Energy Efficient TDMA Sleep Scheduling in Wireless Sensor Networks
|
|
- Juliet Long
- 6 years ago
- Views:
Transcription
1 Energy Effiient TDMA Sheuling in Wireless Sensor Networks Junho M, Wei Lou Deprtment of Computing The Hong Kong Polytehni University Kowloon, Hong Kong {sjm, Ynwei Wu, Xing-Yng Li Deprtment of Computer Siene Illinois Institute of Tehnology Chigo, IL 60616, USA Guihi Chen Stte Key Lb of Novel Softwre Tehnology Nnjing University Nnjing, P. R. Chin Abstrt sheuling is wiely use mehnism in wireless sensor networks (WSNs) to reue the energy onsumption sine it n sve the energy wstge use by the ile listening stte. In tritionl sleep sheuling, however, sensors hve to strt up numerous times in perio, n thus onsume extr energy ue to the stte trnsitions. The objetive of this pper is to esign n energy effiient sleep sheuling for low t-rte WSNs, where sensors not only onsume ifferent mounts of energy in ifferent sttes (trnsmit, reeive, ile n sleep), but lso onsume energy for stte trnsitions. We use TDMA s the MAC lyer protool, beuse it hs the vntges of voiing ollisions, ile listening n overhering. We first propose novel interferene-free TDMA sleep sheuling problem lle ontiguous link sheuling, whih ssigns sensors with onseutive time slots to reue the frequeny of stte trnsitions. To tkle this problem, we then present effiient entrlize n istribute lgorithms tht use time slots t most onstnt ftor of the optimum. The simultion stuies orroborte the theoretil results, n show the effiieny of our propose lgorithms. Keywors: energy effiient lgorithms, sleep sheuling, wireless sensor networks. I. INTRODUCTION Wireless sensor networks (WSNs) onsist of lrge number of wireless sensor noes tht orgnize themselves into multihop rio networks. The sensor noes re typilly equippe by power-onstrine btteries, whih re often iffiult n expensive to be reple one the noes re eploye. Therefore, it is ritil onsiertion on reuing the power onsumption in the network esign. Previous work [1], [2] hs shown tht the ile listening stte is the mjor soure of energy wstge. In ft, it n onsume lmost the sme mount of energy s require for reeiving. Therefore, noes re generlly sheule to sleep when the rio moules re not in use [3]. After the sleep sheuling, noes oul operte in low uty yle moe tht they perioilly strt up to hek the hnnel for tivity. Keshvrzin et l. [4] nlyze ifferent sleep sheuling shemes n propose sheuling metho tht n erese the en-to-en overll ely. This metho i not, however, provie n interferene-free sheuling, in whih every noe n strt up n trnsmit or reeive its messges without interferene uring the ssigne time slots. One populr pproh to voi interferene is to opt the time ivision multiple ess (TDMA) MAC protools, whih n iretly support low uty yle opertions n hs the nturl vntges of hving no ontention-introue overhe n ollisions [1]. Moreover, TDMA n gurntee eterministi ely boun. Thus, we re intereste in esigning n effiient TDMA sleep sheuling for WSNs. TDMA protools ivie time into slots, whih re llote to sensor noes tht n turn on the rio uring the ssigne time slots, n turn off the rio when not trnsmitting or reeiving in the sleep sheuling. In orer to be interferenefree, simple pproh is to ssign eh ommunition link time slot, n thus, the number of time slots is equl to the number of ommunition links of the network. This sheme requires muh more time slots thn neessry, whih inreses the ely n reues the hnnel utiliztion signifintly. This is beuse multi-hop networks re ble to mke spe reuse in the shre hnnel, n multiple trnsmissions n be sheule in one time slot without ny interferene. TDMA link sheuling ttempts to minimize the number of time slots ssigne while prouing n interferene-free link sheuling, n it hs been shown tht the problem is NP-omplete [5], [6]. Severl pproximte lgorithms hve been propose in the link sheuling problem [7] [10]. However, if the TDMA link sheuling is use s the strtup mehnism in the sleep sheuling, noe my strt up numerous times to ommunite with its neighbors. Note tht the typil strtup time is on the orer of milliseons, while the trnsmission time my be less thn tht if the pkets re smll [11]. Consequently, the trnsient energy onsumption uring the strtup proess n be higher thn the energy uring the tul trnsmission. If sensor noe strts up too frequently, it not only nees extr time, but lso osts extr energy for the stte trnsition. Therefore, the stte trnsition, e.g., from the sleep stte to the tive stte, shoul be onsiere for n energy effiient TDMA sleep sheuling in WSNs. In this pper, we use new energy moel, where the energy onsumption of the stte trnsition is onsiere. We propose novel interferene-free TDMA sleep sheuling problem lle ontiguous link sheuling to reue the frequeny of stte trnsitions. In the sheuling, links inient to one noe re sheule together to obtin onseutive time slots so tht noes n only strt up one to monitor the hnnel /09/$ IEEE 630
2 in one sheuling perio T. Espeilly, if the topology is tree, noe only nees to strt up twie in perio, one for reeiving t from its hilren noes n one for trnsmitting its t to its prent noe. The min ontributions of this pper re summrize s follows: (1) We ress the sheuling problem in new energy moel, whih is loser to relisti sensors. (2) We propose the ontiguous link sheuling problem in WSNs, n prove it to be NP-omplete. (3) We present entrlize n istribute lgorithms tht hve theoretil performne boun to the optimum of the problem. (4) We evelop simultions to show the effiieny of the propose lgorithms. The reminer of this pper is orgnize s follows. Setion II reviews the relte works. Setion III esribes the system moel n then formultes the ontiguous link sheuling problem. Setion IV presents the entrlize lgorithm n Setion V presents the istribute lgorithm for the ontiguous link sheuling. Setion VI esribes n nlyzes the simultion results for the propose lgorithms. Setion VII onlues the pper. II. RELATED WORK Severl pproximte lgorithms hve been propose in the TDMA sheuling problem, inluing brost sheuling [12] [14] n link sheuling [7] [10]. Brost n link sheuling re time slot ssignments to noes n links, respetively. Rmswmi n Prhi [12] presente n effiient n interferene-free entrlize n istribute brost sheuling in multi-hop pket rio network. In [13], the brost sheuling problem ws moele s istne-2 oloring problem, n Krumke et l. propose pproximtion heuristi lgorithms for vrious geometri grphs. In [14], Ngo et l. presente entrlize geneti-fix lgorithm to reue the serh spe bse on within-two-hop mtrix. However, the performne of brost sheuling is worse thn link sheuling in WSNs, espeilly in terms of energy onservtion. In the brost sheuling, when noe wnts to trnsmit, ll the neighbors hve to turn on their rio n strt up, no mtter whether they re the intene reeiver or not. In ontrst, only the intene reeiver nees to strt up in the link sheuling. Rmnthn n Lloy [7] onsiere both the tree networks n rbitrry networks, n the performne of the propose lgorithms is boune by the thikness of network. In [8], Gnhm et l. propose link sheuling lgorithm involving two phses. In the first phse, vli ege oloring is obtine in istribution fshion. In the seon phse, eh olor is mppe to unique time slot, n the hien terminl n the expose terminl problems re voie by ssigning eh ege iretion of trnsmission. The overll sheuling requires t most 2(δ + 1) time slots, when the topologies re yli. In [9], Wng et l. propose both entrlize n istribute lgorithms with performne gurntee to obtin goo interferene-free link sheuling to mximize the throughput of the network. In the lgorithms, the sensors re sheule iniviully in preefine orer without onseutive ssignment of time slots, n eh noe is ssigne the best possible time slot to trnsmit or reeive without using interferene to the lrey-sheule sensors. Djuki n Vlee [10] propose n effiient min-mx ely sheuling metho to fin sheules with minimum roun trip ely in the link sheuling. The previous stuies in the TDMA sheuling i not onsier the energy onsumption of rio in the stte trnsition. Compre to brost sheuling n link sheuling, the ontiguous link sheuling oul reue the frequeny tht sensor noes strt up, n thus hieve better energy effiieny. III. SYSTEM MODEL AND PROBLEM FORMULATION In this setion, we present the system moel onsisting of network moel, n interferene moel n n energy moel, then we formulte the ontiguous link sheuling problem n prove it to be NP-omplete. A. System Desription Network Moel. We ssume tht WSN hs n stti sensor noes, whih re ll equippe with single omni-iretionl ntenns, n there exists sink noe to ollet the t from other sensor noes. With the ssumption tht ll the sensors hve the sme ommunition rnge r, the network n be represente s ommunition grph G = (V, E), where V = {v 1, v 2,, v n } enotes the set of noes, n E enotes the set of eges referre to ll the ommunition