. Eng. Georgi Institute of Technology Atlnt, GA 333, USA Emil: eydy@gtech.edu Frmrz Feri School

More information

4110 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 66, NO. 5, MAY 2017

4110 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 66, NO. 5, MAY 2017 40 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 66, NO. 5, MAY 07 Trnsmit Power Control for DD-Underlid Cellulr Networs Bsed on Sttisticl Fetures Peng Sun, Kng G. Shin, Life Fellow, IEEE, Hilin Zhng,

More information

Analysis of circuits containing active elements by using modified T - graphs

Analysis of circuits containing active elements by using modified T - graphs Anlsis of circuits contining ctive elements using modified T - grphs DALBO BOLEK *) nd EA BOLKOA**) Deprtment of Telecommunictions *) dioelectronics **) Brno Universit of Technolog Purknov 8, 6 Brno CECH

More information

EE Controls Lab #2: Implementing State-Transition Logic on a PLC

EE Controls Lab #2: Implementing State-Transition Logic on a PLC Objective: EE 44 - Controls Lb #2: Implementing Stte-rnsition Logic on PLC ssuming tht speed is not of essence, PLC's cn be used to implement stte trnsition logic. he dvntge of using PLC over using hrdwre

More information

Soft switched DC-DC PWM Converters

Soft switched DC-DC PWM Converters Soft switched DC-DC PWM Converters Mr.M. Prthp Rju (), Dr. A. Jy Lkshmi () Abstrct This pper presents n upgrded soft switching technique- zero current trnsition (ZCT), which gives better turn off chrcteristics

More information

9.4. ; 65. A family of curves has polar equations. ; 66. The astronomer Giovanni Cassini ( ) studied the family of curves with polar equations

9.4. ; 65. A family of curves has polar equations. ; 66. The astronomer Giovanni Cassini ( ) studied the family of curves with polar equations 54 CHAPTER 9 PARAMETRIC EQUATINS AND PLAR CRDINATES 49. r, 5. r sin 3, 5 54 Find the points on the given curve where the tngent line is horizontl or verticl. 5. r 3 cos 5. r e 53. r cos 54. r sin 55. Show

More information

Jamming-Resistant Collaborative Broadcast In Wireless Networks, Part II: Multihop Networks

Jamming-Resistant Collaborative Broadcast In Wireless Networks, Part II: Multihop Networks Jmming-Resistnt ollbortive Brodcst In Wireless Networks, Prt II: Multihop Networks Ling Xio Ximen University, hin 361005 Emil: lxio@xmu.edu.cn Huiyu Di N Stte University, Rleigh, N 27695 Emil: huiyu di@ncsu.edu

More information

Design and Modeling of Substrate Integrated Waveguide based Antenna to Study the Effect of Different Dielectric Materials

Design and Modeling of Substrate Integrated Waveguide based Antenna to Study the Effect of Different Dielectric Materials Design nd Modeling of Substrte Integrted Wveguide bsed Antenn to Study the Effect of Different Dielectric Mterils Jgmeet Kour 1, Gurpdm Singh 1, Sndeep Ary 2 1Deprtment of Electronics nd Communiction Engineering,

More information

A Channel Splitting Technique for Reducing Handoff Delay in Wireless Networks

A Channel Splitting Technique for Reducing Handoff Delay in Wireless Networks Interntionl Journl o Engineering Reserch & Technology (IJERT) A Chnnel Splitting Technique or Reducing Hndo ely in Wireless Networks Jeykumr. J #1, Venktesh. * 2, Vigneswri. G* 3, Nivethith. V *4 # 1 PG

More information

A Practical DPA Countermeasure with BDD Architecture

A Practical DPA Countermeasure with BDD Architecture A Prcticl DPA Countermesure with BDD Architecture Toru Akishit, Msnou Ktgi, Yoshikzu Miyto, Asmi Mizuno, nd Kyoji Shiutni System Technologies Lortories, Sony Corportion, -7- Konn, Minto-ku, Tokyo 8-75,

More information

Topic 20: Huffman Coding

Topic 20: Huffman Coding Topic 0: Huffmn Coding The uthor should gze t Noh, nd... lern, s they did in the Ark, to crowd gret del of mtter into very smll compss. Sydney Smith, dinburgh Review Agend ncoding Compression Huffmn Coding

More information

Off-Chip Data Transmission

Off-Chip Data Transmission Bus Stuttering : n Encoding Technique to Reduce nductie Noise in ff-chip Dt Trnsmission Brock J. LMeres Design lidtion Diision gilent Technologies nc. Colordo Springs, C 97 US Sunil P. Khtri Electricl

More information

CS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates

CS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates Bsic Logic Gtes : Computer Architecture I Boolen Algebr Instructor: Prof. Bhgi Nrhri Dept. of Computer Science Course URL: www.ses.gwu.edu/~bhgiweb/cs35/ Digitl Logic Circuits We sw how we cn build the

More information