Topology Design in Time-Evolving Delay-Tolerant Networks with Unreliable Links
|
|
- Christopher Payne
- 5 years ago
- Views:
Transcription
1 Topology Design in Time-Eoling Dely-Tolernt Networks with Unrelile Links Minsu Hung Siyun Chen Fn Li Yu Wng Deprtment of Computer Science, Uniersity of North Crolin t Chrlotte, Chrlotte, NC 83, USA. School of Computer Science, Beijing Institute of Technology, Beijing, 8, Chin. Astrct With possile prticiption of lrge numer of wireless deices in dely tolernt networks (DTNs), how to mintin efficient nd dynmic topology ecomes crucil. In this pper, we study the topology design prolem in predictle DTN where the time-eoling network topology is known priori or cn e predicted. We model such network s weighted spce-time grph with oth spcil nd temporl informtion. Links inside the spce-time grph re unrelile due to either the dynmic nture of wireless communictions or the rough prediction of underlying humn/deice moility. The im of our topology design prolem is to uild sprse spce-time structure such tht () for ny pir of deices, there is spce-time pth connecting them with the reliility lrger thn required threshold; () the totl cost of the structure is minimized. We first show tht this prolem is NP-hrd, nd then propose seerl heuristics which cn significntly reduce the totl cost of the topology while mintin the relile connectiity oer time. I. INTRODUCTION In dely tolernt networks (DTNs), the lck of continuous connectiity, network prtitioning, long delys, unrelile time-rying links, nd dynmic topology pose new chllenges in design of DTN protocols. Recently, seerl DTN routing schemes [] [3] he een proposed to tke the intermittent connectiity nd time-rying topology into considertion. In ddition, different moility study [], [5] nd grph modeling [6], [7] he een conducted for DTNs to understnd the underlying socil nd temporl chrcteristics of the network prticipnts. Howeer, there is little reserch on how to mintin cost-efficient nd relile topology of DTNs. Network topology is lwys criticl issue in design of ny networking systems. For different network pplictions, network topology cn e designed or controlled under different ojecties (such s power efficiency, fult tolernce, nd throughput mximiztion). Topology control protocols he een well studied in wireless networks [8]. The focus of preious reserch is minly on how to construct cost-efficient structure from sttic nd connected topology. Howeer, in DTNs, the underlying topology is lck of continuous connectiity which mkes existing topology control lgorithms useless. Therefore, how to efficiently mintin dynmic The work of M. Hung, S. Chen, nd Y. Wng is supported in prt y the US Ntionl Science Foundtion (NSF) under Grnt No. CNS-9533 nd CNS The work of F. Li is prtilly supported y the Ntionl Nturl Science Foundtion of Chin under Grnt 6935, Beijing Nturl Science Foundtion under Grnt 7 nd Scientific Reserch Foundtion for the Returned Oerses Chinese Scholrs, Stte Eduction Ministry. Y. Wng (yu.wng@uncc.edu) is the corresponding uthor. topology in DTNs ecomes crucil, especilly with the prticiption of lrge numer of wireless deices. In this pper, we study the topology design prolem in time-eoling nd predictle DTN. DTNs often eole oer time: chnges of network topology cn occur if nodes moe round. For certin type of DTNs, the temporl chrcteristics of topology could e known priori or cn e predicted from historicl dt. For exmple, it is esy to discoery the temporl pttern of topology for DTN formed y either pulic uses [9] or stellites [] which he fixed tours nd schedules, or moile socil network [5] consisting of students who shre fixed clss schedules. A recent study [] on humn moility lso shows tht 93% potentil predictility cn e chieed in humn moility prediction. For this kind of time-eoling nd predictle DTNs, the spce-time grph model [], insted of the sttic grph model, cn e used to cpture oth the spce nd time dimensions of the dynmic network topology nd to enle the emultion of ny storend-forwrd DTN routing methods. Gien such spcetime grph including ll possile temporl nd spcil links, the topology design prolem ims to find sugrph which mintins the connectiity oer time etween ny two deices while minimizing the cost. In our recent study [3], [], we he proposed seerl heuristics for the sic topology design prolem in timeeoling nd predictle DTNs. Those methods ll ssume tht the prediction of future links re perfect nd links re relile for communictions, i.e., the pcket deliery oer these spcil or temporl links is gurnteed nd without errors. This is clerly too optimistic since in prctice, the wireless communictions re unrelile due to the lossy nture of wireless chnnels. In ddition, een though certin type of network moility could e predicted sed on user ehior or historicl dt, the link prediction could e inccurte sometime. Therefore, in this pper, we remoe the strong ssumptions on relile links nd perfect prediction. Insted, for ech spcil or temporl link in the spce-time grph, we ssume it hs proility to reflect its reliility, either sed on link qulity estimtion or moility prediction. Lrger the relile proility of link, higher chnce the DTN trnsmissions oer tht link to e successful. Therefore, gien the weighted spce-time grph, the new relile topology design prolem (RTDP) ims to find sugrph in which the reliility of DTN routing etween ny two deices is gurnteed lrger thn required threshold nd the totl cost
2 of topology is minimized. In this pper, we show tht this new topology design prolem is NP-hrd nd propose fie heuristics which cn significntly reduce the totl cost of network topology while mintining the DTN reliility oer time. For our est knowledge, this pper is the first ttempt to study topology design for time-eoling networks with unrelile links. spce t= t= t=3 t= () 5 time t= t= t=3 t= () Fig.. A time-eoling DTN nd its corresponding spce-time grph: () the time-eoling topology of DTN ( sequence of snpshots); () the corresponding spce-time grph G, where spce-time DTN pth from the source to the destintion 5 is highlighted in lue. II. MODELS, ASSUMPTIONS, AND THE PROBLEM A. Modeling Time-eoling Networks: Spce-time Grphs Assume tht V = {,, n } e the set of ll indiidul nodes (wireless deices) in the network oer period of time T. Here, time is diided into discrete nd equl time slots, e.g. {,, T }. Since positions of indiidul nodes nd the topology co-eole oer time, sequence of sttic grphs cn e defined oer V to model the interctions mong nodes in the time-eoling DTN during certin time slot. Fig. () illustrtes such n exmple. Let G t = (V t, E t ) e directed grph representing the snpshot of the network t time slot t nd link i tt j Et represents tht node i cn communicte to j t time t. Then, the dynmic network is descried y the union of ll snpshots {G t t = T }. Howeer, such sequence of sttic grphs is not directly usele in the nlysis of DTN routing protocols. Some of the snpshots my not e connected grphs t ll (e.g., the first three snpshots in Fig. ()), which mkes routing tsk oer them chllenging. In some existing DTN protocols, n ggregted grph oer {G t } is used, where n edge etween pir of nodes represents these two nodes he intercted t certin point during the time period T. The weight of such n edge could e the frction of the occurrence oer the historicl period of tht interction, i.e., contct proility. Seerl DTN routing protocols [], [3] estimte this contct proility sed on pst contct history nd use it to select rely nodes. Howeer, such ggregted iew discrds temporl informtion out the timing nd order of interctions, which my cuse filure of deliery or d performnces. In this pper, we dopt the spce-time grph [] to model the time-eoling DTNs. We conert the sequence of sttic grphs {G t } into spce-time grph G = (V, E), which is directed grph defined in oth 3 5 spcil nd temporl spces. Fig. () illustrtes the spcetime grph of the sme network in Fig. (). In the spcetime grph G, T + lyers of