arxiv: v1 [cs.it] 16 Nov 2017

Size: px
Start display at page:

Download "arxiv: v1 [cs.it] 16 Nov 2017"

Transcription

1 Sptio-Temporl Motifs for Optimize Vehile-to-Vehile (V2V) Communitions Tenghn Zeng, Omi Semiri, n Wli S Wireless@VT, Brley Deprtment of Eletril n Computer Engineering, Virgini Teh, Blksurg, VA, USA Emils:{tenghn, wlis}@vt.eu Deprtment of Eletril Engineering, Georgi Southern University, Sttesoro, GA, USA Emil: osemiri@georgisouthern.eu rxiv:7.030v [s.it] Nov 207 Astrt Ching populr ontents in vehile-to-vehile (V2V) ommunition networks is expete to ply n importnt role in ro trffi mngement, the reliztion of intelligent trnsporttion systems (ITSs), n the elivery of multimei ontent ross vehiles. However, for effetive hing, the network must ynmilly hoose the optiml set of rs tht will he populr ontent n isseminte it in the entire network. However, most of the existing prior rt on V2V hing is restrite to he plement tht is solely se on lotion n user emns n oes not ount for the lrge-sle sptio-temporl vritions in V2V ommunition networks. In ontrst, in this pper, novel sptio-temporl hing strtegy is propose se on the notion of temporl grph motifs tht n pture sptio-temporl ommunition ptterns in V2V networks. It is shown tht, y ientifying suh V2V motifs, the network n fin su-optiml ontent plement strtegies for effetive ontent issemintion ross vehiulr network. Simultion results using rel tres from the ity of Cologne show tht the propose pproh n inrese the verge t rte y 5% for ifferent network senrios. I. INTRODUCTION Vehile-to-vehile (V2V) ommunition is seen s one of enling tehnologies for intelligent trnsporttion systems n key enler for mny smrt ro n trffi mngement systems [], s it llows ritil informtion issemintion. Moreover, spurre y the vilility of in-vehile infotinment (IVI) systems isseminting entertinment n informtion ontent to pssengers [2], there is strong nee for high-spee n stle elivery of lrge multimei files, suh s vieos, photos n songs, to the vrious rs within vehiulr network. For effetive issemintion of suh iverse ontent ross vehiulr networks, there is nee for effetive ontent plement strtegies to mximize the throughput of the system [3]. Moreover, to rep the enefits of V2V ontent issemintion, we must ress ifferent hllenges inluing optiml he plement n resoure llotion []. Che plement in V2V networks hs reently ttrte signifint ttention suh s in [5]-[8]. In suh works, the populr ontents re offloe to the storge of numer of well-hosen rs n evies t off-pek hours in orer to serve requests uring pek trffi hours. In these senrios, rs n evies tht o not hve the he ontent will not hve to ownlo the ontent from wireless se sttions (BSs). Inste, they n request the ontent iretly from other rs hving he t whih n eventully le to reution in the trffi lo t the BSs. Menwhile, hing using lol storge n reue lteny ue to shorter ommunition istne. However, the enefits of hing re highly epenent on the set of rs n evies hosen for hing the populr ontents [7]. This reserh ws supporte y the U.S. Ntionl Siene Fountion uner Grnts CNS-5397 n IIS In [5], the uthors use vehile moility t for ontent issemintion n omine the ie of opportunisti forwring, trjetory se forwring n geogrphil forwring to evelop moility-entri lgorithm to ple ontent in vehiulr networks. Menwhile, the work in [] pplies ville users moility ptterns to evelop polynomil-time solution to mximize the sve ost y hing ontents in lol storge. Moreover, in [7], the uthors use lotion informtion n susription-se informtion to ivie vehiles into ifferent groups n, then, esign sptio-temporl multist routing protool to onstrut n optimize issemintion mesh network. The work in [8] presents n optiml hing poliy y using oth moility informtion n users emns n proposes greey hing lgorithm with polynomil orer omplexity to otin ouns of the hing poliy whose omplexity grows exponentilly with the numer of users. However, existing works, inluing [5]-[8], o not tke into ount the temporl ynmis of V2V ommunition networks, suh s the frequeny of ourrene of ifferent V2V links, whih n e key metri for ontent plement. For exmple, using only lotion informtion to selet the set of rs tht will he the ontent n le to hoosing rs whih re unle to ommunite with eh other or with other rs, effetively limiting the enefits of hing. The min ontriution of this pper is novel frmework for sptio-temporl hing in vehiulr networks tht is ogniznt of intrinsi sptil n temporl ptterns in V2V ommunitions. In prtiulr, using the tools of temporl network nlysis [9], we ientify temporl motifs in the V2V network s key ommunition ptterns oserve mong vehiles tht pper more frequently ompre with wht is expete in seline, rnomize referene system. After ientifying the sptil-temporl motifs, the propose pproh then fins the est nite rs for ontent plement. To our est knowlege, this is the first work tht exploits sptil-temporl motifs for optimizing ontent issemintion in vehiulr networks. Simultion results using rel tres from the ity of Cologne, Germny, show tht the propose motif-se pproh yiels signifint performne gins in terms of the verge t rte, ompre to onventionl lotion-se sheme. The rest of the pper is orgnize s follows. Setion II presents the system moel n prolem formultion. In Setion III, we present the propose motif-se pproh. Setion IV provies the simultion results. Conlusions re rwn in Setion V. II. SYSTEM MODEL AND PROBLEM FORMULATION Consier vehiulr network in n urn environment, ompose of set N of N vehiles. In prtiulr, s shown in Fig., we onsier tht nery BS provies wireless overge to the

2 Link etween BS n rs V2V ommunition Songs j SINR t the reeiving r j from the trnsmitting r i exees trget threshol for V2V ommunition, otherwise, L i,j = 0. Aoringly, the hievle t rte for the V2V link etween the serving r n non-serving r is i R, = ω log 2 ( + γ, ), (3) Work zones Vieos Cr ients Fig.. V2V ommunition networks n its mrosopi ommunition grph. rs in N. The BS frequently uses eon signls to keep trk of the vehiles positions y using the reeive signl-strength mesurements in [0], n ollets the V2V ommunition t when exhnging informtion with the ommunition fility within the vehiles s propose in []. In our system, the BS seeks to see multimei files n trffi t in the storge unit of set C N of C rs to provie the pssengers in neighoring rs with streming servies or to isseminte ely-sensitive informtion, suh s upoming ro inients to help rivers eie on their routes. Using this mehnism, the seee rs, referee to hereinfter s serving rs, n isseminte the he ontent to nery rs vi V2V links. Consequently, the BS n reue its trffi lo, s it no longer nees to trnsmit the sme ontent to multiple rs. Fig. shows se in whih the BS hes ontent t r. Here, n ritrry r N\{} sens request for ontent m to the BS. If the ontent is lrey he t r, the BS woul inform the requesting r to use V2V ommunition to otin the ontent from. Otherwise, the BS hs to iretly trnsmit the requeste ontent to, whih inreses its lo. Hereinfter, we refer to rs tht o not hve the he ontent s non-serving rs. To inrese the spetrum effiieny, we ssume tht V2V links reuse the spetrl resoures of the ellulr network s in [2]. A. Prolem formultion The signl-to-interferene-plus-noise rtio (SINR) of V2V ommunition link etween serving r n non-serving r will e: P, g, γ, = I, + I + σ 2, () where P, is the trnsmission power from to, n σ 2 is the vrine of the Gussin noise t the reeiver. In ition, g, represents the hnnel gin etween n n n expresse s g, =η α,, where η is the fing gin,, is the istne, n α is the pth loss exponent. We onsier tht the ellulr links n the V2V links will experiene Ryleigh fing s one in [3]. I, n I pture, respetively, the interferene generte y the links etween the BS n other vehiles n y other V2V ommunition links. These interferene terms re given y, I, = (L, )P, g,, I = (L, )P, g, N \, N \ where L i,j is inry vrile tht ptures the fesiility of ommunition link etween i n j. In ft, L i,j = if the (2) where ω is the nwith. The orresponing SINR γ, n the hievle rte R, etween the BS n non-serving r, re: γ, = P,g, I + σ 2, R, = ω log 2 ( + γ, ). () We onsier set M of M populr ontents with the sme size, sorte from high to low populrity. Due to the limite storge, the serving noes will hoose to he limite numer of ontents. Therefore, to inrese the possiility of meeting the requirements from non-serving noes, the serving rs will he F M most populr files, uner the pity onstrints. Therefore, when non-serving noe requests one file out of the F files, the noe n quire it vi V2V link s long s there exists one serving noe within its ommunition rnge. To leverge V2V ommunitions for isseminting he ontent, the network must etermine whih vehiles t s serving noes so s to mximize the verge t rte hieve y non-serving rs. To this en, we efine the inry vrile x i for eh r i, where x i = if r i is selete s serving noe, otherwise x i =0, n set C ontins C= N i x i serving noes. Therefore, we n formulte the prolem s follows: ( F mx Pr (m) ) M β, R, + Pr (m)r, C N(N C) N \C m= C m=f + (5) s.t. P, P mx, () γ γ,, (7) where Pr (m) is the proility mss funtion (pmf) of the request for file m y r. This istriution n e moele y the Zipf istriution with pmf Pr (m) = m / M θr x= x, θr where θ r is the Zipf exponent tht etermines the skewness of the istriution []. The initor vrile β, is suh tht β, = if the serving r is the nerest r to the requester in the serving set C; β, =0, otherwise. β, ensures tht non-serving r will lwys hoose the losest serving r with the requeste file. Constrint () gurntees tht the trnsmission power of vehiles will not surpss the mximum power level P mx, n onstrint (7) ensures tht SINR of the V2V links is ove threshol, γ. B. V2V mrosopi ommunition grphs As long s we fin the optiml set of serving vehiles, we n ssign non-serving noes to serving noes oring to the sptil istne, n solve the prolem given y (5)-(7). However, fining the optiml set C is 0- integer progrmming where etermining whether eh iniviul noe in the set N shoul e onsiere s either serving or non-serving noe. In ft, the prolem is one of Krp s 2 NP-omplete prolems [5], whih is hr to solve iretly. Alterntively, we n fin su-optiml solution to the optimiztion prolem y using the informtion within the vehiulr

