Quick convergecast in ZigBee beacon-enabled tree-based wireless sensor networks

Size: px
Start display at page:

Download "Quick convergecast in ZigBee beacon-enabled tree-based wireless sensor networks"

Transcription

1 Aville online t Computer Communictions (8) Quick convergecst in ZigBee econ-enled tree-sed wireless sensor networks Meng-Shiun Pn *, Yu-Chee Tseng Deprtment of Computer Science, Ntionl Chio-Tung University, T Hsueh Rod, Hsin-Chu, Tiwn Aville online 5 Decemer 7 Astrct Convergecst is fundmentl opertion in wireless sensor networks. Existing convergecst solutions hve focused on reducing ltency nd energy consumption. However, good design should e complint to stndrds, in ddition to considering these fctors. Bsed on this oservtion, this pper defines minimum dely econ scheduling prolem for quick convergecst in ZigBee tree-sed wireless sensor networks nd proves tht this prolem is NP-complete. Our formultion is complint with the low-power design of IEEE We then propose optiml solutions for specil cses nd heuristic lgorithms for generl cses. Simultion results show tht the proposed lgorithms cn indeed chieve quick convergecst. Ó 7 Elsevier B.V. All rights reserved. Keywords: Convergecst; IEEE 8.5.4; Scheduling; Wireless sensor network; ZigBee. Introduction * Corresponding uthor. Tel.: E-mil ddresses: mspn@cs.nctu.edu.tw (M.-S. Pn), yctseng@cs. nctu.edu.tw (Y.-C. Tseng). The rpid progress of wireless communiction nd emedded micro-sensing MEMS technologies hs mde wireless sensor networks (WSNs) possile. A WSN consists of mny inexpensive wireless sensors cple of collecting, storing, processing environmentl informtion, nd communicting with neighoring nodes. Applictions of WSNs include wildlife monitoring [,4], oject trcking [6,8], nd dynmic pth finding [5,9]. Recently, severl WSN pltforms hve een developed, such s MICA [6] nd Dust Network []. For interoperility mong different systems, stndrds such s ZigBee [4] hve een developed. In the ZigBee protocol stck, physicl nd MAC lyer protocols re dopted from the IEEE stndrd []. ZigBee solves interoperility issues from the physicl lyer to the ppliction lyer. ZigBee supports three kinds of networks, nmely str, tree, nd mesh networks. A ZigBee coordintor is responsile for initilizing, mintining, nd controlling the network. A str network hs coordintor with devices directly connecting to the coordintor. For tree nd mesh networks, devices cn communicte with ech other in multihop fshion. The network is formed y one ZigBee coordintor nd multiple ZigBee routers. A device cn join network s n y the ssociting with the coordintor or router. In tree network, the coordintor nd routers cn nnounce econs. However, in mesh network, regulr econs re not llowed. Becons re n importnt mechnism to support power mngement. Therefore, the tree topology is preferred, especilly when energy sving is desirle feture. To support ZigBee econ-enled tree networks, the IEEE 8.5 WPAN Tsk Group 4 further defines revision of the IEEE [4] specifiction in 6. One of the mjor chnges is structure of superfrmes to support power mngement. On the contrry, to our understnding, power mngement is still impossile for mesh-sed ZigBee networks in the current specifiction. Therefore, we will focus on treesed, econ-enled ZigBee networks in this work. Considering tht dt gthering is mjor ppliction of WSNs, convergecst hs een investigted in severl 4-664/$ - see front mtter Ó 7 Elsevier B.V. All rights reserved. doi:.6/j.comcom.7..5

2 M.-S. Pn, Y.-C. Tseng / Computer Communictions (8) 999 works [8,9,,7,,]. With the gols of low ltency nd low energy consumption, Ref. [] shows how to connect sensors s lnced ing tree nd how to ssign CDMA codes to sensors to diminish interference mong sensors, thus chieving energy efficiency. The work [] ims to minimize the overll energy consumption under the constrint tht sensed dt should e ed within specified time. Dynmic progrmming lgorithms re proposed y ssuming tht sensors cn receive multiple pckets t the sme time. As cn e seen, oth [] nd [] re sed on quite strong ssumptions on communiction cpility of sensor nodes nd they do not fit into the Zig- Bee specifiction. In [7], the uthors propose n energyefficient nd low-ltency MAC, clled DMAC. Sensors re connected y tree nd sty in sleep stte for most of the time. When sensors chnge to ctive stte, they re first set to the receive mode nd then to the trnsmit mode. DMAC chieves low-ltency y stggering wke-up schedules of sensors t the time instnt when their children switch to the trnsmit mode. Similr to [7], Ref. [] rrnges wke-up schedule of sensors y tking trffic lods into ccount. Ech prent periodiclly rodcsts n dvertisement contining set of empty slots. Children nodes request empty slots ccording to their demnds. In [9], the uthors propose distriuted convergecst scheduling lgorithm. The sic concept is to connect nodes y spnning tree. Then the lgorithm reduces the tree to multiple lines. For ech line, the lgorithm schedules nodes trnsmission times in ottom-up mnner. Ref. [8] presents centrlized solution to convergecst. The lgorithm divides nodes into mny segments such tht the trnsmission of node in segment does not cuse interference to other trnsmissions in the sme segment. The im is to increse the degree of prllel trnsmissions to decrese ltencies. Although these results [8,9,,7] re designed for quick convergecst, the solutions re not complint to the ZigBee stndrd for the following two resons. Firstly, in these works, nodes wke/sleep times re dynmiclly chnged ccording to their schedules. However, in Zig- Bee econ-enled tree network, nodes wke/sleep times must e fixed in the wy tht ech router wkes up twice in ech cycle to receive its children s pckets nd to trnsmit pckets to its prent, respectively. The coordintor (resp., n end device) wkes up once to receive its children s pckets (resp., to trnsmit pckets to its prent). Secondly, the scheduling of [8,9,,7] is trnsmission-sed, while ours re receiving-sed. The impliction is tht the former my cuse router to e ctive multiple times per cycle. This is incomptile with the ZigBee specifiction. This pper ims t designing quick convergecst solutions for ZigBee tree-sed, econ-enled WSNs. This work is motivted y the following oservtions. First, we see tht most relted works re not complint to the ZigBee stndrd. Second, we elieve tht tree-sed topology is more suitle if power mngement is min concern in WSNs. The network scenrio is shown in Fig.. The network contins one sink (ZigBee coordintor), some ZigBee routers, nd some ZigBee. Ech ZigBee router is responsile for collecting sensed dt from end devices ssocited with it nd relying incoming dt to the sink. According to specifictions, ZigBee router cn nnounce econ to strt superfrme. Ech superfrme consists of n ctive portion followed y n inctive portion. On receiving its prent router s econ, n end device hs to wke up for n ctive portion to sense the environment nd communicte with its coordintor. However, to void collision with its neighors, router should shift its ctive portion y certin mount. Fig. shows possile lloction of ctive portions for routers A, B, C, nd D. The collected sensory dt of A in the k-th superfrme cn e sent to C in the sme superfrme. However, ecuse the ctive portion of B in the k-th superfrme ppers fter tht of C, the collected dt of B in the k-th superfrme cn only e relyed to C in the (k + )-th superfrme. The dely from B to C is lmost the length of one superfrme. The dely cn e eliminted if the ctive portion of B in the k-th superfrme ppers efore tht of C. The dely is not negligile ecuse of the low duty cycle design of IEEE For exmple, in.4 GHz PHY, with.56% duty cycle, superfrme cn e s long s s (with n ctive portion of.9 s). Clerly, for lrge-scle WSNs, the convergecst ltency could e significnt if the prolem is not crefully ddressed. The quick convergecst prolem is to schedule the econs of routers to minimize the convergecst ltency. We prove tht this prolem is NP-complete y reducing the -CNF-SAT prolem to it. We show two specil cses of this prolem where optiml solutions cn e found in polynomil time nd propose two heuristic lgorithms for generl cses. To the est of our knowledge, this is the first result tht provides convergecst solutions in ZigBee econ-enled tree networks. The rest of this pper is orgnized s follows. Section riefly introduces IEEE nd ZigBee. The quick convergecst prolem is formlly defined in Section. Section 4 presents our scheduling solutions. Simultion results re given in Section 5. Finlly, Section 6 concludes this pper.. Overview of IEEE nd ZigBee stndrds IEEE [] specifies the physicl nd dt link protocols for low-rte wireless personl re networks (LR-WPAN). In the physicl lyer, there re three frequency nds with 7 rdio chnnels. Chnnel rnges from 868. to MHz, which provides dt rte of kps. Chnnels to work from 9. to 98. MHz nd ech chnnel provides dt rte of 4 kps. Chnnels to 6 re locted from.4 to.485 GHz, ech with dt rte of 5 kps. IEEE devices re expected to hve limited power, ut need to operte for longer period of time. Therefore, energy conservtion is criticl issue. Devices re clssified s full function devices (FFDs) nd reduced

3 M.-S. Pn, Y.-C. Tseng / Computer Communictions (8) 999 Sink D B C B C A A ZigBee router (FFD) ZigBee end device (RFD) Interference neighor dt from dt from Schedule of A dt from Schedule of B dt from dt from Schedule of C dt from dt from Schedule of D k-th superfrme to sink (k+)-th superfrme Fig.. An exmple of convergecst in ZigBee tree-sed network. function devices (RFDs). IEEE supports str nd peer-to-peer topologies. In ech PAN, one device is designted s the coordintor, which is responsile for mintining the network. A FFD hs the cpility of serving s coordintor or ssociting with n existing coordintor/ router nd ecoming router. A RFD cn only ssocite with coordintor/router nd cn not hve children. The ZigBee coordintor defines the superfrme structure of ZigBee network. As shown in Fig. (), the structure of superfrmes is controlled y two prmeters: econ order (BO) nd superfrme order (SO), which decide the lengths of superfrme nd its ctive potion, respectively. For econ-enled network, the setting of BO nd SO should stisfy the reltionship 6 SO 6 BO 6 4. (A non-econ-enled network should set BO ¼ SO ¼ 5 to indicte tht superfrmes do not exist.) Ech ctive portion consists of 6 equl-length slots, which cn e further prtitioned into contention ccess period () nd contention free period (CFP). The my contin the first i slots, nd the CFP contins the rest of the 6 i slots, where 6 i 6 6. Slotted CSMA/CA is used in. FFDs which require fixed trnsmission rtes cn sk for gurntee time slots (GTSs) from the coordintor. A CFP cn support multiple GTSs, nd ech GTS my contin multiple slots. Note tht only the coordintor cn llocte GTSs. After the ctive portion, devices cn go to sleep to sve energy. In econ-enled str network, device only needs to e ctive for ðbo SOÞ portion of the time. Chnging the vlue of ðbo SOÞ llows us to djust the on-duty time of devices. However, for econ-enled tree network, routers hve to choose different times to strt their ctive portions to void collision. Once the vlue of ðbo SOÞ is decided, ech router cn choose from BO SO slots s its ctive portion. In the revised version of IEEE [4], router cn select one ctive portion s its outgoing superfrme, nd sed on the ctive portion selected y its prent, the ctive portion is clled its incoming superfrme (s shown in Fig. ()). In n outgoing/incoming superfrme, router is expected to trnsmit/receive econ to/from its child routers/prent router. When choosing slot, neighoring routers ctive portions (i.e., outgoing superfrmes) should e shifted wy from ech other to void interference. This work is motivted y the oservtion tht the specifiction does not clerly define how to choose the loctions of routers ctive portions such tht the convergecst ltency cn e reduced. In our work, we consider two kinds of interference etween routers. Two routers hve direct interference if they cn her ech others econs. Two routers hve indirect interference if they hve t lest one common neighor. Both interferences should e voided when choosing routers ctive portions. Tle lists possile choices of ðbo SOÞ comintions.

