THe notion of the disease [1] has been extended from

Size: px
Start display at page:

Download "THe notion of the disease [1] has been extended from"

Transcription

1 IEEE/ACM TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, VOL., NO., 6 Effective Network Quarantine with Minimal Restrictions on Communication Activities uanyang Zheng an Jie Wu, Fellow, IEEE Abstract This paper stuies a network structure esign problem constraine by the epiemic outbreaks. In our moel, geographic locations (noes) an their connections (eges) are moele as a ring graph. The movement of a person is represente as a flow from one location to another. A person can be infecte at a location (noe), epening on the number of infecte flows (persons) going through that location. In our paper, iseases are not limite to real human iseases; they can also refer to the general epiemic information propagations. Given esire interaction traffic from a noe to other noes in terms of flows, an a greey shortest path routing scheme that is analogous to the greey coin change, we focus on the structure esign (representing quarantine rules) that etermines the number an istribution of chors on the virtual ring network for remote connections. Our objective is to minimize the average number of routing hops, while the epiemic outbreaks are controlle uner given infection an recovery rates. We provie a systematic isomorphic structure esign on nine ifferent cases, base on three traffic istribution an three infection rate moels. Two hypercube-base structures are propose. We also provie a greey solution for constructing polymorphic structures. Our stuy reveals some intriguing theoretical results, valiate through experiments, on traeoffs between local an global infections. Our work casts new light on the effective network quarantine that places minimal restrictions on connections, i.e., maximal preservation of normal communication activities, while controlling epiemic outbreaks. Inex Terms Epiemic outbreaks, interaction, quarantine, network structure esign. INTRODUCTION Te notion of the isease [ has been extene from human iseases, such as Ebola, to general epiemic information propagations [, such as rumors in istribute networks. Controlling the sprea of a communicable isease in a population is usually one through the quarantine, where persons that have, or are suspecte to have, a communicable isease are restricte from having interactions with others. owever, a quarantine is inconvenient for communication activities, ue to its limitations on interactions. ence, there is a traeoff between the control of epiemic outbreaks an the convenience of communication activities. To unerstan this traeoff, we conuct stuies base on a virtual ring moel, which is an abstraction of the real worl through meriian an parallel. As shown in Fig. (a), meriian an parallel iscretize the Earth into geographic locations (represente by noes) on multiple rings. For each ring, noes are connecte via links (roas between nearby towns). Geographically-remote noes are connecte via chors (flights between remote cities). The geographical istance between noes can be measure by their hop istances along the ring. This paper stuies a network structure esign problem constraine by the epiemic outbreaks. In our moel, flows represent the movements of people. A person can be infecte at a location (noe), epening on the number of infecte flows (persons) going through that location. Personto-person interactions are controlle by flow routes among. Zheng an J. Wu are with the Department of Computer an Information Sciences, Temple University, Philaelphia, PA, 9. Manuscript receive May 5, 5; revise September 7, 5. (a) Meriian an parallel. Chors Links (b) Virtual ring moel. Fig.. Abstraction of the Earth with meriian an parallel. ifferent locations. The quarantine is represente as interactions with neighbors only (through a link in a -D ring, say, walking between two ajacent towns), an non-quarantine is shown as interactions with remote noes (through a chor in a -D ring, say, flying between two cities). A real-worl example is that Australia clampe own on the entry of iniviuals traveling from West Africa [3, in orer to control Ebola. Such a quarantine rule is execute by the Australian Customs an Borer Protection Service. The SIS moel [4 is use to simulate the epiemic spreaing, where flows have states of being susceptible or infecte. Flows transfer their states through a cycle of being infecte (base on a given infection rate) from susceptible, an going back to susceptible by recovery (base on a given recovery rate). We consier three infection rate moels, where the infection probability is relate to the infecte flows at a noe. The recovery rate is constant, as use in existing moels [4. We assume that each noe has fixe outgoing traffic, in terms of flows, to other noes, following a particular istribution [5. Flow interactions occur in noes along a routing path from source to estination, which is a sequence of links an chors. The routing path is etermine by

2 IEEE/ACM TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, VOL., NO., F F 3 (a) Local infection. 9 8 Fig.. An example of the traffic flow routing F F 3 (b) Global infection. a greey-coin-change-base routing scheme [6, [7. Each noe will select a connecte relay, which is the closest to the estination, to forwar its traffic. In Fig. (a), if N wants to interact with N 5 by generating a flow F, then its path is {N, N 3, N 4 }. In general, each noe has multiple flows, incluing forwaring flows an its own traffic flows. For example, N 3 has its own esire traffic to N 4 in the flow F, while forwaring the flow F from N to N 4. Classic epiemiology controls the epiemic outbreaks by stuying the space-time patterns of iseases [8. In contrast, we stuy a network structure esign problem constraine by the epiemic outbreaks. The esigne network structure shoul minimize the average number of routing hops for noe interactions without epiemic outbreaks. The application of our work implies a quarantine rule, which can maximally preserve normal communication activities without epiemic outbreaks. Note that the effect of a given flow is not restricte over its routing path. If we esign a ring structure that has few chors, then the traffic will aggregate along local noes. In this case, susceptible flows going through locations with infecte flows are very likely to be infecte. This phenomenon is calle the local infection. For example, Fig. (a) has less chors than Fig. (b). As a result, F an F aggregate along the link from N 3 to N 4. Aggregate flows lea to a larger infection probability, an thus, local infection happens. On the other han, if we esign a ring structure that has numerous chors, then the traffic is sprea wiely through chors. An infecte flow can reach many susceptible remote flows to sprea the isease, leaing to the global infection phenomenon. For example, infecte flows from N can irectly reach more noes in Fig. (b) than Fig. (a). Since flows interacts with epiemics, the traeoff between local infection an global infection makes the structure esign problem very challenging. In this paper, we mainly focus on isomorphic structures, where each noe on the ring has the same chor istribution in terms of egree an neighbor istribution. The sensitivity experiments emonstrate that the isomorphism assumption can be relaxe, an thus they are feasible for real-worl applications. Table shows our major finings, base on three traffic istribution moels an three infection rate moels. The traffic istribution moels (inicating ifferent noe communication patterns) are shown as follows: (I) The traffic from one noe to another noe is a constant; (II) The traffic from one noe to another noe ecays slowly with respect to their geographical istance; (III) The traffic from one noe to another noe ecays quickly with respect to their geographical istance. The infection rate moels (inicating ifferent epiemic infectivities) inclue: (A) The TABLE Major results for isomorphic structures Properties of (-6) are Traffic istribution moels itemize in the text. Moel I Moel II Moel III Infection Moel A, 5, 4 rate Moel B, 6, 4 moels Moel C probability of being infecte by infecte flows is a constant; (B) The probability of being infecte is sub-linearly proportional to the traffic amount of infecte flows; (C) The probability of being infecte is linearly proportional to the traffic amount of infecte flows. For a virtual ring with n noes, the properties in Table are liste as follows: ) The global infection is the major factor for the epiemic outbreak. Epiemic outbreaks coul be controlle, if the noe egree is cappe. ) Neither local nor global infection is the major factor for the epiemic outbreak. The optimal structure remains an open problem. 3) The local infection is the major factor for the epiemic outbreak. The fully-connecte network is the optimal structure. 4) Chors shoul only connect to the geographically nearest O(ln n) noes to facilitate the communications. This is because the interaction traffic ecays exponentially with the geographical istance. 5) The Ulysses butterfly structure [9 is an asymptotically optimal structure. 6) This correspons to the most complex case, an is the focus of this paper. Two hypercube-base structures are propose an analyze. The first structure uses binary jump sizes of chors [7. The secon structure improves the first one by consiering the esire traffic istribution. We also propose a greey solution for constructing polymorphic structures, where noes have heterogenous chor istributions. This greey solution is stuie uner the esire traffic moel I an the infection rate moel A. We show the relationship between the reuce average number of routing hops (i.e., the benefit) an the increase network vulnerability to epiemics (i.e., the cost), brought by aing a chor. The chor, which has the largest benefitto-cost ratio, is iteratively ae to construct a polymorphic structure. This greey solution gives out some insights on efficiently constructing general polymorphic structures that resist epiemic outbreaks. The remainer of this paper is organize as follows. In Section, the basic moel is escribe an the problem is formulate. In Section 3, two hypercube-base isomorphic structures are stuie. In Section 4, we consier other traffic istribution an infection rate moels. In Section 5, we focus on constructing polymorphic structures. In Section 6, our network structures are evaluate. In Section 7, we conclue the paper. Supplementary material are publishe in [. MOTIVATION, MODEL, AND FORMULATION We first escribe the motivation. Then, the ring network moel, the traffic istribution moels, an the infection rate moels are escribe. Finally, the problem is formulate.

3 IEEE/ACM TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, VOL., NO., i - j i links... Directional chors i +... Biirectional n -..., i, j Fig. 3. The virtual ring moel with biirectional links. Relay N i N j Fig. 4. A globe representing Earth with meriian an parallel.. Motivation This paper is base on the real earth. Meriians an parallels iscretize the earth into ifferent locations (cities). People move aroun ifferent locations for their lives. Epiemics (e.g., Ebola) are foun an may sprea. To avoi epiemic outbreak, people s movements are restricte by quarantine. For example, Australia clampe own on the entry of iniviuals traveling from West Africa to against Ebola [3. owever, some movements are necessary an esire, even uner the threat of epiemics. For example, foo suppliers have to move aroun to fee people. Consequently, it is challenging to fin an answer to the question of how to control these necessary movements while avoiing epiemic outbreaks. Let us consier a motivational scenario on the transportation network for foo suppliers: To fee people, foo must be transporte from some cities to some other cities by trains. These movements are necessary, even uner the threat of epiemics. To avoi epiemic outbreaks, two cities may not be irectly connecte by trains. A transportation between them is forware via some thir-party cities. The structure of the transportation network (i.e., which two cities are irectly connecte by trains) for foo suppliers is critical. It is the variable in this paper (represente by the number an istribution of chors). We want to satisfy the foo supply requirement an control the epiemics, with minimal transports. If all cities are irectly connecte by trains, then an epiemic outbreak can sprea globally. owever, if only a few cities are irectly connecte by trains, then people nee to go through multiple cities to gain access to foo supplies. People who goes through more cities also have a higher possibility of being infecte. Cities on the earth are moele by the ring network in subsection.3. Necessary people s movements (e.g., foo supplies) are escribe by given traffic istribution moels, with a routing scheme, in subsection.4. The traffic can be route irectly an inirectly (e.g., nonstop an multi-stop trains). This interacts with epiemic spreaings, which are escribe by given infection rate moels in subsection.5. The problem is formulate in subsection.6. The objective is to minimize the number of routing hops for traffic flows, an the constraint is to control epiemic outbreaks.. Relate Works Our paper is closely relate to transportation network esign papers [5, [, which esign airline/train network structures to satisfy transportation emans an constraints [, [3. For example, Wieberneit [3 review the literature on esigning the freight transportation network, incluing the network structure, the freight frequency, an the freight routing path. The freight service emans are satisfie. Our research buils upon previous knowlege, but aitionally consier the constrains impose by the epiemic outbreak. This paper aims at a network structure, which brings a minimum routing for given traffics, an the constraint is that epiemics will not outbreak. This paper is also relate to peer-to-peer network structure esign problems. For example, Xu s work [5 stuies a egree-cappe network structure that achieves a minimum iameter. Our problem becomes equivalent to Xu s work, when traffics are uniformlyistribute an the epiemic is traffic-insensitive. This is because the minimum routing becomes equivalent to the minimum iameter, an the epiemic constraint becomes equivalent to the egree cap. The spreaing of epiemics has been well-stuie in the literature [4, [5, [6, [7, [8. Classic moels in epiemiology, such as SIS an SIR, are summarize in [4 with respect to ifferent network structures. These moels are known as compartmental moels, which use interactions between states (e.g., susceptible, infecte, recover) to escribe epiemics. owever, these moels o not consier the interactions between the epiemic spreaing an the traffic. Therefore, Preciao et al. [6, [7, [8, [9 introuce convex optimization techniques for the epiemic control uner ifferent traffic rates. In contrast, this paper uses the existing SIS moel to stuy the interaction between the traffic flow routing path an the epiemic spreaing through a network structure esign problem..3 The Ring Network Moel As shown in Fig. 3, our stuy is base on a virtual ring network of n noes. Since the virtual ring is an abstraction of a real-worl geographic map, each noe on the ring represents a geographic location. Noes have links with two geographical neighbors, an chors with geographicallyremote noes. The IDs of noes are from to n, where the i th noe is enote as N i. The geographical istance between N i an N j is enote as, which is measure by their hop istances along the ring (the minor part). In Fig. 3, we have,j = j an,i = n i. Both links an chors are calle eges in this paper, an are irectional. We first explore isomorphic structures, where each noe has a egree of D (both in-egree an out-egree). Polymorphic structures are consiere later in Section 5. The ring moel can represent the geographic relationships among ifferent locations. It is wiely acknowlege