nodes re defined nd ech lyer hs n nodes, thus the whole ertex set V = {j t j =,, n nd t =,, T } nd there re n(t + ) nodes in G. Two kinds of links (sptil links nd temporl links) re dded etween consecutie lyers in E. A temporl link t j j t (those horizontl links in Fig. ()) connects the sme node j cross consecutie (t )th nd tth lyers, which represents the node crrying the messge in the tth time slot. A sptil link t j k t represents forwrding messge from one node j to its neighor k in the tth time slot (i.e., j k E t ). By defining the spce-time grph G, ny communiction opertion in the time-eoling network cn e simulted on this directed grph. As the lue pth shown in Fig. (), spce-time DTN pth from to 5 shows prticulr DTN routing strtegy to delier the pcket from to 5 in the network: holds the pcket for st time slot, then psses it to 3 t t =, etc. We cn define the connectiity of spce-time grph which is different from tht of sttic grph. Definition : A spce-time grph H is connected oer time period T if nd only if there exists t lest one directed pth for ech pir of nodes (i, T j ) (i nd j in [, n]). This gurntees tht ny pcket cn e deliered etween ny two nodes in the network oer the period of T. Note tht connected spce-time grph does not require the connectiity in eery snpshot. Herefter, we ssume tht the originl spce-time grph G is connected oer time period T. For ech direct link e E, we further ssume tht there is cost c(e), representing the cost ssocited with trnsiting messge oer tht link (trnsiting from one node to the other node oer spcil link or holding the messge within one node oer temporl link). The totl cost of spce-time grph c(h) is defined s the summtion of costs of ll links in H, i.e., c(h) = c(e). () e H The lest cost pth Pc H (u, ) is defined s the pth from u to in H with the minimum totl cost. Its totl cost is denoted y c H (u, ) = e Pc H (u,) c(e). B. Reliility of DTN Topology oer Unrelile Links To consider the reliility of lossy wireless links or unperfected link predictions, we lso define relile proility r(e) for ech link e E, which represents the proility of successful dt trnsmission oer link e. The unreliility of the link could come from either link filure due to lossy wireless signl or poor prediction of future links. Here, we ssume tht the relile proility of ech link cn e otined through link estimtion techniques t the link nd physicl lyers [5] or moility prediction techniques [6]. Fig. () illustrtes simple spce-time grph with just two deices. The lel of ech link e is the pir of cost nd reliility, i.e., (c(e), r(e)). For exmple, in the first time slot, the cost of spcil link is 3 nd its reliility is.6. Gien
3 (,.5) (,.5) (,.5) (,.5) (,.5) (,.5) (3,.6) (,.8) (3,.6) (,.8) (3,.6) (,.8) (3,.6) (,.8) (3,.6) (,.8) (3,.6) (,.8) (5,.) (5,.) (5,.) (5,.) (5,.) (5,.) () G () H (c) H Fig.. Exmples of relile topology design: () the originl spce-time grph G with cost nd reliility.36; () H with cost 6 nd reliility.5; nd (c) H with cost nd reliility.36. Here, links re leled y (cost, reliility), nd green links re remoed links from G. the reliility of ech link, we cn then define the reliility of pth P or structure H. In this pper, we only consider the reliility for single-copy DTN routing where only one copy of ech messge is propgted in the network. Thus, the resulting propgtion pth of messge is siclly single spce-time pth in G. Gien pth P (u, ) connecting nodes u nd, the reliility of P (u, ) is the production of reliility of ll links in tht pth. For exmple, the pth in Fig. () hs reliility of.5.8 =.. For gien routing topology H, we cn define the most relile pth Pr H (u, ) s the pth from u to in H with the highest reliility. Let r H (u, ) = Π e P H r (u,)r(e) e the reliility of pth Pr H (u, ). For exmple, etween nd in Fig. (), is the most relile pth with reliility of.6. =.6. Then the reliility of the topology H is defined s follows r(h) = min i,j n rh (i, j T ). () The reliility of structures shown in Fig. (), () nd (c) re.36,.5 nd.36 respectiely. Notice tht it is esy to clculte r(h) gien H y using ny shortest pth lgorithms. C. Relile Topology Design Prolem We now cn define the relile topology design prolem (RTDP) on weighted spce-time grphs s follows. Definition : Gien connected spce-time grph G, the im of relile topology design prolem (RTDP) is to construct sprse spce-time grph H, which is sugrph of the originl spce-time grph G, such tht () H is still connected oer the time period T ; () the reliility is lrger thn or equl to predefined threshold γ; nd (3) the totl cost of H is minimized. Notice tht generlly speking denser spce-time topology leds to etter connectiity nd reliility ut more expensie in term of totl cost. Therefore, the topology design ims to find topology with certin reliility gurntee while minimizing the cost. If the threshold γ is constnt, the reliility requirement itself coers the sic connectiity, since it is oiously much stronger requirement thn sic connectiity. Once gin, we ssume tht the originl spcetime grph G is connected nd hs reliility lrger thn γ. Fig. () nd (c) show two su-topologies of Fig. () with different costs nd reliility. Note tht these topologies re still connected oer time, i.e., eery node cn find spce-time pth to ny other node. Hrdness of RTDP: The topology design prolem for spce-time grph een without reliility requirement is much hrder thn the one for sttic grph. For sttic grph without time domin, minimum spnning tree cn chiee the gol of keeping connectiity with miniml cost. Howeer, simply pplying the spnning tree in ech snpshot or oer the entire spce-time grph is not direct solution. First, the grph in ech snpshot my not e connected t ll. On the other hnd, spnning tree or forest of the whole spce-time grph connects ech node in eery snpshot, which is not necessry nd wste of mny links. Plus the reliility requirement, the RTDP ecomes more chllenging. In [3], we he proed tht the topology design prolem without reliility requirement is NP-hrd. Since such topology design prolem is specil cse of RTDP when γ =, RTDP is lso NP-hrd. The RTDP is different with the stndrd spce-time routing [], [7], which only ims to find the most cost-efficient spce-time pth for pir of source nd destintion. The topology design prolem ims to mintin oth cost-efficient nd connected spce-time routing topology for supporting relile DTN trnsmissions etween ll pirs of nodes. III. HEURISTICS OF RELIABLE TOPOLOGY DESIGN Since RTDP oer spce-time grphs is NP-hrd, we now propose fie different heuristics to construct sprse structure tht fulfills the connectiity nd reliility requirements oer time. The first three heuristics re sed on minimum cost relile routing, while the other two re sed on greedy lgorithms. For ll lgorithms, the inputs re the originl grph G nd reliility requirement γ, nd the output is sugrph H of G. A. Heuristics Bsed on Min Cost Relile Pth One nturl ide to construct low-cost relile sugrph, which gurntees the route reliility etween ny two nodes oer the time period T, is keeping ll the minimum cost relile pths from i to T j for i, j =,, n in G. Here the minimum cost relile pth connecting u nd, denoted y P G cr(u, ), is the pth with the lest cost mong ll pths etween u nd which he reliility lrger thn or equl to γ. Oiously, if we cn find such pths for eery pir of source nd destintion, the union of ll of them stisfies the reliility requirement of our topology design prolem. Howeer, to find the shortest pth with dditionl constrins in grph itself is lso well known NP-hrd prolem, clled restricted shortest pth prolem [8]. Therefore, in this pper, we use one of