4 M.-S. Pn, Y.-C. Tseng / Computer Communictions (8) 999 Becon CFP Becon GTS GTS GTS Inctive SD = BseSuperfrmeDurtion SO symols (Active) BI = BseSuperfrmeDurtion BO symols Received Becon Trnsmitted Becon Received Becon Inctive Inctive SD = BseSuperfrmeDurtion SO symols (Incoming superfrme) Strt Time >SD SD = BseSuperfrmeDurtion SO symols (Outgoing superfrme) BI = BseSuperfrmeDurtion BO symols Fig.. IEEE superfrme structure. Tle Reltionship of BO SO, duty cycle, nd the numer of ctive portions in superfrme BO SO P9 Duty cycle (%) Numer of ctive portions (slots) P5. The minimum dely econ scheduling (MDBS) prolem This section formlly defines the convergecst prolem in ZigBee networks. Given ZigBee network, we model it y grph G ¼ðV ; EÞ, where V contins ll routers nd the coordintor nd E contins ll symmetric communiction links etween nodes in V. The coordintor lso serves s the sink of the network. End devices cn only ssocite with routers, ut re not included in V. From G, we cn construct n interference grph G I ¼ðV ; E I Þ, where edge ði; jþ E I if there re direct/indirect interferences etween i nd j. There is duty cycle requirement for this network. From nd Tle, we cn determine the most pproprite vlue of BO SO. We denote y k ¼ BO SO the numer of ctive portions (or slots) per econ intervl. The econ scheduling prolem is to find slot ssignment sðiþ for ech router i V, where sðiþ is n integer nd sðiþ ½; k Š, such tht router i s ctive portion is in slot sðiþ nd sðiþ 6¼ sðjþ if ði; jþ E I. Here, the slot ssignment mens the position of the outgoing superfrme of ech router (the position of the incoming superfrme, s clrified erlier, is determined y the prent of the router). Motivted y Brook s theorem [], which proves tht n colors re sufficient to color ny grph with mximum degree of n, we would ssume tht k P D I, where D I is the mximum degree of G I. Given slot ssignment for G, the ltency from node i to node j, where ði; jþ E, is the numer of slots, denoted y d ij, tht node i hs to wit to rely its collected sensory dt to node j, i.e., d ij ¼ðsðjÞ sðiþþmod k: ðþ Note tht the ltency from node i to node j ðd ij Þ my not y equl to the ltency from node j to node i ðd ji Þ. Therefore, we cn convert G into weighted directed grph G D ¼ðV ; E D Þ such tht ech ði; jþ E is trnslted into two directed edges ði; jþ nd ðj; iþ such tht wðði; jþþ ¼ d ij nd wððj; iþþ ¼ d ji. The ltency for ech i V to the sink is the sum of ltencies of the links on the shortest pth from i to the sink in G D. The ltency of the convergecst, denoted s LðGÞ, is the mximum of ll nodes ltencies. Definition. Given G ¼ðV ; EÞ, G s interference grph G I ¼ðV ; E I Þ, nd k ville slots, the minimum dely econ scheduling (MDBS) prolem is to find n interference-free slot ssignment sðiþ for ech i V such tht the convergecst ltency LðGÞ is minimized. To prove tht the MDBS prolem is NP-complete, we define decision prolem s follows. Definition. Given G ¼ðV ; EÞ, G s interference grph G I ¼ðV ; E I Þ, k ville slots, nd dely constrint d,

5 M.-S. Pn, Y.-C. Tseng / Computer Communictions (8) 999 the ounded dely econ scheduling (BDBS) prolem is to decide if there exists n interference-free slot ssignment sðiþ for ech i V such tht the convergecst ltency LðGÞ 6 d. Theorem. The BDBS prolem is NP-complete. Proof. First, given slot ssignments for nodes in V, we cn find the ltency of ech i V y running shortest pth lgorithm on G D. We cn then check if LðGÞ 6 d. Clerly, this tkes polynomil time. We then prove tht the BDBS prolem is NP-hrd y reducing the conjunctive norml form stisfiility (- CNF-SAT) prolem to specil cse of the BDBS prolem in polynomil time. Given ny -CNF formul C, we will construct the corresponding G nd G I. Then we show tht C is stisfile if nd only if there is slot ssignment for ech i V using no more thn k ¼ slots such tht LðGÞ 6 4 slots. Let C ¼ C ^ C ^^C m, where cluse C j ¼ x j; _x j; _ x j;, 6 j 6 m, x j;i fx ; X ;...; X n g, nd X i fx i ; x i g, where x i is inry vrile, 6 i 6 n. We first construct G from C s follows:. For ech cluse C j, j ¼ ; ;...; m, dd vertex C j in G.. For ech literl X i, i ¼ ; ;...; n, dd four vertices x i, x i, x i, nd x i in G.. Add vertex t s the sink of G. 4. Add edges ðt; x i Þ nd ðt; x i Þ to G, for i ¼ ; ;...; n. 5. Add edges ðx i ; x i Þ nd ðx i ; x i Þ to G, for i ¼ ; ;...; n. 6. For ech i ¼ ; ;...; n nd ech j ¼ ; ;...; m, ddn edge ðc j ; x i Þ (resp., ðc j ; x i Þ)toG if x i (resp., x i ) ppers in C j. Then we construct G I s follows.. Add ll vertices nd edges in G into G I.. Add edges ðx i ; x i Þ nd ðx i ; x i Þ to G I, for i ¼ ; ;...; n.. Add edges ðc j ; x i Þ nd ðc j ; x i Þ to G I, for i ¼ ; ;...; n nd j ¼ ; ;...; m. Then we uild one-to-one mpping from ech truth ssignment of C to slot ssignment of G. We estlish the following mpping:. Set sðtþ ¼.. Set sðc j Þ¼, j ¼ ; ;...; m.. Set sðx i Þ¼ nd sðx i Þ¼, i ¼ ; ;...; n, ifx i is true; otherwise, set sðx i Þ¼ nd sðx i Þ¼. 4. Set sðx i Þ¼ nd sðx i Þ¼, i ¼ ; ;...; n, ifx i is true; otherwise, set sðx i Þ¼ nd sðx i Þ¼. The ove reduction cn e computed in polynomil time. By the ove reduction, vertices x i or x i, i ¼ ; ;...; n, tht re ssigned to slot (resp., slot ) will hve ltency of (resp., 4) nd vertices x i or x i, i ¼ ; ;...; n, tht re ssigned to slot (resp., slot ) will hve ltency of (resp., ). Hence, for those x x C C C vertices x i, x i, x i, nd x i, i ¼ ; ;...; n, the longest ltency will e 4. To prove the if prt, we need to show tht if C is stisfile, there is slot ssignment such tht k ¼ nd LðGÞ 6 4. Since C stisfile, there must exist n ssignment such tht ech cluse C j, j ¼ ; ;...; m, is true. If cluse C j is true, t lest one vrile in C j is true. According to the reduction, C j cn lwys find n edge ðc j ; x i Þ or ðc j ; x i Þ with wððc j ; x i ÞÞ ¼ orwððc j ; x i ÞÞ ¼, where i ¼ ; ;...; n. Thus, when C is stisfile, the ing ltency for ech cluse is. This chieves LðGÞ ¼4. For the only if prt, if ech vertex C j, j ¼ ; ;...; m, cn find t lest n edge with weight to one of x i nd x i, for i ¼ ; ;...; n, to chieve ltency of, it must e tht ech cluse hs t lest one vrile to e true. So formul C is stisfile. Otherwise, the ltency of C j, j ¼ ; ;...; m, will e 6. h For exmple, given C ¼ðx _ x _ x Þ^ðx _ x _ x Þ^ ðx _ x _ x Þ, Fig. shows the corresponding G. The truth ssignment ðx ; x ; x Þ¼ðT ; F ; T Þ mkes C stisfile. According to the reduction nd the mpping in the ove proof, we cn otin the network G nd its slot ssignment s shown in Fig. such tht LðGÞ ¼4. 4. Algorithms for the MDBS prolem 4.. Optiml solutions for specil cses x x x x x Fig.. An exmple of reduction from the -CNF-SAT to the BDBS prolem. Optiml solutions cn e found for the MDBS prolem in polynomil time for regulr liner networks nd regulr ring networks, s illustrted in Fig. 4. In such networks, ech vertex is connected to one or two djcent vertices nd hs n interference reltion with ech neighor within h hops from it, where h P. In regulr liner network, we ssume tht the sink t is t one end of the network. Clerly, the mximum degree of G I is h. We will show tht n optiml solution cn e found if the numer of slots k P h þ. The slot ssignment cn e done in ottomup mnner. The ottom node is ssigned to slot. Then, t x x x x x