3 network. In prtiulr, in ition to the the position n emn of eh vehile, we n lso leverge the temporl omin informtion. This is euse V2V networks re nturlly ynmi n exhiit the temporl fetures. For exmple, the numer of ommunition links etween two ritrry rs my vry with time. Suh temporl informtion on the frequeny of ommunition is vlule to etermine whih rs re more likely to etter isseminte the ontent. Therefore, time omin informtion is lso importnt to hoose the optiml set C for he plement n solve the prolem (5)-(7). To pture the ynmis in the time omin, we propose to use ollete V2V ommunitions t n moel the system s irete temporl grph G=(N, E), whose verties re the rs in N n whose temporl eges, in set E, enote the timestmpe ommunition events mong vehiles. We represent wireless ommunition link etween two ifferent rs s 3- tuple ege lele s i, e i =< i, i, t i >, where i n i enote the serving r n the non-serving r, respetively. t i is the time of inititing the trnsmission from i to i. Here, we ssume tht, t ny time, r nnot ommunite with more thn one r simultneously. In this se, there re no two eges with the ommon vehile element initite t the sme time. To otin the set of rs tht re more tive n more likely to prtiipte in the V2V ommunition in perio of time, we introue the time onstrint T n evie the grph G=(N, E) into multiple mrosopi ommunition grphs, where we n hnge the vlue of T to filter outte V2V links. Tht is, for ny ege e i in these mrosopi grphs, there lwys exists t lest one other ege e j, i j, in the sme grph, tht meets the following requirements: Two eges shre t lest one noe, ( i, i ) ( j, j ) ; If wireless onnetion i ours efore nother onnetion j, 0 t j t i T ; If wireless onnetion j ours efore nother onnetion i, 0 t i t j T. Given these efinitions, using the grph-theoreti frmework of temporl networks nlysis, next, we present novel grphtheoreti su-optiml solution to the originl prolem in (5)-(7). III. PROPOSED STRATEGY BASED ON SPATIO-TEMPORAL MOTIFS To fin su-optiml solution to (5)-(7), we nee to evelop n lgorithm to etet motifs in V2V ommunition mrosopi grphs. To this en, we follow three steps. The first step is serhing mirosopi sugrphs efine s si ommunition units with typil sizes (numer of eges) in mrosopi ommunition grphs. The seon step is olleting mirosopi sugrphs with similr isomorphi struture. The thir step is etermining the frequently ourring motifs fter ompring eh sugrph s frequeny f of ourrene with its ounterprt f in seline rnomize V2V ommunition network. In prtiulr, we use the notion of Z-sore, expresse s Z = f f, (8) σ m where σ m ptures the stnr evition of the orresponing sugrph in the referene system. If Z>Z th, where Z th is given threshol, we n lssify the sugrph s motif []. Finlly, Algorithm Mirosopi Sugrphs Serhing Algorithm Input: A V2V mrosopi ommunition grph G = (N, E ), n trget sugrph size k. Output: The set of mirosopi sugrph V with size k. : V = 2: for ritrry ege e i E o 3: V {e i } : for ege e j E e i o 5: if { i, i } { j, j } = n j > i : V 2 {e j } 7: en 8: en 9: ll EDGEEXTENSION(V, V 2, k) 0: return V : funtion EDGEEXTENSION(E su, V 3, k) 2: If E su = k then output G[E su ] n return 3: while V 3 o : for ritrry ege e x V 3 o 5: Remove e x from V 3 : for ege e y V 3 e x o 7: if { x, x} { y, y} = n y > x 8: V {e y} 9: en 20: en 2: V 3 = V 3 V 22: ll EDGEEXTENSION(E su {e x}, V 3, k) 23: en 2: return given the etete motifs, our sptio-temporl hing strtegy n selet C, C N, to solve the optimiztion prolem in (5)-(7). A. Serhing for V2V mirosopi sugrphs To effetively etet existing motifs in V2V ommunition networks, we first eompose V2V mrosopi ommunition grphs into mirosopi sugrphs with the sme size. The lgorithm use for fining V2V mirosopi sugrphs with trget size k in mrosopi grph G =(N, E ) is shown in Algorithm. Given set of lele rs n lele onnetion eges, there re two wys to otin mirosopi sugrphs from the mrosopi grph. One pproh is to onsier the noes onnete y eges, n nother pproh is to onsier the set of eges in whih n ritrry ege n fin nother ege shring the ommon noe. In ontrst to the work in [7], the propose lgorithm is se on the seon pproh. As shown in Fig. 2, from the mrosopi grph, we n otin pir of ege sets, V n V 2, where the first set ontins only one ege e i, lele s i, n the seon set hs e i s ll neighoring eges with greter lels. The mehnism will first n ritrry ege e j, lele s j, from the seon set to the first set n upte the first set. By lling EDGEEXTENSION(E SUB, V 3, k), the seon set oul e extene y first merging the set of eges, whih re neighor to the newly e eges e j n with greter lels in the mrosopi grph, n then removing ege e j n other eges with smller lels ompre with j. Next, we repet the forementione steps for the first set with the e ege n the new seon set until we otin the mirosopi sugrphs meeting the size requirement, i.e., k. Exmple: When the two sets of eges from the mrosopi grph re {} n {2,3,,}, s shown in Fig. 2, the lgorithm first s ege 2 to the first set {} n otins the first upte set {,2}. Then, it uptes the seon set s {3,,5,} y first merging the neighoring set with greter lels, i.e., {3,5,} with

4 3 5 Root 2 ({},{2,3,,}) ({2},{3,5,}) ({3},{,5,}) ({},{5,}) ({5},{ø}) ({},{ø}) ({,2},{3,,5,}) ({,3},{,5,}) ({,},{5,}) ({,},{ø}) ({3,},{5,}) ({3,5},{ø}) ({3,},{ø}) ({,5},{}) ({,},{ø}) Fig. 2. Consiering grph with noes n eges in the orner, we n otin ll mirosopi sugrphs with size s 3 fter following Algorithm Fig. 3. Exmples on the nonil leling of mirosopi sugrph n other mirosopi sugrphs shring the sme nonil leling. {2,3,,} n then eleting the ege 2. Repetely, the lgorithm follows the sme proesses for the upte set {,2} n the ege set {3,,5,}, n we n otin the mirosopi sugrphs {,2,3} n {,2,}, if k = 3. As shown in Fig. 2, y using this lgorithm for ny one ege set n the set of its surrouning eges with greter lels, we n finlly ollet ll V2V mirosopi sugrphs with the require size in mrosopi grph. To otin the whole set of mirosopi sugrphs existing in the V2V network, we n use this lgorithm for ifferent mrosopi grphs. Although the omplexity of the lgorithm will inrese with the inrement of the vehiles, we n pply the lgorithm in senrios with pity limittions, like intersetions, prking lots, n prts of the highwy, or suset of the network, thus reuing the omplexity n the proessing time. B. Clssifying V2V mirosopi sugrphs To sort V2V mirosopi sugrphs with the sme isomorphi struture, i.e., to fin mirosopi sugrphs whih ontin the sme numer of rs onnete in the sme wy, we exploit the notion of nonil leling. By permuting the elements in the jeny mtries otine from mirosopi sugrph, we oul onstrut mny lists of integers. By viewing eh list of integers s string of s n 0s, we sort them se on lexiogrphi orering to otin nonil leling efine s the string with the minimum vlue. Due to the ft tht the nonil leling of two sugrphs will e ientil s long s they hve the similr isomorphi struture [8], the prolem of etermining isomorphi strutures mong sugrphs is equivlent to eiing whether given mirosopi sugrphs hve the sme nonil leling or not. For exmple, s shown in Fig. 3, y ontenting rows or olumns one fter the other in the permute jeny mtries of the first mirosopi extrte from Fig. 2, we n fin two strings 5 Assume W motifs, lulte the orresponing weight vlues n etermine the influentil noe in eh motif Use funtion (9) n otin the sum frequeny f(j) of eing the influentil r i=i+ no i= i>n Output: serving r set n non-serving r set yes Sort the sum frequeny set from the iggest vlue to the smllest vlue Choose the first C elements s the serving rs Assign eh non-serving r to the optiml serving r se on sptil informtion Fig.. Flow ht of the propose sptio-temporl hing strtegy. of s n 0s. Aoring to lexiogrphi orering, we notie the string orresponing to the seon mtrix is smller thn its ounterprt in the first mtrix, i.e., < 0000, n 0000 n e hosen s the nonil leling for the first mirosopi sugrph ompre with other permuttions. Similrly, we n oserve the seon mirosopi sugrph shres the sme nonil leling with the first sugrph, n, thus, these two sugrphs hve the sme isomorphi struture. Aoringly, we re ple of ompleting struture lssifition for ll the mirosopi sugrphs in the V2V ommunition network, n then, we n lulte the ourrene frequeny f of mirosopi sugrphs hving similr isomorphi struture. Moreover, we lso repet the sme steps for rnomize V2V ommunition network so s to otin the men frequeny f n the stnr evition σ m of the orresponing sugrph. We n use (8) to etermine whether the sugrph is motif or not. C. Propose sptio-temporl hing strtegy To otin the su-optiml solution for the optimiztion prolem (5)-(7), s shown in Fig., the BS will first selet the serving rs in the set C se on the motifs etete from the V2V ommunition grph. In prtiulr, we ssume there re W motifs n the Z-sore of motif i is Z i. Note tht for ny i {,..., W }, Z i > Z th. By oserving the motif struture, we n etermine the outegree of eh r, whih is efine s the numer of outgoing eges emnting from the r. For exmple, for the first mirosopi sugrph in Fig. 3, the outegrees of,, re, 2, n 0. Then, we hoose the influentil r s the noe with the mximum outegree in the orresponing motif,