4 the existing heuristics for restricted shortest pth, Bckwrd- Forwrd method (BFM) y Reees nd Slm [9]. The sic ide of Bckwrd-Forwrd method is quite simple. Assume we wnt to find relile pth from s to t. BFM first determines the lest-cost pth (LCP) nd the most relile pth (MRP) from eery node u to t. It then strts from s nd explores the grph y conctenting two segments: () the sofr explored pth from s to n intermedite node u, nd () the LCP or the MRP from node u to t. BFM simply uses Dijkstrs lgorithm with the following modifiction in the relxtion procedure: link u is relxed if it reduces the totl cost from s to while its pproximted end-to-end reliility oeys the reliility constrint. The computtionl complexity of the BFM is siclly three times tht of Dijkstr s lgorithm. Let P G BF M (u, ) e the resulting pth from u to sed on BFM. Notice tht P G BF M (u, ) is not optiml for restricted shortest pth. Howeer, sed on simultion study y Kuipers et l. [], BFM is one of the most efficient methods mong ll existing methods, it hs smll execution time nd often genertes good qulity pth compred with the optiml. Algorithm Union of Min Cost Relile Pth () : H φ; X = {(i, T j )} for ll integer i, j n. : for ll pirs (i, T j ) X do 3: Find the minimum cost relile pth P G BF M ( i, T j ) in G using Bckwrd-Forwrd method. : if e P G BF M ( i, T j ) nd e / H then 5: H = H {e}. 6: return H Algorithm Greedy with Min Cost Relile Pth () : H φ; X = {(i, T j )} for ll i nd j in [, n]. : while X φ do 3: Find the minimum cost relile pths for eery pir nodes in X using BFM in G, nd ssume P BF M (i, T j ) hs the lest cost mong these pths. : if e P BF M (i, T j ) then 5: H e; c(e). 6: X X (i, T j ). 7: return H Algorithm 3 Lest Cost Pth or Min Cost Relile Pth () : H φ; X = {(i, T j )} for ll integer i, j n. : for ll pirs (i, T j ) X do 3: Find the lest cost pth Pc G (i, T j ) in G. : if e Pc G (i, T j ) nd e / H then 5: H = H {e}. 6: for ll pirs (i, T j ) X do 7: if r H (i, T j ) < γ then 8: Add ll links e P G BF M ( i, T j ) into H if e / H. 9: return H With Bckwrd-Fowrd method, our first heuristic pproch is to find minimum cost relile pth for ech pir of source nd destintion nd tke the union of them to form the sugrph which gurntee the oerll reliility. Algorithm shows the detiled lgorithm. Its time complexity is O(n T (log(nt ) + n)) since we only need to compute minimum cost relile pths of G (with O(nT ) nodes nd t most O(n T ) links). This cn e esily chieed y running 3n times of Dijkstr s lgorithm whose complexity is O(nT (log(nt ) + n)). Herefter, we refer this method s union of minimum cost relile pth lgorithm (). Howeer, the structure uilt y the oe method my contin more links thn necessry. Therefore, we propose new greedy lgorithm (s shown in Algorithm ) to further improe the performnce. The sic ide is s follows. We im to connect n pir of nodes in X. In ech round we pick the minimum cost relile pth etween pir nodes in X which is the minimum mong ll minimum cost relile pths connecting ny pir of nodes in X. Then we dd ll links in this pth into H, cler the costs of these links to zeros, nd remoe this pir from X. This procedure is repeted until ll n pir nodes (i, T j ) re gurnteed to e connected y relile pths in H. It is oious tht the output of this method is much sprser thn the one of method. We refer this method s greedy method sed on minimum cost relile pth (). The time complexity is O(T n 5 + T n log(t n)) since 3n times of Dijkstr s lgorithm re running on the spce-time grph in ech round for n rounds. The third method siclly comines the lest cost pth nd the minimum cost relile pth. It includes two steps. In the first step, we connect n pir of nodes in X = {(i, T j )} for ll integer i, j n y dding ll of the lest cost pths etween them. After this step, we he structure H which connects ll pirs of (i, T j ) ut my not stisfy the reliility requirements yet. In the second step, for ech pir (i, T j ), we clculte its reliility in H. If the cost of r H (i, T j ) is less thn γ, we directly dd the links in the minimum cost relile pth etween this two nodes in G into H. See Algorithm 3 for detil. Herefter, we denote this method s. Both steps of need n O(n T (log(nt )+n)) time since they oth run computtion of shortest pths for O(n ) rounds. Therefore, the totl time complexity is O(n T (log(nt )+n)). B. Greedy-sed Heuristics Both the fourth nd fifth lgorithms re sed on the sme greedy principle, deleting or dding edges in order nd checking whether the reliility is chieed or oid. The sic ide of the fourth method is deleting edges from input grph (either the originl grph G or the output grph from the first two lgorithms) in decresing order sed on link cost. Link i tt+ j is remoed if the sugrph H without this link cn still chiee reliility of γ. Algorithm shows the detiled lgorithm, nd we denote it s herefter. The time complexity nlysis is strightforwrd. The sorting could e done in O(n T log(n T )) with O(n T ) links. The for-loop includes n T rounds of computtions of shortest pths. Thus,
5 Algorithm Greedy Algorithm to Delete Links () : H G. : Sort ll links in link set E of G sed on their costs. 3: for ll e E (processed in decresing order of costs) do : if r(h {e}) γ then 5: H = H {e}. 6: return H Algorithm 5 Greedy Algorithm to Add Links () : H φ; X = {(i, T j )} for ll integer i, j n. : for ll pirs (i, T j ) X do 3: Find the lest cost pth Pc G (i, T j ) in G. : if e Pc G (i, T j ) nd e / H then 5: H = H {e}. 6: for ll e G H (in incresing order of costs) do 7: if r(h) < γ then 8: H = H + {e}. 9: return H the time complexity of this prt is O(n T (log(nt ) + n)). Therefore, totl time complexity of is lso in order of O(n T (log(nt ) + n)), which is much higher thn those of methods sed on minimum cost relile pth. Note tht since the outputs of our first two lgorithms re much sprser thn the originl grph ut cn gurntee the reliility, if we use them s the input of it cn se certin computtion cost. The fifth lgorithm is lso greedy lgorithm ut processes links in the reerse order compred with the fourth lgorithm. It strts with uilding connected sprse structure nd then dds more links to stisfy the reliility requirement. It lso includes two steps. In the first step, gin we tke the union of ll lest cost pths etween (i, T j ) for ll integer i, j n s H. In the second step, remining links re processed in the incresing order of cost. Link i tt+ j is dded to H if the current sugrph H cnnot chiee reliility of γ yet. See Algorithm 5 for detil. Herefter, we denote this method s. The complexity of is the sme s the one of (O(n T (log(nt ) + n))) since the second step is lmost the sme with nd the first step cost less time. IV. SIMULATIONS To elute our proposed lgorithms deoted to the RTDP prolem we he conducted extensie simultions oer rndomly generted networks. We implement nd test the following six lgorithms: (Alg ), (Alg. ), (Alg. 3), (Alg. ), (Alg. 5), nd. Here, is the union of lest cost pths from i to j T for i, j =,, n), which mintins the connectiity oer time ut cnnot gurntee the reliility. We use s reference. In ll simultions, we tke three metrics s the performnce mesurement for ny lgorithm deoted to RTDP: Totl Cost: the totl cost of the constructed topology H (output of the lgorithm), i.e., c(h) = e H c(e). Totl Numer of Edges: the totl numer of edges in H, i.e., H. Here, G denotes totl edge numer of G. Reliility: r(h) = min i,j n r H (i, T j ). The ojectie of topology design is to construct topologies with smll totl cost, smll edge numer nd lrger reliility. The underlying time-eoling networks re rndomly generted from rndom grph model. We first generte sequence of sttic rndom grphs {G t } with nodes, spreding oer time slots. For ech time slot t, the sttic grph G t is generted using the clssicl rndom grph genertor. For ech pir of nodes i nd j, we insert edge i j with fixed proility δ into G t. Smll lue of δ leds to sprse DTN, nd δ =. implies tht the topology in ech time slot is complete grph. After generting the sequence of {G t }, we conert it into the corresponding spce-time grph G. The cost nd reliility of ech inserted edge re rndomly chosen from to 5 nd from.8 to, respectiely. For ech setting, we generte rndom time-eoling networks nd report the erge performnce of our lgorithms mong them. For the first set of simultions, we increse