6 4 M.-S. Pn, Y.-C. Tseng / Computer Communictions (8) 999 t t r t r size: size: l left group right group r l r left group right group Fig. 4. Exmples of optiml slot ssignments for regulr liner nd ring networks ðh ¼ Þ. Dotted lines men interference reltions. for ech vertex v, sðvþ ¼ðkþÞmodk, where k is the slot ssigned to v s child. Theorem. For regulr liner network, if k P h þ, the ove slot ssignment chieves ltency of j V j, which is optiml. Proof. Clerly, the slot ssignment is interference-free. Also the ltency of j V j is clerly the lower ound. h For regulr ring network, we first prtition vertices excluding t into left nd right groups s illustrted in Fig. 4() such tht the left group consists of the sink node t nd c other nodes counting counter clockwise from t, nd the right group consists of those d e nodes counting clockwise from t. Now we consider the ring s spnning tree with t s the root nd left nd right groups s two liner pths. Assuming tht c P h nd k P h, the slot ssignment works s follows:. The ottom node in the left group is ssigned to slot.. All other nodes in the left group re ssigned with slots in ottom-up mnner. For ech node i in the left group, we let sðiþ ¼ðj þ Þmod k, where j is the slot of i s child.. Nodes in the right group re ssigned with slots in topdown mnner. For ech node i in the right group, we let sðiþ ¼ðj cþmodk, where j is the slot ssigned to i s prent nd c is the smllest constnt ( 6 c 6 k) tht ensures tht sðiþ is not used y ny of its interference neighors tht hve een ssigned with slots. It is not hrd to prove the slot ssignment is interference-free ecuse nodes receives slots sequentilly nd we hve voided using the sme slots mong interfering neighors. Although this is greedy pproch, we show tht c is equl to in step in most of the cses except when two specil nodes re visited. This gives n symptoticlly optiml lgorithm, s proved in the following theorem. Theorem. For regulr ring network, ssuming tht k P h nd c P h, the ove slot ssignment chieves ltency LðGÞ ¼ cþh, which is optiml within fctor of.5. Proof. We first identify three nodes on the ring (refer to Fig. 4()): l : the ottom node in the left group. r : the first node in the right group. r : the node tht is h hops from l clockwise. counting counter The ltency of ech node cn e nlyzed s follows. The prent of node x is denoted y prðxþ. A. For ech node i in the left group except the sink t, the ltency from i to prðiþ is. A. The ltency from r to t is h. A. For ech node i next to r in the right group ut efore r (counting clockwise), the ltency from i to prðiþ is. A4. The ltency from r to prðr Þ is if the ring size is even; otherwise, the ltency is. A5. For ech node i in the right group tht is descendnt of r, the ltency from i to prðiþ is. It is not hrd to prove tht A, A, nd A re true. To see A4 nd A5, we mke the following oservtions. The function pr i ðxþ is to pply i times the prðþ function on node x. Note tht pr ðxþ mens x itself.

7 M.-S. Pn, Y.-C. Tseng / Computer Communictions (8) O. When the ring size is even, the equlity sðpr i ðl ÞÞ ¼ sðpr i ðr ÞÞ holds for i ¼ ; ;...; c h. More specificlly, this mens tht (i) l nd prðr Þ will receive the sme slot, (ii) prðl Þ nd pr ðr Þ will receive the sme slot, etc. This cn e proved y induction y showing tht the i-th descendnt of t in the right group will e ssigned the sme slot s the ðh þ i Þ-th descendnt of t in the left group (the induction cn go in top-down mnner). This property implies tht when ssigning slot to r in step, c ¼ in cse tht the ring size is even. Further, r nd its descendnts will e sequentilly ssigned to slots k, k,..., k h, which implies tht c ¼ when doing the ssignments in step. So properties A4 nd A5 hold for the cse of n even ring. O. When the ring size is odd, the equlity sðpr i ðl ÞÞ ¼ sðpr i ðr ÞÞ holds for i ¼ ; ;...; c h. This mens tht (i) prðl Þ nd prðr Þ will receive the sme slot, nd (ii) pr ðl Þ nd pr ðr Þ will receive the sme slot, etc. Agin, this cn e proved y induction s in O. This property implies tht c ¼ when ssigning slot to r in step, nd c ¼ when ssigning slots to descendnts of r.so properties A4 nd A5 hold for the cse of n odd ring. The equlity of slot ssignments pointed out in O nd O is illustrted in Fig. 4() y those numers in gry nodes. In summry, the ltency of the left group is c. When the ring size is even, the ltency of the right group is the numer of nodes in this group, jv j plus the extr ltency h incurred t r. So LðGÞ ¼ jv j j þ h ¼jV cþh. When the ring size is odd, the ltency of right group is the numer of nodes in this group,, plus the extr ltency h incurred t r nd the extr ltency incurred t r.so LðGÞ ¼ cþh. A lower ound on the ltency of this prolem is the mximum numer of nodes in ech group excluding t. Applying c s lower ound nd using the fct tht c P h, LðGÞ will e smller thn :5 c, which implies the lgorithm is optiml within fctor of.5. Note tht the condition c P h is to gurntee tht t will not locte within h hops from r. Otherwise, the oservtion O will not hold. h 4.. A centrlized tree-sed ssignment scheme Given G ¼ðV ; EÞ, G I ¼ðV ; E I Þ, nd k, we propose centrlized slot ssignment heuristic lgorithm. Our lgorithm is composed of the following three phses: phse. From G, we first construct BFS tree T rooted t sink t., phse. We trverse vertices of T in ottom-up mnner. For these vertices in depth d, we first sort them ccording to their degrees in G I in descending order. Then we sequentilly trverse these vertices in tht order. For ech vertex v in depth d visited, we compute temporry slot numer tðvþ for v s follows.. If v is lef node, we set tðvþ to the miniml non-negtive integer l such tht for ech vertex u tht hs een visited nd ðu; vþ E I,(tðuÞmodk) 6¼ l.. If v is n in-tree node, let m e the mximum of the numers tht hve een ssigned to v s children, i.e., m ¼ mxftðchildðvþþg, where childðvþ is the set of v s children. We then set tðvþ to the miniml non-negtive integer l > m such tht for ech vertex u tht hs een visited nd ðu; vþ E I,(tðuÞmodk) 6¼ ðlmodkþ. After every vertex v is visited, we mke the ssignment sðvþ ¼ tðvþ mod k. phse. In this phse, vertices re trversed sequentilly from t in top-down mnner. When ech vertex v is visited, we try to greedily find new slot l such tht (sðprðvþþ l)modk < ðsðprðvþþ sðvþþ mod k, such tht l 6¼ sðuþ for ech ðu; vþ E I, if possile. Then we ressign sðvþ ¼l. Note tht in phse, node with higher degree mens tht it hs more interference neighors, implying tht it hs less slots to use. Therefore, it hs to e ssigned to slot erlier. Also note tht, the numer tðvþ is not modulus numer. However, in step of phse, we did check tht if tðvþ is converted to slot numer, no interference will occur. Intuitively, this is temporry slot ssignment tht will incur the lest ltency to v s children. At the end, tðvþ is converted to slot ssignment sðvþ. Phse is greedy pproch to further reduce the ltency of routers. For exmple, Fig. 5() shows the slot ssignment fter phse. Fig. 5() indictes tht B, C, nd D cn find nother slots nd their ltencies re decresed. This phse cn reduce LðGÞ in some cses. The computtionl complexity of this lgorithm is nlyzed elow. In phse, the complexity of constructing BFS tree is Oðj V jþje jþ. In phse, the cost of sorting is t most Oðj V j Þ nd the computtionl cost to compute tðvþ for ech vertex v is ounded y OðkD I Þ, where D I is the degree of G I. So the time complexity of phse is Oðj V j þ kd I j V jþ. Phse performs similr procedure s phse, so its time complexity is lso OðkD I j V jþ. Overll, the time complexity is Oðj V j þ kd I j V jþ. 4.. A distriuted ssignment scheme In this section, we propose distriuted slot ssignment lgorithm. Ech node hs to compute its direct s well s indirect interference neighors in distriuted mnner. To chieve this, we will refer to the heterogeneity pproch

8 6 M.-S. Pn, Y.-C. Tseng / Computer Communictions (8) A B C t D in [], which dopts power control to chieve this gol. Assuming routers defult trnsmission rnge is r, interference neighors must locte within rnge r. From time-totime, ech router will oost its trnsmission power to doule its defult trnsmission rnge nd send HELLO pckets to its neighor routers. Ech HELLO pcket further contins sender s () depth, () the loction of outgoing superfrme (i.e., slot), nd () numer of interference neighors. Note tht ll other pckets re trnsmitted y the defult power level. When ooting up, ech router will rodcst HELLO pckets climing tht its depth nd slot re NULL. After joining the network nd choosing slot, the HELLO pckets will crry the node s depth nd slot informtion. The lgorithm is triggered y the sink t setting sðtþ ¼k nd then rodcsting its econ. A router v 6¼ t tht receives econ will decide its slot s follows.. Node v sends n ssocition request to the econ sender.. If v fils to ssocite with the econ sender, it stops the procedure nd wits for other econs.. If v successfully ssocites with prent node prðvþ, it computes the smllest positive integer l such tht ðsðprðvþþ lþmodk 6¼ sðuþ for ll ðu; vþ E I nd sðuþ 6¼ NULL. Then v chooses sðvþ ¼ðsðprðvÞÞ lþ modk s its slot. 4. Then, v rodcsts HELLOs including its slot ssignment sðvþ for time period t wit. If it finds tht sðvþ ¼sðuÞ for ny ðu; vþ E I, v hs to chnge to new slot if one of the following rules is stisfied nd goes ck to step. () Node u hs more interference neighors thn v. () Node u nd v hve the sme numer of interference neighors ut the depth of u is lower thn v, i.e., u is closer to the sink thn v. (c) Node u nd v hve the sme numer of interference neighors nd they re t the sme depth ut the u s ID is smller thn v s. The depth of node is the length of the tree pth from the root to the node. The root node is t depth zero. E E I A B C D Fig. 5. () Slot ssignment fter phse. () Slot compcting y phse. t 5. After t wit, v cn finlize its slot selection nd rodcst its econs. In this distriuted lgorithm, slots re ssigned to routers, idelly, in top-down mnner. However, due to trnsmission ltency, some routers t lower levels my find slots erlier thn those t higher levels. Also note tht the time t wit is to void possile collision on slot ssignments due to pcket loss. 5. Simultion results This section presents our simultion results. We first ssume tht the size of sensory dt is negligile nd tht ll routers generte s t the sme time, nd compre the performnces of different convergecst lgorithms. Then we simulte more relistic scenrios where the size of sensory dt is not negligile nd routers need to generte s periodiclly or pssively driven y events rndomly ppering in certin regions in the sensing field. More specificlly, sensors generte s ccording to certin ppliction specifictions. Devices ll run ZigBee nd IEEE protocols to communicte with ech other. Routers cn ggregte child sensors s nd to their prents directly. Ech router hs fix-size uffer. When router s uffer overflows, this router will not ccept further incoming frmes. We lso mesure the goodput of the network, which is defined s the rtio of sensors s successfully received y the sink. Some prmeters used in our simultion re listed in Tle. 5.. Comprison of different convergecst lgorithms We compre the proposed slot ssignment lgorithms ginst rndom slot ssignment (denoted y RAN) scheme nd greedy slot ssignment (denoted y GDY) scheme. In RAN, the slot ssignment strts from the sink nd ech router, fter ssociting with prent router, simply chooses ny slot which hs not een used y ny of its interference neighors. In GDY, routers re given sequence numer in top-down mnner. The sink sets its slot to k. Then the slot ssignment continues in sequence. For node i, it will try to find slot sðiþ ¼sðjÞ l modk, where j is the predecessor of i nd l is the smllest integer letting sðiþ is the slot which does not ssign to ny of i s interference neighors. In the simultions, routers re rndomly distriuted in circulr region of rdius r nd sink is plced in the center. Our centrlized tree-sed scheme nd distriuted slot ssignment scheme re denoted s CTB nd DSA, respectively. We compre the ltency LðGÞ (in terms of slots). Fig. 6 shows some slot ssignment results of CTB nd DSA when r = 5 m nd k ¼ 64. Devices re rndomly distriuted. The trnsmission rnge of routers is set to m. In this cse, CTB performs etter thn DSA.