links. If {v i, v j } V, the ege e = (v i, v j ) E if n only if v j is lote within the trnsmission rnge of v i. In irete grph, the ege e is lle inient from v i, n inient to v j. Two types of network topologies for t olletion n ggregtion re isusse in this pper, t gthering tree n irete yli grph (DAG). A t gthering tree is tree route t sink noe, where eh intermeite noe ollets the t from its hilren noes n then forwrs the t to its prent noe. A DAG is grph with no irete yles, tht is, there is no pth tht strts n ens t the sme vertex. The epth of vertex in DAG is the length of the longest pth from tht vertex to sink. Interferene Moel. In wireless networks, the pkets trnsmitte by noe my be reeive by ll the noes within its trnsmission rnge. Therefore, interferenes my our mong these noes ue to the brost nture of the wireless meium. There re two types of interferenes: primry interferene n seonry interferene [7]. The primry interferene ours when noe hs more thn one ommunition tsk in single time slot. Typil exmples re sening n reeiving t the sme time n reeiving from two ifferent trnsmitters. The seonry interferene ours when noe tune to prtiulr trnsmitter is lso within the trnsmission rnge of nother trnsmission intene for other noes. Both primry interferene n seonry interferene re onsiere in this pper. The interferene between two links in the network epens on the interferene moel, n we use the protool moel [15], [16] in this pper. In the protool moel, eh noe v i hs 631
3 Ative Ative Ative Trnsmit Reeive Trnsient Trnsient Trnsient () Ative (b) Trnsient Fig. 1. The energy moel: () Before tive time slots merge, (b) After tive time slots merge. fixe trnsmission rnge r n n interferene rnge R, where R > r. We enote the rtio between the trnsmission rnge n the interferene rnge s γ = R r. In prtie, 2 γ 4. A trnsmission from v i to v j is suessful if ny noe v k lote within istne R from v j is not trnsmitting. TABLE I TIME AND POWER CONSUMPTION IN THE STARTUP PROCESS FOR A MICA2 MOTE WITH A CC1000 TRANSCEIVER Opertion proess Time Power onsumption 90μW Rio initiliztion 0.35ms 18mW Turn on Rio 1.50ms 3mW Swith to RX/TX stte 0.25ms 45mW Reeive 1 byte 0.416ms 45mW Trnsmit 1 byte 0.416ms 60mW Energy Moel. In B-MAC [17], Polstre et l. presente the energy onsumption of smpling the hnnel in low-power listening (LPL) on Mi2 mote. The strtup proess from the sleep stte to the tive stte inlues rio initiliztion, rio n its osilltor strtup, n the swith of rio to reeive/trnsmit stte. The strtup proess is slow ue to the feebk loop in the phse-loke loop (PLL) [18], n typil setting time of the PLL-bse frequeny synthesizer is on the orer of milliseons. The strtup time n energy onsumption in the strtup proess n lso be foun in the hnnel polling in [19]. Tble I lists the time n power onsumption in the strtup proess for Mi2 mote with CC1000 trnseiver. We n see tht the time to tivte sensor is 2.1ms, n the energy onsumption is bout 22μJ. Our energy moel is similr to the one use in [20]. In our moel, we ssume tht eh noe opertes in three sttes: tive stte (trnsmit, reeive n listen), sleep stte, n trnsient stte (stte trnsition). The energy onsumption of sensor noes in the sleep stte is muh less thn the onsumption in the tive stte, n signifint energy sving n be hieve if the sleep stte is employe uring the perios of intivity. The trnsient stte omprises two proesses: strtup (from the sleep stte to the tive stte), n turnown (from the tive stte to the sleep stte). The energy moel is illustrte in Fig. 1 (), n there is signifint energy onsumption n time overhe when the sensor s rio powers on n off. time time e b f () g h Noe Noe b Noe Noe Noe e Noe f Noe g Noe h (b) Noe Noe b Noe Noe Noe e Noe f Noe g Noe h Fig. 2. Link sheuling n ontiguous link sheuling: () Network topology, (b) Link sheuling, () Contiguous link sheuling Fig. 1 (b) shows tht merging the sensor s tive time slots together n reue the strtup frequeny so s to sve both energy n time, whih benefits the uty yle network esign. B. Problem Formultion In TDMA sleep sheuling, eh link l ij is ssigne time slot, in whih both sener noe v i n reeiver noe v j shoul strt up to ommunite. After the llote time slot, noes v i n v j hnge to sleep. When using the tritionl link sheuling lgorithms (e.g. [9], lle egree-bse heuristi in this pper) whih sheule the ommunition links one by one, noe v j my strt up w j times to monitor the hnnel in perio T, where w j is the number of neighbors. As resse before, the frequent strtup woul onsume lrge mount of extr energy n time. A resonble esign is to ssign onseutive time slots to ll irete links inient to the sme noe, n then noe only nees to strt up one to reeive ll the pkets from its neighbors. We refer to suh n interferene-free sheuling s the ontiguous link sheuling. A ontiguous link sheuling is si to be vli if ll the links inient to one noe re ssigne onseutive time slots. Fig. 2 shows smple of the ontiguous link sheuling. In Fig. 2 (), the given network is t gthering tree route t noe, in whih ny two links interfere with eh other. Fig. 2 (b) shows n interferene-free link sheuling, where noe strts up numerous times in perio. Fig. 2 () shows the ontiguous link sheuling tht noe n strt up only one for reeiving t from its neighbors. Note tht the ontiguous link sheuling n be pplie to both tree topology n mesh topology, suh s DAG. Espeilly, if the network is t gthering tree where eh noe only hs one prent, noe just nees to strt up twie t most in perio: one for reeiving t from its hilren noes n one for trnsmitting its t to its prent noe. An intervl vertex oloring [21], [22] is n ssignment of set S (i) ofw i onseutive olors to eh noe v i in suh wy tht S (i) S ( j) = for ny two jent noes v i n v j.inthe following prt of this setion, we show tht vli ontiguous link sheuling n be obtine by the intervl vertex oloring in the merge onflit grph, n we prove tht the ontiguous link sheuling problem is NP-omplete. Merge Conflit Grph. Given n interferene moel, the interferene of the links in the ommunition grph G = (V, E) () 632
4 b l b l b l b L (1) (2) L b R-r r r L (1) (1) L v s v t v q r v j v i v k v p e f le lf () Communition grph (b) Conflit grph () Merge onflit grph Fig. 3. Communition grph n orresponing onflit grphs n be represente s onflit grph G [16]. Corresponing to eh irete link between v i n v j in G, the onflit grph ontins vertex (enote by l ij ), n there is n ege between verties l ij n l pq in the onflit grph if l ij interferes with l pq in the network. Notie tht the onflit grph in the protool moel is irete grph, sine the links my not interfere with eh other. In [9], the link sheuling problem is moele s the vertex oloring in the onflit grph. Different from the onflit grph, we propose merge onflit grph G m to moel the ontiguous link sheuling problem. The w i irete links inient to the sme noe in G orrespon to vertex in G m, n there is n ege between ny two verties in G m if n only if t lest one pir of the orresponing links in G interfere with eh other. In G m,weusel vi (w i )to enote the orresponing w i links inient to noe v i, n w i is the weight of vertex L vi (w i ). For exmple, the links l b n l b in Fig. 3 (b) orrespon to L b (2) in Fig. 3 (). For the smple ommunition grph shown in Figs 3 (), if the interferene rnge is two hops, the orresponing onflit grph n merge onflit grph re shown in Figs 3 (b) n 3 (), respetively. In Fig. 3 (), we n see tht the number of verties in G m is equl to the number of reeiving noes in G, n w i is the number of links irete to the sme noe. Obviously, we oul obtin vli ontiguous link sheuling by the intervl vertex oloring in the merge onflit grph. Theorem 1. The ontiguous link sheuling problem is NPomplete. Proof: The problem is lerly in NP sine n ssignment n be verifie in polynomil time. We trnsform the intervl vertex oloring to the ontiguous link sheuling, n the intervl vertex oloring problem is prove to be NP-omplete [22]. Suppose tht eh vertex v i in weighte grph G w hs weight of w i, n the number of jent verties of eh vertex v i is w i, whih is no less thn w i. We onstrut ommunition grph G by repling eh vertex v i in G w with noe v i, n eh noe v i rnomly hooses w i noes s jent noes (or neighbors) in the orresponing w i jent verties in G w. Then, eh noe v i in G hs w i inient links. The remining w i w i jent verties of v i in G w n be seen s interferene in the ommunition grph. This trnsformtion n be performe in polynomil time n we oul obtin Fig. 4. Interferene of links in the protool moel ontiguous link sheuling in G by n intervl vertex oloring in G w, therefore, the problem is NP-omplete. IV. CENTRALIZED ALGORITHMS In this setion, we propose the entrlize ontiguous link sheuling lgorithms, entrlize sheuling n entrlize sheuling with sptil reuse (reursive bktrking n minimum onflits heuristi). A. Centrlize Sheuling We first stuy