4 IEEE/ACM TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, VOL., NO., 6 4 in research on PP networks [7 an social networks (the small-worl phenomenon) [. As shown in Fig. 4, each meriian or parallel of the Earth can be abstracte as a ring. In such a case, noe communications can be ecompose on two rings. In Fig. 4, N i an N j can communicate with each other through a relay noe at the intersection of the meriian an the parallel rings (X-Y routing). More etails are presente in the supplemental material. Links in the ring represent the network backbone that maintains the network connectivity. Quarantine is represente as interactions with neighbors only (through a link in the ring, say, walking between two ajacent towns). People are always allowe to move near to their home locations. Chors stan for the normal connections. Non-quarantine is shown as the interactions with remote noes (through a chor in the ring, say, flying between two cities). A realworl example is that Australia clampe own on the entry of iniviuals traveling from West Africa [3. There is no chor from West Africa to Australia, i.e., people in West Africa are not allowe to travel to remote locations irectly..4 The Desire Traffic Distribution Moel In this subsection, we start with the esire traffic istribution moel II. Let T i,j enote the esire interaction traffic from N i to N j. T i,j can be interprete as a flow, which inclues a certain number of people moving from locations N i to N j. T l is the total interaction traffic going through N l (incluing the traffic that heas for N l, an the traffic that is forware by N l ). The mean value of T l is enote as T l. Since people are more likely to move aroun their home locations, we consier T i,j to be T i,j (monotonically ecreasing with geographical istance). For simplicity, we assume that noes have homogeneous traffic istributions. After normalization ( j T i,j = ), we have (ln n ln ): T i,j = ln n () ln n Eq. shows the esire traffic istribution moel II. We also consier two ifferent moels (moel I where T i,j, an moel III where T i,j e i,j ) in Section 4, since they represent ifferent noe communication patterns. The movement in moel I has no locality, meaning that people (e.g., businessmen) equally visit nearby an remote locations. On the other han, the movement in moel III is locality-oriente, meaning that people (e.g., farmers) only move aroun their home locations. Moel II is in the mile. Compare to existing traffic istribution moels in [, [, our moels are more simple an abstracte. They escribe the asymptotic traffic istribution with respect to the geographical istance. Flows are only allowe to be route among connecte noes (through links or chors). Flow interactions occur in noes along a routing path from source to estination, which is a sequence of links an chors. The routing path is the shortest one etermine by a greey-coin-change-base routing scheme. In this routing scheme, each noe greeily forwars the interaction traffic flow to a connecte relay that is geographically closest to the estination [6, [3. This flow routing scheme is use, since people usually make local ecisions for their movements without a global view. The routing path (representing the movement trace) from N i to n- n- 3 4 n-4 n-3 Fig. 5. An illustration of the 4-ary tree. N j is enote as P i,j, with its length being P i,j. We efine the average number of routing hops as: i,j = T i,j P i,j i,j T () i,j represents the communication convenience (a smaller means more convenient communications). Our goal is to esign a structure that can minimize without epiemic outbreaks. Then, we have the following observation: Proposition. If the network structure is isomorphic an all the noes in the network have out-egrees of D, then the average traffic receive by a noe is. The average amount of traffic going through each ege is /D. Proof: The interaction traffic from N i to N j is T i,j, with a path length P i,j. Each noe on the path P i,j, except for the source noe N i, receives this traffic. Therefore, P i,j noes receive a traffic of T i,j, an the total traffic is T i,j P i,j = i,j T i,j T i,j P i,j i,j i,j T = n (3) i,j i,j Since the esire interaction traffic of each noe is a specifie unit, we have i,j T i,j = n. Therefore, the average traffic receive by a noe is. Note that the traffic of a noe is share by D eges, an thus the average amount of traffic going through each ege is /D. Proposition means that longer routing paths bring heavier forwaring traffic on each noe. If the ring network has fewer chors, then people nee to go through more locations to reach their estinations. Meanwhile, we have: Theorem. In any network structures, if all the noes have out-egrees no more than D, then Ω(log D n). Proof: Since the out-egree of each noe is boune by D, a noe can reach at most D P noes through a path no longer than P. When the network structure is a D-ary tree, the root noe can reach the most noes with a limite path length. The lower boun of is that each noe can be regare as a root of a D-ary tree. Let us look into a specifie noe, N, as the root noe. The neighbors of N in the ring are put into the higher layers of the tree, an the remote noes are assigne into the lower layers of the tree, as shown in Fig. 5. This is because N has more interaction traffic to nearby noes than remote noes. In Fig. 5, noes N, N, N n, N n are place into the secon layer, while the interaction traffic between the root an these noes are T, = T,n = ln n an T, = T,n = ln n. Then, we have the following inequality: i = T n,i P,i i T =,i i= log D n [ x ln n x= n T,i P,i = T,i P,i (D x +...+D )/ (D x +...+D )/ i= y y (4)

5 IEEE/ACM TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, VOL., NO., 6 5 This is because the tree has O(log D n) layers. For the x th layer, the tree contains D x noes. Then, we have (D x +...+D )/ (D x +...+D )/ Therefore, Eq. 4 can be rewritten as y y = ln Dx D D x > ln D (5) D > [log D n x ln D log D n ln D = ln n ln n log D n (6) x= where log D n = ln n ln D. ence, we have Ω(log D n)..5 The Infection Rate Moel We start with the infection rate moel B, which is a simplification of the classic SIS moel [4. The eigenvalue approach [4 is not use because of complexity. In our moel, the infection rate can be traffic-sensitive. We highlight that a esire traffic flow with ifferent routing paths have ifferent impacts on epiemic spreaings [4. This paper uniquely connect the traffic flow routing an the epiemic spreaing through the network structure esign. Flows have states of being susceptible or infecte. A susceptible flow represents a group of moving people who o not have the isease, but can be infecte. A infecte flow represents a group of moving people, who have the isease an can sprea the isease at the locations they go through. Infecte flows can go back into the susceptible state upon recovery, an can be reinfecte. For isomorphic structures, Theorem shows that the average traffic per ege is /D. In the infection rate moel B, let us consier a noe with D incoming eges, each of which loas a traffic of /D. If the flows on one incoming ege are infecte, then they woul bring an infection rate (the infection probability per time unit) of λ /D, where λ is a coefficient (λ > ). The square root epicts the ecreasing hazar infection of subsequent interactions [5. Other sub-linear functions can also be use here. Section 4 further consiers a constant rate moel of λ as moel A, an a linear rate moel of λ/d as moel C. While moel A is traffic-insensitive, moel C is traffic-sensitive. Moel B is in the mile. Base on the existing literature [4, λ an r are fixe. Let f(t) an g(t) (or simply f an g) enote the average fractions of eges that loa infecte an susceptible flows at time t, respectively. Each noe has, on average, Df incoming eges that loa infecte flows. ence, the infection probability for susceptible outgoing flows per time unit is: ( λ D )Df λ Df = µf (7) In Eq. 7, we efine µ = λ D for presentation simplicity. We assume λ /D. Otherwise, the epiemic outbreak cannot be controlle. ence, a total fraction, µf g, of all flows are infecte uring a time unit. Let r enote the recovery rate of infecte flows. Therefore, we have: g f = rf µfg an = µfg rf (8) t t Base on the existing literature [4, the solution to Eq. 8 is: (µ r)e (µ r)t f(t) = f() µ r + µf()e (µ r)t (9) Notation N i n D TABLE Notations in this paper Description Noe with an ID of i in the ring. Total number of noes in the ring. In-/Out-egrees of all noes (only use for isomorphic structures). Number of chors for half a ring. We have = D/. Geographical istance between N i an N j. T i,j Desire interaction traffic from N i to N j. P i,j Routing path from N i to N j. P i,j enotes the path length. T l Total interaction traffic going through N l. Average number of routing hops. f (g) Fraction of eges that loa infecte (susceptible) flows. λ, µ Coefficients for infection rate moels. Recovery rate of the infecte flows. Fraction of noes with in-egree D (only use for polymorphic structures). Mean value of the corresponing variable. r Q(D) If µ < r, f(t) ecreases exponentially, meaning that the epiemic outbreak is controlle. ence, we have: r µ < r or D < () λ A larger egree D generally brings a smaller, since more chors can shrink the network iameter. Eq. means that short routing paths can contribute to the control of epiemic outbreaks. This is because flows visit fewer locations, when is smaller. owever, the pattern of Eq. is very complex: If logarithmically ecreases with D, the constraint of controlling epiemic outbreaks is equivalent to a egree limitation. For example, if = ln n/ ln D, then D increases monotonically with D >.78, i.e., D shoul be smaller than a threshol. Our goal becomes minimizing with a limite egree. On the other han, if exponentially ecreases with D, then a larger D is better, which is counterintuitive. For example, if = n/ D, then D ecreases monotonically with D >.443. The above phenomena shows the traeoff between local an global infections. If D is small, then the traffic will aggregate along local noes ( is large). In this case, susceptible flows going through locations with infecte flows are very likely to be infecte, resulting in a local infection phenomenon. On the other han, if D is large, then the traffic is sprea wiely through chors. At this time, an infecte flow can reach many susceptible remote flows to sprea the isease, leaing to the global infection phenomenon. The challenge is that cannot be irectly erive as a function of D. This is because networks with the same D can have a ifferent ue to ifferent network structures..6 Problem Formulation This paper stuies a network structure esign problem constraine by the epiemic outbreaks. The network structure refers to the number an istribution of chors on the ring. Our objective is to minimize the average number of routing hops (minimize ), an the constraint is that epiemics will not outbreak. The variable of our problem is the number