the network density y rising δ from. to.8, nd keep reliility requirement γ t.6. Fig. 3() nd 3() show the rtios etween the totl cost/numer-edges of the generted grph H nd tht of the originl grph G with incresing δ. This rtio implies how much sing chieed y the topology design lgorithm, compred with the originl network. From the results, ll lgorithms cn significntly reduce the cost of mintining the connectiity. Een with the lest density (δ =.), ll lgorithms except for cn se more thn 7% cost nd round 65% edges. When the network is denser, the sing of topology design is lrger. For δ =.8, more thn 85% cost is sed. Compring ll methods, we cn find the following osertions. () hs the lest cost since it only gurntee the connectiity while other proposed lgorithms gurntee the reliility; () hs the lrgest cost due to simply dding mny low-cost links; (3) chiees smller cost thn since it reuse some links in preious rounds; () s cost is etween s nd s since it comines oth LCP nd MCRP; (5) Oerll, nd he the est costs mong the proposed fie methods. Fig. 3(c) shows the reliility of ech structure generted y ll methods. Clerly, LCP is the only lgorithm tht cnnot stisfy the reliility requirement γ =.6. It is n lgorithm only for mintining the connectiity oer time. All other fie lgorithms cn lwys chiee the desired reliility, nd they he ery close performnce in term of reliility. But considering their costs,,, re etter choices. When G is sprse (e.g. δ =.), its reliility is just oer.6. In tht cse, our proposed lgorithms remoe round 7% edges ut still keep the reliility t the desired leel. This clerly demonstrtes the power of topology design. In the second set of simultions, we fixed the network density δ =.5 nd run our lgorithms with different reliility requirement γ incresing from.3 to.6. From results shown in Fig., we cn osere tht tighter reliility requirement results in higher cost nd lrger numer of
6 rtio of totl cost rtio of edge numer unicsting reliility G δ δ () c(h)/c(g) () H / G (c) r(h) Fig. 3. Simultion results on rndom networks with different density nd γ =.6. ()-(): The cost (or edge numer) of H is diided y the cost (or edge numer) of G, which shows how much sing chieed y proposed methods. (c): The reliility r(h) shows the reliility of H. δ rtio of totl cost rtio of edge numer unicsting reliility G γ γ () c(h)/c(g) () H / G (c) r(h) Fig.. Simultion results on rndom networks with fixed network density δ =.5 nd rying reliility requirement γ. γ edge-usge of our topology lgorithms. When the reliility requirement ecomes looser, the restriction on remoing links ecomes weker. In the extreme cse with γ =, our RTDP conerges to the sic topology design prolem [3] which only preseres the connectiity. Notice tht performnces of LCP do not ffect y the reliility requirement. In ddition, performs etter when the reliility requirement is smll. V. CONCLUSION We study relile topology design prolem in predictle time-eoling DTN with unrelile links modeled y proilistic spce-time grph. We propose set of new heuristics which cn not only mintin the connectiity nd reliility of pths oer time ut lso significntly reduce the cost of topology. Simultion results from rndom networks demonstrte the efficiency of our methods. We eliee tht this pper presents the first step in exploiting topology design for time-eoling DTNs with unrelile links. REFERENCES [] Q. Yun, I. Crdei, nd J. Wu, Predict nd rely: n efficient routing in disruption-tolernt networks, in ACM MoiHoc 9, 9. [] T. Spyropoulos, et l., Spry nd wit: n efficient routing scheme for intermittently connected moile networks, in ACM WDTN 5, 5. [3] A. Lindgren, A. Dori, O. Schelén, Proilistic routing in intermittently connected networks, Mo. Comp. Comm. Re., 7(3):9, 3. [] J. Leguy, T. Friedmn, nd V. Conn, Eluting moility pttern spce routing for DTNs, in IEEE INFOCOM, 6. [5] V. Srinisn, et l., Anlysis nd implictions of student contct ptterns deried from cmpus schedules, in ACM Moicom, 6. [6] E.M. Dly nd M. Hhr, Socil network nlysis for routing in disconnected dely-tolernt mnets, in ACM MoiHoc, 7. [7] T. Hossmnn, et l., Know thy neighor: towrds optiml mpping of contcts to socil grphs for DTN routing, in IEEE INFOCOM, 9. [8] Y. Wng, Topology control for wireless sensor networks, ook chpter, Sensor Networks & Applictions (eds. Y. Li et l.), Springer, 7. [9] X. Zhng, J. Kurose, B.N. Leine, D. Towsley, nd H. Zhng, Study of us-sed disruption-tolernt network: moility modeling nd impct on routing, in ACM MoiCom 7, 7. [] S. Burleigh nd A. Hooke, Dely-tolernt networking: n pproch to interplnetry internet, IEEE Commun. Mg., (6):8 36, 3. [] C. Song, Z. Qu, N. Blumm, nd A.-L. Brsi, Limits of predictility in humn moility, Science, 37:8,. [] S. Merugu, M. Ammr, nd E. Zegur, Routing in spce nd time in networks with predictle moility, GIT, Tech. Rep., CC--7,. [3] M. Hung, S. Chen, Y. Zhu, et l., Topology control for time-eoling nd predictle dely-tolernt networks, in IEEE MASS,. [] M. Hung, S. Chen, et l., Cost-efficient topology design prolem in time-eoling dely-tolernt networks, in IEEE Gloecom,. [5] N. Bccour, et l., A comprtie simultion study of link qulity estimtors in wireless sensor networks, in IEEE MASCOTS, 9. [6] W. Su, S. Lee, nd M. Gerl, Moility prediction in wireless networks, in IEEE MILCOM,. [7] B.B. Xun, A. Ferreir, nd A. Jrry, Computing shortest, fstest, nd foremost journeys in dynmic networks, Int l J. of Foundtions of Computer Science, ():67 85, 3. [8] F. A. Kuipers, An oeriew of constrint-sed pth selection lgorithms for QoS routing, IEEE Communictions Mgzine, 5 56,. [9] D. S. Reees nd H. F. Slm, A distriuted lgorithm for delyconstrined unicst routing, IEEE/ACM Trns. Netw., 8:39 5,. [] F. Kuipers, T. Korkmz, et l., Performnce elution of constrintsed pth selection lgorithms, IEEE Network, 8:6 3,.
A New Algorithm to Compute Alternate Paths in Reliable OSPF (ROSPF)
A New Algorithm to Compute Alternte Pths in Relile OSPF (ROSPF) Jin Pu *, Eric Mnning, Gholmli C. Shoj, Annd Srinivsn ** PANDA Group, Computer Science Deprtment University of Victori Victori, BC, Cnd Astrct
More informationMAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES
MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES Romn V. Tyshchuk Informtion Systems Deprtment, AMI corportion, Donetsk, Ukrine E-mil: rt_science@hotmil.com 1 INTRODUCTION During the considertion
More informationMulti-beam antennas in a broadband wireless access system
Multi-em ntenns in rodnd wireless ccess system Ulrik Engström, Mrtin Johnsson, nders Derneryd nd jörn Johnnisson ntenn Reserch Center Ericsson Reserch Ericsson SE-4 84 Mölndl Sweden E-mil: ulrik.engstrom@ericsson.com,
More informationTravel Prediction-based Data Forwarding for Sparse Vehicular Networks. Technical Report
Trvel Prediction-sed Dt Forwrding for Sprse Vehiculr Networks Technicl Report Deprtment of Computer Science nd Engineering University of Minnesot 4-192 Keller Hll 200 Union Street SE Minnepolis, MN 55455-0159
More informationCHAPTER 2 LITERATURE STUDY
CHAPTER LITERATURE STUDY. Introduction Multipliction involves two bsic opertions: the genertion of the prtil products nd their ccumultion. Therefore, there re two possible wys to speed up the multipliction:
More informationEfficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment
Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 1 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment Roerto Di Pietro, Luigi V. Mncini, nd Alessndro
More informationMixed CMOS PTL Adders
Anis do XXVI Congresso d SBC WCOMPA l I Workshop de Computção e Aplicções 14 20 de julho de 2006 Cmpo Grnde, MS Mixed CMOS PTL Adders Déor Mott, Reginldo d N. Tvres Engenhri em Sistems Digitis Universidde
More informationCHAPTER 3 AMPLIFIER DESIGN TECHNIQUES
CHAPTER 3 AMPLIFIER DEIGN TECHNIQUE 3.0 Introduction olid-stte microwve mplifiers ply n importnt role in communiction where it hs different pplictions, including low noise, high gin, nd high power mplifiers.