entrlize lgorithm to the ontiguous link sheuling problem. In ste of sheuling time slot iniviully for eh ommunition link, eh noe v i will be ssigne w i onseutive time slots, where w i is the number of links inient to v i. Eh noe n only strt up one to reeive ll the t from its neighbors. In the entrlize sheuling, we olor the noes in the eresing orer of their weight. Sine eh noe v i is ssigne the smllest w i onseutive time slots whih re not ssigne to other noes tht interfere with v i in the merge onflit grph G m, our sheuling lgorithm is interferene-free. The entrlize sheuling is esribe in Algorithm 1. We ssume R/r = γ, where r n R re the trnsmission n interferene rnge of noe v i, respetively. We use D(v i, x) to enote the isk entere t noe v i with rius x, n L(v i ) L(v j ) to enote the istne between noes v i n v j. Lemm 1. Let I(e) be the links tht interfere with link e in the orresponing weighte onflit grph G m uner the protool moel, then t lest I(e) /C 1 time slots re neee to sheule ll links in I(e), where C 1 = 9(γ+1)2 n I(e) is (γ 1) 2 the number of links in I(e). Proof: If noe v j n ommunite with noe v i, then noe v j must be in D(v i, r). Fig. 4 shows tht, if link inient to v p interferes with l ji in G m, v p must be in D(v i, R + r), n the link must be in D(v i, R + 2r), beuse there is t lest one jent noe of v p in D(v i, R) to interfere with v i, suh s v q. We observe tht the istne between two noes trnsmitting simultneously without interferene in G m shoul be t lest R r. For exmple, if l ji n l ts re interferene-free, the istne between v i n v t is lrger 633
5 Algorithm 1 Centrlize sheuling (Centrlize) Input: A ommunition grph G = (V, E). Output: A vli ontiguous link sheuling. 1: Construt the merge onflit grph G m, n initilize n empty stk S. 2: Push the verties in G m in the non-eresing orer of weight w i to the stk S. 3: while S is not empty o 4: Pop the verties in S sequentilly n ssign eh vertex L vi (w i ) the smllest w i onseutive time slots for noe v i to reeive, whih re not yet ssigne to ny of its neighbors in G m. 5: Sheule the w i time slots for trnsmitting sequentilly for eh jent noe of noe v i in G. thn R, n the istne between noe v j n v t shoul be L(v i ) L(v t ) L(v i ) L(v j ) R r. There re t most C 1 = π[r+2r+0.5(r r)]2 = 9(γ+1)2 links with rius (R r)/2 π[0.5(r r)] 2 (γ 1) 2 tht n be ple in D(v i, R+2r). Thus, there exists link set with the size t lest I(e) /C 1 suh tht eh pir of links in the set interferes with eh other. Therefore, t lest I(e) /C 1 time slots re neee to sheule ll links in I(e). g i1 w i1 g i2 w i2 g i3 w i3... g il w il w i T Fig. 5. The time slots tht onflit with v i in G m when v i is sheule Theorem 2. The number of time slots use by Algorithm 1 is t most onstnt ftor of the optimum. Proof: Suppose tht v i is the sensor noe to be sheule in the lst w i time slots, n ll the other sensors hve lrey been sheule, s shown in Fig. 5. In the figure, w il (1 l L) is the number of onseutive time slots oupie by the links inient to noe v il tht interfere with the links inient to v i in the merge onflit grph G m, n g i1, g i2,, g il represent the gps oupie by other non-onfliting links. The links re sheule in the non-inresing orer of weight, so w il (1 l L) is not smller thn w i. Sine eh vertex v i is ssigne the smllest w i onseutive time slots, whih o not interfere with v i, g il (1 l L) issmllerthnw i. The totl number of time slots use by our sheuling is T = g il + w il + w i < L w i + w il + w i 2( w il + w i ) The number of links tht interfere with the links inient to v i in G m is L w il + w i. We enote T opt s the minimum number of time slots use by ny sheuling, i.e., the minimum sheuling perio. From Lemm 1, we know tht L w il +w i T opt C 1. Then, we get T 2C 1 T opt = C T opt, where C = 2C 1. b e f () g h b e f (b) Fig. 6. Contiguous link sheuling: () Centrlize sheuling, (b) Centrlize sheuling with sptil reuse B. Centrlize Sheuling with Sptil Reuse In the ontiguous link sheuling, it is possible to ssign the verties L vi (w i ) n L v j (w j ) the sme time slots when L vi (w i ) interferes with L v j (w j )ing m, beuse not every link in L vi (w i ) interferes with every link in L v j (w j ). A smple is illustrte in Fig. 6. The given network is irete yli grph (DAG), n the interferene rnge of eh noe is two hops. Sine L (2), L b (3) n L (3) interfere with eh other in the merge onflit grph, n the time slots ssigne using Algorithm 1 re shown in Fig. 6 (). We oul lso get vli ontiguous link sheuling shown in Fig. 6 (b), whih uses fewer time slots. Bse on the observtion, we propose the entrlize sheuling with sptil reuse to improve the entrlize sheuling by re-rrnging the time slots in n interferene mtrix. Definition 1. An interferene mtrix of noe v i is n m n mtrix M = (m j,k ) m n (1 j m, 1 k n) tht shows whether time slot oul be ssigne to link inient to v i without interferene. In the mtrix M, m j,k = : link l k oul not use time slot t j (inter f erene) 0:link l k oul use time slot t j (inter f erene- free) 1:link l k selets time slot t j (seletion) where enotes interferene with the lrey-sheule links, 0 enotes interferene-free n 1 enotes the selete (or ssigne) time slot for the link (seletion). Note tht the number of olumns n is equl to the number of links inient to noe v i, n the number of rows m is the number of time slots ssigne in the sheuling. A smple of the interferene mtrix is shown below. In the mtrix M 0, noe v i hs 5 inient links {l 1, l 2, l 3, l 4, l 5 }, n the time slots whih hve been use by other links tht interfere with links l 1, l 2, l 3, l 4, l 5 re {t 1, t 2, t 6 }, {t 2, t 4, t 7 }, {t 1, t 2, t 5 }, {t 2, t 3, t 6 } n {t 2 }, respetively. l 1 l 2 l 3 l 4 l 5 t t 2 t M 0 = t t t t g h 634
6 Definition 2. An ssignment in the interferene mtrix M = (m j,k ) m n of noe v i is si to be vli if there is only one 1 in eh row n eh olumn, n there re n onseutive rows tht hve 1 in eh row in the mtrix. The links inient to v i oul be sheule onseutive time slots by obtining vli ssignment in the interferene mtrix. Definition 3. An interferene submtrix is n n n mtrix M = (m j,k ) n n, whih onsists of n onseutive rows in the interferene mtrix M. Algorithm 2 Centrlize sheuling with sptil reuse Input: A ommunition grph G = (V, E). Output: A vli ontiguous link sheuling. 1: Construt the merge onflit grph G m, onstrut n interferene mtrix for eh vertex L vi (w i ), n initilize n empty stk S. 2: Push the verties in G m in the non-eresing orer of weight w i to the stk S. 3: while S is not empty o 4: Pop the verties in S sequentilly n ssign eh vertex L vi (w i ) the smllest w i onseutive time slots, using Algorithm 3 or Algorithm 4 in the interferene mtrix M to fin solution. 5: v i brosts the time slot ssignments to the noes whose inient links interfere with the links inient to v i, then the noes upte their interferene mtrixes. Algorithm 2 esribes the entrlize sheuling with sptil reuse. In orer to reue the time slots ssigne, the reursive bktrking lgorithm is use to mke sure tht noe is ssigne the smllest vilble onseutive time slots. In the lgorithm, when noe v i is ssigne time slots, it will brost the informtion to ll the noes whose inient links interfere with the links inient to v i. Then eh noe in the network woul hve n interferene mtrix to inite the time slots tht its inient links oul not use. The lgorithm first fins the smllest n onseutive rows tht hve 0 in eh row in the interferene mtrix M, n onstruts n interferene submtrix M whih onsists of the n rows. Then it strts the first seletion in the first row, n the seon seletion in the seon row without interferene to the seletion in the first row. The lgorithm ontinues the seletion to the next row until vli ssignment is foun. During the proess of eh seletion in row, there my be severl nites 0, n the selete nite is referre to s preeessor, n the nites 0 in the next row re referre to s suessors of the preeessor. If suessor fils in the seletion, it then exeutes the bktrking proeure: the lgorithm heks whether the next suessor of the preeessor stisfies the onition tht there is only one 1 in eh olumn. If the suessors re exhuste, the lgorithm bktrks to the previous preeessor n tries the next suessor of the previous preeessor. If there re no more preeessors, the lgorithm s new time slot interferene-free to ll the links inient to v i, n the orresponing interferene mtrix s zero row vetor (0) 1 n in the lst row. The etils of the reursive bktrking lgorithm re shown in Algorithm 3. Algorithm 3 Reursive bktrking Input: An interferene mtrix M = (m j,k ) m n. Output: A vli ssignment in M. 1: Construt n interferene submtrix M onsisting of the smllest n onseutive rows tht hve 0 in eh row. 2: Strt the first seletion in the first row. 3: Continue the seletion in the next row stisfying the onition tht there is only one 1 in eh olumn, until vli ssignment is obtine. 