6 IEEE/ACM TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, VOL., NO., 6 6 chors chors n/ n - -(n/) -(n/4).... +(n/4) Fig. 6. An illustration of the binary-cut network structure (only the chors of N are shown). +(n/) n/ an istribution of chors (how noes connect each other on the ring; as a result, the egree D is a variable). The istribution of the esire traffic (T i,j ) is given. The routing scheme (given the number an istribution of chors, which path oes T i,j route from N i to N j ) is given. The epiemic outbreak constraint ( D < r λ for infection rate moel B) is given. In general, more chors brings a smaller, but the network may be more vulnerable to epiemic outbreaks ( D may be larger, since the egree D is larger). Networks with the same number of chors can have a ifferent ue to ifferent chor istributions. Our problem stans for an effective network quarantine with minimal restrictions on communication activities. The ring network is an abstraction of the real-worl geographic map, as shown in Fig.. The quarantine rule is represente by the number an istribution of chors. Two unconnecte noes (no chor) mean that they are isolate from each other in the quarantine, in orer to control epiemic outbreaks. A real-worl example is that Australia clampe own on the entry of iniviuals traveling from West Africa [3. Australia an West Africa are represente as two noes on the ring, while there is no chor connecting these two noes. Such a quarantine rule is execute by the Australian Customs an Borer Protection Service. The average number of routing hops represents the convenience level of the communication activities. A smaller means that fewer restrictions are put on the communication activities. The epiemics in this paper inclue human iseases, as well as epiemic information propagations in istribute systems (more etaile escriptions can be foun in [). In the next section, we esign isomorphic structures, uner the esire traffic istribution moel II an the infection rate moel B. In Section 4, we iscuss other traffic istribution moels an infection rate moels. The reason for the isomorphic structures is that networks with heterogenous egrees are more vulnerable to epiemics [6. We also show a greey solution for constructing polymorphic structures in Section 5. Finally, all the notations are shown in Table. 3 ISOMORPIC STRUCTURE DESIGN In this section, we esign two hypercube-base isomorphic structures that correspon to property (6) in Table. Since the structure is isomorphic, we only escribe the chor istribution of noe N for clear presentation. A chor from the noe N to N i (i< n ) inicates that N has a jump size of i. The out-egree of N is D, incluing two links an D chors. We use symmetric esigns for each sie of the ring, meaning that = D chors are assigne for the left-sie (or right-sie) half ring of N. The core iea of our structure esign is to fin a goo traeoff between the egree an the average number of routing hops, while the greey-coinchange-base routing is well-supporte. All of these factors can be foun in hypercube structures [5, [7 because of their structural symmetries. Epiemic outbreaks are reveale by the traeoff between the local an global infections, which are, in turn, controlle by the egree. First, we iscuss the hypercube-base binary-cut structure, which is shown in Fig. 6. In this network structure, the jump sizes are {+ n/, + n/,..., + n/, +} for the right-sie half ring an { n/, n/,..., n/, } for the left-sie half ring. For example, if n = 6 an = (D = 6), N woul have chors to noes {N, N 4, N, N 4 } an links to noes {N, N 5 }. We have assume < log n such that noes in the range ( n/, + n/ ) are archive through stepby-step links (jump sizes of ). Then, the bouns of for the binary-cut structure are: Theorem. In the binary-cut structure, the bouns of are O( 3 n 4 ln n ) an Ω( n ln n ). The proof of Theorem is attache in the supplemental material. Asymptotically, D monotonically ecreases with D, meaning that a larger egree is better. This structure can support at most = log n i i n n i i, the jump sizes are set to be {+ n/, + 4 n/, + 8 n/,..., + n/, +} an { n/, 4 n/, 8 n/,..., n/, }. ere, the esire traffic from noe N to the nearest n/ noes is the same as its traffic to the remaining noes. The bouns of for the binary-traffic-cut structure are: chors for half a ring. The jump sizes for half a ring are {+, +, +4..., + n/ }. owever, the binary-cut structure fails to consier the esire traffic istribution for optimizing. While each noe has more traffic to its geographically-nearby noes, we shoul provie more jumps to geographically-nearby noes an fewer jumps to geographically-remote noes. Following this intuition, we can improve the binary-cut network structure to the binary-traffic-cut network structure. Instea of jumping to the mile noe of each interval, we jump to the noe that forwars half of its esire traffic. Consiering that we have n Theorem 3. In the binary-traffic-cut structure, the upper an lower bouns of are O( n ln n + ln nn ) an Ω( n ln n + ln n n ), respectively. The proof of Theorem 3 is attache in the supplemental material. The binary-traffic-cut structure can support at most O(ln ln n) chors. owever, even if is very small, the n first part of ln n ominates the bouns of. For this structure, D monotonically increases with D, meaning that we nee to control the egree to avoi epiemic outbreaks: Corollary. For a binary-traffic-cut network structure without epiemic outbreaks, we have O( n ln n + ln nn ) an Ω( n ln n + ln n n ), where (r ln n)/(λ n).

7 IEEE/ACM TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, VOL., NO., 6 7 If (r ln n)/(λ n)<, epiemic outbreak is inevitable for this structure. In terms of minimizing, the binarytraffic-cut structure outperforms the binary-cut structure, since it consiers the esire traffic istribution. owever, in the view of minimizing without epiemic outbreaks, it is har to analytically compare these two structures, since they have ifferent vulnerabilities to epiemic outbreaks. 4 OTER TRAFFIC DISTRIBUTION AND INFECTION RATE MODELS FOR ISOMORPIC STRUCTURES In this section, we stuy isomorphic structures with ifferent traffic istribution an infection rate moels. 4. Other Traffic Distribution Moels In previous sections, we only stuy the esire traffic istribution moel II, where T i,j /. In this subsection, two ifferent traffic istribution moels (moel I an moel III) are iscusse. These three moels present ifferent noe communication patterns. Compare to moel II (i.e., the most general case), moels I an III are two more extreme moels that have simpler properties as follows. Let us start with the esire traffic istribution moel I, where we have a uniform istribution of T i,j = n. In this case, the binary-cut structure is equivalent to the binarytraffic-cut structure. For each jump size on one sie of the ring, half of the flows to noes on that sie will take it. For example, if n = 6 an =, flows from N to {N 4, N 5, N 6, N 7 } inclue a jump size of +4, flows from N to {N, N 3, N 6, N 7 } inclue a jump size of +, an flows from N to {N, N 3, N 5, N 7 } inclue a jump size of +. Therefore, the average path length through chors is Θ(). For each noe in the interval of (, n ), it is achieve through links (jump sizes of ), the average path length of which is Θ( n ). Therefore, we have Θ( + n ), where Θ(log n) is the best choice. If D < r /λ, we have Θ(log n) for the binary-cut structure. owever, better structures may exist. For the same number of chors, the Ulysses butterfly network structure [9 achieves a lower network iameter than oes the hypercube structure. The esire traffic istribution moel III has an exponential traffic istribution of T i,j e i,j. Note that, the istribution in moel III ecays exponentially, an thus the traffic to remote noes can be ignore (people s movements are extremely locality-oriente). Assuming N is the source, then each noe can be achieve in, at most, steps (by links), an at least step (by a chor). Then, we have the following inequation: n n ln n e i i < n e ln n ln n n e i i () Eq. means that the nearest ln n noes on one sie of the ring are more important, while the traffic from N to the remaining noes on that sie can be ignore. Even if all the other noes can only be achieve by links, their influences on are much smaller than the nearest ln n noes. Therefore, all the chors are only necessary to connect the nearest O(ln n) noes, regarless of the remaining remote noes. The insight is that we nee smaller jump sizes for a faster traffic ecay, where remote connections are useless. This result is state as the property 4 in Table. 4. Other Infection Rate Moels In previous sections, we use the infection rate moel B, where µ = λ D. The reason behin the sub-linearity of moel B is that people are more likely to be infecte by the initial interactions with infectors than the subsequent interactions with infectors. In this subsection, two ifferent infection rate moels (moel A an moel C) are iscusse. These three infection rate moels present ifferent epiemic infectivities. Compare to moel B (i.e., the most general case), moels A an C are two more extreme moels that have simpler properties as follows. First, we consier the infection rate moel A, where the infection rate is a constant, i.e., traffic-insensitive. In this case, Eq. 7 can be rewritten as (let µ = λd for consistency): ( λ) Df λdf = µf () Eqs. 8 an 9 remain the same, while Eq. changes to: D < r λ (3) Eq. 3 means that the constraint of controlle outbreaks is equal to the egree limitation. The insight is that the global infection ominates, an thus we nee to restrict the connections among ifferent locations. This result is state as the property in Table. Uner the traffic istribution moel I an the infection rate moel A, our problem is reuce to minimizing with a limite egree. As shown in [9, Ulysses butterfly network structure is asymptotically optimal for this problem, where we have Ω(log r/λ n). This result is state as property 5 in Table. As for the infection rate moel C, we consier that the infection rate is traffic-sensitive. For a given location, each incoming ege that loas infecte flows woul inepenently bring an infection probability that is linearly proportional to the traffic on that ege. Then, Eq. 7 can be rewritten as (let µ = λ for presentation consistency): ( λ D )Df λf = µf (4) Eqs. 8 an 9 remain the same, while Eq. changes to: < r λ (5) Eq. 5 means that the network structure with a smaller can resist epiemics better, an thus the fully-connecte network is the best choice. This is because the local infection becomes the major factor for epiemic outbreaks. It implies that the communication restrictions lea to negative effects, uner the infection rate moel C. In this case, one noe shoul connect to as many noes as possible, in orer to mitigate the traffic aggregation on local links. This result is state as property 3 in Table. 5 POLYMORPIC STRUCTURE DESIGN In this section, we stuy polymorphic structures, uner the esire traffic moel I an the infection rate moel A. Other moels are not explore ue to their complexities.

8 IEEE/ACM TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, VOL., NO., 6 8 Algorithm Greey Construction Input: Output: A virtual ring network that has no chor; A polymorphic network structure; : while D D < r λ o : for each pair of unconnecte noes o 3: Calculate the corresponing an [ D D, if a chor is ae for this pair of noes; 4: A the chor with the highest / [ D D ; 5: Remove the last ae chor to guarantee D D < r λ ; 6: return the current network structure; Algorithm Greey Dismantlement Input: Output: A fully-connecte virtual ring network; A polymorphic network structure; : while D D > r λ o : for each pair of noes connecte by a chor o 3: Calculate the corresponing an [ D D, if a chor is remove for this pair of noes; 4: Remove the chor with the lowest / [ D D ; 5: return the current network structure; 5. Contributions of an Aitional Chor This subsection stuies how reuces, if an aitional chor is ae into the current ring network (uner the esire traffic moel I). Let enote the amount of reuce. Let us start with a virtual ring network that has no chor, an then consier aing a chor from N i x to N i with a jump size of x. Then, noes {N i n/,..., N j,..., N i x } can benefit from this chor. For N j specifically, its routing paths of flows to noes {N i,..., N j+n/ } are shortene by x. Uner the esire traffic moel I, we have: n x = (x ) ( n x j) (n x) x (6) j= Eq. 6 is maximize, when we use a chor with the jump size of x = n 6. The insight behin Eq. 6 is the traeoff between () the number of routing paths that can benefit from the chor an () the save lengths of routing paths brought by the chor. ere, we o not further explore the contribution of an aitional chor on a ring with multiple chors. owever, note that the brought by an aitional chor can be calculate in polynomial time. This is because we have O(n ) pairs of noes, while the routing path for each pair of noes can be etermine within O(n). 5. Epiemics in Polymorphic Structures This subsection introuces an avance epiemic moel [6 for polymorphic structures uner the infection rate moel A. To capture the structural heterogeneity, let Q(D) enote the fraction of noes with in-egree D, an let f D (t) enote the fraction of incoming eges that loa infecte flows in locations with in-egree D at time t. For the moel A of the constant infection probability, we have: f D (t) t = λd[ f D (t)θ(f(t)) rf D (t) (7) Eq. 7 is similar to Eq. 8, which is for isomorphic structures. The fraction of outgoing eges that loa susceptible flows in locations with in-egree D is [ f D (t). Θ(f(t)) is the total fraction of eges that loa infecte flows. Therefore, the first term, λd[ f D (t)θ(f(t)), inicates the fraction of eges that loa new infecte flows at locations with in-egree D. The last term, rf D (t), shows the recovery. Existing work in [6 shows the following result: D D + D < r D λ (8) D is average noe egree, an D D represents the noe egree variance. Eq. 8 epicts the prerequisite of controlle outbreaks in polymorphic structures, uner the infection rate moel A. In contrast, the constraint for isomorphic structures are shown in Eq. 3. The insight of Eq. 8 is that a larger egree variance also brings a more vulnerable network. Uner the infection rate moel A, both the average egree an the egree variance etermines the network resistance to epiemics. D D inicates the network vulnerability to epiemics (the larger, the more vulnerable). 5.3 Constructing Polymorphic Structures This subsection escribes two greey algorithms for polymorphic structures. Algorithm starts with a ring network that has no chors, an then iteratively as chors with the consieration of () that inicates the reuce average number of routing hops (the benefit of that chor) an () [ D D that represents the increase network vulnerability (the cost of that chor). Algorithm iteratively as the chor with the highest ratio of to [ D D (the benefitto-cost ratio). In the event of a tie, a ranom one is picke. A chor with a large means that it can effectively minimize the number of average hops. A chor with a small [ D D inicates that aing this chor only slightly increases the network vulnerability to epiemics. In contrast, Algorithm starts with a fully-connecte ring network, an then iteratively removes the chor with the lowest ratio of to [ D D. Algorithms an are extenable to heterogeneous traffic istribution an epiemic spreaing moels [7, [8, since they construct polymorphic network structures base on the benefit-to-cost ratio of each chor. owever, both Algorithms an are suboptimal. They may be trappe into local optima ue to the greey nature. The optimal solution remains to be explore. 6 EXPERIMENTS This section conucts experiments to evaluate the propose structures. Coes are publishe in [9. 6. Experiments on Ring Networks Settings. In this subsection, we focus on the propose isomorphic structures in a ring network. The ring network has n = 7 noes, with the number of chors ranging from to 3. The infection coefficient λ is., while the recovery rate r varies in ifferent settings, in orer to observe the epiemic outbreak point. % of the total eges