More informationMath Circles Finite Automata Question Sheet 3 (Solutions)
Mth Circles Finite Automt Question Sheet 3 (Solutions) Nickols Rollick nrollick@uwterloo.c Novemer 2, 28 Note: These solutions my give you the nswers to ll the prolems, ut they usully won t tell you how
More informationAlgorithms for Memory Hierarchies Lecture 14
Algorithms for emory Hierrchies Lecture 4 Lecturer: Nodri Sitchinv Scribe: ichel Hmnn Prllelism nd Cche Obliviousness The combintion of prllelism nd cche obliviousness is n ongoing topic of reserch, in
More informationDataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1)
The slides contin revisited mterils from: Peter Mrwedel, TU Dortmund Lothr Thiele, ETH Zurich Frnk Vhid, University of liforni, Riverside Dtflow Lnguge Model Drsticlly different wy of looking t computtion:
More informationKirchhoff s Rules. Kirchhoff s Laws. Kirchhoff s Rules. Kirchhoff s Laws. Practice. Understanding SPH4UW. Kirchhoff s Voltage Rule (KVR):
SPH4UW Kirchhoff s ules Kirchhoff s oltge ule (K): Sum of voltge drops round loop is zero. Kirchhoff s Lws Kirchhoff s Current ule (KC): Current going in equls current coming out. Kirchhoff s ules etween
More informationNetwork-coded Cooperation for Multi-unicast with Non-Ideal Source-Relay Channels
This full text pper ws peer reviewed t the direction of IEEE Communictions Society suject mtter experts for puliction in the IEEE ICC 2010 proceedings Network-coded Coopertion for Multi-unicst with Non-Idel
More informationOn the Description of Communications Between Software Components with UML
On the Description of Communictions Between Softwre Components with UML Zhiwei An Dennis Peters Fculty of Engineering nd Applied Science Memoril University of Newfoundlnd St. John s NL A1B 3X5 zhiwei@engr.mun.c
More informationGenetic Representations for Evolutionary Minimization of Network Coding Resources
Genetic Representtions for Evolutionry Minimiztion of Network Coding Resources Minkyu Kim 1, Vrun Aggrwl 2, Un-My O Reilly 2, Muriel Médrd 1, nd Wonsik Kim 1 1 Lortory for Informtion nd Decision Systems
More informationInformation-Coupled Turbo Codes for LTE Systems
Informtion-Coupled Turbo Codes for LTE Systems Lei Yng, Yixun Xie, Xiowei Wu, Jinhong Yun, Xingqing Cheng nd Lei Wn rxiv:709.06774v [cs.it] 20 Sep 207 Abstrct We propose new clss of informtion-coupled
More informationInterference Cancellation Method without Feedback Amount for Three Users Interference Channel
Open Access Librry Journl 07, Volume, e57 ISSN Online: -97 ISSN Print: -9705 Interference Cncelltion Method without Feedbc Amount for Three Users Interference Chnnel Xini Tin, otin Zhng, Wenie Ji School
More informationA Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Radio Networks
Globecom 04 - Wireless Networking Symposium A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Rdio Networks Xingy Liu nd Jing Xie Deprtment of Electricl nd Computer Engineering
More informationArea-Time Efficient Digit-Serial-Serial Two s Complement Multiplier
Are-Time Efficient Digit-Seril-Seril Two s Complement Multiplier Essm Elsyed nd Htem M. El-Boghddi Computer Engineering Deprtment, Ciro University, Egypt Astrct - Multipliction is n importnt primitive
More informationDiscontinued AN6262N, AN6263N. (planed maintenance type, maintenance type, planed discontinued typed, discontinued type)
ICs for Cssette, Cssette Deck ANN, ANN Puse Detection s of Rdio Cssette, Cssette Deck Overview The ANN nd the ANN re the puse detection integrted circuits which select the progrm on the cssette tpe. In
More informationUnderstanding Basic Analog Ideal Op Amps
Appliction Report SLAA068A - April 2000 Understnding Bsic Anlog Idel Op Amps Ron Mncini Mixed Signl Products ABSTRACT This ppliction report develops the equtions for the idel opertionl mplifier (op mp).
More informationSolutions to exercise 1 in ETS052 Computer Communication
Solutions to exercise in TS52 Computer Communiction 23 Septemer, 23 If it occupies millisecond = 3 seconds, then second is occupied y 3 = 3 its = kps. kps If it occupies 2 microseconds = 2 6 seconds, then
More information10.4 AREAS AND LENGTHS IN POLAR COORDINATES
65 CHAPTER PARAMETRIC EQUATINS AND PLAR CRDINATES.4 AREAS AND LENGTHS IN PLAR CRDINATES In this section we develop the formul for the re of region whose oundry is given y polr eqution. We need to use the
More informationSequential Logic (2) Synchronous vs Asynchronous Sequential Circuit. Clock Signal. Synchronous Sequential Circuits. FSM Overview 9/10/12
9//2 Sequentil (2) ENGG5 st Semester, 22 Dr. Hden So Deprtment of Electricl nd Electronic Engineering http://www.eee.hku.hk/~engg5 Snchronous vs Asnchronous Sequentil Circuit This Course snchronous Sequentil
More informationEnergy Harvesting Two-Way Channels With Decoding and Processing Costs
IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, VOL., NO., MARCH 07 3 Energy Hrvesting Two-Wy Chnnels With Decoding nd Processing Costs Ahmed Arf, Student Member, IEEE, Abdulrhmn Bknin, Student
More informationINSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad
Hll Ticket No Question Pper Code: AEC009 INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigl, Hyderd - 500 043 MODEL QUESTION PAPER Four Yer B.Tech V Semester End Exmintions, Novemer - 2018 Regultions:
More informationRegular languages can be expressed as regular expressions.