4: if seletion fils to obtin vli ssignment then 5: Exeute the bktrking proeure. 6: if the reursive bktrking fils then 7: A zero row vetor in the lst row of M, n elete the first row in the n onseutive rows. Upte M, n repet the reursive bktrking in M. The reursive bktrking lgorithm is brute-fore serh lgorithm, whih is too omplex for sensor networks. Therefore, we present fst lgorithm lle minimum onflits heuristi, s shown in Algorithm 4. Definition 4. A onflit mtrix is n n n mtrix M C = ( j,k ) n n tht esribes the number of onflits in the interferene submtrix M = (m j,k ) n n, n eh element j,k in the mtrix is the number of onflits, whih is the sum of the seletions 1 in the row n olumn tht inlue j,k. Tht is, j,k = n m l,k + n m j,l m j,k,ifm j,k. The minimum onflits heuristi lgorithm first onstruts n interferene submtrix M whih onsists of n onseutive rows, n then strts with rnom initil onfigurtion in M, e.g., with one seletion per olumn or per row. One initil onfigurtion of mtrix M 0 is shown in the mtrix M 1.The orresponing onflit mtrix of mtrix M 1 is shown in the mtrix M C1. The lgorithm then uses heuristi to etermine how to reue the interferene by moving the seletion 1 with the lrgest number of onflits to the position in the sme olumn where the number of onflits is minimum. The first step of improvement is shown in the mtrix M 2, n the orresponing onflit mtrix of mtrix M 2 is M C 2. It ontinues to reue the interferene until there is no interferene or the initil onfigurtion fils. If the initil onfigurtion fils, it will new time slot n ontinue. Though the lgorithm onverges muh fster, the minimum onflits heuristi my get stuk on lol optimum, thus, it oes not gurntee solution to fin the onseutive time slots whih tully exist. M 1 = , M C1 =
7 M 2 = , M C2 = Algorithm 4 Minimum onflits heuristi Input: An interferene mtrix M = (m j,k ) m n. Output: A vli ssignment in M. 1: Construt n interferene submtrix M onsisting of the smllest n onseutive rows tht hve 0 in eh row. 2: Initilize the mtrix M with rnom onfigurtion. 3: Count the number of onflits in M, n obtin the onflit mtrix M C. 4: Use heuristi to reue the interferene, moving the seletion 1 with the lrgest number of onflits to the position in the sme olumn, where the number of onflits is minimum. 5: if the minimum onflits heuristi fils then 6: A zero row vetor in the lst row of M, n elete the first row in the n onseutive rows. Upte M, n repet the minimum onflits heuristi in M. As Algorithm 2 reues the number of time slots ompre to Algorithm 1, it lso follows onstnt boun performne gurntee of Algorithm 1. Note tht two verties tht onflit with eh other in the merge onflit grph my overlp some time slots in Algorithm 2. Corollry 1. The number of time slots use by Algorithm 2 is t most onstnt ftor of the optimum. V. DISTRIBUTED ALGORITHMS Wireless sensor networks re self-orgnize n istribute, entrlize lgorithms oul not be use without preefine leer. Therefore, it is neessry to esign effiient istribute lgorithms. In this setion, we propose two istribute lgorithms, istribute sheuling n istribute sheuling with effiient ely. A. Distribute Sheuling In the istribute sheuling, we use rnom orer rther thn globl eresing orer of the weight, n we ssume tht there is ontention-bse MAC (e.g. S-MAC [1]) vilble for noe to ompete the hnnel n to obtin n interferene-free ontiguous link sheuling. The istribute sheuling is simple n effiient so tht eh sensor noe n run the sheuling without extr omputtion. The istribute sheuling is shown in Algorithm 5. Theorem 3. The number of time slots use by Algorithm 5 is t most onstnt ftor of the optimum. Proof: Suppose tht noe v i is sheule in the lst w i time slots, n ll the other noes hve lrey been sheule. We enote K = w i w min, where w min = min w i l. 1 l L Algorithm 5 Distribute sheuling (Distribute) 1: Eh noe v i monitors n ompetes for the hnnel. 2: if noe v i obtins the hnnel then 3: v i ssigns the smllest w i onseutive time slots sequentilly to its inient links whih o not interfere with the links tht hve lrey been sheule. 4: v i brosts the informtion to the noes tht re in the interferene rnge of v i, n these noes oul not trnsmit in the time slots ue to the interferene. 5: else 6: v i wits for rnom time, then goes to step 1. Cse 1: If K is onstnt, the number of time slots use is t most onstnt ftor of the optimum, sine T = g il + w il + w i < K w il + (K + 1)C 1 T opt w i + w il + w i w il + w i (K + 1)( w il + w i ) Cse 2: If K is not onstnt, we oul ivie the time slots ssigne before v i is sheule into severl onseutive groups, n k g = w g i w gmin is onstnt in eh group, where w gi is the number of time slots ssigne to the lst noe in group g, n w gmin is the minimum number of time slots ssigne to noe in group g. LetT gopt be the optimum number of time slots in group g, n it must be tht T gopt T opt. Then the number of time slots use in eh group is T g (k g + 1)C 1 T gopt (k g + 1)C 1 T opt. Thus, the totl number of time slots use is T (K g +1)N g C 1 T opt, where N g is the number of groups, n K g is the lrgest k g mong the groups. Note tht the weight of the noes in the ltter group is lwys higher orer infinite ompre to the noes in the former group, i.e., the rtio of the weight of ny noe in the former group to the weight of ny noe in the ltter group is 0. Otherwise, we oul merge the two groups into new group g, n the rtio between w g i n w g min in group g is still onstnt. Sine the sheuling is in rnom orer, the number of groups N g is finite. We efine C = (K g + 1)N g C 1, then we get T C T opt. B. Distribute Sheuling with Effiient Dely e 4 e 3 e 2 e 1 v 5 v 4 v 2 v 1 v 3 () Line topology of 5 noes e 1 e 2 e 3 e 4 e 1 e 2 e 3 e 4 e 1 e 2 e 3 e 4 e 1 e 2 e 3 e 4 0 T 2T 3T 4T (b) Time ely Fig. 7. TDMA sheuling ely 636
8 In the TDMA sleep sheuling, noe stys in the sleep stte for most time, n perioilly strts up to hek for tivity. As forwring noe hs to wit until its nexthop neighbor strts up n is rey to reeive, the messge elivery ely will inrese. When pkets re forwre from n inoming link to n outgoing link, they oul only be forwre to the outgoing link in the next perio T if the inoming link is sheule to be tive fter the outgoing link. This kin of ely will umulte t every hop in the network, whih my le to long lteny. A smple is illustrte in Fig. 7. The network topology is line s shown in Fig. 7 (), n the trnsmission sequene is e 1 e 2 e 3 e 4 s shown in Fig. 7 (b). Uner this sitution, the time ely for pket trnsmitting from v 5 to v 1 is lmost 3T. However, if the trnsmission is e 4 e 3 e 2 e 1, v 5 oul trnsmit the t to v 1 in one perio T. In orer to reue this ely, we sheule the links from bottom to top, tht is, noe with higher epth shoul be sheule erlier. Hene, noe v i n only be sheule until ll the hilren noes of v i re lrey sheule. The lgorithm is esribe in Algorithm 6. Algorithm 6 Distribute sheuling with effiient ely (Distribute-ely) 1: Eh noe v i monitors n ompetes for the hnnel if ll the hilren noes of v i re lrey sheule. 2: if noe v i obtins the hnnel then 3: v i ssigns the smllest w i onseutive time slots sequentilly to its inient links whih o not interfere with the links tht hve lrey been sheule. 4: v i brosts the informtion to the noes tht re in the interferene rnge of v i, n these noes oul not trnsmit in the time slots ue to the interferene. 5: else 6: v i wits for rnom time, then goes to step 1. As the links re still sheule in rnom orer, the lgorithm follows onstnt boun performne gurntee of Algorithm 5, tht is, the number of time slots use by Algorithm 6 is t most onstnt ftor of the optimum. Corollry 2. The number of time slots use by Algorithm 6 is t most onstnt ftor of the optimum. VI. SIMULATION RESULTS In this setion, we stuy the verge-se performne of the propose entrlize n istribute lgorithms for the ontiguous link sheuling using simultor built in C++, n we lso ompre our lgorithms with the egreebse heuristi in [9]. The performne metris use in the evlution re the number of stte trnsitions, the number of time slots ssigne, n time ely. In the simultions, noes with trnsmission rnge of 15m n n interferene rnge of 30m re eploye in squre re of 100m 100m. We test the networks when the number of noes vries from 200 to 400 in steps of 50. We onstrut breth first serh (BFS) tree n irete yli grph () BFS tree Fig. 8. () BFS tree Fig. 9. (b) DAG grph Mximum number of stte trnsitions (b) DAG grph Averge number of stte trnsitions (DAG) roote t the sink noe s the topologies of the network. For eh se, 50 networks re rnomly generte, n the verge performne over ll of these rnomly smple networks is reporte. Fig. 8 n Fig. 9 show the mximum n verge number of stte trnsitions of the following shemes: entrlize, reursive bktrking, minimum onflits heuristi, istribute, istribute-ely, n egree-bse heuristi (egree-bse). In the BFS tree moel, the mximum number of stte trnsitions is two in the shemes of the ontiguous link sheuling, while mny noes nee to strt up numerous times uner the egree-bse sheme, whih is proportionl to the totl time slots require by this noe. In the DAG moel, the number of stte trnsitions of the ontiguous link sheuling shemes is muh less thn the number of the egree-bse sheme, n the trnsient energy ost n be reue. The verge number of time slots ssigne in the sheuling is shown in Fig. 10. In both the BFS tree n DAG moel, the number of time slots ssigne inreses s the number of noes inreses, for the number of interferene links inreses when the number of noes inreses. In the ontiguous link sheuling, the links inient to one noe re sheule together to obtin onseutive time slots to voi frequent stte trnsitions, n severl gps re forme mong the ssigne time slots (seen in Fig. 5), whih ereses the hnnel utiliztion n requires more time slots. Fig. 10 shows tht the overhe is not high, n the reursive bktrking sheuling sheme hs performne omprble to the egree-bse sheme. Although the minimum onflits heuristi my get stuk on lol optimum, it lmost hs the sme performne ompre to reursive bktrking. If the entrlize sheuling with sptil reuse is not use, the results woul be little worse, 637