9 IEEE/ACM TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, VOL., NO., µ< r λ µ< r λ µ r λ (a) T i,j, µ = λ D, r = (b) T i,j = n, µ = λ D, r = (c) T i,j, µ = λd, r =. Fig. 7. The evaluation results. The top line figures show the relationship between an, an the bottom line figures show the relationship between an the infection percentage of noes after, time units. (a) The evaluation results uner the esire traffic moel II an the infection rate moel B, with a recovery rate r =.5. (b) The evaluation results uner the esire traffic moel I an the infection rate moel B, with a recovery rate r =.3. (c) The evaluation results uner the esire traffic moel II an the infection rate moel A, with a recovery rate r =.. are initialize as being infecte, while the percentage of infectors is checke again after, time units. The time perio of, time units is long enough to guarantee that the infection percentage becomes steay. We o not consier the other initializations on the percentage of infectors, since [4 has shown that the initialize percentage of infectors has a very limite influence on the eventual epiemic outbreak (or not). ere, the esire traffic moel III is not consiere, since all chors ten to connect to the nearest noes. The infection rate moel C is not consiere, since it results in a fully-connecte network as an optimal solution. Therefore, we focus on the esire traffic moel I (T i,j = n ) an moel II (T i,j ). As for the infection rate moels, we only pay attention to moel A (µ = λd) an moel B (µ = λ D). Three aitional isomorphic structures are use for comparison. The first one is the uniform-cut structure, where the chors uniformly cut the half-ring. In this structure, the jump sizes are {+, + n, + n ( )n,..., + } for half a ring. The secon one is the structure, where each noe connects to the nearest D geographical neighbors. The thir one is the structure [3, which was propose for the connections among servers in ata center networks. Testing Different Structures. The experimental results are shown in Fig. 7. The top-line figures show the relationship between an, while the bottom-line figures show the relationship between an the percentage of infecte flows after, time units. The three subfigures in Fig. 7 escribe three ifferent settings of traffic istribution moels an infection rate moels. The top lines of Figs. 7(a) an 7(c) are the same, since they have the same traffic moel. In Fig. 7(b), the performance of the binary-cut an binarytraffic-cut structures are the same, ue to the uniform traffic moel. In the top line figures, the ashe boxes show the theoretical interval of controlle epiemic outbreaks (i.e., the theoretical constraint of µ < r λ ). The real infection percentages, after, time units (i.e., epiemic outbreaks or not), are shown in the bottom line of Fig. 7. It can be seen that the uniform-cut an the structures are useless, since they cannot control epiemic outbreaks. They have very large average numbers of routing hops. Although has a ecent average number of routing hops, it cannot control epiemic outbreaks. For the esire traffic moel II an the infection rate moel B in Fig. 7(a), the binary-cut structure controls outbreaks with a large, an the binary-traffic-cut structure controls outbreaks with a small. This is consistent with our theoretical results. The binary-cut structure can achieve the smallest without outbreaks. For the esire traffic moel I an the infection rate moel B in Fig. 7(b), the performance of the two propose structures are the same, an they can control epiemic outbreaks when is large enough. The esire traffic moel II an the infection rate moel A in Fig. 7(c) show that the epiemic outbreaks only epen on the egree. These results verify that the prerequisite of controlle epiemic outbreaks (i.e., µ < r λ ) is accurate. Sensitivity Experiments. One step further, here we also stuy the sensitivities of the propose structures, since the assumption of isomorphic structures may be too strong for real-worl applications. We want to check whether this assumption can be relaxe or not. ence, we ranomly rewire a fraction of chors for the propose structures to check their sensitivities. If a chor is rewire, it will reconnect to a pair of noes that are ranomly selecte. For the binary-cut an binary-traffic-cut structures, the resulting structures with % rewire chors are enote as binarycut* an binary-traffic-cut*, respectively. Then, the resulting

10 IEEE/ACM TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, VOL., NO., * ** * ** * ** * ** * ** 5 5 * ** * ** * ** 5 5 (a) T i,j, µ = λ D, r = * ** * ** 5 5 (b) T i,j = n, µ = λ D, r = * ** * ** 5 5 (c) T i,j, µ = λd, r =. Fig. 8. The sensitivity experiments. The settings are the same as those in Fig. 7. The binary-cut* an binary-traffic-cut* enote binary-cut an binary-traffic-cut structures with % ranomly rewire chors, respectively. Similarly, The binary-cut** an binary-traffic-cut** enote binary-cut an binary-traffic-cut structures with 5% ranomly rewire chors, respectively. Fig. 9. The geographic map of the real ata-riven experiment. structures with 5% rewire chors are enote as binarycut** an binary-traffic-cut**, respectively. The sensitivity experiment results are shown in Fig. 8. It can be seen that, rewire chors have a very limite impact, in terms of both the average number of routing hops () an the infection percentage. The network traffic moel an infection rate moel also o not significantly change the result. The average number of routing hops () slightly increases, since the hypercube-base structures are greatly fault-tolerant with respect to greey-coin-change-base routings. The variance of the infection percentage is also limite, since the isomorphic structure is not estructe too much. Overall, these two structures are not sensitive to a small portion of ranomly rewire chors, i.e., the isomorphism assumption can be relaxe for real-worl applications. 6. Real Data-Driven Experiments Settings. This subsection conucts real ata-riven experiments to verify the applicability of our approach. We use a real airline ataset of OpenFlights [3, which contains 59,36 routes between 3,9 airports on 53 airlines spanning the globe, as shown in Fig. 9 (airports are marke as re points). Airports correspon to noes in our moel. We iscretize the Earth through meriians an parallels (, points). Each airport is roune to its nearest geographic point. The existing airline routes imply the information on the esire traffic istribution. In other wors, the esire traffic istribution moel is given, where each flight stans for a unit traffic. If we use the existing airline routes as chors, then the average number of routing hops () is one, but this structure fails to control epiemic outbreaks. To apply our ring moel, X-Y routing scheme is use for noe communications. The routing has two stages: the first stage routes along the meriian ring of the source noe, an the secon stage routes along the parallel ring of the estination noe. An example of such a routing has been shown in Fig. 4. The number of routing hops is the sum of these two stages on two ifferent rings. We use the real Ebola ataset in three countries (Guinea, Liberia, an Sierra Leone) reporte by Wor ealth Organization [3 to moel epiemic spreaings. Table 3 shows the ata statistics, in terms of the number of recovers an eaths. The number of recovers are significantly smaller than the number of eaths in Guinea, approximately equal to the number of eaths in Liberia, an significantly larger than the number of eaths in Sierra Leone. The fractions of recovers an eaths are use as the recover an infection rates, respectively. ere, the infection rate is trafficinsensitive (infection rate moel A). The other settings are the same as those in the previous subsection. Experimental results. The results for the real ata-riven experiments are shown in Fig.. Fig. (a) shows the relationship between an. A larger noe egree leas to a smaller average number of routing hops. The binarytraffic-cut outperforms other structures, when is large. It

11 IEEE/ACM TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, VOL., NO., (a) Number of routing hops (b) Epiemics in Guinea (c) Epiemics in Liberia () Epiemics in Sierra Leone. Fig.. Evaluation results for real ata-riven experiments. TABLE 3 Ebola statistics reporte by Wor ealth Organization. Dataset Recover Death Total Guinea (/8/5),68,536 3,84 Liberia (5/9/5) 5,86 4,86,666 Sierra Leone (/7/5),67 3,955 4, ACKNOWLEDGMENTS This work is supporte in part by NSF grants CNS 4986, CNS 4693, CNS 4697, CNS 43967, CNS 3774, ECCS 346, ECCS 89, an CNS has an of about 4, when = 8. In contrast, has the largest among all the structures. Another notable point is that has the smallest when is small (when = ). Fig. (b), Fig. (c), an Fig. () shows the eventual infection percentages uner the ataset of Guinea, Liberia, an Sierra Leone, respectively. A larger always leas to a larger infection percentage. Note that, in our structure esign, each airport can have four routes to nearby airports (on meriian an parallel), an routes to remote airports ( for meriian-remote airport an for parallel-remote airport). This is because the infection rate is not traffic-sensitive, an thus, we shoul cap the noe egree to avoi epiemic outbreaks. Fig. (b) has the highest infection percentages, since the ataset of Guinea has the highest eath-to-recover ratio, an the infection rate is larger than the recovery rate. In Fig. (b), uniform-cut an can only control epiemic outbreaks when = with 7. controls epiemic outbreaks when = 3 with 6. Binary-cut an binary-trafficcut control epiemic outbreaks when = 5 with 5. In Fig. (c), uniform-cut an control epiemic outbreaks when = 4 with 6. controls epiemic outbreaks when = 6 with 7. Binary-cut an binarytraffic-cut control epiemics with 4. Fig. () shows similar results with Fig. (c), since Sierra Leone has the lowest eath-to-recover ratio. Real ata-riven experiments confirm the real-worl applicability of our approach. 7 CONCLUSION This paper stuies network structures with minimum traffic flow routings, while controling epiemic outbreaks through regulating the number an istribution of chors on a ring network. The objective is to esign a structure (quarantine rules) that can minimize the average number of routing hops, while the epiemic outbreaks are controlle. For isomorphic structures, we provie a systematic structure esign on nine ifferent cases. Two hypercube-base structures are explore. Sensitivity experiments emonstrate that the isomorphism assumption can be relaxe. For polymorphic structures, we provie a greey solution. Our work casts new light on the effective network quarantine that places minimal restrictions on communication activities. REFERENCES [ C. Lagorio, M. Dickison, F. Vazquez, L. A. Braunstein, P. A. Macri, M. V. Migueles, S. avlin, an. E. Stanley, Quarantinegenerate phase transition in epiemic spreaing, Physical Review E, vol. 83, no., p. 6,. [ P. T. Eugster, R. Guerraoui, A.-M. Kermarrec, an L. Massoulié, Epiemic information issemination in istribute systems, Computer, vol. 37, no. 5, pp. 6 67, 4. [3 [4 M. Newman, Networks: An Introuction. New York, NY, USA: Oxfor University Press,. [5 J. Xu, A. Kumar, an X. Yu, On the funamental traeoffs between routing table size an network iameter in peer-topeer networks, IEEE Journal on Selecte Areas in Communications, vol., no., pp. 5 63, 6. [6 J. M. Kleinberg, Navigation in a small worl, Nature, vol. 46, no. 6798, p. 845,. [7 I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, an. Balakrishnan, Chor: A scalable peer-to-peer lookup service for internet applications, SIGCOMM Computer Communication Review, vol. 3, no. 4, pp. 49 6,. [8 M. Marathe an A. K. S. Vullikanti, Computational epiemiology, Communications of the ACM, vol. 56, no. 7, pp , 3. [9 A. Kumar, S. Merugu, J. Xu, an X. Yu, Ulysses: a robust, low-iameter, low-latency peer-to-peer network, in Proceeings of IEEE ICNP 3, pp [ [ K. Savla, G. Como, M. Dahleh et al., Robust network routing uner cascaing failures, IEEE Transactions on Network Science an Engineering, vol., no., pp , 4. [ P. J. Leerer an R. S. Nambimaom, Airline network esign, Operations Research, vol. 46, no. 6, pp , 998. [3 N. Wieberneit, Service network esign for freight transportation: a review, OR spectrum, vol. 3, no., pp. 77, 8. [4 A. Ganesh, L. Massoulié, an D. Towsley, The effect of network topology on the sprea of epiemics, in Proceeings of IEEE INFOCOM 5, pp [5 F. D. Sahneh, C. Scoglio, an P. Van Mieghem, Generalize epiemic mean-fiel moel for spreaing processes over multilayer complex networks, IEEE/ACM Transactions on Networking, vol., no. 5, pp. 69 6, 3. [6 V. M. Preciao, F. D. Sahneh, an C. Scoglio, A convex framework for optimal investment on isease awareness in social networks, in Proceeings of IEEE GlobalSIP 3, pp [7 C. Nowzari, V. M. Preciao, an G. J. Pappas, Stability analysis of generalize epiemic moels over irecte networks, in Proceeings of IEEE CDC 4, pp [8 C. Enyioha, A convex framework for epiemic control in networks, 4. [9 V. M. Preciao an M. Zargham, Traffic optimization to control epiemic outbreaks in metapopulation moels, in Proceeings of IEEE GlobalSIP 3, pp