5 TABLE I SIMULATION PARAMETERS. Prmeter Mening Vlue w l With of eh lne 3.5 m P,n Trnsmission power of se sttion 20 W P mx Trnsmission power of V2V links 20 Bm α Pth loss exponent 3 γ SINR threshol 0 B σ 2 Power of noise 9 Bm ω Bnwith of the system 75 MHz θ r Zipf exponent 2 M Totl numer of files in the network 0 F The mximum numer of files the r n he 3 Approximte istne from BS to freewy 0.0 km T Time onstrint 00 s sine the onnetions tht originte from this r n reh more reipients ompre with other rs, leing to more effetive ontent issemintion. Next, we n sttistilly quire the frequeny of r j s eing the influentil r in the i th motif s f ij, j N. Bse on tht, s shown in Fig., we n otin the sum frequeny of eing the influentil r in the motifs for r j s, W f(j) = w i f ij, (9) i= where w i ptures the weight vlue of motif i, expresse s Z w i = W i. After lulting the sum frequeny of eh r, j=0 Zj we sort noes from the r with the highest frequeny to the one with the lowest frequeny. Finlly, the hoie of est C nites to he will e the first C elements in the rry. After hoosing the serving rs, the next step is to ssign eh reeiving r to its optiml serving r. In prtiulr, if the BS reeives the request from one reeiving r, the BS woul inform the r the nerest serving r with require ontent se on the ollete lotion informtion. To solve (5)-(7), we eompose it into two prolems. One is etermining the optiml set of serving rs, whih is solve y exploiting the temporl motifs. The other is ompleting the est ssignments etween the serving rs n the non-serving rs using the sptil knowlege. IV. SIMULATION RESULTS For our simultions, we use the vehiulr moility tset within the ity of Cologne, Germny, whih is ollete y the TAPASCologne projet [9]. The tset ontins informtion out ros n vehiles s well s the trip informtion for eh iniviul r in one y. In prtiulr, we tke into ount 5 km-length freewy (Autohn in Cologne) with three lnes in eh iretion n the nerest BS is olonius fernsehturm. We ollet the lotion informtion of network of 53 vehiles tht oexist on the freewy from the t. All simultion prmeters re summrize in Tle. I. Sine the Poisson istriution n e use to pture the numer of events ourring within fixe intervl [20], we ssume tht the numer of wireless ommunition links etween two ritrry rs i n j tht in proximity of one nother, in given perio of time, follows Poisson istriution with prmeter λ i,j. To etter simulte rel-time t, we ssume tht λ i,j is inversely proportionl to the istne etween i n j. This is euse loser istne les to etter ommunition environment, resulting in higher proility to uil Fig. 5. Motifs foun in the first senrio. () 3 rs () 39 n rs () 33, 35, n 37 rs () 3, 5, 7, 9, 5 n 53 rs Fig.. Motifs foun in the seon senrio with ifferent numer of rs. ommunition links. Then, we rnomly ssign time stmp to eh V2V ommunition links. In seline rnomize V2V ommunition network, the ommunition instnes re rnomly generte n given time stmp. One the temporl grph t is generte, the motifs n e etete se on the pproh in Setion III. In our nlysis, struture is ientifie s motif, when the Z-ore of the struture is t lest 2. For omprison, we use lotion-se hing strtegy. In this strtegy, the si priniple is tht the BS woul lwys selet set of rs tht n relize the lest summtion of istne etween remining rs n the orresponing losest rs the in the selete set. We onsier two simultion senrios. In the first senrio, we onsier totl numer of 53 rs (serving n non-serving). As we hnge the numer of serving rs, the numer of non-serving rs will e moifie oringly. In the seon senrio, we first rnomly hoose severl r sets with ifferent totl numer of rs. Then, se on the propose strtegy n the lotion-se strtegy, we hoose fixe numer of non-serving rs hosen out of the selete sets. In prtiulr, we selet twelve r sets hving totl numer of rs rnging from 3 to 53 with step of 2, n we fix the numer of reeiving rs to 30. Aoring to the propose metho, we n etet ifferent motifs in oth senrios, sorte from the highest to the lowest in terms of Z-sore, from the rel tre t n generte wireless ommunition t, s shown in Fig. 5 n Fig.. Bse on these strutures, we n oserve the outegree of eh noe. Then, using the propose lgorithm in Setion III, we n etermine the set of rs use for hing. Fig. 7 shows the verge trnsmission rte hieve y nonserving rs uner the lotion-se hing strtegy n the propose pproh, with the totl numer of rs fixe t 53 (first senrio). From Fig. 7, we oserve tht the sptio-temporl hing strtegy yiels etter performne ompre with the lotion-se he strtegy in terms of verge te rte per non-serving r. In prtiulr, the performne vntge rehes up to 5% when the numer of serving r is 20. Furthermore, s the numer of serving rs inreses, the numer of non-serving rs will erese. In prtiulr, when the numer of serving rs goes to 50, there re only 3 rs requesting for ontent, leing to reue interferene n n inrese in the verge t rte, s lso seen in Fig. 7. Fig. 8 shows the verge t rte for 30 non-serving rs