9 () BFS tree Fig. 10. () BFS tree (b) DAG grph Averge number of time slots ssigne Fig. 11. Averge time ely (b) DAG grph s shown in the entrlize sheuling. The two istribute lgorithms hve the worst performne, ue to the ft tht they o not hve the globl informtion. The number of time slots in the istribute lgorithms is bout 1.5 times of the number of time slots in the reursive bktrking sheuling. Fig. 11 shows the verge time ely, n the ely inreses s the number of noes inreses in both BFS tree moel n DAG moel. The istribute sheuling with effiient ely sheme hs the best performne, for the links re sheule from the bottom to the top in the sheuling, whih is helpful to reue the ely. We summrize observtions from the simultion results s follows: (1) The entrlize n istribute lgorithms propose n reue the number of stte trnsitions, n thus hieve better energy effiieny. If the topology is tree, the noes n only strt up twie in perio. (2) Our propose istribute lgorithms n hieve performne omprble to the entrlize lgorithms. (3) The istribute sheuling with effiient ely sheme n reue the network ely. VII. CONCLUSION In this pper, we propose new interferene-free TDMA sleep sheuling problem in WSNs, lle ontiguous link sheuling. In the sheuling, sensor noe only strts up one to reeive ll the t from its neighbors, n thus n reue the energy ost n time overhe in the stte trnsition. Espeilly, if the topology is tree, the noes n only strt up twie in one sheuling perio. We lso propose entrlize n istribute lgorithms tht use time slots t most onstnt ftor of the optimum. The simultion results orroborte the theoretil nlysis, n show the effiieny of our lgorithms in terms of the number of stte trnsitions, the number of time slots ssigne, n time ely. ACKNOWLEDGMENT This work ws supporte in prt by grnts A-PH12, PolyU 5236/06E, PolyU 5232/07E, PolyU 5243/08E, HKUST 6169/07E, HKBU 2104/06E, NSF CNS , NSF CCF , Ntionl Bsi Reserh Progrm of Chin (2006CB30300), Ntionl High Tehnology Reserh n Development Progrm of Chin (2007AA01Z180), n Chin NSF grnts ( , , , ). REFERENCES [1] W. Ye, J. Heiemnn, n D. Estrin, An energy-effiient MAC protool for wireless sensor networks, in Pro. of IEEE INFOCOM, [2] T. Dm n K. Lngenoen, An ptive energy-effiient MAC protool for wireless sensor networks, in Pro. of the First ACM Conferene on Embee Networke Sensor Systems (SenSys), [3] Y. Sun, S. Du, O. Gurewitz, n D. B. Johnson, DW-MAC: low lteny, energy effiient emn-wkeup MAC protool for wireless sensor networks, in Pro. of ACM MobiHo, [4] A. Keshvrzin, H. Lee, n L. Venktrmn, Wkeup sheuling in wireless sensor networks, in Pro. of ACM MobiHo, [5] E. Arikn, Some omplexity results bout pket rio networks, IEEE Trnstions on Informtion Theory, vol. 30, no. 4, pp , [6] A. Ephremeis n T. Truong, Sheuling brosts in multihop rio networks, IEEE Trnstions on Communitions, vol. 38, no. 4, pp , [7] S. Rmnthn n E. L. Lloy, Sheuling lgorithms for multihop rio networks, IEEE/ACM Trnstions on Networking, vol. 1, no. 2, pp , [8] S. Gnhm, M. Dwne, n R. Prksh, Link sheuling in sensor networks: Distribute ege oloring revisite, in Pro. of IEEE INFO- COM, [9] W. Wng, Y. Wng, X. Y. Li, W. Z. Song, n O. Frieer, Effiient interferene-wre TDMA link sheuling for stti wireless networks, in Pro. of ACM MobiCom, [10] P. Djuki n S. Vlee, Link sheuling for minimum ely in sptil re-use TDMA, in Pro. of IEEE INFOCOM, [11] A. Wng, S. Cho, C. Soini, n A. Chnrksn, Energy effiient moultion n MAC for symmetri RF mirosensor systems, in Pro. of the 2001 Interntionl Symposium on Low Power Eletronis n Design (ISLPED), [12] R. Rmswmi n K. Prhi, Distribute sheuling of brosts in rio network, in Pro. of IEEE INFOCOM, [13] S. Krumke, M. Mrthe, n S. Rvi, Moels n pproximtion lgorithms for hnnel ssignment in rio networks, Wireless Networks, vol. 7, no. 6, pp , [14] C. Y. Ngo n V. O. K. Li, Centrlize brost sheuling in pket rio networks vi geneti-fix lgorithms, IEEE Trnstions on Communitions, vol. 51, no. 9, pp , [15] P. Gupt n P. R. Kumr, The pity of wireless networks, IEEE Trnstions on Informtion Theory, vol. 46, no. 2, pp , [16] K. Jin, J. Phye, V. N. Pmnbhn, n L. Qiu, Impt of interferene on multi-hop wireless network performne, in Pro. of ACM MobiCom, [17] J. Polstre, J. Hill, n D. Culler, Verstile low power mei ess for wireless sensor networks, in Pro. of the Seon ACM Conferene on Embee Networke Sensor Systems (SenSys), [18] R. E. Best, Phse-loke Loops: Design, Simultion n Applitions. MGrw-Hill, [19] W. Ye, F. Silv, n J. Heiemnn, Ultr-low uty yle MAC with sheule hnnel polling, in Pro. of the 4th ACM Conferene on Embee Networke Sensor Systems (SenSys), [20] S. Cui, A. J. Golsmith, n A. Bhi, Energy-onstrine moultion optimiztion, IEEE Trnstions on Wireless Communitions, vol. 4, no. 5, pp , [21] D. e Werr n A. Hertz, Conseutive olorings of grphs, Mthemtil Methos of Opertions Reserh, vol. 32, no. 1, pp , [22] M. Kuble, Intervl vertex-oloring of grph with forbien olors, Disrete Mthemtis, vol. 74, no. 1-2, pp ,
Optimal Time Slot Assignment for Mobile Ad Hoc Networks
Optiml Time Slot Assignment for Mobile A Ho Networks Koushik Sinh Honeywell Tehnology Solutions Lb, Bnglore, 560076 Ini sinh kou@yhoo.om Abstrt. We present new pproh to fin ollision-free trnsmission sheule
More informationA Low Power Parallel Sequential Decoder for Convolutional Codes
Int. J. Com. Dig. Sys. 2, No. 2, 95-(23) 95 Interntionl Journl of Computing n Digitl Systems http://x.oi.org/.2785/ijs/226 @ 23 UOB SPC, University of Bhrin A Low Power Prllel Sequentil Deoer for Convolutionl
More informationUplinks Analysis and Optimization of Hybrid Vehicular Networks
Uplinks Anlysis n Optimiztion of Hybri Vehiulr Networks Shikun Li 1, Zipeng Li 1, Xiohu Ge 1, Yonghui Li 2 1 Shool of Eletroni Informtion n Communitions, Huzhong University of Siene n Tehnology Wuhn, Hubei
More informationChanging the routing protocol without transient loops
Chnging the routing protool without trnsient loops Nny Rhkiy, Alexnre Guitton To ite this version: Nny Rhkiy, Alexnre Guitton. Chnging the routing protool without trnsient loops. Computer Communitions,
More informationMAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES
MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES Romn V. Tyshchuk Informtion Systems Deprtment, AMI corportion, Donetsk, Ukrine E-mil: rt_science@hotmil.com 1 INTRODUCTION During the considertion
More information3878 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 9, SEPTEMBER Optimal Algorithms for Near-Hitless Network Restoration via Diversity Coding
3878 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 6, NO. 9, SEPTEMBER 23 Optiml Algorithms for Ner-Hitless Network Restortion vi Diversity Coing Serht Nzim Avi, Stuent Memer, IEEE, n Ener Aynoglu, Fellow,
More informationA Novel Virtual Anchor Node-based Localization Algorithm for Wireless Sensor Networks
Novel Virtul nhor Noe-se Loliztion lgorithm for Wireless Sensor Networks Pengxi Liu Xinming Zhng Shung Tin Zhiwei Zho Peng Sun Deprtment of Computer Siene n Tehnology University of Siene n Tehnology of
More informationarxiv: v1 [cs.it] 16 Nov 2017
Sptio-Temporl Motifs for Optimize Vehile-to-Vehile (V2V) Communitions Tenghn Zeng, Omi Semiri, n Wli S Wireless@VT, Brley Deprtment of Eletril n Computer Engineering, Virgini Teh, Blksurg, VA, USA Emils:{tenghn,
More informationUnilateral and equitransitive tilings by squares of four sizes
Also ville t http://m-journl.eu ISSN 1855-3966 (printe en.), ISSN 1855-3974 (eletroni en.) ARS MATHEMATICA CONTEMPORANEA 10 (2015) 135 167 Unilterl n equitrnsitive tilings y squres of four sizes Csey Mnn