9 M.-S. Pn, Y.-C. Tseng / Computer Communictions (8) Tle Simultion prmeters Prmeter Vlue Length of frme s heder nd til 8 Bytes Length of sensor s 6 Bytes Becon length 8 Bytes Mximum length of frme 7 Bytes Bit rte 5 kps Symol rte 6.5 k symols/s BseSuperfrmeDurtion 96 symols UnitBckoffPeriod symols CCATime 8 symols McMinBE MxBE 5 McMxCSMABckoffs 4 Mximum numer of retrnsmissions Next, we oserve the impct of different r, C R (numer of routers), nd T R (trnsmission distnce). Fig. 7() shows the impct of r when k ¼ 64, T R ¼ 5 m, nd C R ¼ ðr=þ. CTB performs the est. DSA performs slightly worse thn CTB, ut still significntly outperforms RAN nd GDY. It cn e seen tht RAN nd GRY could result in very long convergecst ltency. Both CTB nd DSA re quite insensitive to the network size. But this is not the cse for RAN nd GDY. Fig. 7() shows the impct of T R when C R ¼, r ¼ m, nd k ¼ 64. Since lrger trnsmission rnge implies higher interference mong routers, the ltencies of CTB nd DSA will increse linerly s T R increses. The ltency of RAN lso increses when T R ¼ 7 m ecuse of the incresed interference. After T R P m, the ltency of RAN decreses ecuse tht the network dimeter is reduced. Bsiclly, GDY ehves the sme s CTB nd DSA. But when the trnsmission rnge is lrger, the ltency slightly ecomes smll. Fig. 7(c) shows the impct of C R when r ¼ m, T R ¼ m, nd k ¼ 8. As lrger C R mens higher network density nd thus more interference, the ltencies of CTB nd DSA increse s C R increses. Since the network dimeter is ounded, the ltency of RAN is lso ounded. GDY is sensitive to the numer of routers when there re less routers. This is ecuse tht ech router cn own slot nd the ltency increses proportionlly to the numer of routers. With r ¼ m, C R ¼, nd T R ¼ m, Fig. 7(d) shows the impct of routers duty cycle. Note tht lower duty cycle mens lrger numer of ville slots. Interestingly, we see tht the ltencies of CTB, DSA, nd GDY re independent of the numer of slots. Contrrily, with rndom ssignment, RAN even incurs higher ltency s there re more freedom in slot selection. Next, we ssume tht sensors re instructed to their dt in periodiclly mnner. We set r ¼ m, T R ¼ m, nd C R ¼ with 6 rndomly plced sensors ssocited to these routers, nd we further restrict router cn ccept t most sensors. BO SO is fixed to six, so k ¼ BO SO ¼ 64. Since the erlier simultions show tht CTB nd DSA perform quite close, we will use only CTB to ssign routers slots. Sensors re required to generte every 5.66 s (the length of one econ intervl when BO ¼ 4). We set the uffer size of ech router is KB. We llocte two mini-slots for ech child router of the sink s the GTS slot. Since ðbo SOÞ is fixed, smll BO implies smller slot size (nd thus smller unit size of LðGÞ). So, smller slot size seemingly implies higher contention mong sensors if they ll intend to to their prents simultneously. In fct, smller BO does not hurt the overll ing times of sensors if we cn properly divide sensors into groups. For exmple, in Fig. 8, when BO ¼ 4, ll sensors of router cn in every superfrme. When BO ¼, if we divide sensors into two groups, then they cn lterntely in odd nd even superfrmes. Similrly, when BO ¼, four groups of sensors cn lterntely. Since the length of superfrmes re reduced proportionlly, the intervls of sensors ctully remin the sme in these cses. In the following experiments, we groups sensors ccording to their prents IDs. A sensor elongs to group m if the modulus of its prent s ID is m. Fig. 9 shows the theoreticl nd ctul ltencies under different BOs. Note tht my e delyed due to uffer constrint. As cn e seen, the ctul ltency does not lwys fvor smller BO. Our results show tht BO ¼ performs etter. Fig. 9() shows the goodput of sensory s, chnnel utiliztion t the sink, nd the numer of dropped frmes t the sink. When BO ¼ 4, lthough there is no frmes eing dropped t the sink, the goodput is still low. This is ecuse lot of collisions hppen inside the network, cusing mny sensory s eing dropped t intermedite levels ( frme is dropped fter exceeding its retrnsmission limit). Fig. shows log of the numers of frmes received y sink s child router when BO ¼ 4. We cn see tht more thn hlf of the ctive portion is wsted. Overll, BO ¼ produces the est goodput nd shorter ltency. Some previous works cn e lso integrted in this periodicl ing scenrio, such s the dptive GTS lloction mechnism in [] nd the ggregtion lgorithms for WSNs in [7,]. Fig. shows n experiment tht routers cn compress s from sensors with rte cr when BO ¼. If router receives n s nd ech s size is 6 Bytes (s in Tle ), it cn compress the size to 6 n ð crþ. The ltencies decrese when the cr ecomes lrger. By compressing the dt, 5.. Periodicl ing scenrios Currently, there re some pltforms which re equipped with lrger RAMs. For exmple, Jennic JN5 [5] hs 96 KB RAM nd CC4DBK [] hs KB RAM. There re sixteen mini-slots per ctive portion (slot).

10 8 M.-S. Pn, Y.-C. Tseng / Computer Communictions (8) 999 k = 64 k = 64 L(G)=9 L(G)= Fig. 6. Slot ssignment exmples y CTB nd DSA. Averge L(G) 5 5 CTB DSA RAN GDY Averge L(G) 5 5 CTB DSA RAN GDY Network rdius (m) Trnsmission rnge (m) c 7 d 5 Averge L(G) CTB DSA RAN GDY Averge L(G) CTB DSA RAN GDY Numer of ZigBee routers Network duty cycle (%).98 Fig. 7. Comprison of ltencies under different configurtions. the goodput cn up to 98% nd the cn rrive to the sink more quickly. 5.. Event-driven ing scenrios In the following, we ssume tht sensors ing ctivities re triggered y events occurred t rndom loctions in the network with rte k. The sensing rnge of ech sensors is m nd ech event is disk of rdius of 5 m. A sensor cn detect n event if its sensing rnge overlps with the disk of tht event. Ech router hs n KB uffer. When sensor detects n event, it only tries to tht event once. All other settings re the sme s those in Section 5.. Fig. shows the simultion results when k = /5s, / 5s, nd /s. From Fig. (), we cn oserve tht when

11 M.-S. Pn, Y.-C. Tseng / Computer Communictions (8) BO=4 # of groups = econ n th superfrme ll sensors econ (n+)th superfrme ll sensors econ (n+)th superfrme... BO= # of groups = econ n th superfrme group econ (n+)th superfrme econ (n+)th superfrme econ (n+)th superfrme group group group econ (n+4)th superfrme n th (n+)th (n+)th (n+)th (n+4)th (n+5)th (n+6)th (n+7)th (n+8)th superfrme superfrme superfrme superfrme superfrme superfrme superfrme superfrme superfrme BO= # of groups = 4 group group group group group group group group econ econ econ econ econ econ econ econ econ Fig. 8. An exmple of scheduling under different vlues of BO L(G) x slot-size (in seconds) Theoreticl Actul Goodput or chnnel utiliztion (%) Goodput Chnnel utiliztion The numer of dropped frmes Numer of dropped frmes 8 9 BO BO 4 Fig. 9. Simultions considering uffer limittion nd contention effects: () Theoreticl vs. ctul ltencies nd () goodput, chnnel utiliztion, nd numer of dropped frmes. Report (Becon) intervl: 5.66 s Report (Becon) intervl: 5.66 s Numer of frmes received Active portion:.9 s Active portion:.9 s Active portion:.9 s time (s) Fig.. A log of the numer of frmes received y sink s child router when BO ¼ 4. BO is smll, the ltency cn not chieve to the theoreticl vlue. This is ecuse tht n ctive portion is too smll to ccommodte ll s from sensors, thus lengthening the ltency. When BO ecomes lrger, the theoreticl nd ctul curves would meet. However, the good put will degrde, s shown in Fig. (). This is ecuse s re likely to e dropped due to uffer overflow. How to determine proper BO, which cn contin most of the s nd gurntee low ltency, is n importnt design issue for such scenrios. 6. Conclusions In this pper, we hve defined new minimum dely econ scheduling (MDBS) prolem for convergecst with the restrictions tht the econ scheduling must e complint to the ZigBee stndrd. We prove the MDBS prolem is NP-complete nd propose optiml solutions for specil cses nd two heuristic lgorithms for generl cses. Simultion results indicte the performnce of our heuristic lgorithms decrese only when the numer of interference

12 M.-S. Pn, Y.-C. Tseng / Computer Communictions (8) 999 L(G) x slot-size (in seconds) Theoreticl Actul Goodput or chnnel utiliztion (%) Goodput Chnnel utiliztion Numer of dropped frmes.5.5 Numer of dropped frmes 5 7 Compression rte (%) Compression rte (%) 9 Fig.. Simultions considering dt compression: () Theoreticl vs. ctul ltencies nd () goodput, chnnel utiliztion, nd numer of dropped frmes. L(G) x slot-size (in second) Theoreticl Actul(λ=/5s) Actul(λ=/5s) Actul(λ=/s) BO Goodput (%) λ=/5s λ=/5s λ=/s BO Fig.. Simultion results of event-driven scenrios: () theoreticl vs. ctul ltencies nd () goodput. neighors is incresed. Compred to the rndom slot ssignment nd greedy slot ssignment scheme, our heuristic lgorithms cn effectively schedule the ZigBee routers econ times to chieve quick convergecst. In the future, it deserves to consider extending this work to n synchronous sleep scheduling to support energy-efficient convergecst in ZigBee mesh networks. Acknowledgements Y.-C. Tseng s reserch is co-sponsored y Tiwn MoE ATU Progrm, y NSC Grnts 9-75-E-7--PAE, ET, 95--E-9-58-MY, 95-- E-9-6-MY, 95-9-E-9-7, 95-8-E-9-9, nd 94-9-E-7-9, y Reltek Semiconductor Corp., y MOEA under Grnt No. 94-EC-7-A-4-S-44, y ITRI, Tiwn, y Microsoft Corp., nd y Intel Corp. References [] Chipcon CC4DBK. Aville from: < [] Dust network Inc. Aville from: < [] Design nd construction of wildfire instrumenttion system using networked sensors. Aville from: < [4] Hitt monitoring on gret duck islnd. Aville from: < [5] Jennic JN5. Aville from: < [6] Motes, smrt dust sensors, wireless sensor networks. Aville from: < [7] S.-J. Bek, G. de Vecin, X. Su, Minimizing energy consumption in lrge-scle sensor networks through distriuted dt compression nd hierrchicl ggregtion, IEEE Journl on Selected Ares in Communictions (6) (4) 4. [8] H. Choi, J. Wng, E.A. Hughes, Scheduling on sensor hyrid network, in: Proceedings of IEEE Interntionl Conference on Computer Communictions nd Networks (ICCCN), Sn Diego, USA, 5. [9] S. Gndhm, Y. Zhng, Q. Hung, Distriuted miniml time convergecst scheduling in wireless sensor networks, in: Proceedings of IEEE Interntionl Conference on Distriuted Computing Systems (ICDCS), Liso, Portugl, 6. [] D. Gnesn, B. Greenstein, D. Perelyuskiy, D. Estrin, J. Heidemnn. An evlution of multiresolution storge for sensor networks, in: Proceedings of ACM Interntionl Conference on Emedded Networked Sensor Systems (SenSys), Los Angeles, USA,. [] B. Hohlt, L. Doherty, E. Brewer, Flexile power scheduling for sensor networks, in: Proceedings of ACM/IEEE Interntionl Conference on Informtion Processing in Sensor Networks (IPSN), Berkeley, USA, 4.