6 CDF Averge t rte per non-serving r (Mps) Averge t rte per non-serving r (Mps) Propose hing strtegy Lotion-se hing strtegy Numer of serving rs Fig. 7. Averge t rte for non-serving rs where the numer of rs is Propose hing strtegy Lotion-se hing strtegy Numer of serving rs Fig. 8. Averge t rte for non-serving rs where the numer of non-serving rs is Lotion-se hing strtegy, 5 rs Lotion-se hing strtegy, rs Lotion-se hing strtegy, 5 rs Lotion-se hing strtegy, 2 rs Propose hing strtegy, 5 rs Propose hing strtegy, rs Propose hing strtegy, 5 rs Propose hing strtegy, 2 rs Dt trnsmission rte (Gps) Fig. 9. CDFs for the t rte of non-serving rs where the numer of serving rs re 5,, 5, 2. s we vry the numer of serving rs. We n oserve tht the propose strtegy outperforms lotion-se hing strtegy up to 5% when there re rs ting s serving noes. Further, the verge t rte for oth strtegies will not inrese ll the time. This is ue to the ft tht n inrese in the numer of serving rs will rise the interferene over the V2V links. When the impt of interferene nnot e ompenste y the gin from V2V ommunition, the verge t rte for V2V links will erese, s seen in Fig. 8. Moreover, Fig. 9 shows the umultive istriution funtions (CDFs) of the t rte of non-serving rs for 5,, 5, n 2 serving rs. Compre with the t rte resulting from lotion-se strtegy, the nonserving rs re more likely to hieve higher t rte when employing the propose hing strtegy. Fig. 9 lso shows uner oth hing strtegies, the proility of hieving higher t rte for 5 serving rs is greter thn the ounterprts for 5,, n 2 serving rs. In prtiulr, when the numer of serving rs is 5 n the proility is 0.8, the propose hing strtegy improves the t rte of out 20% ompre to the lotionse strtegy. V. CONCLUSIONS In this pper, we hve propose novel sptio-temporl hing poliy in vehiulr networks. In ontrst to tritionl lotionse hing strtegies, we hve leverge temporl grph motifs, whih represent sugrphs with high frequeny of ourrene in the V2V ommunition grph, to etermine r nites to he populr ontent. We hve evelope n pproh to etet the motifs n, then, hve use the results to etermine the preferre set of rs for populr ontent plement. Simultion results using rel r lotion tres hve shown tht the propose sptio-temporl hing strtegy n yiel signifint gins in terms of the verge t rte per r for two prtil senrios. REFERENCES [] K. Zheng, Q. Zheng, P. Chtzimisios, W. Xing, n Y. Zhou, Heterogeneous Vehiulr Networking: A Survey on Arhiteture, Chllenges, n Solutions, IEEE Commun. Surveys Tuts., vol. 7, no., pp , Fourthqurter, 205. [2] Y. Wu, W. Putnm, J. Wng, n Z. Cheng, A wireless peer-to-peer rost moel for emergeny vehiles using utomotive networking, in Pro. of IEEE Symposium Series on Computtionl Intelligene (SSCI), Athens, Greee, De. 20. [3] D. Ryhuhuri n N. B. Mnym, Frontiers of wireless n moile ommunitions, Pro. IEEE, vol. 00, no., pp , Apr [] IEEE, IEEE tril-use stnr for wireless ess in vehiulr environments (WAVE) - seurity servies for pplitions n mngement messges, in IEEE St , e, 200. [5] H. Wu, R. Fujimoto, R. Guensler, n M. Hunter, MDDV: A moilityentri t issemintion lgorithm for vehiule network, in Prof. of ACM Interntionl Workshop on VehiulAr Inter-NETworking (VANET), Philelphi, PA, USA, Ot [] Y. Gun, Y. Xio, H. Feng, C. Shen, n L. Cimini, MoiCher: Moilitywre ontent hing in smll-ell networks, in Pro. of IEEE Glol Communitions Conferene (GLOBECOM), Austin, TX, USA, De. 20. [7] S. Shivshkr n A. Jmlipour, Sptio-temporl multist grouping for ontent-se routing in vehiulr networks: A istriute pproh, J. Netw. Comput. Appl., vol. 39, pp , Mr. 20. [8] S. Hosny, A. Eryilmz, A. Aouzei, n H. Gml, "Moility-wre entrlize D2D hing networks," in Pro. of Annul Allerton Conferene, Urn-Chmpign, IL, USA, Sept. 20. [9] U. Alon, Network motifs: Theory n experimentl pprohes, Nture Rev. Genet., vol. 8, pp. 50, Jun [0] M. Hellernt, R. Mthr, n M. Sheienogen, Estimting position n veloity of moiles in ellulr rio network. IEEE Trns. Veh. Tehnol., vol., no., pp. 5-7, Fe [] J. Huux, S. Cpkun, n J. Luo, The seurity n privy of smrt vehiles. IEEE Seurity Privy vol. 2, no. 3, pp. 9-55, My-June 200. [2] C. Yu, K. Doppler, C. Roeiro, n O. Tirkkonen, Resoure shring optimiztion for evie-to-evie ommunition unerlying ellulr networks. IEEE Trns. Wireless Commun., vol. 0, no. 8, pp , Aug. 20. [3] F. Liu, Z. Chen, n B. Xi, Dt issemintion with network oing in two-wy vehile-to-vehile networks. IEEE Trns. Veh. Tehnol., vol. 5, no., pp , Apr. 20. [] D. Mlk, M. Al-Shlsh, n J. Anrews, Optimizing the sptil ontent hing istriution for evie-to-evie ommunitions, in Pro. of 20 IEEE Interntionl Symposium on Informtion Theory (ISIT), Brelon, Spin, July 20. [5] R. Krp, Complexity of omputer omputtions, New York, USA: Springer Press, 972. [] P. Holme n J. Srmki, Temporl network, Phys. Rep., vol. 59, no. 3, pp , Ot [7] S. Wernike, Effiient etetion of network motifs, IEEE/ACM Trns. Comput. Biol. Bioinf., vol. 3. no., pp , Ot [8] R. Re n D. Corneil. The grph isomorph isese, Journl of Grph Theory, vol., pp , De [9] Dt/Senrios/TAPASCologne, ville on: Senrios/TAPASCologne. [20] J. Kingmn, Poisson proesses, Oxfor, UK: Oxfor University Press, 993.

Changing the routing protocol without transient loops

Changing the routing protocol without transient loops Chnging the routing protool without trnsient loops Nny Rhkiy, Alexnre Guitton To ite this version: Nny Rhkiy, Alexnre Guitton. Chnging the routing protool without trnsient loops. Computer Communitions,

More information

Uplinks Analysis and Optimization of Hybrid Vehicular Networks

Uplinks Analysis and Optimization of Hybrid Vehicular Networks Uplinks Anlysis n Optimiztion of Hybri Vehiulr Networks Shikun Li 1, Zipeng Li 1, Xiohu Ge 1, Yonghui Li 2 1 Shool of Eletroni Informtion n Communitions, Huzhong University of Siene n Tehnology Wuhn, Hubei

More information

Fig. 6. SIR distribution for different number of sectors per cell

Fig. 6. SIR distribution for different number of sectors per cell 0 0 setors per ell: setors per ell: 0 setors per ell: For 0 B (no fing), B n B s the stnr evition, the 99%-overge SIR is B,. B, n. B respetively. A onfiene nlysis for ifferent sees for lognorml fing shows

More information

Proposed Cable Tables for SAS2

Proposed Cable Tables for SAS2 Tle 50 Requirements for internl le ssemlies using SASDrive onnetors n kplnes. Requirement, Units 1,5 Gps 3Gps 6 Gps Bulk le or kplne:, Differentil impene ohm 100 ± 10 100 g Common-moe impene ohm 32,5 ±

More information

A Novel Virtual Anchor Node-based Localization Algorithm for Wireless Sensor Networks

A Novel Virtual Anchor Node-based Localization Algorithm for Wireless Sensor Networks Novel Virtul nhor Noe-se Loliztion lgorithm for Wireless Sensor Networks Pengxi Liu Xinming Zhng Shung Tin Zhiwei Zho Peng Sun Deprtment of Computer Siene n Tehnology University of Siene n Tehnology of

More information

Energy Efficient TDMA Sleep Scheduling in Wireless Sensor Networks

Energy Efficient TDMA Sleep Scheduling in Wireless Sensor Networks Energy Effiient TDMA Sheuling in Wireless Sensor Networks Junho M, Wei Lou Deprtment of Computing The Hong Kong Polytehni University Kowloon, Hong Kong {sjm, sweilou}@omp.polyu.eu.hk Ynwei Wu, Xing-Yng

More information

Probability and Statistics P(A) Mathletics Instant Workbooks. Copyright

Probability and Statistics P(A) Mathletics Instant Workbooks. Copyright Proility nd Sttistis Student Book - Series K- P(A) Mthletis Instnt Workooks Copyright Student Book - Series K Contents Topis Topi - Review of simple proility Topi - Tree digrms Topi - Proility trees Topi

More information

3878 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 9, SEPTEMBER Optimal Algorithms for Near-Hitless Network Restoration via Diversity Coding

3878 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 9, SEPTEMBER Optimal Algorithms for Near-Hitless Network Restoration via Diversity Coding 3878 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 6, NO. 9, SEPTEMBER 23 Optiml Algorithms for Ner-Hitless Network Restortion vi Diversity Coing Serht Nzim Avi, Stuent Memer, IEEE, n Ener Aynoglu, Fellow,

More information

Optimal Time Slot Assignment for Mobile Ad Hoc Networks

Optimal Time Slot Assignment for Mobile Ad Hoc Networks Optiml Time Slot Assignment for Mobile A Ho Networks Koushik Sinh Honeywell Tehnology Solutions Lb, Bnglore, 560076 Ini sinh kou@yhoo.om Abstrt. We present new pproh to fin ollision-free trnsmission sheule

More information

Macroscopic and Microscopic Springs Procedure

Macroscopic and Microscopic Springs Procedure Mrosopi nd Mirosopi Springs Proedure OBJECTIVE Purpose In this l you will: investigte the spring-like properties of stright wire, disover the strethiness of mteril, independent of the size nd shpe of n

More information

Unilateral and equitransitive tilings by squares of four sizes

Unilateral and equitransitive tilings by squares of four sizes Also ville t http://m-journl.eu ISSN 1855-3966 (printe en.), ISSN 1855-3974 (eletroni en.) ARS MATHEMATICA CONTEMPORANEA 10 (2015) 135 167 Unilterl n equitrnsitive tilings y squres of four sizes Csey Mnn

More information

ALONG with the maturity of mobile cloud computing,

ALONG with the maturity of mobile cloud computing, An Optiml Offloding Prtitioning Algorithm in Moile Cloud Computing Huming Wu, Dniel Seidenstüker, Yi Sun, Crlos Mrtín Nieto, Willim Knottenelt, nd Ktink Wolter system, nd their min gol is to keep the whole

More information

Q tomography towards true amplitude image and improve sub-karst image Yang He and Jun Cai, TGS

