Generalized Cooperative Multicast in Mobile Ad Hoc Networks

Size: px
Start display at page:

Download "Generalized Cooperative Multicast in Mobile Ad Hoc Networks"

Transcription

1 Generalized Cooperative Multicast in Mobile Ad Hoc Networks Bin Yang Yulong Shen Meber IEEE Xiaohong Jiang Senior Meber IEEE and Tarik Taleb Senior Meber IEEE Abstract Cooperative ulticast serves as an efficient counication paradig for supporting ulticast-intensive applications in obile ad hoc networks MANETs. Available studies on cooperative ulticast in MANETs ainly focus on either the full cooperation or the noncooperation which fail to capture the ore general cooperation behaviors aong destination nodes. To address this issue this paper proposes a general cooperative ulticast schee CMfgpτ with replication factor f ulticast fanout g cooperative probability p and packet lifetie τ. With this schee a packet fro source node will be replicated to at ost f distinct relay nodes which forward the packet to its g destination nodes and with probability p a destination node helps to forward the packet. Here the packet has the lifetie of τ tie slots. The schee is fleible and general and it covers the full cooperation p = and the noncooperation p =0 as special cases. A Markov chain theoretical odel is further developed to depict the packet delivery process under the new schee and help us to conduct analytical study on the corresponding epected packet delivery probability and packet delivery cost. Finally etensive siulation and nuerical results are provided for discussions. Inde Ters Mobile Ad Hoc Network cooperative ulticast two-hop relay packet delivery probability/cost. I. INTRODUCTION Multicast in obile ad hoc networks MANETs is iportant for supporting any critical applications with one-toany counications [] [5] like essage echanges aong a group of soldiers in battlefield earthquake alaring video conferencing etc. Cooperative ulticast serves as an efficient counication paradig destination nodes ay share their packets with each other. In practice however a destination node ay act selfishly and refuses to forward packets to other nodes due to its liit power resource. Thus for an efficient support of future ulticast-intensive applications in MANETs [6] [9] it is critical to take into account the cooperation behaviors of destination nodes in the design of ulticast schee. Available studies on cooperative ulticast in MANETs ainly focus on either the case when all destination nodes are willing to share packets with each other full cooperation or the case when none of these nodes is willing to share packets B. Yang is with the School of Coputer and Inforation Engineering Chuzhou University China and is also with the School of Coputer Science Shaani Noral University China. E-ail: ybcup@6.co. Y. Shen is with the School of Coputer Science and Technology Xidian University China. E-ail: ylshen@ail.idian.edu.cn. X. Jiang is with the School of Systes Inforation Science Future University Hakodate Japan. E-ail: jiang@fun.ac.jp. T. Taleb is with the Departent of Counications and Networking Aalto University Helsinki Finland. Eail: talebtarik@gail.co. with others noncooperation. The noncooperative ulticast schee in two-hop relay MANETs is studied in [0] [3] [0] [] consider the siple independent and identically distributed i.i.d. obility odel and [3] considers ore general speed-restricted obility odels. Later the full cooperative ulticast schee is eplored in two-hop relay MANETs under i.i.d. obility odel [4] [5]. Recently the perforance of full cooperative and nocooperative ulticast schees is also eained in cognitive radio MANETs [6] which allow unlicensed nodes to eploit the spectru allocated to licensed nodes in an opportunistic anner. It is notable that the above studies only represent the two etree cases of cooperative ulticast and could not depict the general cooperative behaviors aong destination nodes. Moreover these studies assue that all packets fro source node can be successfully delivered to destination nodes and only investigate the packet delivery perforance in ters of capacity and delay. In a real MANET however destination nodes ay ehibit ore general cooperative behaviors and the packet loss ay happy e.g. due to lifetie constraint. Also the theoretical odels in these studies could not be applied in a straightforward way for the perforance analysis of MANETs with the considerations of general node cooperative behaviors and packet loss issue. To address the above liitations this paper proposes a new and general cooperative ulticast schee and develops corresponding Markov chain theoretical odel for perforance analysis. The ain contributions of this paper are suarized as follows. First we propose a general cooperative ulticast schee CMfgpτ for two-hop relay MANETs source node can deliver a packet to at ost f distinct relay nodes which forward the packet to its g destination nodes and with probability p a destination node also helps to forward the packet before its lifetie τ epires. The schee is fleible and general in the sense that we can control transission behaviors by paraeter p and it covers the available full cooperation schee [4] [5] p = and noncooperation schee [0] [3] p =0as special cases. We then develop a two-diensional Markov chain theoretical odel to capture the cople packet delivery process under CMfgpτ. With the help of the theoretical odel we derive the analytical epressions for the epected packet delivery probability and delivery cost. Finally etensive siulation and theoretical results are provided to validate the theoretical analysis results and c 07 IEEE. Personal use is peritted but republication/redistribution requires IEEE perission. See for ore inforation.