13 M.-S. Pn, Y.-C. Tseng / Computer Communictions (8) 999 [] Y.-K. Hung, A.-C. Png, T.-W. Kuo, AGA: dptive GTS lloction with low ltency nd firness considertions for IEEE 8.5.4, in: Proceedings of IEEE Interntionl Conference on Communictions (ICC), Istnul, Turkey, 6. [] IEEE stndrd for informtion technology telecommunictions nd informtion exchnge etween systems locl nd metropolitn re networks specific requirements prt 5.4: wireless medium ccess control (MAC) nd physicl lyer (PHY) specifictions for low-rte wireless personl re networks (LR-WPANs),. [4] IEEE stndrd for informtion technology telecommunictions nd informtion exchnge etween systems locl nd metropolitn re networks specific requirements prt 5.4: wireless medium ccess control (MAC) nd physicl lyer (PHY) specifictions for low-rte wireless personl re networks (LR-WPANs) (revision of IEEE Std ), 6. [5] Q. Li, M. DeRos, D. Rus, Distriuted lgorithm for guiding nvigtion cross sensor network, in: Proceedings of ACM Interntionl Symposium on Moile Ad Hoc Networking nd Computing (MoiHoc), Mrylnd, USA,. [6] C.-Y. Lin, W.-C. Peng, Y.-C. Tseng, Efficient in-network moving oject trcking in wireless sensor networks, IEEE Trnsctions on Moile Computing 5 (8) (6) [7] G. Lu, B. Krishnmchri, C.S. Rghvendr, An dptive energyefficient nd low-ltency MAC for dt gthering in wireless sensor networks, in: Proceedings of IEEE Interntionl Prllel nd Distriuted Processing Symposium (IPDPS), New Mexico, USA, 4. [8] Y.-C. Tseng, S.-P. Kuo, H.-W. Lee, C.-F. Hung, Loction trcking in wireless sensor network y moile gents nd its dt fusion strtegies, The Computer Journl 47 (4) (4) [9] Y.-C. Tseng, M.-S. Pn, Y.-Y. Tsi, Wireless sensor networks for emergency nvigtion, IEEE Computer 9 (7) (6) [] S. Updhyyul, V. Annmli, S.K.S. Gupt, A low-ltency nd energy-efficient lgorithm for convergecst in wireless sensor networks, in: Proceedings of IEEE Glol Telecommunictions Conference (Gloecom), Sn Frncisco, USA,. [] D.B. West, Introduction to Grph Theory, Prentice Hll,. [] M. Yrvis, N. Kushlngr, H. Singh, A. Rngrjn, Y. Liu, S. Singh, Exploiting heterogeneity in sensor networks, in: Proceedings of IEEE INFOCOM, Mimi, USA, 5. [] Y. Yu, B. Krishnmchri, V.K. Prsnn, Energy-ltency trdeoffs for dt gthering in wireless sensor networks, in: Proceedings of IEEE INFOCOM, Hong Kong, 4. [4] ZigBee specifiction version 6, ZigBee document 64, 6.

Multi-beam antennas in a broadband wireless access system

Multi-beam antennas in a broadband wireless access system Multi-em ntenns in rodnd wireless ccess system Ulrik Engström, Mrtin Johnsson, nders Derneryd nd jörn Johnnisson ntenn Reserch Center Ericsson Reserch Ericsson SE-4 84 Mölndl Sweden E-mil: ulrik.engstrom@ericsson.com,

More information

Solutions to exercise 1 in ETS052 Computer Communication

Solutions to exercise 1 in ETS052 Computer Communication Solutions to exercise in TS52 Computer Communiction 23 Septemer, 23 If it occupies millisecond = 3 seconds, then second is occupied y 3 = 3 its = kps. kps If it occupies 2 microseconds = 2 6 seconds, then

More information

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES Romn V. Tyshchuk Informtion Systems Deprtment, AMI corportion, Donetsk, Ukrine E-mil: rt_science@hotmil.com 1 INTRODUCTION During the considertion

More information

Dataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1)

Dataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1) The slides contin revisited mterils from: Peter Mrwedel, TU Dortmund Lothr Thiele, ETH Zurich Frnk Vhid, University of liforni, Riverside Dtflow Lnguge Model Drsticlly different wy of looking t computtion:

More information

Geometric quantities for polar curves

Geometric quantities for polar curves Roerto s Notes on Integrl Clculus Chpter 5: Bsic pplictions of integrtion Section 10 Geometric quntities for polr curves Wht you need to know lredy: How to use integrls to compute res nd lengths of regions

More information

Mixed CMOS PTL Adders

Mixed CMOS PTL Adders Anis do XXVI Congresso d SBC WCOMPA l I Workshop de Computção e Aplicções 14 20 de julho de 2006 Cmpo Grnde, MS Mixed CMOS PTL Adders Déor Mott, Reginldo d N. Tvres Engenhri em Sistems Digitis Universidde

More information

A New Algorithm to Compute Alternate Paths in Reliable OSPF (ROSPF)

A New Algorithm to Compute Alternate Paths in Reliable OSPF (ROSPF) A New Algorithm to Compute Alternte Pths in Relile OSPF (ROSPF) Jin Pu *, Eric Mnning, Gholmli C. Shoj, Annd Srinivsn ** PANDA Group, Computer Science Deprtment University of Victori Victori, BC, Cnd Astrct

More information

CHAPTER 3 AMPLIFIER DESIGN TECHNIQUES

CHAPTER 3 AMPLIFIER DESIGN TECHNIQUES CHAPTER 3 AMPLIFIER DEIGN TECHNIQUE 3.0 Introduction olid-stte microwve mplifiers ply n importnt role in communiction where it hs different pplictions, including low noise, high gin, nd high power mplifiers.

More information

To provide data transmission in indoor

To provide data transmission in indoor Hittite Journl of Science nd Engineering, 2018, 5 (1) 25-29 ISSN NUMBER: 2148-4171 DOI: 10.17350/HJSE19030000074 A New Demodultor For Inverse Pulse Position Modultion Technique Mehmet Sönmez Osmniye Korkut

More information

Sequential Logic (2) Synchronous vs Asynchronous Sequential Circuit. Clock Signal. Synchronous Sequential Circuits. FSM Overview 9/10/12

Sequential Logic (2) Synchronous vs Asynchronous Sequential Circuit. Clock Signal. Synchronous Sequential Circuits. FSM Overview 9/10/12 9//2 Sequentil (2) ENGG5 st Semester, 22 Dr. Hden So Deprtment of Electricl nd Electronic Engineering http://www.eee.hku.hk/~engg5 Snchronous vs Asnchronous Sequentil Circuit This Course snchronous Sequentil

More information

RT-Link: A Time-Synchronized Link Protocol for Energy Constrained Multi-hop Wireless Networks

RT-Link: A Time-Synchronized Link Protocol for Energy Constrained Multi-hop Wireless Networks RT-Link: A Time-Synchronized Link Protocol for Energy Constrined Multi-hop Wireless Networks Anthony Rowe, Rhul Mnghrm, Rj Rjkumr Electricl nd Computer Engineering Deprtment, Crnegie Mellon University,

More information

A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Radio Networks

A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Radio Networks Globecom 04 - Wireless Networking Symposium A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Rdio Networks Xingy Liu nd Jing Xie Deprtment of Electricl nd Computer Engineering

More information

Kirchhoff s Rules. Kirchhoff s Laws. Kirchhoff s Rules. Kirchhoff s Laws. Practice. Understanding SPH4UW. Kirchhoff s Voltage Rule (KVR):

Kirchhoff s Rules. Kirchhoff s Laws. Kirchhoff s Rules. Kirchhoff s Laws. Practice. Understanding SPH4UW. Kirchhoff s Voltage Rule (KVR): SPH4UW Kirchhoff s ules Kirchhoff s oltge ule (K): Sum of voltge drops round loop is zero. Kirchhoff s Lws Kirchhoff s Current ule (KC): Current going in equls current coming out. Kirchhoff s ules etween

More information

A Cluster-based TDMA System for Inter-Vehicle Communications *

A Cluster-based TDMA System for Inter-Vehicle Communications * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 30, 213-231 (2014) A Cluster-bsed TDMA System for Inter-Vehicle Communictions * Deprtment of Electricl Engineering Ntionl Sun Yt-Sen University Kohsiung,

More information

On the Description of Communications Between Software Components with UML

On the Description of Communications Between Software Components with UML On the Description of Communictions Between Softwre Components with UML Zhiwei An Dennis Peters Fculty of Engineering nd Applied Science Memoril University of Newfoundlnd St. John s NL A1B 3X5 zhiwei@engr.mun.c

More information

Math Circles Finite Automata Question Sheet 3 (Solutions)

Math Circles Finite Automata Question Sheet 3 (Solutions) Mth Circles Finite Automt Question Sheet 3 (Solutions) Nickols Rollick nrollick@uwterloo.c Novemer 2, 28 Note: These solutions my give you the nswers to ll the prolems, ut they usully won t tell you how

More information

Y9.ET1.3 Implementation of Secure Energy Management against Cyber/physical Attacks for FREEDM System

Y9.ET1.3 Implementation of Secure Energy Management against Cyber/physical Attacks for FREEDM System Y9.ET1.3 Implementtion of Secure Energy ngement ginst Cyber/physicl Attcks for FREED System Project Leder: Fculty: Students: Dr. Bruce cillin Dr. o-yuen Chow Jie Dun 1. Project Gols Develop resilient cyber-physicl