Q tomography towards true amplitude image and improve sub-karst image Yang He and Jun Cai, TGS Q tomogrphy towrs true mplitue imge n improve su-krst imge Yng He n Jun Ci, TGS Summry A frequeny omin tomogrphi inversion ws evelope to estimte frequeny epenent energy ttenution y using prestk epth migrtion

More information

A Low Power Parallel Sequential Decoder for Convolutional Codes

A Low Power Parallel Sequential Decoder for Convolutional Codes Int. J. Com. Dig. Sys. 2, No. 2, 95-(23) 95 Interntionl Journl of Computing n Digitl Systems http://x.oi.org/.2785/ijs/226 @ 23 UOB SPC, University of Bhrin A Low Power Prllel Sequentil Deoer for Convolutionl

More information

Computational Complexity of a Pop-up Book

Computational Complexity of a Pop-up Book omputtionl omplexity of Pop-up ook Ryuhei Uehr Shio Termoto strt Origmi is the enturies-ol rt of foling pper, n reently, it is investigte s omputer siene: Given n origmi ith reses, the prolem to etermine

More information

COMPUTER NETWORK DESIGN Network layer protocols

COMPUTER NETWORK DESIGN Network layer protocols OMPUTER NETWORK ESIGN Network lyer protools Network lyer (lyer 3) Gruppo Reti TL nome.ognome@polito.it http://www.telemti.polito.it/ OMPUTER NETWORK ESIGN Review of network lyer protools - opyright This

More information

(1) Primary Trigonometric Ratios (SOH CAH TOA): Given a right triangle OPQ with acute angle, we have the following trig ratios: ADJ

(1) Primary Trigonometric Ratios (SOH CAH TOA): Given a right triangle OPQ with acute angle, we have the following trig ratios: ADJ Tringles nd Trigonometry Prepred y: S diyy Hendrikson Nme: Dte: Suppose we were sked to solve the following tringles: Notie tht eh tringle hs missing informtion, whih inludes side lengths nd ngles. When

More information

The Great-Case Cabinet Company

The Great-Case Cabinet Company Hng Angle Mesurement Proeure To ensure tht your guitr is hoste properly, we nee to know how ig it is. Our lrgest inet will host lmost ny guitr on the mrket, ut more eonomil size my e equte. If you hve

More information

Question Paper Wednesday 13 Thursday 14 January 2010

Question Paper Wednesday 13 Thursday 14 January 2010 KEY SKILLS INFORMATION AND COMMUNICATION TECHNOLOGY Level 3 ArtComp [KSI31] Question Pper Wenesy 13 Thursy 14 Jnury 2010 Do NOT open this Question Pper until you re tol to y the invigiltor THERE ARE THREE

More information

EASY DISC Assessment

EASY DISC Assessment EASY DISC Assessment Instrution: Selet the one most pproprite response for eh question. 1. In my work environment, it is most importnt to me... To help o-workers n to e in peeful environment. To feel tht

More information

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES Romn V. Tyshchuk Informtion Systems Deprtment, AMI corportion, Donetsk, Ukrine E-mil: rt_science@hotmil.com 1 INTRODUCTION During the considertion

More information

Study of WiMAX Based Communication Channel Effects on the Ciphered Image Using MAES Algorithm

Study of WiMAX Based Communication Channel Effects on the Ciphered Image Using MAES Algorithm Stuy of WiMAX Bse Communition Chnnel Effets on the Ciphere Imge Using MAES Algorithm Ahme G. Wy, Slim M. Wi, Hyer J. Mohmme Ali A. Aullh Communitions Tehs. Engineering Deprtment, Al-Furt Alwst Tehnil University,

More information

A Secure Localization Method in Wireless Sensor Network

A Secure Localization Method in Wireless Sensor Network Vol. 1(3), Ot. 2015, pp. 212-219 A Seure Loliztion Metho in Wireless Sensor Network Mrym Mirzei, Mohmm Rotmili n Mehi Khlili Dept. of Computer n Informtis Engineering, Pym Noor University, Tehrn, Irn *Corresponing

More information

A novel PLC channel modeling method and channel characteristic analysis of a smart distribution grid

A novel PLC channel modeling method and channel characteristic analysis of a smart distribution grid Le et l. Protetion n Control of Moern Power Systems (2017) 2:14 DOI 10.1186/s41601-017-0044-2 Protetion n Control of Moern Power Systems ORIGINAL RESEARCH A novel PLC hnnel moeling metho n hnnel hrteristi

More information

Published in: Wireless Communications and Networking Conference, IEEE WCNC 2009

Published in: Wireless Communications and Networking Conference, IEEE WCNC 2009 Alorg Universitet Cross-Lyer Optimiztion of Multipoint Messge Brodst in MANETs Nielsen, Jimmy Jessen; Grønæk, Lrs Jesper; Renier, Thiult Julien; Shwefel, Hns- Peter; Toftegrd, Thoms Pulished in: Wireless

More information

Detection of Denial of Service attacks using AGURI

Detection of Denial of Service attacks using AGURI Detetion of Denil of Servie ttks using AGURI Ryo Kizki Keio Univ. kizki@sf.wide.d.jp Kenjiro Cho SonyCSL kj@sl.sony.o.jp Osmu Nkmur Keio Univ. osmu@wide.d.jp Astrt Denil of Servie ttks is divided into

More information

ECE 274 Digital Logic Spring Digital Design. Combinational Logic Design Process and Common Combinational Components Digital Design

ECE 274 Digital Logic Spring Digital Design. Combinational Logic Design Process and Common Combinational Components Digital Design ECE 27 Digitl Logi Spring 29 Comintionl Logi Design Proess n Common Comintionl Components Digitl Design 2.7 2. Digitl Design Chpter 2: Comintionl Logi Design Slies to ompn the tetook Digitl Design, irst

More information

Evaluating territories of Go positions with capturing races

Evaluating territories of Go positions with capturing races Gmes of No Chne 4 MSRI Pulitions Volume 63, 2015 Evluting territories of Go positions with pturing res TEIGO NAKAMURA In nlysing pturing res, or semeis, we hve een fousing on the method to find whih plyer

More information

Aluminium Roof Outlets - Introduction to Detail Outlets

Aluminium Roof Outlets - Introduction to Detail Outlets Aluminium Roof Outlets - Introution to Detil Outlets The Hrmer Roof Detil rnge inlues outlets to over ll the wkwr etiling situtions tht our in uiling esign n in refurishment. Min Chrteristis Hrmer Roof

More information

A Novel SVPWM Technology Used in PWM Rectifiers of WPGS

A Novel SVPWM Technology Used in PWM Rectifiers of WPGS Reserh Journl of Applie Sienes, Engineering n Tehnology 5(1): 4-45, 13 ISSN: 4-7459; e-issn: 4-747 Mxwell Sientifi Orgniztion, 13 Sumitte: Otoer, 1 Aepte: Novemer 9, 1 Pulishe: April 3, 13 A Novel SPWM

More information

Online Testing for Three Fault Models in Reversible Circuits

Online Testing for Three Fault Models in Reversible Circuits 25 IEEE 45th Interntionl Smposium on MultipleVlue Logi Online Testing for Three Fult Moels in Reversile Ciruits M Asif Nshir Dept. of Mth n Computer Siene Universit of Lethrige Lethrige, AB Cn Emil: sif.nshir@uleth.

More information

WORKSHOP 15 PARASOLID MODELING

WORKSHOP 15 PARASOLID MODELING WORKSHOP 15 PARASOLID MODELING WS15-2 Workshop Ojetives Crete prsoli moel of tension fitting using numer of the prsoli tools in MSC.Ptrn WS15-3 Suggeste Exerise Steps 1. Crete new tse for the tension fitting

More information

ASY P.O. BOX 729 TERRELL, TEXAS / PAGE 1 OF 13 SAM

ASY P.O. BOX 729 TERRELL, TEXAS / PAGE 1 OF 13 SAM 203 Madix Inc., ll rights reserved ommon Parts 2 MXI GRI WIRE GRI SHELF WITH (GPWGS) MXI GRI FIXTURE PNEL (GPWFP) FIXTURE PNELS RE USE S EN SUPPORT. SHELF N E USE NYWHERE. MXI GRI REINFORMENT R 3 (GPR)

More information

Solutions to exercise 1 in ETS052 Computer Communication

Solutions to exercise 1 in ETS052 Computer Communication Solutions to exercise in TS52 Computer Communiction 23 Septemer, 23 If it occupies millisecond = 3 seconds, then second is occupied y 3 = 3 its = kps. kps If it occupies 2 microseconds = 2 6 seconds, then

More information

8.1. The Sine Law. Investigate. Tools

8.1. The Sine Law. Investigate. Tools 8.1 Te Sine Lw Mimi 50 ermud Tringle ermud 1600 km Sn Jun 74 Puerto Rio Te ermud Tringle, in te nort tlnti Oen, is te lotion of severl unexplined plne nd sip disppernes. Vrious teories ve een suggested

More information

Resistors, Current and Voltage measurements, Ohm s law, Kirchhoff s first and second law. Kirchhoff s first Objectives:

Resistors, Current and Voltage measurements, Ohm s law, Kirchhoff s first and second law. Kirchhoff s first Objectives: EE -050 Ciruit L Experiment # esistors, Current nd Voltge mesurements, Ohm s lw, Kirhhoff s first nd seond lw. Kirhhoff s first Ojetives: Slmn in Adul Aziz University Eletril Engineering Deprtment. Fmiliriztion

More information

A Development of Embedded System for Speed Control of Hydraulic Motor

A Development of Embedded System for Speed Control of Hydraulic Motor AISTPME (2011) 4(4): 35-39 A Development of Embedded System for Speed Control of Hydruli Motor Pornjit P. Edutionl Mehtronis Reserh Group Deprtment of Teher Trining in Mehnil Engineering, KMUTN, ngkok,

More information

RWM4400UH High Performance Hand Held Wireless Microphone System

RWM4400UH High Performance Hand Held Wireless Microphone System CH 1 CH 2 CH 3 CH 4 UHF QUAD VOLUME MAX VOLUME MAX VOLUME MAX VOLUME RWM 4400UH MIN MIN MIN CHANNEL 1 CHANNEL 2 CHANNEL 3 CHANNEL 4 RWM4400UH High Performne Hnd Held Wireless Mirophone System OWNER S MANUAL

More information

Experiments for Leveled RFID Localization for Indoor Stationary Objects

Experiments for Leveled RFID Localization for Indoor Stationary Objects 2014 11th Interntionl Conferene on Informtion Tehnology: New Genertions Experiments for Levele RFID Loliztion for Inoor Sttionry Ojets Mtthew Chn Computer Systems Tehnology Dept. NYC College of Tehnology,

More information

TRANSIENT VOLTAGE DISTRIBUTION IN TRANSFORMER WINDING (EXPERIMENTAL INVESTIGATION)

TRANSIENT VOLTAGE DISTRIBUTION IN TRANSFORMER WINDING (EXPERIMENTAL INVESTIGATION) IJRET: Interntionl Journl of Reserh in Engineering nd Tehnology ISSN: 2319-1163 TRANSIENT VOLTAGE DISTRIBUTION IN TRANSFORMER WINDING (EXPERIMENTAL INVESTIGATION) Knhn Rni 1, R. S. Goryn 2 1 M.teh Student,

More information

GLONASS PhaseRange biases in RTK processing

GLONASS PhaseRange biases in RTK processing ASS PhseRnge ises in RTK proessing Gle Zyrynov Ashteh Workshop on GSS Bises 202 Bern Switzerlnd Jnury 8-9 202 Sope Simplified oservtion models for Simplified oservtion models for ASS FDMA speifi: lok nd

More information

MATHEMATICS. Student Booklet

MATHEMATICS. Student Booklet GRADE 6 ASSESSMENT OF READING, WRITING AND MATHEMATICS, 2004 2005 Stuent Booklet MATHEMATICS Plese note: The formt of these ooklets is slightly ifferent from tht use for the ssessment. The items themselves

More information

THIS LECTURE looks at bell ringing (the posh name is Tintinnalogia) which as. WE NORMALLY think of a bell as hanging mouth down. If we swing the bell,

THIS LECTURE looks at bell ringing (the posh name is Tintinnalogia) which as. WE NORMALLY think of a bell as hanging mouth down. If we swing the bell, 7 Bells THIS LECTURE looks t ell ringing (the posh nme is Tintinnlogi) whih s n orgnize tivity hs een roun for long time. Inee, n importnt ook y Stemn on the sujet ws pulishe in 1668 (two yers fter the

More information

Patterns and Algebra

Patterns and Algebra Student Book Series D Mthletis Instnt Workooks Copyright Series D Contents Topi Ptterns nd funtions identifying nd reting ptterns skip ounting ompleting nd desriing ptterns numer ptterns in tles growing

More information

CHAPTER 2 LITERATURE STUDY

CHAPTER 2 LITERATURE STUDY CHAPTER LITERATURE STUDY. Introduction Multipliction involves two bsic opertions: the genertion of the prtil products nd their ccumultion. Therefore, there re two possible wys to speed up the multipliction:

More information

Inclined Plane Walking Compensation for a Humanoid Robot

Inclined Plane Walking Compensation for a Humanoid Robot Incline Plne Wlking Compenstion for Humnoi Robot Nttpong Kewlek n Thvi Mneewrn Institute of Fiel Robotics, King Mongkut's University of Technology Thonburi, Bngkok, Thiln (Tel : +662-4709339; E-mil: k.nttpong@hotmil.co.th,

More information

Digital Simulation of an Interline Dynamic Voltage Restorer for Voltage Compensation

Digital Simulation of an Interline Dynamic Voltage Restorer for Voltage Compensation JOURNL OF ENGINEERING RESERH ND TEHNOLOGY, VOLUME 1, ISSUE 4, DEEMER 214 Digitl Simultion of n Interline Dynmi Voltge Restorer for Voltge ompenstion Dr.P.Ush Rni R.M.D.Engineering ollege, henni, pushrni71@yhoo.om

More information

Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England and Associated Companies throughout the world

Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England and Associated Companies throughout the world Person Edution Limited Edinurgh Gte Hrlow Essex M20 2JE Englnd nd ssoited ompnies throughout the world Visit us on the World Wide We t: www.personed.o.uk Person Edution Limited 2014 ll rights reserved.

More information

The PWM switch model introduced by Vatché Vorpérian in 1986 describes a way to model a voltage-mode switching converter with the VM-PWM switch model.

The PWM switch model introduced by Vatché Vorpérian in 1986 describes a way to model a voltage-mode switching converter with the VM-PWM switch model. The PWM swith model introdued by Vthé Vorpérin in 1986 desribes wy to model voltge-mode swithing onverter with the VM-PWM swith model. The lrge-signl model is equivlent to d trnsformer whose turns rtio

More information

MinCounter: An Efficient Cuckoo Hashing Scheme for Cloud Storage Systems

MinCounter: An Efficient Cuckoo Hashing Scheme for Cloud Storage Systems MinCounter: An Effiient Cukoo Hshing Sheme for Cloud Storge Systems Yunyun Sun Yu Hu Dn Feng Ling Yng Pengfei Zuo Shunde Co Wuhn Ntionl L for Optoeletronis, Shool of Computer Huzhong University of Siene

More information

ISM-PRO SOFTWARE DIGITAL MICROSCOPE OPERATION MANUAL

ISM-PRO SOFTWARE DIGITAL MICROSCOPE OPERATION MANUAL MN-ISM-PRO-E www.insize.om ISM-PRO SOFTWARE DIGITAL MICROSCOPE OPERATION MANUAL Desription Clik Next. As the following piture: ISM-PRO softwre is for ISM-PM00SA, ISM-PM600SA, ISM- PM60L digitl mirosopes.

More information

Algorithms for Memory Hierarchies Lecture 14

Algorithms for Memory Hierarchies Lecture 14 Algorithms for emory Hierrchies Lecture 4 Lecturer: Nodri Sitchinv Scribe: ichel Hmnn Prllelism nd Cche Obliviousness The combintion of prllelism nd cche obliviousness is n ongoing topic of reserch, in

More information

Automatic Strategy Verification for Hex

Automatic Strategy Verification for Hex utomti Strtegy Verifition for Hex Ryn B. Hywrd, Broderik rneson, nd Philip Henderson Deprtment of Computing Siene, University of lert, Edmonton, Cnd {hywrd,roderi,ph}@s.ulert. strt. We present onise nd/or-tree

More information

SLOVAK UNIVERSITY OF TECHNOLOGY Faculty of Material Science and Technology in Trnava. ELECTRICAL ENGINEERING AND ELECTRONICS Laboratory exercises

SLOVAK UNIVERSITY OF TECHNOLOGY Faculty of Material Science and Technology in Trnava. ELECTRICAL ENGINEERING AND ELECTRONICS Laboratory exercises SLOVAK UNIVERSITY OF TECHNOLOGY Fulty of Mteril Siene nd Tehnology in Trnv ELECTRICAL ENGINEERING AND ELECTRONICS Lbortory exerises Róbert Riedlmjer TRNAVA 00 ELECTRICAL ENGINEERING AND ELECTRONICS Lbortory

More information

The Nottingham eprints service makes this work by researchers of the University of Nottingham available open access under the following conditions.