Regulr lnguges cn e expressed s regulr expressions. A generl nondeterministic finite utomton (GNFA) is kind of NFA such tht: There is unique strt stte nd is unique ccept stte. Every pir of nodes re connected
More informationThe Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center
Resource Overview Quntile Mesure: Skill or Concept: 300Q Model the concept of ddition for sums to 10. (QT N 36) Model the concept of sutrction using numers less thn or equl to 10. (QT N 37) Write ddition
More informationCHARACTERISTICS OF THE GPS SIGNAL SCINTILLATIONS DURING IONOSPHERIC IRREGULARITIES AND THEIR EFFECTS OVER THE GPS SYSTEM
CHRCTERISTICS OF THE GPS SIGNL SCINTILLTIONS DURING IONOSPHERIC IRREGULRITIES ND THEIR EFFECTS OVER THE GPS SYSTEM Eurico R. de Paula, I.J.Kantor, L.F.C. de Rezende ERONOMY DIVISION NTIONL INSTITUTE FOR
More informationRedundancy Data Elimination Scheme Based on Stitching Technique in Image Senor Networks
Sensors & Trnsducers 204 by IFSA Publishing, S. L. http://www.sensorsportl.com Redundncy Dt Elimintion Scheme Bsed on Stitching Technique in Imge Senor Networks hunling Tng hongqing Technology nd Business
More informationA COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE
A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE Mster Thesis Division of Electronic Devices Deprtment of Electricl Engineering Linköping University y Timmy Sundström LITH-ISY-EX--05/3698--SE
More informationDesign and implementation of a high-speed bit-serial SFQ adder based on the binary decision diagram
INSTITUTE OFPHYSICS PUBLISHING Supercond. Sci. Technol. 16 (23) 1497 152 SUPERCONDUCTORSCIENCE AND TECHNOLOGY PII: S953-248(3)67111-3 Design nd implementtion of high-speed it-seril SFQ dder sed on the
More informationMOS Transistors. Silicon Lattice
rin n Width W chnnel p-type (doped) sustrte MO Trnsistors n Gte Length L O 2 (insultor) ource Conductor (poly) rin rin Gte nmo trnsistor Gte ource pmo trnsistor licon sustrte doped with impurities dding
More informationAdaptive Network Coding for Wireless Access Networks
Adptive Network Coding for Wireless Access Networks Tun Trn School of Electricl Engineering nd Computer Science Oregon Stte University, Corvllis, Oregon 9733 Emil: trntu@eecs.orst.edu Thinh Nguyen School
More informationHigh-speed Simulation of the GPRS Link Layer
989 High-speed Simultion of the GPRS Link Lyer J Gozlvez nd J Dunlop Deprtment of Electronic nd Electricl Engineering, University of Strthclyde 204 George St, Glsgow G-lXW, Scotlnd Tel: +44 4 548 206,
More informationABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC
User Mnul ntelligent nstlltion Systems A B 1 2 3 4 5 6 7 8 30 ma 30 ma n = AC Un = 230 V AC 30 ma 9 10 11 12 C ABB STOTZ-KONTAKT Appliction Softwre Current Vlue Threshold/1 Contents Pge 1 Device Chrcteristics...
More informationarxiv: v1 [cs.cc] 29 Mar 2012
Solving Mhjong Solitire ords with peeking Michiel de Bondt rxiv:1203.6559v1 [cs.cc] 29 Mr 2012 Decemer 22, 2013 Astrct We first prove tht solving Mhjong Solitire ords with peeking is NPcomplete, even if
More informationRT-Link: A Time-Synchronized Link Protocol for Energy Constrained Multi-hop Wireless Networks
RT-Link: A Time-Synchronized Link Protocol for Energy Constrined Multi-hop Wireless Networks Anthony Rowe, Rhul Mnghrm, Rj Rjkumr Electricl nd Computer Engineering Deprtment, Crnegie Mellon University,
More informationA Novel Back EMF Zero Crossing Detection of Brushless DC Motor Based on PWM
A ovel Bck EMF Zero Crossing Detection of Brushless DC Motor Bsed on PWM Zhu Bo-peng Wei Hi-feng School of Electricl nd Informtion, Jingsu niversity of Science nd Technology, Zhenjing 1003 Chin) Abstrct:
More informationSimulation of Transformer Based Z-Source Inverter to Obtain High Voltage Boost Ability
Interntionl Journl of cience, Engineering nd Technology Reserch (IJETR), olume 4, Issue 1, October 15 imultion of Trnsformer Bsed Z-ource Inverter to Obtin High oltge Boost Ability A.hnmugpriy 1, M.Ishwry
More informationChapter 2 Literature Review
Chpter 2 Literture Review 2.1 ADDER TOPOLOGIES Mny different dder rchitectures hve een proposed for inry ddition since 1950 s to improve vrious spects of speed, re nd power. Ripple Crry Adder hve the simplest
More informationAnalysis of Coding-aware MAC Protocols based on Reverse Direction Protocol for IEEE based Wireless Networks using Network Coding*
Anlysis of oding-wre MA Protocols sed on Reverse irection Protocol for IEEE 8.-sed Wireless Networks using Network oding* Rul Plcios, Htegereil Kssye Hile, Jesus Alonso-Zrte nd Frizio Grnelli {plciostrujillo,
More informationGeometric quantities for polar curves
Roerto s Notes on Integrl Clculus Chpter 5: Bsic pplictions of integrtion Section 10 Geometric quntities for polr curves Wht you need to know lredy: How to use integrls to compute res nd lengths of regions
More informationExperiment 3: Non-Ideal Operational Amplifiers
Experiment 3: Non-Idel Opertionl Amplifiers Fll 2009 Equivlent Circuits The bsic ssumptions for n idel opertionl mplifier re n infinite differentil gin ( d ), n infinite input resistnce (R i ), zero output
More informationTwo-layer slotted-waveguide antenna array with broad reflection/gain bandwidth at millimetre-wave frequencies
Two-lyer slotted-wveguide ntenn rry with rod reflection/gin ndwidth t millimetre-wve frequencies S.-S. Oh, J.-W. Lee, M.-S. Song nd Y.-S. Kim Astrct: A 24 24 slotted-wveguide rry ntenn is presented in
More informationPublication [P5] 2007 ISMA07. Reprinted, with permission.
Publiction [P5] L. Eriksson T. Oksnen PID Controller Tuning for Integrting Processes: Anlysis nd New Design Approch in Proc. ourth Interntionl Symposium on Mechtronics nd its Applictions (ISMA7 Shrjh UAE
More informationMake Your Math Super Powered
Mke Your Mth Super Powered: Use Gmes, Chllenges, nd Puzzles Where s the fun? Lern Mth Workshop model by prticipting in one nd explore fun nocost/low-cost gmes nd puzzles tht you cn esily bring into your
More informationLecture 20. Intro to line integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts.