More information

Algorithms for Memory Hierarchies Lecture 14

Algorithms for Memory Hierarchies Lecture 14 Algorithms for emory Hierrchies Lecture 4 Lecturer: Nodri Sitchinv Scribe: ichel Hmnn Prllelism nd Cche Obliviousness The combintion of prllelism nd cche obliviousness is n ongoing topic of reserch, in

More information

Exercise 1-1. The Sine Wave EXERCISE OBJECTIVE DISCUSSION OUTLINE. Relationship between a rotating phasor and a sine wave DISCUSSION

Exercise 1-1. The Sine Wave EXERCISE OBJECTIVE DISCUSSION OUTLINE. Relationship between a rotating phasor and a sine wave DISCUSSION Exercise 1-1 The Sine Wve EXERCISE OBJECTIVE When you hve completed this exercise, you will be fmilir with the notion of sine wve nd how it cn be expressed s phsor rotting round the center of circle. You

More information

Genetic Representations for Evolutionary Minimization of Network Coding Resources

Genetic Representations for Evolutionary Minimization of Network Coding Resources Genetic Representtions for Evolutionry Minimiztion of Network Coding Resources Minkyu Kim 1, Vrun Aggrwl 2, Un-My O Reilly 2, Muriel Médrd 1, nd Wonsik Kim 1 1 Lortory for Informtion nd Decision Systems

More information

Energy Harvesting Two-Way Channels With Decoding and Processing Costs

Energy Harvesting Two-Way Channels With Decoding and Processing Costs IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, VOL., NO., MARCH 07 3 Energy Hrvesting Two-Wy Chnnels With Decoding nd Processing Costs Ahmed Arf, Student Member, IEEE, Abdulrhmn Bknin, Student

More information

On the Prediction of EPON Traffic Using Polynomial Fitting in Optical Network Units

On the Prediction of EPON Traffic Using Polynomial Fitting in Optical Network Units On the Prediction of EP Trffic Using Polynomil Fitting in Opticl Networ Units I. Mmounis (1),(3), K. Yinnopoulos (2), G. Ppdimitriou (4), E. Vrvrigos (1),(3) (1) Computer Technology Institute nd Press

More information

Analysis of Coding-aware MAC Protocols based on Reverse Direction Protocol for IEEE based Wireless Networks using Network Coding*

Analysis of Coding-aware MAC Protocols based on Reverse Direction Protocol for IEEE based Wireless Networks using Network Coding* Anlysis of oding-wre MA Protocols sed on Reverse irection Protocol for IEEE 8.-sed Wireless Networks using Network oding* Rul Plcios, Htegereil Kssye Hile, Jesus Alonso-Zrte nd Frizio Grnelli {plciostrujillo,

More information

ABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC

ABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC User Mnul ntelligent nstlltion Systems A B 1 2 3 4 5 6 7 8 30 ma 30 ma n = AC Un = 230 V AC 30 ma 9 10 11 12 C ABB STOTZ-KONTAKT Appliction Softwre Current Vlue Threshold/1 Contents Pge 1 Device Chrcteristics...

More information

CS2204 DIGITAL LOGIC & STATE MACHINE DESIGN SPRING 2005

CS2204 DIGITAL LOGIC & STATE MACHINE DESIGN SPRING 2005 CS2204 DIGITAL LOGIC & STATE MACHINE DESIGN SPRING 2005 EXPERIMENT 1 FUNDAMENTALS 1. GOALS : Lern how to develop cr lrm digitl circuit during which the following re introduced : CS2204 l fundmentls, nd

More information

Travel Prediction-based Data Forwarding for Sparse Vehicular Networks. Technical Report

Travel Prediction-based Data Forwarding for Sparse Vehicular Networks. Technical Report Trvel Prediction-sed Dt Forwrding for Sprse Vehiculr Networks Technicl Report Deprtment of Computer Science nd Engineering University of Minnesot 4-192 Keller Hll 200 Union Street SE Minnepolis, MN 55455-0159

More information

Energy-efficient scheduling and hybrid communication architecture for underwater littoral surveillance

Energy-efficient scheduling and hybrid communication architecture for underwater littoral surveillance Computer Communictions xxx (26) xxx xxx www.elsevier.com/locte/comcom Energy-efficient scheduling nd hybrid communiction rchitecture for underwter littorl surveillnce Mihel Crdei * Deprtment of Computer

More information

& Y Connected resistors, Light emitting diode.

& Y Connected resistors, Light emitting diode. & Y Connected resistors, Light emitting diode. Experiment # 02 Ojectives: To get some hndson experience with the physicl instruments. To investigte the equivlent resistors, nd Y connected resistors, nd

More information

Synchronous Machine Parameter Measurement

Synchronous Machine Parameter Measurement Synchronous Mchine Prmeter Mesurement 1 Synchronous Mchine Prmeter Mesurement Introduction Wound field synchronous mchines re mostly used for power genertion but lso re well suited for motor pplictions

More information

10.4 AREAS AND LENGTHS IN POLAR COORDINATES

10.4 AREAS AND LENGTHS IN POLAR COORDINATES 65 CHAPTER PARAMETRIC EQUATINS AND PLAR CRDINATES.4 AREAS AND LENGTHS IN PLAR CRDINATES In this section we develop the formul for the re of region whose oundry is given y polr eqution. We need to use the

More information

Area-Time Efficient Digit-Serial-Serial Two s Complement Multiplier

Area-Time Efficient Digit-Serial-Serial Two s Complement Multiplier Are-Time Efficient Digit-Seril-Seril Two s Complement Multiplier Essm Elsyed nd Htem M. El-Boghddi Computer Engineering Deprtment, Ciro University, Egypt Astrct - Multipliction is n importnt primitive

More information

The Discussion of this exercise covers the following points:

The Discussion of this exercise covers the following points: Exercise 4 Bttery Chrging Methods EXERCISE OBJECTIVE When you hve completed this exercise, you will be fmilir with the different chrging methods nd chrge-control techniques commonly used when chrging Ni-MI

More information

Implementation of Different Architectures of Forward 4x4 Integer DCT For H.264/AVC Encoder

Implementation of Different Architectures of Forward 4x4 Integer DCT For H.264/AVC Encoder Implementtion of Different Architectures of Forwrd 4x4 Integer DCT For H.64/AVC Encoder Bunji Antoinette Ringnyu, Ali Tngel, Emre Krulut 3 Koceli University, Institute of Science nd Technology, Koceli,

More information

ISSCC 2006 / SESSION 21 / ADVANCED CLOCKING, LOGIC AND SIGNALING TECHNIQUES / 21.5

ISSCC 2006 / SESSION 21 / ADVANCED CLOCKING, LOGIC AND SIGNALING TECHNIQUES / 21.5 21.5 A 1.1GHz Chrge-Recovery Logic Visvesh Sthe, Jung-Ying Chueh, Mrios Ppefthymiou University of Michign, Ann Aror, MI Boost Logic is chrge-recovery circuit fmily cple of operting t GHz-clss frequencies

More information

CHAPTER 2 LITERATURE STUDY

CHAPTER 2 LITERATURE STUDY CHAPTER LITERATURE STUDY. Introduction Multipliction involves two bsic opertions: the genertion of the prtil products nd their ccumultion. Therefore, there re two possible wys to speed up the multipliction:

More information

Synchronous Machine Parameter Measurement

Synchronous Machine Parameter Measurement Synchronous Mchine Prmeter Mesurement 1 Synchronous Mchine Prmeter Mesurement Introduction Wound field synchronous mchines re mostly used for power genertion but lso re well suited for motor pplictions

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad Hll Ticket No Question Pper Code: AEC009 INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigl, Hyderd - 500 043 MODEL QUESTION PAPER Four Yer B.Tech V Semester End Exmintions, Novemer - 2018 Regultions:

More information

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 1 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment Roerto Di Pietro, Luigi V. Mncini, nd Alessndro

More information

LATEST CALIBRATION OF GLONASS P-CODE TIME RECEIVERS

LATEST CALIBRATION OF GLONASS P-CODE TIME RECEIVERS LATEST CALIBRATION OF GLONASS P-CODE TIME RECEIVERS A. Fos 1, J. Nwroci 2, nd W. Lewndowsi 3 1 Spce Reserch Centre of Polish Acdemy of Sciences, ul. Brtyc 18A, 00-716 Wrsw, Polnd; E-mil: fos@c.ww.pl; Tel.:

More information

A Development of Earthing-Resistance-Estimation Instrument

A Development of Earthing-Resistance-Estimation Instrument A Development of Erthing-Resistnce-Estimtion Instrument HITOSHI KIJIMA Abstrct: - Whenever erth construction work is done, the implnted number nd depth of electrodes hve to be estimted in order to obtin

More information

Domination and Independence on Square Chessboard

Domination and Independence on Square Chessboard Engineering nd Technology Journl Vol. 5, Prt, No. 1, 017 A.A. Omrn Deprtment of Mthemtics, College of Eduction for Pure Science, University of bylon, bylon, Irq pure.hmed.omrn@uobby lon.edu.iq Domintion

More information

Use of compiler optimization of software bypassing as a method to improve energy efficiency of exposed data path architectures

Use of compiler optimization of software bypassing as a method to improve energy efficiency of exposed data path architectures Guzm et l. EURASIP Journl on Emedded Systems 213, 213:9 RESEARCH Open Access Use of compiler optimiztion of softwre ypssing s method to improve energy efficiency of exposed dt pth rchitectures Vldimír

More information

Study on SLT calibration method of 2-port waveguide DUT

Study on SLT calibration method of 2-port waveguide DUT Interntionl Conference on Advnced Electronic cience nd Technology (AET 206) tudy on LT clibrtion method of 2-port wveguide DUT Wenqing Luo, Anyong Hu, Ki Liu nd Xi Chen chool of Electronics nd Informtion

More information

Distributed two-hop proportional fair resource allocation in Long Term Evolution Advanced networks

Distributed two-hop proportional fair resource allocation in Long Term Evolution Advanced networks WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2016; 16:264 278 Published online 12 August 2014 in Wiley Online Librry (wileyonlinelibrry.com)..2517 RESEARCH ARTICLE Distributed

More information

Discontinued AN6262N, AN6263N. (planed maintenance type, maintenance type, planed discontinued typed, discontinued type)

Discontinued AN6262N, AN6263N. (planed maintenance type, maintenance type, planed discontinued typed, discontinued type) ICs for Cssette, Cssette Deck ANN, ANN Puse Detection s of Rdio Cssette, Cssette Deck Overview The ANN nd the ANN re the puse detection integrted circuits which select the progrm on the cssette tpe. In

More information

A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE

A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE Mster Thesis Division of Electronic Devices Deprtment of Electricl Engineering Linköping University y Timmy Sundström LITH-ISY-EX--05/3698--SE