The Nottingham eprints service makes this work by researchers of the University of Nottingham available open access under the following conditions. Remenyte-Presott, Rs nd Andrews, John (27) Prime implints for modulrised non-oherent fult trees using inry deision digrms. Interntionl Journl of Reliility nd Sfety, (4). pp. 446-464. ISSN 479-393 Aess

More information

Fubini for continuous functions over intervals

Fubini for continuous functions over intervals Fuini for ontinuous funtions over intervls We first prove the following theorem for ontinuous funtions. Theorem. Let f(x) e ontinuous on ompt intervl =[, [,. Then [, [, [ [ f(x, y)(x, y) = f(x, y)y x =

More information

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 1 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment Roerto Di Pietro, Luigi V. Mncini, nd Alessndro

More information

Positron Emission Tomography (PET) Images

Positron Emission Tomography (PET) Images Positron Emission Tomogrphy (PET) Imges Eh set of PET imges elow ontins four imges of humn rin. The four imges show ross-setions tken t ifferent levels of the rin. Set 1 Set 4 Set 5 Set 2 Set 6 Set 3 highest

More information

Genetic Representations for Evolutionary Minimization of Network Coding Resources

Genetic Representations for Evolutionary Minimization of Network Coding Resources Genetic Representtions for Evolutionry Minimiztion of Network Coding Resources Minkyu Kim 1, Vrun Aggrwl 2, Un-My O Reilly 2, Muriel Médrd 1, nd Wonsik Kim 1 1 Lortory for Informtion nd Decision Systems

More information

by Kathy Brown of The Teacher s Pet

by Kathy Brown of The Teacher s Pet y Kthy Brown of The Teher s Pet Designs y Kthy Brown Pieing y Kthy Brown & Lin Ree Mhine quilte y Crol Hilton www.reroosterfris.om Quilte size: pproximtely 40" x 50" Fris from the Sprinkles (Style #4527)

More information

Comparison of the Efficiency of Input Determination Techniques with LM and BR Algorithms in ANN for Flood Forecasting, Mun Basin, Thailand

Comparison of the Efficiency of Input Determination Techniques with LM and BR Algorithms in ANN for Flood Forecasting, Mun Basin, Thailand Interntionl Journl Computer n Eletril Engineering, Vol., No., April 01 Comprison Effiieny Input Determintion Tehniques with n Algorithms in ANN for Foresting, Mun Bsin, Thiln Twee Chipimonplin n Thveesk

More information

UNATTENDED ground sensors (UGS) are widely used in

UNATTENDED ground sensors (UGS) are widely used in IEEE SENSORS JOURNAL, VOL. 12, NO. 6, JUNE 212 179 Trget Detetion n Clssifition Using Seismi n PIR Sensors Xin Jin, Stuent Member, IEEE, Soumly Srkr, Asok Ry, Fellow, IEEE, Shlbh Gupt, Member, IEEE, n

More information

Academic. Grade 9 Assessment of Mathematics SAMPLE ASSESSMENT QUESTIONS

Academic. Grade 9 Assessment of Mathematics SAMPLE ASSESSMENT QUESTIONS Aemi Gre 9 Assessment of Mthemtis 211 SAMPLE ASSESSMENT QUESTIONS Reor your nswers to the multiple-hoie questions on the Stuent Answer Sheet (211, Aemi). Plese note: The formt of this ooklet is ifferent

More information

Minimum Cost Localization Problem in Three-Dimensional Ocean Sensor Networks

Minimum Cost Localization Problem in Three-Dimensional Ocean Sensor Networks Minimm Cost Loliztion Prolem in Three-Dimensionl Oen Sensor Netorks Cho Zhng Yingjin Li Zhongen Go Goong Sn Y Wng Deprtment of Compter Siene, Uniersity of North Crolin t Chrlotte, Chrlotte, NC 8, USA.

More information

Lecture 16. Double integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts.

Lecture 16. Double integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts. Leture 16 Double integrls Dn Nihols nihols@mth.umss.edu MATH 233, Spring 218 University of Msshusetts Mrh 27, 218 (2) iemnn sums for funtions of one vrible Let f(x) on [, b]. We n estimte the re under

More information

QUANTUM SECRET SHARING VIA FOUR PARTICLE ASYMMETRIC ENTANGLED STATE

QUANTUM SECRET SHARING VIA FOUR PARTICLE ASYMMETRIC ENTANGLED STATE Europen Journl of Mthemtis nd Computer Siene Vol. No., 7 ISSN 59-995 QUANTUM SECRET SHARING VIA FOUR PARTICLE ASYMMETRIC ENTANGLED STATE Pn-ru Zho, Yun-jing Zhou, Jin-wei Zho, Ling-shn Xu, Yun-hong To

More information

DETAIL A SCALE 1 : 85

DETAIL A SCALE 1 : 85 ISIONS ZONE LTR. ESRIPTION TE PP - INITIL RELESE PER N NORTH.0 0 EST ISOLTE P (0" X.") 0 9 0 X FOOKE # 0 ENTER ISOLTE P (" X 9") WEST ISOLTE P (0" X.") FOOKE # 0. RWING ONTENTS SHEET : OVERLL LYOUT SHEET

More information

MOE FLEXIBLE LEARNING SPACE NELSON 2-STOREY BLOCK WELLINGTON AND CHRISTCHURCH - OPTION 1

MOE FLEXIBLE LEARNING SPACE NELSON 2-STOREY BLOCK WELLINGTON AND CHRISTCHURCH - OPTION 1 MOE FLEXILE LERNING SPE NELSON 2-STOREY LOK WELLINGTON N HRISTHURH - Plot ate: Office: Filename: 19/08/201 :18:4 a.m. -MOE-NELSON LOK ENTRL FILE 201 - ONRETE-_detached.rvt 1 TE N: 54 005 19 87 person using

More information

Throughput of Wireless Relay Networks with Interference Processing

Throughput of Wireless Relay Networks with Interference Processing NCC 2009, Jnury 16-18, IIT Guwhti 170 Throughput of Wireless Rely Networks with Interference Processing M. Bm, rikrishn Bhshym nd Andrew Thngrj, eprtment of Electricl Engineering, Indin Institute of Technology,

More information

Computers and Mathematics with Applications. An evaluation study of clustering algorithms in the scope of user communities assessment

Computers and Mathematics with Applications. An evaluation study of clustering algorithms in the scope of user communities assessment Computers nd Mthemtis with Applitions 58 (29) 198 1519 Contents lists ville t SieneDiret Computers nd Mthemtis with Applitions journl homepge: www.elsevier.om/lote/mw An evlution study of lustering lgorithms

More information

Understanding Three-Phase Transformers

Understanding Three-Phase Transformers PDH ourse E450 (4 PDH) Understnding Three-Phse Trnsformers Rlph Fehr, Ph.D., P.E. 2014 PDH Online PDH enter 5272 Medow Esttes Drive Firfx, V 22030-6658 Phone & Fx: 703-988-0088 www.pdhonline.org www.pdhenter.om

More information

Interference Cancellation Method without Feedback Amount for Three Users Interference Channel

Interference Cancellation Method without Feedback Amount for Three Users Interference Channel Open Access Librry Journl 07, Volume, e57 ISSN Online: -97 ISSN Print: -9705 Interference Cncelltion Method without Feedbc Amount for Three Users Interference Chnnel Xini Tin, otin Zhng, Wenie Ji School

More information

Multi-beam antennas in a broadband wireless access system

Multi-beam antennas in a broadband wireless access system Multi-em ntenns in rodnd wireless ccess system Ulrik Engström, Mrtin Johnsson, nders Derneryd nd jörn Johnnisson ntenn Reserch Center Ericsson Reserch Ericsson SE-4 84 Mölndl Sweden E-mil: ulrik.engstrom@ericsson.com,

More information

arxiv: v2 [cs.sy] 16 Nov 2012

arxiv: v2 [cs.sy] 16 Nov 2012 IEEE Personl use of this mteril is permitted Permission from IEEE must e otined for ll other uses, in ny urrent or future medi, inluding reprinting/repulishing this mteril for dvertising or promotionl

More information

& Y Connected resistors, Light emitting diode.

& Y Connected resistors, Light emitting diode. & Y Connected resistors, Light emitting diode. Experiment # 02 Ojectives: To get some hndson experience with the physicl instruments. To investigte the equivlent resistors, nd Y connected resistors, nd

More information

PORCH. Canopies and Accessories DECKING SYSTEMS. For more information. STOCKISTS For details of your nearest stockist for any product:

PORCH. Canopies and Accessories DECKING SYSTEMS. For more information. STOCKISTS For details of your nearest stockist for any product: DECKING SYSTEMS For more informtion STOCKISTS For etils of your nerest stokist for ny prout: 0 01 TECHNICAL HELPLINE For further help n vie: 0 1 INTERNET rihrurige.o.uk EMAIL info@rihrurige.o.uk Whittington

More information

Artificial Neural Network Based Backup Differential Protection of Generator-Transformer Unit

Artificial Neural Network Based Backup Differential Protection of Generator-Transformer Unit Interntionl Journl of Eletronis nd Eletril Engineering Vol. 3, No. 6, Deemer 05 rtifiil Neurl Network sed kup Differentil Protetion of Genertor-Trnsformer Unit H. lg nd D. N. Vishwkrm Deprtment of Eletril

More information

GENERAL NOTES USE OF DESIGN DATA SHEETS:

GENERAL NOTES USE OF DESIGN DATA SHEETS: GENERL DT: TE FOLLOWING DT IS SSUMED: USE OF DT SEETS: ED REVIEWED INTERNL NGLE OF FRITION OF KFILL SOIL, = 30 TOTL UNIT WEIGT OF KFILL SOIL = 20 PF bf. LULTE TE REQUIRED EIGT "" PER TE "STEM EIGT" NOTE