Lecture 2 Intro to line integrls Dn Nichols nichols@mth.umss.edu MATH 233, Spring 218 University of Msschusetts April 12, 218 (2) onservtive vector fields We wnt to determine if F P (x, y), Q(x, y) is
More informationA Stochastic Geometry Approach to the Modeling of DSRC for Vehicular Safety Communication
A Stochstic Geometry Approch to the Modeling of DSRC for Vehiculr Sfety Communiction Zhen Tong, Student Member, IEEE, Hongsheng Lu 2, Mrtin Henggi, Fellow, IEEE, nd Christin Poellbuer 2, Senior Member,
More informationThroughput of Wireless Relay Networks with Interference Processing
NCC 2009, Jnury 16-18, IIT Guwhti 170 Throughput of Wireless Rely Networks with Interference Processing M. Bm, rikrishn Bhshym nd Andrew Thngrj, eprtment of Electricl Engineering, Indin Institute of Technology,
More informationExperiment 3: Non-Ideal Operational Amplifiers
Experiment 3: Non-Idel Opertionl Amplifiers 9/11/06 Equivlent Circuits The bsic ssumptions for n idel opertionl mplifier re n infinite differentil gin ( d ), n infinite input resistnce (R i ), zero output
More informationStudy on SLT calibration method of 2-port waveguide DUT
Interntionl Conference on Advnced Electronic cience nd Technology (AET 206) tudy on LT clibrtion method of 2-port wveguide DUT Wenqing Luo, Anyong Hu, Ki Liu nd Xi Chen chool of Electronics nd Informtion
More informationOn the Effectivity of Different Pseudo-Noise and Orthogonal Sequences for Speech Encryption from Correlation Properties
On the Effectivity of Different Pseudo-Noise nd Orthogonl Sequences for Speech Encryption from Correltion Properties V. Anil Kumr, Ahijit Mitr nd S. R. Mhdev Prsnn Astrct We nlyze the effectivity of different
More informationOpen Access A Novel Parallel Current-sharing Control Method of Switch Power Supply
Send Orders for Reprints to reprints@enthmscience.e 170 The Open Electricl & Electronic Engineering Journl, 2014, 8, 170-177 Open Access A Novel Prllel Current-shring Control Method of Switch Power Supply
More informationExperimental Application of H Output-Feedback Controller on Two Links of SCARA Robot
INTERNATIONAL JOURNAL OF CONTROL, AUTOMATION AND SYSTEMS VOL.5 NO. Jnury 6 ISSN 65-877 (Print) ISSN 65-885 (Online) http://www.reserchpu.org/journl/jc/jc.html Experimentl Appliction of H Output-Feedck
More informationImplementation of Different Architectures of Forward 4x4 Integer DCT For H.264/AVC Encoder
Implementtion of Different Architectures of Forwrd 4x4 Integer DCT For H.64/AVC Encoder Bunji Antoinette Ringnyu, Ali Tngel, Emre Krulut 3 Koceli University, Institute of Science nd Technology, Koceli,
More informationMETHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin
METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN Inventor: Brin L. Bskin 1 ABSTRACT The present invention encompsses method of loction comprising: using plurlity of signl trnsceivers to receive one or
More informationColor gamut reduction techniques for printing with custom inks
Color gmut reduction techniques for printing with custom inks Sylvin M. CHOSSON *, Roger D. HERSCH * Ecole Polytechnique Fédérle de usnne (EPF) STRCT Printing with custom inks is of interest oth for rtistic
More informationA Cluster-based TDMA System for Inter-Vehicle Communications *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 30, 213-231 (2014) A Cluster-bsed TDMA System for Inter-Vehicle Communictions * Deprtment of Electricl Engineering Ntionl Sun Yt-Sen University Kohsiung,
More informationCSI-SF: Estimating Wireless Channel State Using CSI Sampling & Fusion
CSI-SF: Estimting Wireless Chnnel Stte Using CSI Smpling & Fusion Riccrdo Crepldi, Jeongkeun Lee, Rul Etkin, Sung-Ju Lee, Robin Krvets University of Illinois t Urbn-Chmpign Hewlett-Pckrd Lbortories Emil:{rcrepl,rhk}@illinoisedu,
More informationPerformance Monitoring Fundamentals: Demystifying Performance Assessment Techniques
Simplifying PID Control. Optimizing Plnt Performnce. Performnce Monitoring Fundmentls: Demystifying Performnce Assessment Techniques Roert C. Rice, PhD Rchelle R. Jyringi Dougls J. Cooper, PhD Control
More informationA New Stochastic Inner Product Core Design for Digital FIR Filters
MATEC Web of Conferences, (7) DOI:./ mtecconf/7 CSCC 7 A New Stochstic Inner Product Core Design for Digitl FIR Filters Ming Ming Wong,, M. L. Dennis Wong, Cishen Zhng, nd Ismt Hijzin Fculty of Engineering,
More informationDIGITAL multipliers [1], [2] are the core components of
World Acdemy of Science, Engineering nd Technology 9 8 A Reduced-Bit Multipliction Algorithm for Digitl Arithmetic Hrpreet Singh Dhillon nd Ahijit Mitr Astrct A reduced-it multipliction lgorithm sed on
More informationA Development of Earthing-Resistance-Estimation Instrument
A Development of Erthing-Resistnce-Estimtion Instrument HITOSHI KIJIMA Abstrct: - Whenever erth construction work is done, the implnted number nd depth of electrodes hve to be estimted in order to obtin
More informationTHE STUDY OF INFLUENCE CORE MATERIALS ON TECHNOLOGICAL PROPERTIES OF UNIVERSAL BENTONITE MOULDING MATERIALS. Matej BEZNÁK, Vladimír HANZEN, Ján VRABEC
THE STUDY OF INFLUENCE CORE MATERIALS ON TECHNOLOGICAL PROPERTIES OF UNIVERSAL BENTONITE MOULDING MATERIALS Mtej BEZNÁK, Vldimír HANZEN, Ján VRABEC Authors: Mtej Beznák, Assoc. Prof. PhD., Vldimír Hnzen,
More informationProceedings of Meetings on Acoustics
Proceedings of Meetings on Acoustics Volume 19, 2013 http://cousticlsociety.org/ ICA 2013 Montrel Montrel, Cnd 2-7 June 2013 Signl Processing in Acoustics Session 4SP: Sensor Arry Bemforming nd Its Applictions
More informationCS2204 DIGITAL LOGIC & STATE MACHINE DESIGN SPRING 2005
CS2204 DIGITAL LOGIC & STATE MACHINE DESIGN SPRING 2005 EXPERIMENT 1 FUNDAMENTALS 1. GOALS : Lern how to develop cr lrm digitl circuit during which the following re introduced : CS2204 l fundmentls, nd
More informationFair Coalitions for Power-Aware Routing in Wireless Networks
Fir Colitions for Power-Awre Routing in Wireless Networks Rtul K. Guh, Crl A. Gunter nd Sswti Srkr University of Pennsylvni {rguh@ses, gunter@.cis, swti@.ee }.upenn.edu Astrct Severl power wre routing
More informationY9.ET1.3 Implementation of Secure Energy Management against Cyber/physical Attacks for FREEDM System
Y9.ET1.3 Implementtion of Secure Energy ngement ginst Cyber/physicl Attcks for FREED System Project Leder: Fculty: Students: Dr. Bruce cillin Dr. o-yuen Chow Jie Dun 1. Project Gols Develop resilient cyber-physicl
More informationUse of compiler optimization of software bypassing as a method to improve energy efficiency of exposed data path architectures
Guzm et l. EURASIP Journl on Emedded Systems 213, 213:9 RESEARCH Open Access Use of compiler optimiztion of softwre ypssing s method to improve energy efficiency of exposed dt pth rchitectures Vldimír
More informationAvailable online at ScienceDirect. Procedia Engineering 89 (2014 )
Aville online t www.sciencedirect.com ScienceDirect Procedi Engineering 89 (2014 ) 411 417 16th Conference on Wter Distriution System Anlysis, WDSA 2014 A New Indictor for Rel-Time Lek Detection in Wter
More informationTo provide data transmission in indoor
Hittite Journl of Science nd Engineering, 2018, 5 (1) 25-29 ISSN NUMBER: 2148-4171 DOI: 10.17350/HJSE19030000074 A New Demodultor For Inverse Pulse Position Modultion Technique Mehmet Sönmez Osmniye Korkut
More informationISSCC 2006 / SESSION 21 / ADVANCED CLOCKING, LOGIC AND SIGNALING TECHNIQUES / 21.5
21.5 A 1.1GHz Chrge-Recovery Logic Visvesh Sthe, Jung-Ying Chueh, Mrios Ppefthymiou University of Michign, Ann Aror, MI Boost Logic is chrge-recovery circuit fmily cple of operting t GHz-clss frequencies
More informationCAL. NX15 DUO-DISPLAY QUARTZ
L. NX15 UO-ISPLY QURTZ l nlogue time disply l igitl time nd clendr l hronogrph l Tchymeter l t recll function l lrm l Illuminting light (Electroluminescent pnel) ENGLISH Illuminting light (TIME/LENR mode
More informationModule 9. DC Machines. Version 2 EE IIT, Kharagpur
Module 9 DC Mchines Version EE IIT, Khrgpur esson 40 osses, Efficiency nd Testing of D.C. Mchines Version EE IIT, Khrgpur Contents 40 osses, efficiency nd testing of D.C. mchines (esson-40) 4 40.1 Gols
More informationAlgebra Practice. Dr. Barbara Sandall, Ed.D., and Travis Olson, M.S.