More information

THE STUDY OF INFLUENCE CORE MATERIALS ON TECHNOLOGICAL PROPERTIES OF UNIVERSAL BENTONITE MOULDING MATERIALS. Matej BEZNÁK, Vladimír HANZEN, Ján VRABEC

THE STUDY OF INFLUENCE CORE MATERIALS ON TECHNOLOGICAL PROPERTIES OF UNIVERSAL BENTONITE MOULDING MATERIALS. Matej BEZNÁK, Vladimír HANZEN, Ján VRABEC THE STUDY OF INFLUENCE CORE MATERIALS ON TECHNOLOGICAL PROPERTIES OF UNIVERSAL BENTONITE MOULDING MATERIALS Mtej BEZNÁK, Vldimír HANZEN, Ján VRABEC Authors: Mtej Beznák, Assoc. Prof. PhD., Vldimír Hnzen,

More information

Fair Coalitions for Power-Aware Routing in Wireless Networks

Fair Coalitions for Power-Aware Routing in Wireless Networks Fir Colitions for Power-Awre Routing in Wireless Networks Rtul K. Guh, Crl A. Gunter nd Sswti Srkr University of Pennsylvni {rguh@ses, gunter@.cis, swti@.ee }.upenn.edu Astrct Severl power wre routing

More information

Experimental Application of H Output-Feedback Controller on Two Links of SCARA Robot

Experimental Application of H Output-Feedback Controller on Two Links of SCARA Robot INTERNATIONAL JOURNAL OF CONTROL, AUTOMATION AND SYSTEMS VOL.5 NO. Jnury 6 ISSN 65-877 (Print) ISSN 65-885 (Online) http://www.reserchpu.org/journl/jc/jc.html Experimentl Appliction of H Output-Feedck

More information

arxiv: v1 [cs.cc] 29 Mar 2012

arxiv: v1 [cs.cc] 29 Mar 2012 Solving Mhjong Solitire ords with peeking Michiel de Bondt rxiv:1203.6559v1 [cs.cc] 29 Mr 2012 Decemer 22, 2013 Astrct We first prove tht solving Mhjong Solitire ords with peeking is NPcomplete, even if

More information

CSI-SF: Estimating Wireless Channel State Using CSI Sampling & Fusion

CSI-SF: Estimating Wireless Channel State Using CSI Sampling & Fusion CSI-SF: Estimting Wireless Chnnel Stte Using CSI Smpling & Fusion Riccrdo Crepldi, Jeongkeun Lee, Rul Etkin, Sung-Ju Lee, Robin Krvets University of Illinois t Urbn-Chmpign Hewlett-Pckrd Lbortories Emil:{rcrepl,rhk}@illinoisedu,

More information

Chapter 2 Literature Review

Chapter 2 Literature Review Chpter 2 Literture Review 2.1 ADDER TOPOLOGIES Mny different dder rchitectures hve een proposed for inry ddition since 1950 s to improve vrious spects of speed, re nd power. Ripple Crry Adder hve the simplest

More information

Design of UHF Fractal Antenna for Localized Near-Field RFID Application

Design of UHF Fractal Antenna for Localized Near-Field RFID Application 1 Design of UHF Frctl Antenn for Loclized Ner-Field RFID Appliction Yonghui To, Erfu Yng, Yxin Dong, nd Gng Wng, Memer, IEEE Astrct In this pper, frctl structure is proposed for loclized ner-field UHF

More information

Open Access A Novel Parallel Current-sharing Control Method of Switch Power Supply

Open Access A Novel Parallel Current-sharing Control Method of Switch Power Supply Send Orders for Reprints to reprints@enthmscience.e 170 The Open Electricl & Electronic Engineering Journl, 2014, 8, 170-177 Open Access A Novel Prllel Current-shring Control Method of Switch Power Supply

More information

Design and implementation of a high-speed bit-serial SFQ adder based on the binary decision diagram

Design and implementation of a high-speed bit-serial SFQ adder based on the binary decision diagram INSTITUTE OFPHYSICS PUBLISHING Supercond. Sci. Technol. 16 (23) 1497 152 SUPERCONDUCTORSCIENCE AND TECHNOLOGY PII: S953-248(3)67111-3 Design nd implementtion of high-speed it-seril SFQ dder sed on the

More information

(1) Non-linear system

(1) Non-linear system Liner vs. non-liner systems in impednce mesurements I INTRODUCTION Electrochemicl Impednce Spectroscopy (EIS) is n interesting tool devoted to the study of liner systems. However, electrochemicl systems

More information

SOLVING TRIANGLES USING THE SINE AND COSINE RULES

SOLVING TRIANGLES USING THE SINE AND COSINE RULES Mthemtics Revision Guides - Solving Generl Tringles - Sine nd Cosine Rules Pge 1 of 17 M.K. HOME TUITION Mthemtics Revision Guides Level: GCSE Higher Tier SOLVING TRIANGLES USING THE SINE AND COSINE RULES

More information

Experiment 3: Non-Ideal Operational Amplifiers

Experiment 3: Non-Ideal Operational Amplifiers Experiment 3: Non-Idel Opertionl Amplifiers Fll 2009 Equivlent Circuits The bsic ssumptions for n idel opertionl mplifier re n infinite differentil gin ( d ), n infinite input resistnce (R i ), zero output

More information

Lecture 16: Four Quadrant operation of DC Drive (or) TYPE E Four Quadrant chopper Fed Drive: Operation

Lecture 16: Four Quadrant operation of DC Drive (or) TYPE E Four Quadrant chopper Fed Drive: Operation Lecture 16: Four Qudrnt opertion of DC Drive (or) TYPE E Four Qudrnt chopper Fed Drive: Opertion The rmture current I is either positive or negtive (flow in to or wy from rmture) the rmture voltge is lso

More information

METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin

METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN Inventor: Brin L. Bskin 1 ABSTRACT The present invention encompsses method of loction comprising: using plurlity of signl trnsceivers to receive one or

More information

Example. Check that the Jacobian of the transformation to spherical coordinates is

Example. Check that the Jacobian of the transformation to spherical coordinates is lss, given on Feb 3, 2, for Mth 3, Winter 2 Recll tht the fctor which ppers in chnge of vrible formul when integrting is the Jcobin, which is the determinnt of mtrix of first order prtil derivtives. Exmple.

More information

Three-Phase Synchronous Machines The synchronous machine can be used to operate as: 1. Synchronous motors 2. Synchronous generators (Alternator)

Three-Phase Synchronous Machines The synchronous machine can be used to operate as: 1. Synchronous motors 2. Synchronous generators (Alternator) Three-Phse Synchronous Mchines The synchronous mchine cn be used to operte s: 1. Synchronous motors 2. Synchronous genertors (Alterntor) Synchronous genertor is lso referred to s lterntor since it genertes

More information

Simulation of Transformer Based Z-Source Inverter to Obtain High Voltage Boost Ability

Simulation of Transformer Based Z-Source Inverter to Obtain High Voltage Boost Ability Interntionl Journl of cience, Engineering nd Technology Reserch (IJETR), olume 4, Issue 1, October 15 imultion of Trnsformer Bsed Z-ource Inverter to Obtin High oltge Boost Ability A.hnmugpriy 1, M.Ishwry

More information

Network-coded Cooperation for Multi-unicast with Non-Ideal Source-Relay Channels

Network-coded Cooperation for Multi-unicast with Non-Ideal Source-Relay Channels This full text pper ws peer reviewed t the direction of IEEE Communictions Society suject mtter experts for puliction in the IEEE ICC 2010 proceedings Network-coded Coopertion for Multi-unicst with Non-Idel

More information

Available online at ScienceDirect. Procedia Engineering 89 (2014 )

Available online at   ScienceDirect. Procedia Engineering 89 (2014 ) Aville online t www.sciencedirect.com ScienceDirect Procedi Engineering 89 (2014 ) 411 417 16th Conference on Wter Distriution System Anlysis, WDSA 2014 A New Indictor for Rel-Time Lek Detection in Wter

More information

Two-layer slotted-waveguide antenna array with broad reflection/gain bandwidth at millimetre-wave frequencies

Two-layer slotted-waveguide antenna array with broad reflection/gain bandwidth at millimetre-wave frequencies Two-lyer slotted-wveguide ntenn rry with rod reflection/gin ndwidth t millimetre-wve frequencies S.-S. Oh, J.-W. Lee, M.-S. Song nd Y.-S. Kim Astrct: A 24 24 slotted-wveguide rry ntenn is presented in

More information

Experiment 3: Non-Ideal Operational Amplifiers

Experiment 3: Non-Ideal Operational Amplifiers Experiment 3: Non-Idel Opertionl Amplifiers 9/11/06 Equivlent Circuits The bsic ssumptions for n idel opertionl mplifier re n infinite differentil gin ( d ), n infinite input resistnce (R i ), zero output

More information

Jamming-Resistant Collaborative Broadcast In Wireless Networks, Part II: Multihop Networks

Jamming-Resistant Collaborative Broadcast In Wireless Networks, Part II: Multihop Networks Jmming-Resistnt ollbortive Brodcst In Wireless Networks, Prt II: Multihop Networks Ling Xio Ximen University, hin 361005 Emil: lxio@xmu.edu.cn Huiyu Di N Stte University, Rleigh, N 27695 Emil: huiyu di@ncsu.edu

More information

Lecture 20. Intro to line integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts.

Lecture 20. Intro to line integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts. Lecture 2 Intro to line integrls Dn Nichols nichols@mth.umss.edu MATH 233, Spring 218 University of Msschusetts April 12, 218 (2) onservtive vector fields We wnt to determine if F P (x, y), Q(x, y) is

More information

Synchronous Generator Line Synchronization

Synchronous Generator Line Synchronization Synchronous Genertor Line Synchroniztion 1 Synchronous Genertor Line Synchroniztion Introduction One issue in power genertion is synchronous genertor strting. Typiclly, synchronous genertor is connected

More information

Interference Cancellation Method without Feedback Amount for Three Users Interference Channel

Interference Cancellation Method without Feedback Amount for Three Users Interference Channel Open Access Librry Journl 07, Volume, e57 ISSN Online: -97 ISSN Print: -9705 Interference Cncelltion Method without Feedbc Amount for Three Users Interference Chnnel Xini Tin, otin Zhng, Wenie Ji School

More information

Regular languages can be expressed as regular expressions.

Regular languages can be expressed as regular expressions. Regulr lnguges cn e expressed s regulr expressions. A generl nondeterministic finite utomton (GNFA) is kind of NFA such tht: There is unique strt stte nd is unique ccept stte. Every pir of nodes re connected

More information

DESIGN OF CONTINUOUS LAG COMPENSATORS

DESIGN OF CONTINUOUS LAG COMPENSATORS DESIGN OF CONTINUOUS LAG COMPENSATORS J. Pulusová, L. Körösi, M. Dúbrvská Institute of Robotics nd Cybernetics, Slovk University of Technology, Fculty of Electricl Engineering nd Informtion Technology

More information

High-speed Simulation of the GPRS Link Layer

High-speed Simulation of the GPRS Link Layer 989 High-speed Simultion of the GPRS Link Lyer J Gozlvez nd J Dunlop Deprtment of Electronic nd Electricl Engineering, University of Strthclyde 204 George St, Glsgow G-lXW, Scotlnd Tel: +44 4 548 206,

More information

Direct Current Circuits. Chapter Outline Electromotive Force 28.2 Resistors in Series and in Parallel 28.3 Kirchhoff s Rules 28.