More informationQuestion Paper Wednesday 13 Thursday 14 January 2010
KEY SKILLS INFORMATION AND COMMUNICATION TECHNOLOGY Level 3 ArtComp [KSI31] Question Pper Wenesy 13 Thursy 14 Jnury 2010 Do NOT open this Question Pper until you re tol to y the invigiltor THERE ARE THREE
More informationCOMPUTER NETWORK DESIGN Network layer protocols
OMPUTER NETWORK ESIGN Network lyer protools Network lyer (lyer 3) Gruppo Reti TL nome.ognome@polito.it http://www.telemti.polito.it/ OMPUTER NETWORK ESIGN Review of network lyer protools - opyright This
More informationFig. 6. SIR distribution for different number of sectors per cell
0 0 setors per ell: setors per ell: 0 setors per ell: For 0 B (no fing), B n B s the stnr evition, the 99%-overge SIR is B,. B, n. B respetively. A onfiene nlysis for ifferent sees for lognorml fing shows
More informationProposed Cable Tables for SAS2
Tle 50 Requirements for internl le ssemlies using SASDrive onnetors n kplnes. Requirement, Units 1,5 Gps 3Gps 6 Gps Bulk le or kplne:, Differentil impene ohm 100 ± 10 100 g Common-moe impene ohm 32,5 ±
More informationTRANSIENT VOLTAGE DISTRIBUTION IN TRANSFORMER WINDING (EXPERIMENTAL INVESTIGATION)
IJRET: Interntionl Journl of Reserh in Engineering nd Tehnology ISSN: 2319-1163 TRANSIENT VOLTAGE DISTRIBUTION IN TRANSFORMER WINDING (EXPERIMENTAL INVESTIGATION) Knhn Rni 1, R. S. Goryn 2 1 M.teh Student,
More informationThe Great-Case Cabinet Company
Hng Angle Mesurement Proeure To ensure tht your guitr is hoste properly, we nee to know how ig it is. Our lrgest inet will host lmost ny guitr on the mrket, ut more eonomil size my e equte. If you hve
More informationALONG with the maturity of mobile cloud computing,
An Optiml Offloding Prtitioning Algorithm in Moile Cloud Computing Huming Wu, Dniel Seidenstüker, Yi Sun, Crlos Mrtín Nieto, Willim Knottenelt, nd Ktink Wolter system, nd their min gol is to keep the whole
More informationTHIS LECTURE looks at bell ringing (the posh name is Tintinnalogia) which as. WE NORMALLY think of a bell as hanging mouth down. If we swing the bell,
7 Bells THIS LECTURE looks t ell ringing (the posh nme is Tintinnlogi) whih s n orgnize tivity hs een roun for long time. Inee, n importnt ook y Stemn on the sujet ws pulishe in 1668 (two yers fter the
More informationEASY DISC Assessment
EASY DISC Assessment Instrution: Selet the one most pproprite response for eh question. 1. In my work environment, it is most importnt to me... To help o-workers n to e in peeful environment. To feel tht
More informationA Novel SVPWM Technology Used in PWM Rectifiers of WPGS
Reserh Journl of Applie Sienes, Engineering n Tehnology 5(1): 4-45, 13 ISSN: 4-7459; e-issn: 4-747 Mxwell Sientifi Orgniztion, 13 Sumitte: Otoer, 1 Aepte: Novemer 9, 1 Pulishe: April 3, 13 A Novel SPWM
More informationA Secure Localization Method in Wireless Sensor Network
Vol. 1(3), Ot. 2015, pp. 212-219 A Seure Loliztion Metho in Wireless Sensor Network Mrym Mirzei, Mohmm Rotmili n Mehi Khlili Dept. of Computer n Informtis Engineering, Pym Noor University, Tehrn, Irn *Corresponing
More informationStudy of WiMAX Based Communication Channel Effects on the Ciphered Image Using MAES Algorithm
Stuy of WiMAX Bse Communition Chnnel Effets on the Ciphere Imge Using MAES Algorithm Ahme G. Wy, Slim M. Wi, Hyer J. Mohmme Ali A. Aullh Communitions Tehs. Engineering Deprtment, Al-Furt Alwst Tehnil University,
More informationAlgorithms for Memory Hierarchies Lecture 14
Algorithms for emory Hierrchies Lecture 4 Lecturer: Nodri Sitchinv Scribe: ichel Hmnn Prllelism nd Cche Obliviousness The combintion of prllelism nd cche obliviousness is n ongoing topic of reserch, in
More informationDetection of Denial of Service attacks using AGURI
Detetion of Denil of Servie ttks using AGURI Ryo Kizki Keio Univ. kizki@sf.wide.d.jp Kenjiro Cho SonyCSL kj@sl.sony.o.jp Osmu Nkmur Keio Univ. osmu@wide.d.jp Astrt Denil of Servie ttks is divided into
More informationWORKSHOP 15 PARASOLID MODELING
WORKSHOP 15 PARASOLID MODELING WS15-2 Workshop Ojetives Crete prsoli moel of tension fitting using numer of the prsoli tools in MSC.Ptrn WS15-3 Suggeste Exerise Steps 1. Crete new tse for the tension fitting
More informationQUANTUM SECRET SHARING VIA FOUR PARTICLE ASYMMETRIC ENTANGLED STATE
Europen Journl of Mthemtis nd Computer Siene Vol. No., 7 ISSN 59-995 QUANTUM SECRET SHARING VIA FOUR PARTICLE ASYMMETRIC ENTANGLED STATE Pn-ru Zho, Yun-jing Zhou, Jin-wei Zho, Ling-shn Xu, Yun-hong To
More informationA novel PLC channel modeling method and channel characteristic analysis of a smart distribution grid
Le et l. Protetion n Control of Moern Power Systems (2017) 2:14 DOI 10.1186/s41601-017-0044-2 Protetion n Control of Moern Power Systems ORIGINAL RESEARCH A novel PLC hnnel moeling metho n hnnel hrteristi
More informationProbability and Statistics P(A) Mathletics Instant Workbooks. Copyright
Proility nd Sttistis Student Book - Series K- P(A) Mthletis Instnt Workooks Copyright Student Book - Series K Contents Topis Topi - Review of simple proility Topi - Tree digrms Topi - Proility trees Topi
More informationComputational Complexity of a Pop-up Book
omputtionl omplexity of Pop-up ook Ryuhei Uehr Shio Termoto strt Origmi is the enturies-ol rt of foling pper, n reently, it is investigte s omputer siene: Given n origmi ith reses, the prolem to etermine
More informationSLOVAK UNIVERSITY OF TECHNOLOGY Faculty of Material Science and Technology in Trnava. ELECTRICAL ENGINEERING AND ELECTRONICS Laboratory exercises
SLOVAK UNIVERSITY OF TECHNOLOGY Fulty of Mteril Siene nd Tehnology in Trnv ELECTRICAL ENGINEERING AND ELECTRONICS Lbortory exerises Róbert Riedlmjer TRNAVA 00 ELECTRICAL ENGINEERING AND ELECTRONICS Lbortory
More information(1) Primary Trigonometric Ratios (SOH CAH TOA): Given a right triangle OPQ with acute angle, we have the following trig ratios: ADJ
Tringles nd Trigonometry Prepred y: S diyy Hendrikson Nme: Dte: Suppose we were sked to solve the following tringles: Notie tht eh tringle hs missing informtion, whih inludes side lengths nd ngles. When
More informationFubini for continuous functions over intervals
Fuini for ontinuous funtions over intervls We first prove the following theorem for ontinuous funtions. Theorem. Let f(x) e ontinuous on ompt intervl =[, [,. Then [, [, [ [ f(x, y)(x, y) = f(x, y)y x =
More informationPublished in: Wireless Communications and Networking Conference, IEEE WCNC 2009
Alorg Universitet Cross-Lyer Optimiztion of Multipoint Messge Brodst in MANETs Nielsen, Jimmy Jessen; Grønæk, Lrs Jesper; Renier, Thiult Julien; Shwefel, Hns- Peter; Toftegrd, Thoms Pulished in: Wireless
More informationResistors, Current and Voltage measurements, Ohm s law, Kirchhoff s first and second law. Kirchhoff s first Objectives:
EE -050 Ciruit L Experiment # esistors, Current nd Voltge mesurements, Ohm s lw, Kirhhoff s first nd seond lw. Kirhhoff s first Ojetives: Slmn in Adul Aziz University Eletril Engineering Deprtment. Fmiliriztion
More informationScheduling on Sensor Hybrid Network
Sheuling on Sensor Hybri Network Hongsik Choi, Ju Wang an Esther A. Hughes Shool of Engineering Viginia Commonwealth University Rihmon, VA 23284 Email:{hongsik,jwang3,eahughes}@vu.eu. Abstrat We investigate
More informationDouble Integrals over Rectangles
Jim Lmbers MAT 8 Spring Semester 9- Leture Notes These notes orrespond to Setion. in Stewrt nd Setion 5. in Mrsden nd Tromb. Double Integrls over etngles In single-vrible lulus, the definite integrl of
More informationEnergy Harvesting Two-Way Channels With Decoding and Processing Costs
IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, VOL., NO., MARCH 07 3 Energy Hrvesting Two-Wy Chnnels With Decoding nd Processing Costs Ahmed Arf, Student Member, IEEE, Abdulrhmn Bknin, Student
More informationThe PWM switch model introduced by Vatché Vorpérian in 1986 describes a way to model a voltage-mode switching converter with the VM-PWM switch model.
The PWM swith model introdued by Vthé Vorpérin in 1986 desribes wy to model voltge-mode swithing onverter with the VM-PWM swith model. The lrge-signl model is equivlent to d trnsformer whose turns rtio
More informationSamantha s Strategies page 1 of 2
Unit 1 Module 2 Session 3 Smnth s Strtegies pge 1 of 2 Smnth hs been working with vriety of multiplition strtegies. 1 Write n expression to desribe eh of the sttements Smnth mde. To solve 18 20, I find
More informationPearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England and Associated Companies throughout the world
Person Edution Limited Edinurgh Gte Hrlow Essex M20 2JE Englnd nd ssoited ompnies throughout the world Visit us on the World Wide We t: www.personed.o.uk Person Edution Limited 2014 ll rights reserved.
More informationLecture 16. Double integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts.