More information

ITEC2620 Introduction to Data Structures

ITEC2620 Introduction to Data Structures /5/20 ITEC220 Introdution to Dt Strutures Leture 0 Gme Trees Two-Plyer Gmes Rules for gme define the sttespe Nodes re gme sttes Links re possile moves Build serh tree y rute fore Exmple I Exmple II A Our

More information

Balancing Your Life. Ideas that might help you

Balancing Your Life. Ideas that might help you Blning Your Life Ides tht might help you Pul Hoskin Summer 2007 Let s e honest if one lists off the responsiilities nd hoies tht eh of us hve nd ssigns weekly hourly time tht eh needs to e fulfilled, then

More information

Math Circles Finite Automata Question Sheet 3 (Solutions)

Math Circles Finite Automata Question Sheet 3 (Solutions) Mth Circles Finite Automt Question Sheet 3 (Solutions) Nickols Rollick nrollick@uwterloo.c Novemer 2, 28 Note: These solutions my give you the nswers to ll the prolems, ut they usully won t tell you how

More information

Elettra Evolution OK! OK! b. User manual

Elettra Evolution OK! OK! b. User manual Elettr Evolution User mnul Pg. 1 INSTALLING THE SOLENOID VALVE. The progrmmle solenoi vlve is fully wtertight n will funtion even if instlle permnently uner wter t epth of up to one metre (IP68 ingress

More information

CHAPTER 3 AMPLIFIER DESIGN TECHNIQUES

CHAPTER 3 AMPLIFIER DESIGN TECHNIQUES CHAPTER 3 AMPLIFIER DEIGN TECHNIQUE 3.0 Introduction olid-stte microwve mplifiers ply n importnt role in communiction where it hs different pplictions, including low noise, high gin, nd high power mplifiers.

More information

EUSIPCO

EUSIPCO EUSIPCO 213 1974139 STABLE TIME-FREQUENCY CONTOURS FOR SPARSE SIGNAL REPRESENTATION Yoonseo Lim 1, Brr Shinn-Cunninghm 2, nd Timothy J. Grdner 3 Dept. Cognitive nd Neurl Systems 1, Biomedil Eng. 2, Biology

More information

PORCH. Canopies and Accessories. For more information. STOCKISTS For details of your nearest stockist for any product:

PORCH. Canopies and Accessories. For more information. STOCKISTS For details of your nearest stockist for any product: For more informtion STOCKISTS For etils of your nerest stokist for ny prout: 0 01 TECHNICAL HELPLINE For further help n vie: 0 1 INTERNET www.rihrurige.o.uk EMAIL info@rihrurige.o.uk Whittington Ro Oswestry,

More information

LATEST CALIBRATION OF GLONASS P-CODE TIME RECEIVERS

LATEST CALIBRATION OF GLONASS P-CODE TIME RECEIVERS LATEST CALIBRATION OF GLONASS P-CODE TIME RECEIVERS A. Fos 1, J. Nwroci 2, nd W. Lewndowsi 3 1 Spce Reserch Centre of Polish Acdemy of Sciences, ul. Brtyc 18A, 00-716 Wrsw, Polnd; E-mil: fos@c.ww.pl; Tel.:

More information

Analog Input Modules

Analog Input Modules 7 922 nlog Input odules G56... nlog input modules for the ontrol of SQ5... ir dmper tutors y ontinuous nlog ontrol signls, suh s 4...20 m, nd ontinuous nlog position feedk signls. For supplementry Dt Sheets,

More information

Abdominal Wound Closure Forceps

Abdominal Wound Closure Forceps Inventor: Crlson, Mrk A. My 25, 2007 Adominl Wound Closure Foreps Astrt. The devie is modifition of stndrd tissue foreps for use during losure of dominl wounds mde for surgil proedure. The modifition onsists

More information

Seamless Integration of SER in Rewiring-Based Design Space Exploration

Seamless Integration of SER in Rewiring-Based Design Space Exploration Semless Integrtion of SER in Rewiring-Bsed Design Spe Explortion Soeeh Almukhizim* & Yiorgos Mkris Eletril Engineering Dept. Yle University New Hven, CT 62, USA Astrt Rewiring hs een used extensively for

More information

Birka B22: threaded in variation

Birka B22: threaded in variation Tblet Weving: 4-Hole Ptterns Stringcrfter The chrt, fining your wy roun the pttern, n suggestions for viking style bris for rnks in the Drchenwl Acemy of Defence You will nee: 22 crs 1 repet 88 Thres:

More information

Student Book SERIES. Fractions. Name

Student Book SERIES. Fractions. Name D Student Book Nme Series D Contents Topic Introducing frctions (pp. ) modelling frctions frctions of collection compring nd ordering frctions frction ingo pply Dte completed / / / / / / / / Topic Types

More information

VOLTAGE SAG IMPROVEMENT BY PARTICLE SWARM OPTIMIZATION OF FUZZY LOGIC RULE BASE

VOLTAGE SAG IMPROVEMENT BY PARTICLE SWARM OPTIMIZATION OF FUZZY LOGIC RULE BASE VOL., NO. 7, PRIL 206 ISSN 89-6608 RPN Journl of Engineering nd pplied Sienes 2006-206 sin Reserh Pulishing Network (RPN). ll rights reserved. VOLTGE SG IMPROVEMENT Y PRTILE SWRM OPTIMIZTION OF FUZZY LOGI

More information

The Effects of Interference Suppression by a Reconfigurable Structure at DSSS-DPSK Receiver

The Effects of Interference Suppression by a Reconfigurable Structure at DSSS-DPSK Receiver 494 N. MIOŠEVIĆ, Z. NIKOIĆ, B. DIMITRIJEVIĆ, B. NIKOIĆ, THE EFFECTS OF INTERFERENCE SUPPRESSION The Effets of Interferene Suppression y Reonfigure Struture t DSSS-DPSK Reeiver Nend MIOŠEVIĆ, Zori NIKOIĆ,

More information

A New Algorithm to Compute Alternate Paths in Reliable OSPF (ROSPF)

A New Algorithm to Compute Alternate Paths in Reliable OSPF (ROSPF) A New Algorithm to Compute Alternte Pths in Relile OSPF (ROSPF) Jin Pu *, Eric Mnning, Gholmli C. Shoj, Annd Srinivsn ** PANDA Group, Computer Science Deprtment University of Victori Victori, BC, Cnd Astrct

More information

Section 6.1 Law of Sines. Notes. Oblique Triangles - triangles that have no right angles. A c. A is acute. A is obtuse

Section 6.1 Law of Sines. Notes. Oblique Triangles - triangles that have no right angles. A c. A is acute. A is obtuse Setion 6.1 Lw of Sines Notes. Olique Tringles - tringles tht hve no right ngles h is ute h is otuse Lw of Sines - If is tringle with sides,, nd, then sin = sin = sin or sin = sin = sin The miguous se (SS)

More information

AGA56... Analog Input Modules. Siemens Building Technologies HVAC Products

AGA56... Analog Input Modules. Siemens Building Technologies HVAC Products 7 922 nlog Input odules G56... nlog input modules for the ontrol of SQ5... ir dmper tutors y ontinuous nlog ontrol signls, suh s 4...20 m, nd ontinuous nlog position feedk signls. For supplementry Dt Sheets,

More information

Design of Miniaturized 10 db Wideband Branch Line Coupler Using Dual Feed and T-Shape Transmission Lines

Design of Miniaturized 10 db Wideband Branch Line Coupler Using Dual Feed and T-Shape Transmission Lines RADIOENGINEERING, VOL. 27, NO. 1, APRIL 2018 207 Design of Miniturized 10 db Widend Brnh Line Coupler Using Dul Feed nd T-Shpe Trnsmission Lines Mukesh KUMAR, SK. Nurul ISLAM, Goind SEN, Susnt Kumr PARUI,

More information

Energy Harvesting Two-Way Channels With Decoding and Processing Costs

Energy Harvesting Two-Way Channels With Decoding and Processing Costs IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, VOL., NO., MARCH 07 3 Energy Hrvesting Two-Wy Chnnels With Decoding nd Processing Costs Ahmed Arf, Student Member, IEEE, Abdulrhmn Bknin, Student

More information

LORING THE SMARTER WAY TO ROAST PROPRIETARY ITEM:

LORING THE SMARTER WAY TO ROAST PROPRIETARY ITEM: TLE, MXIMUM WEIGHTS, L (KG) ROSTER (9) JOS TUING + (9.) GREEN EN RT + (.) EXHUST STK VENT UTO HOPPER.9.. 9.. ZONE TRIER UTO ISHRGE OOR PPROVE J HUTTON. 0....0 9. WLL TO. 0..0 0. REOMMENE LERNE.0. REOMMENE

More information

First Round Solutions Grades 4, 5, and 6

First Round Solutions Grades 4, 5, and 6 First Round Solutions Grdes 4, 5, nd 1) There re four bsic rectngles not mde up of smller ones There re three more rectngles mde up of two smller ones ech, two rectngles mde up of three smller ones ech,

More information