12 IEEE/ACM TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, VOL., NO., 6 [ D. J. Watts an S.. Strogatz, Collective ynamics of smallworl networks, Nature, vol. 393, no. 6684, pp , 998. [ M. Caesar, M. Castro, E. B. Nightingale, G. O Shea, an A. Rowstron, Virtual ring routing: network routing inspire by hts, ACM SIGCOMM Computer Communication Review, vol. 36, no. 4, pp , 6. [ S. C. Ergen an P. Varaiya, Energy efficient routing with elay guarantee for sensor networks, Wireless Networks, vol. 3, no. 5, pp , 7. [3 S. Kniesburges, A. Koutsopoulos, an C. Scheieler, A selfstabilization process for small-worl networks, in Proceeings of IEEE IPDPS, pp [4 P. Van Mieghem, Epiemic phase transition of the sis type in networks, Europhysics Letters, vol. 97, no. 4, p. 484,. [5 R. K. Plowright, P. Foley,. E. Fiel, A. P. Dobson, J. E. Foley, P. Eby, an P. Daszak, Urban habituation, ecological connectivity an epiemic ampening: the emergence of henra virus from flying foxes, Proceeings of the Royal Society B: Biological Sciences, vol. 78, no. 75, pp ,. [6 R. Pastor-Satorras an A. Vespignani, Immunization of complex networks, Physical Review E, vol. 65, no. 3, p. 364,. [7 M. Barthélemy, A. Barrat, R. Pastor-Satorras, an A. Vespignani, Velocity an hierarchical sprea of epiemic outbreaks in scalefree networks, Physical Review Letters, vol. 9, no. 7, p. 787, 4. [8. Rahmana an J. Sterman, eterogeneity an network structure in the ynamics of iffusion: Comparing agent-base an ifferential equation moels, Management Science, vol. 54, no. 5, pp , 8. [9 [3 C. Guo,. Wu, K. Tan, L. Shi, Y. Zhang, an S. Lu, : a scalable an fault-tolerant network structure for ata centers, SIGCOMM Computer Communication Review, vol. 38, no. 4, pp , 8. [3 [3 uanyang Zheng receive his B.Eng. egree in Telecommunication Engineering from Beijing U- niversity of Posts an Telecommunications, China, in. e is currently a Ph.D. caniate in the Department of Computer an Information Sciences, Temple University, USA. is research focuses on wireless an mobile networks, social networks an structures, an clou systems. Jie Wu is the Associate Vice Provost for International Affairs at Temple University. e also serves as the Chair an Laura. Carnell professor in the Department of Computer an Information Sciences. Prior to joining Tempe University, he was a program irector at the National Science Founation an was a istinguishe professor at Floria Atlantic University. is current research interests inclue mobile computing an wireless networks, routing protocols, clou an green computing, network trust an security, an social network applications. Dr. Wu regularly publishes in scholarly journals, conference proceeings, an books. e serves on several eitorial boars, incluing IEEE Transactions on Service Computing an the Journal of Parallel an Distribute Computing. Dr. Wu was general co-chair/chair for IEEE MASS 6, IEEE IPDPS 8, IEEE ICDCS 3, an ACM Mobioc 4, as well as program co-chair for IEEE INFOCOM an CCF CNCC 3. e was an IEEE Computer Society Distinguishe Visitor, ACM Distinguishe Speaker, an chair for the IEEE Technical Committee on Distribute Processing (TCDP). Dr. Wu is a CCF Distinguishe Speaker an a Fellow of the IEEE. e is the recipient of the China Computer Feeration (CCF) Overseas Outstaning Achievement Awar.

Construction of Power Efficient Routing Tree for Ad Hoc Wireless Networks using Directional Antenna

Construction of Power Efficient Routing Tree for Ad Hoc Wireless Networks using Directional Antenna Construction of Power Efficient Routing Tree for A Hoc Wireless Networks using Directional Antenna Qing Dai an Jie Wu Department of Computer Science an Engineering Floria Atlantic University Boca Raton,

More information

Resource Allocation for Cooperative Transmission in Wireless Networks with Orthogonal Users

Resource Allocation for Cooperative Transmission in Wireless Networks with Orthogonal Users Resource Allocation for Cooperative Transmission in Wireless Networks with Orthogonal Users D. Richar Brown III Electrical an Computer Engineering Department Worcester Polytechnic Institute Worcester,

More information

IN GENERAL, an optical network can consist of a

IN GENERAL, an optical network can consist of a 1 Geometric Capacity Provisioning for Wavelength-Switche WDM Networks Li-Wei Chen, Eytan Moiano Abstract In this paper, we use an asymptotic analysis similar to the sphere-packing argument in the proof

More information

SECONDARY TRANSMISSION POWER OF COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS

SECONDARY TRANSMISSION POWER OF COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS SECONDARY TRANSMISSION POWER OF COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS Xiaohua Li 1 1 Department of ECE State University of New York at Binghamton Binghamton, NY 139, USA {xli,jhwu1}@binghamton.eu

More information

Relay Deployment and Power Control for Lifetime Elongation in Sensor Networks

Relay Deployment and Power Control for Lifetime Elongation in Sensor Networks Relay Deployment an Power Control for Lifetime Elongation in Sensor Networks Yufeng Xin, Tuna Güven, Mark Shayman Institute of Avance Computer Stuies University of Marylan, College Park, MD 074 e-mail:

More information

QoS Topology Control in Ad Hoc Wireless Networks

QoS Topology Control in Ad Hoc Wireless Networks QoS Topology Control in A Hoc Wireless Networks Xiaohua Jia, Deying Li Dept of Computer Science City University of Hong Kong Hong Kong, China Dingzhu Du Dept of Computer Science an Engineering University

More information

A NEW PUZZLE FOR ITERATED COMPLETE GRAPHS OF ANY DIMENSION

A NEW PUZZLE FOR ITERATED COMPLETE GRAPHS OF ANY DIMENSION A NEW PUZZLE FOR ITERATED COMPLETE GRAPHS OF ANY DIMENSION ELIZABETH SKUBAK AND NICHOLAS STEVENSON ADVISOR: PAUL CULL OREGON STATE UNIVERSITY ABSTRACT. The Towers of Hanoi puzzle can be use to label a

More information

Cache-Aided Content Delivery in Fog-RAN Systems with Topological Information and no CSI

Cache-Aided Content Delivery in Fog-RAN Systems with Topological Information and no CSI Cache-Aie Content Delivery in Fog-RAN Systems with Topological Information an no CSI Wei-Ting Chang, Ravi Tanon, Osvalo Simeone Abstract In this work, we consier a Fog Raio Access Network (F-RAN) system

More information

Joint Cooperative Relaying and Jamming for Maximum Secrecy Capacity in Wireless Networks

Joint Cooperative Relaying and Jamming for Maximum Secrecy Capacity in Wireless Networks Joint Cooperative Relaying an Jamming for Maximum Secrecy Capacity in Wireless Networks Li Wang, Chunyan Cao, Mei Song an Yu Cheng Beijing Key Laboratory of Work Safety Intelligent Monitoring School of

More information

AN-1140 APPLICATION NOTE

AN-1140 APPLICATION NOTE APPLICATION NOTE One Technology Way P.O. Box 9106 Norwoo, MA 02062-9106, U.S.A. Tel: 781.329.4700 Fax: 781.461.3113 www.analog.com Microphone Array Beamforming by Jera Lewis INTRODUCTION All MEMS microphones

More information

Cross-layer Routing Optimization for Wireless Networks with Cooperative Diversity

Cross-layer Routing Optimization for Wireless Networks with Cooperative Diversity Cross-layer Routing Optimiation for Wireless Networs with Cooperative Diversity Zhiguo Ding an Kin K. Leung Department of Electrical an Electronic Engineering Imperial College Lonon, UK. Email: {higuo.ing,

More information

Principal Component Analysis-Based Compensation for Measurement Errors Due to Mechanical Misalignments in PCB Testing

Principal Component Analysis-Based Compensation for Measurement Errors Due to Mechanical Misalignments in PCB Testing Principal Component Analysis-Base Compensation for Measurement Errors Due to Mechanical Misalignments in PCB Testing Xin He 1, Yashwant Malaiya 2, Anura P. Jayasumana 1 Kenneth P. Parker 3 an Stephen Hir

More information

Using Chaos to Detect IIR and FIR Filters

Using Chaos to Detect IIR and FIR Filters PIERS ONLINE, VOL. 6, NO., 00 90 Using Chaos to Detect IIR an FIR Filters T. L. Carroll US Naval Research Lab, Coe 66, Washington, DC 07, USA Abstract In many signal processing applications, IIR an FIR

More information

Indoor Wireless Planning using Smart Antennas

Indoor Wireless Planning using Smart Antennas Inoor Wireless Planning using Smart Antennas Ali Abbasi an Maji Ghaeri Department of Computer Science, University of Calgary Emails: {abbasi, mghaeri}@ucalgary.ca Abstract This paper consiers the problem

More information

Capacity Gain from Transmitter and Receiver Cooperation

Capacity Gain from Transmitter and Receiver Cooperation Capacity Gain from Transmitter an Receiver Cooperation Chris T. K. Ng an Anrea J. Golsmith Dept. of Electrical Engineering Stanfor University, Stanfor, CA 90 Email: ngctk, anrea}@wsl.stanfor.eu arxiv:cs/00800v1

More information

Probabilistic Handshake in All-to-all Broadcast Coded Slotted ALOHA

Probabilistic Handshake in All-to-all Broadcast Coded Slotted ALOHA Probabilistic Hanshake in All-to-all Broacast Coe Slotte ALOHA Mikhail Ivanov, Petar Popovski, Frerik Brännström, Alexanre Graell i Amat, an Čeomir Stefanović Department of Signals an Systems, Chalmers

More information

Contents Maryland High School Programming Contest 1. 1 Stacked Floating Mountains 2. 2 Chess Puzzle 3. 3 Life Connections 4

Contents Maryland High School Programming Contest 1. 1 Stacked Floating Mountains 2. 2 Chess Puzzle 3. 3 Life Connections 4 2010 Marylan High School Programming Contest 1 Contents 1 Stacke Floating Mountains 2 2 Chess Puzzle 3 3 Life Connections 4 4 Circle of Friens 5 5 Floating Mountain Stability 6 6 Aim It Right! 7 7 Navi

More information

Balanced-energy Sleep Scheduling Scheme for High Density Cluster-based Sensor Networks

Balanced-energy Sleep Scheduling Scheme for High Density Cluster-based Sensor Networks Balance-energy Sleep Scheuling Scheme for High Density Cluster-base Sensor Networks Jing Deng, unghsiang S. Han, Weni B. Heinzelman, an Pramo K. Varshney Abstract In orer to conserve battery power in very

More information

Page 1. Overview : Wireless Networks Lecture 7: Cellular Networks. The advent of cellular networks. The cellular network design.