Leture 16 Double integrls Dn Nihols nihols@mth.umss.edu MATH 233, Spring 218 University of Msshusetts Mrh 27, 218 (2) iemnn sums for funtions of one vrible Let f(x) on [, b]. We n estimte the re under
More informationA Development of Embedded System for Speed Control of Hydraulic Motor
AISTPME (2011) 4(4): 35-39 A Development of Embedded System for Speed Control of Hydruli Motor Pornjit P. Edutionl Mehtronis Reserh Group Deprtment of Teher Trining in Mehnil Engineering, KMUTN, ngkok,
More informationElettra Evolution OK! OK! b. User manual
Elettr Evolution User mnul Pg. 1 INSTALLING THE SOLENOID VALVE. The progrmmle solenoi vlve is fully wtertight n will funtion even if instlle permnently uner wter t epth of up to one metre (IP68 ingress
More informationInclined Plane Walking Compensation for a Humanoid Robot
Incline Plne Wlking Compenstion for Humnoi Robot Nttpong Kewlek n Thvi Mneewrn Institute of Fiel Robotics, King Mongkut's University of Technology Thonburi, Bngkok, Thiln (Tel : +662-4709339; E-mil: k.nttpong@hotmil.co.th,
More informationFirst Round Solutions Grades 4, 5, and 6
First Round Solutions Grdes 4, 5, nd 1) There re four bsic rectngles not mde up of smller ones There re three more rectngles mde up of two smller ones ech, two rectngles mde up of three smller ones ech,
More informationThe Discussion of this exercise covers the following points:
Exercise 4 Bttery Chrging Methods EXERCISE OBJECTIVE When you hve completed this exercise, you will be fmilir with the different chrging methods nd chrge-control techniques commonly used when chrging Ni-MI
More informationRegister Allocation. Goal: replace temporary variable accesses by register accesses Why? Constraints:
Rgistr Allotion Gol: rpl tmporry vril sss y rgistr sss Why? Constrints: Fix st of rgistrs Two simultnously liv vrils nnot llot to th sm rgistr A vril is liv if it will us gin for ing rfin. 1. Intify Liv
More informationMacroscopic and Microscopic Springs Procedure
Mrosopi nd Mirosopi Springs Proedure OBJECTIVE Purpose In this l you will: investigte the spring-like properties of stright wire, disover the strethiness of mteril, independent of the size nd shpe of n
More informationSwitching Algorithms for the Dual Inverter fed Open-end Winding Induction Motor Drive for 3-level Voltage Space Phasor Generation
S.Srinivs et l: Swithing Algorithms for the Dul Inverter fed... Swithing Algorithms for the Dul Inverter fed Open-end Winding Indution Motor Drive for 3-level Voltge Spe Phsor Genertion S. Srinivs nd V..
More informationSolutions to exercise 1 in ETS052 Computer Communication
Solutions to exercise in TS52 Computer Communiction 23 Septemer, 23 If it occupies millisecond = 3 seconds, then second is occupied y 3 = 3 its = kps. kps If it occupies 2 microseconds = 2 6 seconds, then
More informationInterference Cancellation Method without Feedback Amount for Three Users Interference Channel
Open Access Librry Journl 07, Volume, e57 ISSN Online: -97 ISSN Print: -9705 Interference Cncelltion Method without Feedbc Amount for Three Users Interference Chnnel Xini Tin, otin Zhng, Wenie Ji School
More informationA Cluster-based TDMA System for Inter-Vehicle Communications *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 30, 213-231 (2014) A Cluster-bsed TDMA System for Inter-Vehicle Communictions * Deprtment of Electricl Engineering Ntionl Sun Yt-Sen University Kohsiung,
More information10.4 AREAS AND LENGTHS IN POLAR COORDINATES
65 CHAPTER PARAMETRIC EQUATINS AND PLAR CRDINATES.4 AREAS AND LENGTHS IN PLAR CRDINATES In this section we develop the formul for the re of region whose oundry is given y polr eqution. We need to use the
More informationPositron Emission Tomography (PET) Images
Positron Emission Tomogrphy (PET) Imges Eh set of PET imges elow ontins four imges of humn rin. The four imges show ross-setions tken t ifferent levels of the rin. Set 1 Set 4 Set 5 Set 2 Set 6 Set 3 highest
More informationPatterns and Algebra
Student Book Series D Mthletis Instnt Workooks Copyright Series D Contents Topi Ptterns nd funtions identifying nd reting ptterns skip ounting ompleting nd desriing ptterns numer ptterns in tles growing
More informationASY P.O. BOX 729 TERRELL, TEXAS / PAGE 1 OF 13 SAM
203 Madix Inc., ll rights reserved ommon Parts 2 MXI GRI WIRE GRI SHELF WITH (GPWGS) MXI GRI FIXTURE PNEL (GPWFP) FIXTURE PNELS RE USE S EN SUPPORT. SHELF N E USE NYWHERE. MXI GRI REINFORMENT R 3 (GPR)
More informationJamming-Resistant Collaborative Broadcast In Wireless Networks, Part II: Multihop Networks
Jmming-Resistnt ollbortive Brodcst In Wireless Networks, Prt II: Multihop Networks Ling Xio Ximen University, hin 361005 Emil: lxio@xmu.edu.cn Huiyu Di N Stte University, Rleigh, N 27695 Emil: huiyu di@ncsu.edu
More informationMinCounter: An Efficient Cuckoo Hashing Scheme for Cloud Storage Systems
MinCounter: An Effiient Cukoo Hshing Sheme for Cloud Storge Systems Yunyun Sun Yu Hu Dn Feng Ling Yng Pengfei Zuo Shunde Co Wuhn Ntionl L for Optoeletronis, Shool of Computer Huzhong University of Siene
More informationby Kathy Brown of The Teacher s Pet
y Kthy Brown of The Teher s Pet Designs y Kthy Brown Pieing y Kthy Brown & Lin Ree Mhine quilte y Crol Hilton www.reroosterfris.om Quilte size: pproximtely 40" x 50" Fris from the Sprinkles (Style #4527)
More informationQuantitative Studies of Impact of 3D IC Design on Repeater Usage
Quntittive Stuies of Impct of 3D IC Design on Repeter Usge Json Cong, Chunyue Liu, Guojie Luo Computer Science Deprtment, UCLA {cong, liucy, gluo}@cs.ucl.eu Abstrct: In this pper, we present our quntittive
More informationINSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad
Hll Ticket No Question Pper Code: AEC009 INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigl, Hyderd - 500 043 MODEL QUESTION PAPER Four Yer B.Tech V Semester End Exmintions, Novemer - 2018 Regultions:
More informationMath Circles Finite Automata Question Sheet 3 (Solutions)
Mth Circles Finite Automt Question Sheet 3 (Solutions) Nickols Rollick nrollick@uwterloo.c Novemer 2, 28 Note: These solutions my give you the nswers to ll the prolems, ut they usully won t tell you how
More informationQ tomography towards true amplitude image and improve sub-karst image Yang He and Jun Cai, TGS
Q tomogrphy towrs true mplitue imge n improve su-krst imge Yng He n Jun Ci, TGS Summry A frequeny omin tomogrphi inversion ws evelope to estimte frequeny epenent energy ttenution y using prestk epth migrtion
More informationCHAPTER 2 LITERATURE STUDY
CHAPTER LITERATURE STUDY. Introduction Multipliction involves two bsic opertions: the genertion of the prtil products nd their ccumultion. Therefore, there re two possible wys to speed up the multipliction:
More informationComparing Fractions page 1 of 2 1 Color in the grid to show the fractions below. Each grid represents 1 whole. a 1 2 b 1. d 16
Unit 2 Moule Session 2 Compring Frtions pge of 2 Color in the gri to show the frtions below. Eh gri represents whole. 2 b 4 0 0 e 4 2 Use the pitures bove to help omplete eh omprison below using ,
More informationRWM4400UH High Performance Hand Held Wireless Microphone System
CH 1 CH 2 CH 3 CH 4 UHF QUAD VOLUME MAX VOLUME MAX VOLUME MAX VOLUME RWM 4400UH MIN MIN MIN CHANNEL 1 CHANNEL 2 CHANNEL 3 CHANNEL 4 RWM4400UH High Performne Hnd Held Wireless Mirophone System OWNER S MANUAL
More informationITEC2620 Introduction to Data Structures
/5/20 ITEC220 Introdution to Dt Strutures Leture 0 Gme Trees Two-Plyer Gmes Rules for gme define the sttespe Nodes re gme sttes Links re possile moves Build serh tree y rute fore Exmple I Exmple II A Our
More informationMulti-beam antennas in a broadband wireless access system
Multi-em ntenns in rodnd wireless ccess system Ulrik Engström, Mrtin Johnsson, nders Derneryd nd jörn Johnnisson ntenn Reserch Center Ericsson Reserch Ericsson SE-4 84 Mölndl Sweden E-mil: ulrik.engstrom@ericsson.com,
More informationUNATTENDED ground sensors (UGS) are widely used in
IEEE SENSORS JOURNAL, VOL. 12, NO. 6, JUNE 212 179 Trget Detetion n Clssifition Using Seismi n PIR Sensors Xin Jin, Stuent Member, IEEE, Soumly Srkr, Asok Ry, Fellow, IEEE, Shlbh Gupt, Member, IEEE, n
More informationMETHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin
METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN Inventor: Brin L. Bskin 1 ABSTRACT The present invention encompsses method of loction comprising: using plurlity of signl trnsceivers to receive one or
More informationSeamless Integration of SER in Rewiring-Based Design Space Exploration
Semless Integrtion of SER in Rewiring-Bsed Design Spe Explortion Soeeh Almukhizim* & Yiorgos Mkris Eletril Engineering Dept. Yle University New Hven, CT 62, USA Astrt Rewiring hs een used extensively for
More informationAluminium Roof Outlets - Introduction to Detail Outlets
Aluminium Roof Outlets - Introution to Detil Outlets The Hrmer Roof Detil rnge inlues outlets to over ll the wkwr etiling situtions tht our in uiling esign n in refurishment. Min Chrteristis Hrmer Roof
More informationExperiments for Leveled RFID Localization for Indoor Stationary Objects
2014 11th Interntionl Conferene on Informtion Tehnology: New Genertions Experiments for Levele RFID Loliztion for Inoor Sttionry Ojets Mtthew Chn Computer Systems Tehnology Dept. NYC College of Tehnology,
More informationCS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates
Bsic Logic Gtes : Computer Architecture I Boolen Algebr Instructor: Prof. Bhgi Nrhri Dept. of Computer Science Course URL: www.ses.gwu.edu/~bhgiweb/cs35/ Digitl Logic Circuits We sw how we cn build the
More informationExercise 1-1. The Sine Wave EXERCISE OBJECTIVE DISCUSSION OUTLINE. Relationship between a rotating phasor and a sine wave DISCUSSION
Exercise 1-1 The Sine Wve EXERCISE OBJECTIVE When you hve completed this exercise, you will be fmilir with the notion of sine wve nd how it cn be expressed s phsor rotting round the center of circle. You
More informationComputers and Mathematics with Applications. An evaluation study of clustering algorithms in the scope of user communities assessment
Computers nd Mthemtis with Applitions 58 (29) 198 1519 Contents lists ville t SieneDiret Computers nd Mthemtis with Applitions journl homepge: www.elsevier.om/lote/mw An evlution study of lustering lgorithms
More informationAutomatic Strategy Verification for Hex
utomti Strtegy Verifition for Hex Ryn B. Hywrd, Broderik rneson, nd Philip Henderson Deprtment of Computing Siene, University of lert, Edmonton, Cnd {hywrd,roderi,ph}@s.ulert. strt. We present onise nd/or-tree
More informationConstruction of Power Efficient Routing Tree for Ad Hoc Wireless Networks using Directional Antenna
Construction of Power Efficient Routing Tree for A Hoc Wireless Networks using Directional Antenna Qing Dai an Jie Wu Department of Computer Science an Engineering Floria Atlantic University Boca Raton,
More informationMultivariable integration. Multivariable integration. Iterated integration
Multivrible integrtion Multivrible integrtion Integrtion is ment to nswer the question how muh, depending on the problem nd how we set up the integrl we n be finding how muh volume, how muh surfe re, how
More informationThe Effects of Interference Suppression by a Reconfigurable Structure at DSSS-DPSK Receiver
494 N. MIOŠEVIĆ, Z. NIKOIĆ, B. DIMITRIJEVIĆ, B. NIKOIĆ, THE EFFECTS OF INTERFERENCE SUPPRESSION The Effets of Interferene Suppression y Reonfigure Struture t DSSS-DPSK Reeiver Nend MIOŠEVIĆ, Zori NIKOIĆ,
More informationExample. Check that the Jacobian of the transformation to spherical coordinates is
lss, given on Feb 3, 2, for Mth 3, Winter 2 Recll tht the fctor which ppers in chnge of vrible formul when integrting is the Jcobin, which is the determinnt of mtrix of first order prtil derivtives. Exmple.