Direct Current Circuits. Chapter Outline Electromotive Force 28.2 Resistors in Series and in Parallel 28.3 Kirchhoff s Rules 28. P U Z Z L E R If ll these pplinces were operting t one time, circuit reker would proly e tripped, preventing potentilly dngerous sitution. Wht cuses circuit reker to trip when too mny electricl devices

More information

Topology Design in Time-Evolving Delay-Tolerant Networks with Unreliable Links

Topology Design in Time-Evolving Delay-Tolerant Networks with Unreliable Links Topology Design in Time-Eoling Dely-Tolernt Networks with Unrelile Links Minsu Hung Siyun Chen Fn Li Yu Wng Deprtment of Computer Science, Uniersity of North Crolin t Chrlotte, Chrlotte, NC 83, USA. School

More information

A Channel Splitting Technique for Reducing Handoff Delay in Wireless Networks

A Channel Splitting Technique for Reducing Handoff Delay in Wireless Networks Interntionl Journl o Engineering Reserch & Technology (IJERT) A Chnnel Splitting Technique or Reducing Hndo ely in Wireless Networks Jeykumr. J #1, Venktesh. * 2, Vigneswri. G* 3, Nivethith. V *4 # 1 PG

More information

Module 9. DC Machines. Version 2 EE IIT, Kharagpur

Module 9. DC Machines. Version 2 EE IIT, Kharagpur Module 9 DC Mchines Version EE IIT, Khrgpur esson 40 osses, Efficiency nd Testing of D.C. Mchines Version EE IIT, Khrgpur Contents 40 osses, efficiency nd testing of D.C. mchines (esson-40) 4 40.1 Gols

More information

Adaptive Network Coding for Wireless Access Networks

Adaptive Network Coding for Wireless Access Networks Adptive Network Coding for Wireless Access Networks Tun Trn School of Electricl Engineering nd Computer Science Oregon Stte University, Corvllis, Oregon 9733 Emil: trntu@eecs.orst.edu Thinh Nguyen School

More information

Automatic Synthesis of Compressor Trees: Reevaluating Large Counters

Automatic Synthesis of Compressor Trees: Reevaluating Large Counters Automtic Snthesis of Compressor Trees: Reevluting Lrge Counters Aj K. Verm AjKumr.Verm@epfl.ch Polo Ienne Polo.Ienne@epfl.ch Ecole Poltechnique Fédérle de Lusnne (EPFL) School of Computer nd Communiction

More information

Redundancy Data Elimination Scheme Based on Stitching Technique in Image Senor Networks

Redundancy Data Elimination Scheme Based on Stitching Technique in Image Senor Networks Sensors & Trnsducers 204 by IFSA Publishing, S. L. http://www.sensorsportl.com Redundncy Dt Elimintion Scheme Bsed on Stitching Technique in Imge Senor Networks hunling Tng hongqing Technology nd Business

More information

Alternating-Current Circuits

Alternating-Current Circuits chpter 33 Alternting-Current Circuits 33.1 AC Sources 33.2 esistors in n AC Circuit 33.3 Inductors in n AC Circuit 33.4 Cpcitors in n AC Circuit 33.5 The LC Series Circuit 33.6 Power in n AC Circuit 33.7

More information

Network Sharing and its Energy Benefits: a Study of European Mobile Network Operators

Network Sharing and its Energy Benefits: a Study of European Mobile Network Operators Network Shring nd its Energy Benefits: Study of Europen Mobile Network Opertors Mrco Ajmone Mrsn Electronics nd Telecommunictions Dept Politecnico di Torino, nd Institute IMDEA Networks, mrco.jmone@polito.it

More information

Triangles and parallelograms of equal area in an ellipse

Triangles and parallelograms of equal area in an ellipse 1 Tringles nd prllelogrms of equl re in n ellipse Roert Buonpstore nd Thoms J Osler Mthemtics Deprtment RownUniversity Glssoro, NJ 0808 USA uonp0@studentsrownedu osler@rownedu Introduction In the pper

More information

CS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates

CS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates Bsic Logic Gtes : Computer Architecture I Boolen Algebr Instructor: Prof. Bhgi Nrhri Dept. of Computer Science Course URL: www.ses.gwu.edu/~bhgiweb/cs35/ Digitl Logic Circuits We sw how we cn build the

More information

April 9, 2000 DIS chapter 10 CHAPTER 3 : INTEGRATED PROCESSOR-LEVEL ARCHITECTURES FOR REAL-TIME DIGITAL SIGNAL PROCESSING

April 9, 2000 DIS chapter 10 CHAPTER 3 : INTEGRATED PROCESSOR-LEVEL ARCHITECTURES FOR REAL-TIME DIGITAL SIGNAL PROCESSING April 9, 2000 DIS chpter 0 CHAPTE 3 : INTEGATED POCESSO-LEVEL ACHITECTUES FO EAL-TIME DIGITAL SIGNAL POCESSING April 9, 2000 DIS chpter 3.. INTODUCTION The purpose of this chpter is twofold. Firstly, bsic

More information

Translate and Classify Conic Sections

Translate and Classify Conic Sections TEKS 9.6 A.5.A, A.5.B, A.5.D, A.5.E Trnslte nd Clssif Conic Sections Before You grphed nd wrote equtions of conic sections. Now You will trnslte conic sections. Wh? So ou cn model motion, s in E. 49. Ke

More information

Network Theorems. Objectives 9.1 INTRODUCTION 9.2 SUPERPOSITION THEOREM

Network Theorems. Objectives 9.1 INTRODUCTION 9.2 SUPERPOSITION THEOREM M09_BOYL3605_13_S_C09.indd Pge 359 24/11/14 1:59 PM f403 /204/PH01893/9780133923605_BOYLSTAD/BOYLSTAD_NTRO_CRCUT_ANALYSS13_S_978013... Network Theorems Ojectives Become fmilir with the superposition theorem

More information

Throughput of Wireless Relay Networks with Interference Processing

Throughput of Wireless Relay Networks with Interference Processing NCC 2009, Jnury 16-18, IIT Guwhti 170 Throughput of Wireless Rely Networks with Interference Processing M. Bm, rikrishn Bhshym nd Andrew Thngrj, eprtment of Electricl Engineering, Indin Institute of Technology,

More information

Demand response for aggregated residential consumers with energy storage sharing

Demand response for aggregated residential consumers with energy storage sharing 21 IEEE 4th Annul Conference on Decision nd Control (CDC December 1-18, 21. Os, Jpn Demnd response for ggregted residentil consumers with energy storge shring Kveh Pridri, Alessndr Prisio, Henri Sndberg

More information

On the Effectivity of Different Pseudo-Noise and Orthogonal Sequences for Speech Encryption from Correlation Properties

On the Effectivity of Different Pseudo-Noise and Orthogonal Sequences for Speech Encryption from Correlation Properties On the Effectivity of Different Pseudo-Noise nd Orthogonl Sequences for Speech Encryption from Correltion Properties V. Anil Kumr, Ahijit Mitr nd S. R. Mhdev Prsnn Astrct We nlyze the effectivity of different

More information

A Stochastic Geometry Approach to the Modeling of DSRC for Vehicular Safety Communication

A Stochastic Geometry Approach to the Modeling of DSRC for Vehicular Safety Communication A Stochstic Geometry Approch to the Modeling of DSRC for Vehiculr Sfety Communiction Zhen Tong, Student Member, IEEE, Hongsheng Lu 2, Mrtin Henggi, Fellow, IEEE, nd Christin Poellbuer 2, Senior Member,

More information

Improving synchronized transfers in public transit networks using real-time tactics

Improving synchronized transfers in public transit networks using real-time tactics Improving synchronized trnsfers in public trnsit networks using rel-time tctics Zhongjun Wu 1,2,3, Grhm Currie 3, Wei Wng 1,2 1 Jingsu Key Lbortory of Urbn ITS, Si Pi Lou 2#, Nnjing, 210096, Chin 2 School

More information

Fuzzy Logic Controller for Three Phase PWM AC-DC Converter

Fuzzy Logic Controller for Three Phase PWM AC-DC Converter Journl of Electrotechnology, Electricl Engineering nd Mngement (2017) Vol. 1, Number 1 Clusius Scientific Press, Cnd Fuzzy Logic Controller for Three Phse PWM AC-DC Converter Min Muhmmd Kml1,, Husn Ali2,b

More information

The Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center

The Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center Resource Overview Quntile Mesure: Skill or Concept: 300Q Model the concept of ddition for sums to 10. (QT N 36) Model the concept of sutrction using numers less thn or equl to 10. (QT N 37) Write ddition

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-297 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

Information Caching Strategy for Cyber Social Computing Based Wireless Networks

Information Caching Strategy for Cyber Social Computing Based Wireless Networks Received 4 December 26; revised 23 Februry 27; ccepted 2 April 27. Dte of publiction 28 April 27; dte of current version 6 September 27. Digitl Object Identifier.9/TETC.27.2699695 Informtion Cching Strtegy

More information

DYE SOLUBILITY IN SUPERCRITICAL CARBON DIOXIDE FLUID

DYE SOLUBILITY IN SUPERCRITICAL CARBON DIOXIDE FLUID THERMAL SCIENCE, Yer 2015, Vol. 19, No. 4, pp. 1311-1315 1311 DYE SOLUBILITY IN SUPERCRITICAL CARBON DIOXIDE FLUID by Jun YAN, Li-Jiu ZHENG *, Bing DU, Yong-Fng QIAN, nd Fng YE Lioning Provincil Key Lbortory

More information

Understanding Basic Analog Ideal Op Amps

Understanding Basic Analog Ideal Op Amps Appliction Report SLAA068A - April 2000 Understnding Bsic Anlog Idel Op Amps Ron Mncini Mixed Signl Products ABSTRACT This ppliction report develops the equtions for the idel opertionl mplifier (op mp).

More information

Device installation. AFR 1xx - Feature Description of the Smart Load. AFR1xx 145 % 200 %

Device installation. AFR 1xx - Feature Description of the Smart Load. AFR1xx 145 % 200 % KM systems, s.r.o. Dr. M. Horákové 559, 460 06 Lierec 7, Czech Repulic tel. +420 485 130 314, fx +420 482 736 896 emil : km@km.cz, url : www.km.cz sturtion of the mgnetic circuit of the VT. This often

More information