By Dr. Brr Sndll, Ed.D., Dr. Melfried Olson, Ed.D., nd Trvis Olson, M.S. COPYRIGHT 2006 Mrk Twin Medi, Inc. ISBN 978-1-58037-754-6 Printing No. 404042-EB Mrk Twin Medi, Inc., Pulishers Distriuted y Crson-Dellos
More informationStudent Book SERIES. Fractions. Name
D Student Book Nme Series D Contents Topic Introducing frctions (pp. ) modelling frctions frctions of collection compring nd ordering frctions frction ingo pply Dte completed / / / / / / / / Topic Types
More informationHigh Speed On-Chip Interconnects: Trade offs in Passive Termination
High Speed On-Chip Interconnects: Trde offs in Pssive Termintion Rj Prihr University of Rochester, NY, USA prihr@ece.rochester.edu Abstrct In this pper, severl pssive termintion schemes for high speed
More informationPostprint. This is the accepted version of a paper presented at IEEE PES General Meeting.
http://www.div-portl.org Postprint This is the ccepted version of pper presented t IEEE PES Generl Meeting. Cittion for the originl published pper: Mhmood, F., Hooshyr, H., Vnfretti, L. (217) Sensitivity
More informationTiming Macro-modeling of IP Blocks with Crosstalk
Timing Mcro-modeling of IP Blocks with Crosstlk Ruiming Chen nd Hi Zhou Electricl nd Computer Engineering Northwestern Universit Evnston, IL 60208 Astrct With the increse of design compleities nd the decrese
More informationHomework #1 due Monday at 6pm. White drop box in Student Lounge on the second floor of Cory. Tuesday labs cancelled next week
Announcements Homework #1 due Mondy t 6pm White drop ox in Student Lounge on the second floor of Cory Tuesdy ls cncelled next week Attend your other l slot Books on reserve in Bechtel Hmley, 2 nd nd 3
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-297 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil
More informationLocalization of Latent Image in Heterophase AgBr(I) Tabular Microcrystals
Interntionl ymposium on ilver Hlide Technology Locliztion of Ltent Imge in Heterophse AgBr(I) Tulr Microcrystls Elen V. Prosvirkin, Aigul B. Aishev, Timothy A. Lrichev, Boris A. echkrev Kemerovo tte University,
More information& Y Connected resistors, Light emitting diode.
& Y Connected resistors, Light emitting diode. Experiment # 02 Ojectives: To get some hndson experience with the physicl instruments. To investigte the equivlent resistors, nd Y connected resistors, nd
More informationPerformance Comparison between Network Coding in Space and Routing in Space
Performnce omprison etween Network oding in Spce nd Routing in Spce Yunqing Ye, Xin Hung, Ting Wen, Jiqing Hung nd lfred Uwitonze eprtment of lectronics nd Informtion ngineering, Huzhong University of
More informationNetwork Theorems. Objectives 9.1 INTRODUCTION 9.2 SUPERPOSITION THEOREM
M09_BOYL3605_13_S_C09.indd Pge 359 24/11/14 1:59 PM f403 /204/PH01893/9780133923605_BOYLSTAD/BOYLSTAD_NTRO_CRCUT_ANALYSS13_S_978013... Network Theorems Ojectives Become fmilir with the superposition theorem
More informationComputing Logic-Stage Delays Using Circuit Simulation and Symbolic Elmore Analysis
Computing Logic-Stge Delys Using Circuit Simultion nd Symolic Elmore Anlysis Clyton B. McDonld Rndl E. Brynt Deprtment of Electricl nd Computer Engineering Crnegie Mellon University, Pittsurgh, PA 15213
More informationBP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks
BP-PP: Belief Propgtion-Bsed Trust nd Reputtion Mngement for PP Networs Ermn Aydy School of Electricl nd Comp. Eng. Georgi Institute of Technology Atlnt, GA 333, USA Emil: eydy@gtech.edu Frmrz Feri School
More information4110 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 66, NO. 5, MAY 2017
40 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 66, NO. 5, MAY 07 Trnsmit Power Control for DD-Underlid Cellulr Networs Bsed on Sttisticl Fetures Peng Sun, Kng G. Shin, Life Fellow, IEEE, Hilin Zhng,
More informationAnalysis of circuits containing active elements by using modified T - graphs
Anlsis of circuits contining ctive elements using modified T - grphs DALBO BOLEK *) nd EA BOLKOA**) Deprtment of Telecommunictions *) dioelectronics **) Brno Universit of Technolog Purknov 8, 6 Brno CECH
More informationEE Controls Lab #2: Implementing State-Transition Logic on a PLC
Objective: EE 44 - Controls Lb #2: Implementing Stte-rnsition Logic on PLC ssuming tht speed is not of essence, PLC's cn be used to implement stte trnsition logic. he dvntge of using PLC over using hrdwre
More informationSoft switched DC-DC PWM Converters
Soft switched DC-DC PWM Converters Mr.M. Prthp Rju (), Dr. A. Jy Lkshmi () Abstrct This pper presents n upgrded soft switching technique- zero current trnsition (ZCT), which gives better turn off chrcteristics
More information9.4. ; 65. A family of curves has polar equations. ; 66. The astronomer Giovanni Cassini ( ) studied the family of curves with polar equations
54 CHAPTER 9 PARAMETRIC EQUATINS AND PLAR CRDINATES 49. r, 5. r sin 3, 5 54 Find the points on the given curve where the tngent line is horizontl or verticl. 5. r 3 cos 5. r e 53. r cos 54. r sin 55. Show
More informationJamming-Resistant Collaborative Broadcast In Wireless Networks, Part II: Multihop Networks
Jmming-Resistnt ollbortive Brodcst In Wireless Networks, Prt II: Multihop Networks Ling Xio Ximen University, hin 361005 Emil: lxio@xmu.edu.cn Huiyu Di N Stte University, Rleigh, N 27695 Emil: huiyu di@ncsu.edu
More informationDesign and Modeling of Substrate Integrated Waveguide based Antenna to Study the Effect of Different Dielectric Materials
Design nd Modeling of Substrte Integrted Wveguide bsed Antenn to Study the Effect of Different Dielectric Mterils Jgmeet Kour 1, Gurpdm Singh 1, Sndeep Ary 2 1Deprtment of Electronics nd Communiction Engineering,
More informationA Channel Splitting Technique for Reducing Handoff Delay in Wireless Networks
Interntionl Journl o Engineering Reserch & Technology (IJERT) A Chnnel Splitting Technique or Reducing Hndo ely in Wireless Networks Jeykumr. J #1, Venktesh. * 2, Vigneswri. G* 3, Nivethith. V *4 # 1 PG
More informationA Practical DPA Countermeasure with BDD Architecture
A Prcticl DPA Countermesure with BDD Architecture Toru Akishit, Msnou Ktgi, Yoshikzu Miyto, Asmi Mizuno, nd Kyoji Shiutni System Technologies Lortories, Sony Corportion, -7- Konn, Minto-ku, Tokyo 8-75,
More informationTopic 20: Huffman Coding
Topic 0: Huffmn Coding The uthor should gze t Noh, nd... lern, s they did in the Ark, to crowd gret del of mtter into very smll compss. Sydney Smith, dinburgh Review Agend ncoding Compression Huffmn Coding
More informationOff-Chip Data Transmission
Bus Stuttering : n Encoding Technique to Reduce nductie Noise in ff-chip Dt Trnsmission Brock J. LMeres Design lidtion Diision gilent Technologies nc. Colordo Springs, C 97 US Sunil P. Khtri Electricl
More informationCS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates
Bsic Logic Gtes : Computer Architecture I Boolen Algebr Instructor: Prof. Bhgi Nrhri Dept. of Computer Science Course URL: www.ses.gwu.edu/~bhgiweb/cs35/ Digitl Logic Circuits We sw how we cn build the
More information