More informationArchitectural Support for Efficient Large-Scale Automata Processing
Architecturl Support for Efficient Lrge-Scle Automt cessing Hongyun Liu, Mohme Ibrhim, Onur Kyirn, Sreepthi Pi, n Awit Jog College of Willim & Mry Avnce Micro Devices, Inc. University of Rochester Emil:
More informationFigure 2.14: Illustration of spatial frequency in image data. a) original image, f(x,y), b) plot of f(x) for the transect across image at the arrow.
CEE 615: DIGITL IMGE PROCESSING Topic 2: The Digitl Imge 2-1 Fourier Trnsform full escription of the istribution of sptil frequencies in n imge is given by the twoimensionl Fourier trnsform of the imge.
More informationKirchhoff s Rules. Kirchhoff s Laws. Kirchhoff s Rules. Kirchhoff s Laws. Practice. Understanding SPH4UW. Kirchhoff s Voltage Rule (KVR):
SPH4UW Kirchhoff s ules Kirchhoff s oltge ule (K): Sum of voltge drops round loop is zero. Kirchhoff s Lws Kirchhoff s Current ule (KC): Current going in equls current coming out. Kirchhoff s ules etween
More informationECE 274 Digital Logic Fall Digital Design. RTL Design RTL Design Method: Preview Example. RTL Design RTL Design Method
ECE 274 igitl ogi Fll 2 ntroution to igitl eign 5. 5.2 igitl eign Chpter 5: lie to ompny the textbook igitl eign, Firt Eition, by Frnk Vhi, John Wiley n on Publiher, 27. http://www.vhi.om Copyright 27
More informationA Development of Earthing-Resistance-Estimation Instrument
A Development of Erthing-Resistnce-Estimtion Instrument HITOSHI KIJIMA Abstrct: - Whenever erth construction work is done, the implnted number nd depth of electrodes hve to be estimted in order to obtin
More informationSystems and Principles Unit Syllabus
Systems n Priniples Unit Syllus Level 2 Customer support provision 2 7540-001 www.itynguils.om Septemer 2010 Version 5.0 Aout City & Guils City & Guils is the UK s leing provier of votionl qulifitions,
More informationA Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Radio Networks
Globecom 04 - Wireless Networking Symposium A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Rdio Networks Xingy Liu nd Jing Xie Deprtment of Electricl nd Computer Engineering
More informationEvaluation of Three Recent Models of UPS for Intersection Traffic Signals with LEDs
Civil Engineering Stuies Trnsporttion Engineering Series No. 139 Trffi Opertions L Series No. 16 UILU-ENG-2005-2007 ISSN-0917-9191 Evlution of Three Reent Moels of UPS for Intersetion Trffi Signls with
More informationMixed CMOS PTL Adders
Anis do XXVI Congresso d SBC WCOMPA l I Workshop de Computção e Aplicções 14 20 de julho de 2006 Cmpo Grnde, MS Mixed CMOS PTL Adders Déor Mott, Reginldo d N. Tvres Engenhri em Sistems Digitis Universidde
More informationTowards a Language Based Synthesis of NCL. circuits
Towrs Lnguge Bse Synthesis of NCL Ciruits Hemngee K. Kpoor, Ahinv Asthn, Toms Krilvičius, Wenjie Zeng, Jieming M n K Lok Mn Astrt This pper is n ttempt to provie lnguge front- to synthesise synhronous
More informationLab 8. Speed Control of a D.C. motor. The Motor Drive
Lb 8. Speed Control of D.C. motor The Motor Drive Motor Speed Control Project 1. Generte PWM wveform 2. Amplify the wveform to drive the motor 3. Mesure motor speed 4. Mesure motor prmeters 5. Control
More informationDataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1)
The slides contin revisited mterils from: Peter Mrwedel, TU Dortmund Lothr Thiele, ETH Zurich Frnk Vhid, University of liforni, Riverside Dtflow Lnguge Model Drsticlly different wy of looking t computtion:
More informationAdaptive Network Coding for Wireless Access Networks
Adptive Network Coding for Wireless Access Networks Tun Trn School of Electricl Engineering nd Computer Science Oregon Stte University, Corvllis, Oregon 9733 Emil: trntu@eecs.orst.edu Thinh Nguyen School
More informationDigital Simulation of an Interline Dynamic Voltage Restorer for Voltage Compensation
JOURNL OF ENGINEERING RESERH ND TEHNOLOGY, VOLUME 1, ISSUE 4, DEEMER 214 Digitl Simultion of n Interline Dynmi Voltge Restorer for Voltge ompenstion Dr.P.Ush Rni R.M.D.Engineering ollege, henni, pushrni71@yhoo.om
More informationcontents Once you learn a handful of stitches, you ll be amazed at the jewelry you can create and wear!
ontents Introution... 4 Mterils n Tools... 5 Bsi Tehniques... 9 One you lern hnful of stithes, you ll e mze t the jewelry you n rete n wer! PEYOTE STITCH... 12 All Together Lether Tssel Errings...13 Angulr
More informationDesign of Miniaturized 10 db Wideband Branch Line Coupler Using Dual Feed and T-Shape Transmission Lines
RADIOENGINEERING, VOL. 27, NO. 1, APRIL 2018 207 Design of Miniturized 10 db Widend Brnh Line Coupler Using Dul Feed nd T-Shpe Trnsmission Lines Mukesh KUMAR, SK. Nurul ISLAM, Goind SEN, Susnt Kumr PARUI,
More informationMinimum Cost Localization Problem in Three-Dimensional Ocean Sensor Networks
Minimm Cost Loliztion Prolem in Three-Dimensionl Oen Sensor Netorks Cho Zhng Yingjin Li Zhongen Go Goong Sn Y Wng Deprtment of Compter Siene, Uniersity of North Crolin t Chrlotte, Chrlotte, NC 8, USA.
More informationEE Controls Lab #2: Implementing State-Transition Logic on a PLC
Objective: EE 44 - Controls Lb #2: Implementing Stte-rnsition Logic on PLC ssuming tht speed is not of essence, PLC's cn be used to implement stte trnsition logic. he dvntge of using PLC over using hrdwre
More informationDomination and Independence on Square Chessboard
Engineering nd Technology Journl Vol. 5, Prt, No. 1, 017 A.A. Omrn Deprtment of Mthemtics, College of Eduction for Pure Science, University of bylon, bylon, Irq pure.hmed.omrn@uobby lon.edu.iq Domintion
More informationABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC
User Mnul ntelligent nstlltion Systems A B 1 2 3 4 5 6 7 8 30 ma 30 ma n = AC Un = 230 V AC 30 ma 9 10 11 12 C ABB STOTZ-KONTAKT Appliction Softwre Current Vlue Threshold/1 Contents Pge 1 Device Chrcteristics...
More information