Page 1. Overview : Wireless Networks Lecture 7: Cellular Networks. The advent of cellular networks. The cellular network design. Overview 18-759: Wireless Networks Lecture 7: Cellular Networks Dina Papagiannaki & Peter Steenkiste Departments of Computer Science an Electrical an Computer Engineering Spring Semester 2009 http://www.cs.cmu.eu/~prs/wireless09/

More information

HOW SYMMETRICAL COMPONENTS MAY HELP TO SUPPRESS VOLTAGE SENSORS IN DIRECTIONAL RELAYS FOR DISTRIBUTION NETWORKS

HOW SYMMETRICAL COMPONENTS MAY HELP TO SUPPRESS VOLTAGE SENSORS IN DIRECTIONAL RELAYS FOR DISTRIBUTION NETWORKS C E D 17 th nternational Conference on Electricity Distribution Barcelona, 12-15 May 2003 HOW SYMMETCAL COMPONENTS MAY HELP TO SUPPESS VOLTAGE SENSOS N DECTONAL ELAYS FO DSTBUTON NETWOKS Xavier LE PVET

More information

MODELLING OF GPS SIGNAL LARGE SCALE PROPAGATION CHARACTERISTICS IN URBAN AREAS FOR PRECISE NAVIGATION

MODELLING OF GPS SIGNAL LARGE SCALE PROPAGATION CHARACTERISTICS IN URBAN AREAS FOR PRECISE NAVIGATION Int. J. Elec&Electr.Eng&Telcomm. 2012 G Sateesh Kumar et al., 2012 Research Paper ISSN 2319 2518 www.ijeetc.com Vol. 1, No. 1, October 2012 2012 IJEETC. All Rights Reserve MODELLING OF GPS SIGNAL LARGE

More information

Energy Efficient Relay Selection for Cooperative Relaying in Wireless Multimedia Networks

Energy Efficient Relay Selection for Cooperative Relaying in Wireless Multimedia Networks Energy Efficient Relay Selection for Cooperative Relaying in Wireless Multimeia Networks Zhengguo Sheng, Jun Fan, Chi Harol Liu, Victor C. M. Leung, Xue Liu*, an Kin K. Leung Orange Labs, France Telecom,

More information

Wireless Event-driven Networked Predictive Control Over Internet

Wireless Event-driven Networked Predictive Control Over Internet UKACC International Conference on Control 22 Cariff, UK, 3-5 September 22 Wireless Event-riven Networke Preictive Control Over Internet Wenshan Hu, Hong Zhou, an Qijun Deng Abstract In networke control

More information

A Circuit Level Fault Model for Resistive Shorts of MOS Gate Oxide

A Circuit Level Fault Model for Resistive Shorts of MOS Gate Oxide Circuit Level Fault Moel for esistive Shorts of MOS Gate Oxie Xiang Lu, Zhuo Li, Wangqi Qiu, D. M. H. Walker an Weiping Shi Dept. of Electrical Engineering Texas &M University College Station, TX 77843-34,

More information

Shadowing Correlation Model for Indoor Multi-hop Radio Link in Office Environment

Shadowing Correlation Model for Indoor Multi-hop Radio Link in Office Environment JAVA, International Journal of Electrical Electronics Engineering Volume 4, Number, April 26 Shaowing Moel for Inoor Multi-hop Raio Link in Office Environment Mohamma Fahli Inustrial Engineering Department

More information

1.0 MEASUREMENT OF PARAXIAL PROPERTIES OF OPTICAL SYSTEMS

1.0 MEASUREMENT OF PARAXIAL PROPERTIES OF OPTICAL SYSTEMS .0 MEASUREMENT OF PARAXIAL PROPERTIES OF OPTICAL SYSTEMS James C. Wyant Optical Sciences Center University of Arizona Tucson, AZ 8572 jcwyant@u.arizona.eu If we wish to completely characterize the paraxial

More information

The effect of two realistic Radio Propagation Models for Mobile Ad hoc NETworks in Urban Area Environment Supported with stations

The effect of two realistic Radio Propagation Models for Mobile Ad hoc NETworks in Urban Area Environment Supported with stations International Journal of Scientific & Engineering Research Volume 2, Issue 1, Oct-211 1 The effect of two realistic Raio Propagation Moels for Mobile A hoc NETworks in Urban Area Environment Supporte with

More information

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues Minimum-Energy Broacast in All-Wireless Networks: NP-Completeness an Distribution Issues Mario Čagal LCA-EPFL CH-05 Lausanne Switzerlan mario.cagal@epfl.ch Jean-Pierre Hubaux LCA-EPFL CH-05 Lausanne Switzerlan

More information

Indoor Positioning Using Ultrasound and Radio Combination

Indoor Positioning Using Ultrasound and Radio Combination Inoor Positioning Using Ultrasoun an Raio Combination Gintautas Salcius, Evalas Povilaitis, Algimantas Tacilauskas Centre of Real Time Computer Systems, Kaunas University of Technology Stuentu St. 50,

More information

Dynamic Hybrid Duplex for Rate Maximization in OFDMA. Sangmin Oh and Chae Y. Lee

Dynamic Hybrid Duplex for Rate Maximization in OFDMA. Sangmin Oh and Chae Y. Lee Dynamic Hybri Duplex for Rate Maximization in OFDMA Sangmin Oh an Chae Y. Lee Dept. of Inustrial Engineering, KAIST, 373-1 Kusung Dong, Taeon, Korea Tel: +82-42-350-5916, FAX: +82-42-350-3110 Email: {sangmin.oh,

More information

Secure Communication with a Wireless-Powered Friendly Jammer

Secure Communication with a Wireless-Powered Friendly Jammer Secure Communication with a Wireless-Powere Frienly Jammer Wanchun Liu, Xiangyun Zhou, Salman Durrani, an Petar Popovski arxiv:42.0349v2 [cs.it] 26 Aug 205 Abstract In this paper, we propose to use a wireless-powere

More information

Research on the Selection Strategy for Optimal Anchor Nodes Based on Ant Colony Optimization

Research on the Selection Strategy for Optimal Anchor Nodes Based on Ant Colony Optimization Sensors & Transucers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Research on the Selection Strategy for Optimal Anchor Noes Base on Ant Colony Optimization Baoxin ZHAO, Bi ZENG Guangong

More information

Radio Range Adjustment for Energy Efficient Wireless Sensor Networks. Electronic Engineering, Aston University, Birmingham B4 7ET,United Kingdom b

Radio Range Adjustment for Energy Efficient Wireless Sensor Networks. Electronic Engineering, Aston University, Birmingham B4 7ET,United Kingdom b Raio Range Ajustment for Energy Efficient Wireless Sensor Networks Q. Gao a,, K. J. Blow a 1, D. J. Holing a, I. W. Marshall b, X. H. Peng a a Electronic Engineering, Aston University, Birmingham B4 7ET,Unite

More information

AN APPLICATION OF A GENERALISED JAKES MODEL FOR MIMO CHANNELS

AN APPLICATION OF A GENERALISED JAKES MODEL FOR MIMO CHANNELS AN APPLICATION OF A GENERALISED JAKES MODEL FOR MIMO CHANNELS Davi B. Smith (1) (1) Faculty of Engineering (Telecommunications), University of Technology Syney PO Box 13 Broaway NS 007 Australia E-mail:

More information

A General Algorithm for Interference Alignment and Cancellation in Wireless Networks

A General Algorithm for Interference Alignment and Cancellation in Wireless Networks A General Algorithm for Interference Alignment an Cancellation in Wireless Networks Li Erran Li, Richar Alimi, Dawei Shen, Harish Viswanathan an Y. Richar Yang Bell Labs MIT Yale University Abstract Physical

More information

Efficient construction of network topology to conserve energy in wireless ad hoc networks q

Efficient construction of network topology to conserve energy in wireless ad hoc networks q Available online at www.scienceirect.com Computer Communications 31 (2008) 160 173 www.elsevier.com/locate/comcom Efficient construction of network topology to conserve energy in wireless a hoc networks

More information

RCGA based PID controller with feedforward control for a heat exchanger system

RCGA based PID controller with feedforward control for a heat exchanger system Journal of the Korean Society of Marine Engineering, Vol. 1, No. pp. 11~17, 17 ISSN 223-7925 (Print) J. Korean Soc. of Marine Engineering (JKOSME) ISSN 223-8352 (Online) https://oi.org/.5916/jkosme.17.1..11

More information

Energy Efficient Virtual MIMO-based Cooperative Communications for Wireless Sensor Networks

Energy Efficient Virtual MIMO-based Cooperative Communications for Wireless Sensor Networks Energy Efficient Virtual MIMO-base Cooperative Communications for Wireless Sensor Networks Suharman K. Jayaweera Department of Electrical an Computer Engineering Wichita State University, Wichita, KS,

More information

Taylor, Muthiah, Kulakowski, Mahoney and Porter 1 AN ARTIFICIAL NEURAL NETWORK SPEED PROFILE MODEL FOR HIGH- SPEED HIGHWAY CONSTRUCTION WORK ZONES

Taylor, Muthiah, Kulakowski, Mahoney and Porter 1 AN ARTIFICIAL NEURAL NETWORK SPEED PROFILE MODEL FOR HIGH- SPEED HIGHWAY CONSTRUCTION WORK ZONES Taylor, Muthiah, Kulakowski, Mahoney an Porter 1 AN ARTIFICIAL NEURAL NETWORK SPEED PROFILE MODEL FOR HIGH- SPEED HIGHWAY CONSTRUCTION WORK ZONES Submission Date: August 1, 2005 Wor Count: 57 wors DOUGLAS

More information

Energy Efficient Clustering Algorithm in Wireless Sensor Networks using Fuzzy Logic Control

Energy Efficient Clustering Algorithm in Wireless Sensor Networks using Fuzzy Logic Control 11 I Colloquium on Humanities, Science an ngineering Research (CHUSR 11), Dec 5-6 11, Penang nergy fficient Clustering Algorithm in Wireless Sensor Networks using Fuzzy Logic Control Z.W. Siew, A. Kiring,

More information

Topology-assisted techniques to relay selection for homogeneously distributed wireless sensor networks

Topology-assisted techniques to relay selection for homogeneously distributed wireless sensor networks This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE Globecom 2010 proceeings. Topology-assiste techniques to relay selection

More information

SUBSET: A Joint Design of Channel Selection and Channel Hopping for Fast Blind Rendezvous in Cognitive Radio Ad Hoc Networks

SUBSET: A Joint Design of Channel Selection and Channel Hopping for Fast Blind Rendezvous in Cognitive Radio Ad Hoc Networks SUBSET: A Joint esign of Channel Selection an Channel Hopping for Fast Blin enezvous in Cognitive aio A Hoc Networks Xingya Liu an Jiang Xie epartment of Electrical an Computer Engineering The University

More information

Effect of Carrier Frequency Offset on the BER Performance of Variable Spreading Factor OFCDM Systems

Effect of Carrier Frequency Offset on the BER Performance of Variable Spreading Factor OFCDM Systems This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the ICC 008 proceeings. Effect of Carrier Frequency Offset on the erformance

More information

Replanning of Optical Networks based on Defragmentation Techniques

Replanning of Optical Networks based on Defragmentation Techniques Replanning of Optical Networks base on Defragmentation Techniques Daniela Aguiar Moniz aniela.moniz@tecnico.ulisboa.pt Instituto Superior Técnico, Lisboa, Portugal November 2015 Abstract The traffic growth

More information

Transit Network Design under Stochastic Demand

Transit Network Design under Stochastic Demand Transit Network Design uner Stochastic Deman Hong K. LO Civil an Environmental Engineering Hong Kong University of Science an Technology 1 Public transport Backgroun Fixe route transit (FRT) : fixe route

More information

Validation of a Non-Line-of-Sight Path-Loss Model for V2V Communications at Street Intersections

Validation of a Non-Line-of-Sight Path-Loss Model for V2V Communications at Street Intersections Valiation of a Non-Line-of-Sight Path-Loss Moel for V2V Communications at Street Intersections Taimoor Abbas, Anreas Thiel, Thomas Zemen, Christoph F. Mecklenbräuker, an Frerik Tufvesson Department of

More information

RECENTLY, the 2G standard GSM was enhanced by

RECENTLY, the 2G standard GSM was enhanced by 274 IEEE TRANSACTIONS ON WIREESS COMMUNICATIONS, VO. 5, NO. 2, FEBRUARY 2006 The Training Sequence Coe Depenence of EDGE Receivers using Zero IF Sampling Martin Krueger, Member, IEEE, Robert Denk, an Bin

More information

Implementation of Beam Formation for WMNs

Implementation of Beam Formation for WMNs Implementation of Beam Formation for WMNs M. UTHANSAKUL, S. PRADITTARA AND P. UTHANSAKUL School of Telecommunication Engineering Suranaree University of Technology 111 University Avenue, Muang, Nakhonratchasima

More information

Measurement of Semi-Anechoic Chamber Using Modified VSWR method above 1GHz

Measurement of Semi-Anechoic Chamber Using Modified VSWR method above 1GHz Measurement of Semi-Anechoic Chamber Using Moifie VSWR metho above 1GHz M. Bittera, K. Kováč, J. Hallon Department of Measurement, Faculty of Electrical Engineering an Information Technology, Slovak University

More information

Intelligent Senses in Robot Based on Neural Networks

Intelligent Senses in Robot Based on Neural Networks Intelligent Senses in Robot Base on Neural Networks Vimal Ganotra, Rashmi Sharma, Priti Dhingra, Sourabh Sharma, an Navin Kumar Abstract This Paper escribes a moel an an implementation of spiking neurons

More information

Acoustical Localization in Schools of Submersibles

Acoustical Localization in Schools of Submersibles Oceans 6, Singapore (authors manuscript o not istribute) Acoustical Localization in Schools of Submersibles Navina Kottege & Uwe R. Zimmer Research School of Information Sciences an Engineering Autonomous

More information

Power Efficient Pilot Symbol Power Allocation under Time-variant Channels

Power Efficient Pilot Symbol Power Allocation under Time-variant Channels Power Efficient Pilot Symbol Power Allocation uner Time-variant Channels Michal Šimko, Paulo S. R. Diniz,QiWang an Markus Rupp Institute of Telecommunications, Vienna University of Technology, Vienna,

More information

Joint Partial Relay Selection, Power Allocation and Cooperative Maximum Likelihood Detection for MIMO Relay Systems with Limited Feedback

Joint Partial Relay Selection, Power Allocation and Cooperative Maximum Likelihood Detection for MIMO Relay Systems with Limited Feedback Joint Partial Relay Selection, Power Allocation an Cooperative Maximum Likelihoo Detection for MIMO Relay Systems with Limite Feeback Thomas Hesketh, Rorigo C. e Lamare, Stephen Wales Department of Electronics,

More information

Downward Trimming of Polymer Thick Film Resistors through High Voltage Pulses

Downward Trimming of Polymer Thick Film Resistors through High Voltage Pulses Downwar Trimming of Polymer Thick Film Resistors through High Voltage Pulses Y.Srinivasa Rao E.C.E. Department Shri Vishnu Engineering College For Women Vishnupur, Bhimavaram-540 W.G.Dt.,Ap, Inia Phone

More information

An Intelligent 3D User Interface Adapting to User Control Behaviors

An Intelligent 3D User Interface Adapting to User Control Behaviors An Intelligent 3D User Interface Aapting to User Control Behaviors Tsai-Yen Li Computer Science Department National Chengchi University Taipei, Taiwan 11623, R.O.C. +886 2 2938 7170 li@nccu.eu.tw Shu-Wei

More information

Chapter 9 answers. Section 9.1. Worked example: Try yourself Heinemann Physics 12 4e APPLYING HUYGENS PRINCIPLE

Chapter 9 answers. Section 9.1. Worked example: Try yourself Heinemann Physics 12 4e APPLYING HUYGENS PRINCIPLE Chapter 9 answers Heinemann Physics 12 4e Section 9.1 Worke example: Try yourself 9.1.1 APPLYING HUYGENS PRINCIPLE On the circular waves shown below, sketch some of the seconary wavelets on the outer wavefront

More information

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors We are IntechOpen, the worl s leaing publisher of Open Access books Built by scientists, for scientists 3,500 108,000 1.7 M Open access books available International authors an eitors Downloas Our authors

More information

Performance Analysis and Comparison of ZF and MRT Based Downlink Massive MIMO Systems

Performance Analysis and Comparison of ZF and MRT Based Downlink Massive MIMO Systems Performance Analysis an Comparison of ZF an MRT Base Downlink Massive MIMO Systems Tebe Parfait, Yujun uang, 1,2 ponyo Jerry 1 Mobilelink Lab Univ of Electronic Sci an Tech of China, UESTC Chengu, China

More information

Wave-Induced Fluctuations in Underwater Light Field: Analysis of Data from RaDyO Experiments

Wave-Induced Fluctuations in Underwater Light Field: Analysis of Data from RaDyO Experiments DISTRIBUTION STATEMENT A. Approve for public release; istribution is unlimite. Wave-Inuce Fluctuations in Unerwater Light Fiel: Analysis of Data from RaDyO Experiments Dariusz Stramski Marine Physical

More information

2.35 Tuning PID Controllers

2.35 Tuning PID Controllers 2.35 Tuning PID Controllers P. W. MURRILL (1970) P. D. SCHNELLE, JR. (1985) B. G. LIPTÁK (1995) J. GERRY, M. RUEL, F. G. SHINSKEY (2005) In orer for the reaer to fully unerstan the content an concepts

More information

Wireless Powered Dual-Hop Multiple Antenna Relay Transmission in the Presence of Interference

Wireless Powered Dual-Hop Multiple Antenna Relay Transmission in the Presence of Interference EEE CC 05 - Wireless Communications Symposium Wireless Powere Dual-Hop Multiple Antenna Relay Transmission in the Presence of nterference Guangxu Zhu, Caijun Zhong, Himal A. Suraweera, George K. Karagianniis,

More information

A Turnover based Adaptive HELLO Protocol for Mobile Ad Hoc and Sensor Networks

A Turnover based Adaptive HELLO Protocol for Mobile Ad Hoc and Sensor Networks A Turnover base Aaptive HELLO Protocol for Mobile A Hoc an Sensor Networks François Ingelrest, Nathalie Mitton, Davi Simplot-Ryl To cite this version: François Ingelrest, Nathalie Mitton, Davi Simplot-Ryl.

More information

Double Closed-loop Control System Design of PMSM Based on DSP MoupengTao1, a,songjianguo2, b, SongQiang3, c

Double Closed-loop Control System Design of PMSM Based on DSP MoupengTao1, a,songjianguo2, b, SongQiang3, c 4th International Conference on Mechatronics, Materials, Chemistry an Computer Engineering (ICMMCCE 2015) Double Close-loop Control System Design of PMSM Base on DSP MoupengTao1, a,songjianguo2, b, SongQiang3,

More information

MLS based Distributed, Bearing, Range and Posture Estimation for Schools of Submersibles

MLS based Distributed, Bearing, Range and Posture Estimation for Schools of Submersibles ISER 6, Brazil (authors manuscript o not istribute) base Distribute, Bearing, Range an Posture Estimation for Schools of Submersibles Navina Kottege & Uwe R. Zimmer Research School of Information Sciences

More information

Lightning Protection Optimization for Large Wind Turbines with Method-of-Moments

Lightning Protection Optimization for Large Wind Turbines with Method-of-Moments Lightning Protection Optimization for Large Win Turbines with Metho-of-Moments Florian Krug, Ralph Teichmann General Electric - Global Research Freisinger Lanstrasse 50, 85748 Munich, GERMAY Ulrich Jakobus,

More information

THE currently deployed dense wavelength division multiplexing

THE currently deployed dense wavelength division multiplexing 1 Elastic Spectrum Allocation for Time-Varying Traffic in FlexGri Optical Networks M. Klinkowski, M. Ruiz, L. Velasco, D. Careglio, V. Lopez, an J. Comellas Abstract Elastic flexgri optical networks (FG-ON)

More information

Distributed generation control using protection principles

Distributed generation control using protection principles University of Wollongong Research Online Faculty of Engineering an Information Sciences - Papers: Part A Faculty of Engineering an Information Sciences 2006 Distribute generation control using protection

More information

Field Notching and Drilling of Glued Laminated Timber Beams

Field Notching and Drilling of Glued Laminated Timber Beams T E C H N I C A L N O T E Fiel Notching an Drilling of Glue Laminate Timber Beams Note: This version is supersee by a more current eition. Check the current eition for upate esign an application recommenations.

More information

16 DESEMBER AC to AC VOLTAGE CONVERTERS

16 DESEMBER AC to AC VOLTAGE CONVERTERS DSMBR AC to AC VOLTAG CONVRTRS THR PHAS AC RGULATORS Instructional Objectives Stuy of the following: The circuits use for the threephase ac regulators (ac to ac voltage converters) The operation of the

More information

A Study of Near-Field Direct Antenna Modulation Systems Using Convex Optimization

A Study of Near-Field Direct Antenna Modulation Systems Using Convex Optimization American Control Conference Marriott Waterfront, Baltimore, MD, USA June 3-July, WeB8.5 A Stuy of Near-Fiel Direct Antenna Moulation Systems Using Convex Optimization Java Lavaei, Ayin Babakhani, Ali Hajimiri

More information

Introduction to Wireless Communication Systems ECE 476/ECE 501C/CS 513 Winter 2003

Introduction to Wireless Communication Systems ECE 476/ECE 501C/CS 513 Winter 2003 Introuction to Wireless ommunication Systems EE 476/EE 5/S 53 Winter 3 Review for Exam # April 5, 3 Exam Details Must follow seating chart - Poste 3 minutes before exam. heating will be treate very seriously.

More information

ELECTROMUSCULAR INCAPACITATING DEVICE SAFETY

ELECTROMUSCULAR INCAPACITATING DEVICE SAFETY ELECTROMUSCULAR INCAPACITATING DEVICE SAFETY Hongyu Sun*, Jiun-Yan Wu*, Rami Aballah**, an John G. Webster*** *University of Wisconsin-Maison/Department of Electrical an Computer Engineering **American

More information

USA Mathematical Talent Search Round 2 Solutions Year 29 Academic Year

USA Mathematical Talent Search Round 2 Solutions Year 29 Academic Year athematical alent earch Year 29 caemic Year 2017-2018 Important information: 1. You must show your work an prove your answers on all problems. If you just sen a numerical answer with no proof for a problem

More information

Wavelet Transform Based Relay Algorithm for the Detection of Stochastic High Impedance Faults

Wavelet Transform Based Relay Algorithm for the Detection of Stochastic High Impedance Faults International Conference on Power Systems Transients IPST 3 in New Orleans, USA Wavelet Transm Base Relay Algorithm the Detection of Stochastic High Impeance Faults T. M. ai,.a. Snier an E. o () Dept.

More information

Musical Wind Instrument Analysis

Musical Wind Instrument Analysis Musical Win Instrument Analysis Darren, Murray Campbell Department of Acoustics an Flui Dynamics, University of Einburgh, EH9 3JZ, Einburgh, Scotlan D.A.@sms.e.ac.uk,.m.campbell@e.ac.uk The acoustic impeance

More information

A Distributed and Provably-Efficient Joint. Channel-Assignment, Scheduling and Routing Algorithm. for Multi-Channel Multi-Radio Wireless Mesh Networks

A Distributed and Provably-Efficient Joint. Channel-Assignment, Scheduling and Routing Algorithm. for Multi-Channel Multi-Radio Wireless Mesh Networks A Distribute an Provably-Efficient Joint Channel-Assignment, Scheuling an Routing Algorithm for Multi-Channel Multi-Raio Wireless Mesh Netwos Shahzaa Rasool an Xiaojun Lin Abstract The capacity of wireless

More information

Power Electronics Laboratory

Power Electronics Laboratory THE UNERSTY OF NEW SOUTH WALES School of Electrical Engineering & Telecommunications ELEC4614 Experiment : C-C Step-up (Boost) Converter 1.0 Objectives This experiment introuces you to a step-up C-C converter

More information

Keywords Electric vehicle, Dynamic wireless power transfer, Efficiency maximization, Power control, Secondary-side control

Keywords Electric vehicle, Dynamic wireless power transfer, Efficiency maximization, Power control, Secondary-side control Dynamic Wireless ower Transfer System for lectric Vehicles to Simplify Groun Facilities - ower Control an fficiency Maximization on the Seconary Sie - Katsuhiro Hata, Takehiro Imura, an Yoichi Hori The

More information

A Scalable Framework for Wireless Distributed Computing

A Scalable Framework for Wireless Distributed Computing A Scalable Framework for Wireless Distribute Computing Songze Li, Stuent Member, IEEE, Qian Yu, Mohamma Ali Maah-Ali, Member, IEEE, an A. Salman Avestimehr, Senior Member, IEEE arxiv:08.07v [cs.it] May

More information

Performance of Amplify-and-Forward Relaying with Wireless Power Transfer over Dissimilar Channels

Performance of Amplify-and-Forward Relaying with Wireless Power Transfer over Dissimilar Channels http://x.oi.org/.5755/ j.eee..5.333 ELEKTRONIKA IR ELEKTROTECHNIKA ISSN 39-5 VOL. NO. 5 5 Performance of Amplify-an-Forwar Relaying with Wireless Power Transfer over Dissimilar Channels Dac-Binh Ha Duc-Dung

More information

Efficient Binary Corona Training Protocols for Heterogeneous Sensor and Actor Networks

Efficient Binary Corona Training Protocols for Heterogeneous Sensor and Actor Networks 1 Efficient Binary Corona Training Protocols for Heterogeneous Sensor an Actor Networks F. Barsi, A.A. Bertossi, C. Lavault, A. Navarra, S. Olariu, M.C. Pinotti, an V. Ravelomanana Abstract Sensor networks

More information

EXPERIMENTAL DEMONSTRATION OF MULTIPLE ROBOT COOPERATIVE TARGET INTERCEPT

EXPERIMENTAL DEMONSTRATION OF MULTIPLE ROBOT COOPERATIVE TARGET INTERCEPT EXPERIMENTAL DEMONSTRATION OF MULTIPLE ROBOT COOPERATIVE TARGET INTERCEPT Timothy W. McLain Ranal W. Bear Je M. Kelsey Department of Mechanical Engineering, Brigham Young University, Provo, Utah 86 Department

More information

New M-ary QAM Transmission Payload System

New M-ary QAM Transmission Payload System r AIAA ICSSC-005 New M-ary QAM Transmission Payloa System Masayoshi TANAKA * Nihon University, College of Inustrial Technology, --, Izumicho, Narashino, 75-8575, Japan This paper presents a new M-ary moulation

More information

Optical schemes of spectrographs with a diffractive optical element in a converging beam

Optical schemes of spectrographs with a diffractive optical element in a converging beam J. ur. Opt. Soc.-api 0, 50 205 www.jeos.org Optical schemes of spectrographs with a iffractive optical element in a converging beam.. Muslimov Kazan National esearch Technical University - KAI, Kazan,

More information

Benford's Law and Possibilities for Its Use in Governmental Statistics 1

Benford's Law and Possibilities for Its Use in Governmental Statistics 1 Benfor's Law an Possibilities for Its Use in Governmental Statistics 1 Richar Hinls 2 University of Economics, Prague, Czech Republic Stanislava Hronová 3 University of Economics, Prague, Czech Republic

More information

Slow Beam Steering for Indoor Multi-User Visible Light Communications

Slow Beam Steering for Indoor Multi-User Visible Light Communications Slow Beam Steering for Inoor Multi-User Visible Light Communications Yusuf Sai Eroğlu, Chethan Kumar Anjinappa, İsmail Güvenç, an Nezih Pala Department of Electrical an Computer Engineering, North Carolina

More information

On the Real Time Implementation of a Controller for an Electromechanical System

On the Real Time Implementation of a Controller for an Electromechanical System On the Real Time Implementation of a Controller for an Electromechanical System Ruben Salas-Cabrera, Jonathan C. Mayo-Malonao, Erika Y. Renon-Fraga, Euaro N. Salas-Cabrera an Aaron Gonzalez-Roriguez Abstract

More information

ROC Analysis of BLM Detector in AF Relays Based Cooperative Wireless Networks Omar GATERA 1, Ahmet Hamdi KAYRAN 1 and Haci ILHAN 2

ROC Analysis of BLM Detector in AF Relays Based Cooperative Wireless Networks Omar GATERA 1, Ahmet Hamdi KAYRAN 1 and Haci ILHAN 2 6 International Conference on Sustainable Energy, Environment an Information Engineering (SEEIE 6) ISBN: 978--6595-337-3 ROC Analys of BLM Detector in AF Relays Base Cooperative Wireless Networks Omar

More information

Reliability and Route Diversity in Wireless Networks

Reliability and Route Diversity in Wireless Networks 2005 Conference on Information Sciences an Sstems, The Johns Hopkins Universit, March 16 18, 2005 Reliabilit an Route Diversit in Wireless Networks Ehsan Khanani, Etan Moiano, Jinane Abounai, Lizhong Zheng

More information

DETERMINATION OF OPTIMAL DIRECT LOAD CONTROL STRATEGY USING LINEAR PROGRAMMING

DETERMINATION OF OPTIMAL DIRECT LOAD CONTROL STRATEGY USING LINEAR PROGRAMMING DETERMINATION OF OPTIMAL DIRECT LOAD CONTROL STRATEGY USING LINEAR PROGRAMMING Zelko Popovic Distribution engineer Rae Koncara 57, 24300 Backa Topola, Yugoslavia Phone: +38 24 74 220 Fax: +38 24 74 898

More information

The MicroPulse Framework for Adaptive Waking Windows in Sensor Networks

The MicroPulse Framework for Adaptive Waking Windows in Sensor Networks The MicroPulse Framework for Aaptive Waking Winows in Sensor Networks Demetrios Zeinalipour-Yazti, Panayiotis Anreou, Panos K. Chrysanthis, George Samaras, Anreas Pitsillies Department of Computer Science,

More information

The MicroPulse Framework for Adaptive Waking Windows in Sensor Networks

The MicroPulse Framework for Adaptive Waking Windows in Sensor Networks The MicroPulse Framework for Aaptive Waking Winows in Sensor Networks Demetrios Zeinalipour-Yazti, Panayiotis Anreou, Panos K. Chrysanthis, George Samaras, Anreas Pitsillies Department of Computer Science,

More information

THE DESIGN OF A ONE NUMBER CENSUS IN THE UK

THE DESIGN OF A ONE NUMBER CENSUS IN THE UK THE DESIGN OF A ONE NUMBER CENSUS IN THE UK O Abbott 1, J Brown 2, L Buckner 1, R Chambers 2, M Cruas 1, I Diamon 2 an J Woolfor 1 1 Office for National Statistics Segensworth Roa Titchfiel Fareham Hampshire

More information

Design and Analysis of an MST-Based Topology Control Algorithm

Design and Analysis of an MST-Based Topology Control Algorithm Design an Analysis of an MST-Base Topology Control Algorithm Ning Li, Jennifer C. Hou, an Lui Sha Department of Computer Science University of Illinois at Urbana-Champaign Urbana, IL 61801 {nli, jhou,

More information

Artificial Impostors for Location Privacy Preservation

Artificial Impostors for Location Privacy Preservation Artificial Impostors for Location Privacy Preservation Cheng Wang, Senior Member, IEEE, an Zhiyang Xie arxiv:8.687v [cs.si] Jan 8 Abstract The progress of location-base services has le to serious concerns

More information

Overhead Energy Considerations for Efficient Routing in Wireless Sensor Networks

Overhead Energy Considerations for Efficient Routing in Wireless Sensor Networks Overhea nergy Consierations for fficient Routing in Wireless Sensor Networks. Ilker Oyman an Cem rsoy Computer ngineering Department, Bogazici University, Istanbul, Turkey {oymani, ersoy}@boun.eu.tr Abstract

More information

Joint Optimized Energy and Minimum Sensor Deployment Density for Cooperative Spectrum Sensing under Rayleigh Fading Channel

Joint Optimized Energy and Minimum Sensor Deployment Density for Cooperative Spectrum Sensing under Rayleigh Fading Channel Joint Optimize Energy an Minimum Sensor Deployment Density for Cooperative Spectrum Sensing uner Rayleigh Faing Channel Hai Ngoc Pham, Yan Zhang, Tor Skeie, Paal E. Engelsta, Frank Eliassen Department

More information

Jitter Limitations on a Gigabit Copper Multi- Carrier System

Jitter Limitations on a Gigabit Copper Multi- Carrier System Jitter Limitations on a Gigabit Copper Multi- Carrier System Jan H. Rutger Schraer, Eric A.M. Klumperink, Jan L. Visschers, Bram Nauta University of Twente, IC-Design Group, P.O. Box 7, 75 AE, Enschee,

More information

Assessment of Combined Integrity Algorithms

Assessment of Combined Integrity Algorithms Assessment of Combine Integrity Algorithms C. Stöber an F. Kneißl Institute of Geoesy an Navigation, University FAF Munich ICG WG-B, Munich, 8.3.1 1/6 OUTLINE Overview User Equations Comparison of Integrity

More information

Teaching Control Using NI Starter Kit Robot

Teaching Control Using NI Starter Kit Robot UKACC International Conference on Control 2012 Cariff, UK, 3-5 September 2012 Teaching Control Using NI Starter Kit Robot Payman Shakouri, Member IEEE, (Research stuent) Gorana Collier, Member IEEE, Anrzej

More information