2 Fig.. a Network odel. + Δ Network odel and transission scheduling. α α b Illustration of transission-group based scheduling with =5and α =5 to illustrate the network perforance under the new ulticast schee. The rest of this paper is organized as follows. Section II introduces the syste odels and the definitions of perforance etrics. In Section III we first propose a general cooperative ulticast schee and then develop a two-diensional Markov chain theoretical odel to depict packet delivery process under such a schee. In Section IV analytical epressions are derived for the epected packet delivery probability/cost. Section V provides nuerical results to validate the theoretical results and to illustrate our theoretical findings. Finally we conclude this paper in Section VI. II. SYSTEM MODELS AND PERFORMANCE METRICS In this section we first introduce syste odels and then define soe perforance etrics involved in this study. A. Syste Models Network and Mobility Models: We consider a tie-slotted MANET with n obile nodes in a unit square of torus boundaries i.e. a node oving across an edge will iediately appears at the opposite edge of the square. Siilar to previous studies [7] [] the network area is evenly divided into cells squares as shown in Fig a. The nodes in the network ove according to independent and identically distributed i.i.d. obility odel [7] [] [3]. Under such obility odel at the beginning of each tie slot each node independently and randoly selects a cell to ove into and stays in it during the tie slot. Counication Model: All the nodes share a coon half-duple ediu for data transissions and we adopt the widely used protocol odel proposed in [4] to address interference aong siultaneous transissions. Suppose that at tie slot t node i transitter is transitting to node j receiver of its transission range. To ensure the successful transission fro i to j for any other siultaneously transitting node k the following condition should be satisfied: d kj t +Δd ij t d ij t denotes the Euclidean distance between i and j at tie slot t and Δ 0 odels a guard zone to prevent the transission failure due to interference fro other siultaneous transissions. We consider a local transission scenario [5] [6] the transission range of each node e.g. node S 0 shown in Fig a covers the sae cell of the node and its eight neighbor cells. In a tie slot the data that can be successfully transitted is noralized as one packet. Traffic Model: We consider a ulticast traffic odel [] [7] there are n ulticast groups in the network each of which consists of g + nodes including one source node and g destination nodes. Each node is the source node in one ulticast group and also a destination node in another ulticast group. In a ulticast group each node can serve as a relay node to forward packets originated fro other n ulticast groups and each destination node also helps to forward packets originated fro the ulticast group. Transission Scheduling Model: To ensure as any as possible successful siultaneous transissions we adopt the transission-group based scheduling odel here [7] [] [5] [6] [8]. Under the scheduling odel the network cells are divided into α different transission-groups and the distance between any two cells in each transissiongroup is soe integer ultiple of α cells along the vertical and horizontal directions respectively. For eaple there are 5 transission-groups in Fig. b all shaded cells witnde belong to the sae transission-group. In every α tie slots each transission-group will becoe active alternately such that all nodes in each cell naely active cell of an active transission-group are allowed to contend for a transission opportunity over the coon half-duple ediu. Only one node if any in each active cell is randoly selected to perfor a transission. To ensure all siultaneous transissions to be successful in an active transission-group the paraeter α is deterined as following. Suppose that at current tie slot a transitter S is transitting to a receiver R within its transission range as shown in Fig. b. Since the transission range of each node covers its own cell and its eight neighbor cells with side length of / the aiu distance r between S and R is 8/. Meanwhile the distance between R and another possible closest siultaneous transitter S is α /. To guarantee the successful transission between S and R the following condition should be satisfied according to the protocol odel [4]: α / + Δ 8/. Since the value of integer α is no ore than wehave α = in{ +Δ 8+ } 3 is the ceiling function of. B. Perforance Metrics Packet Delivery Probability: For a ulticast group and packet lifetie τ the delivery probability of a packet in the ulticast group is defined as the ratio of the nuber of destination nodes that have received the packet before the τ epires to the total nuber of destination nodes in the ulticast group c 07 IEEE. Personal use is peritted but republication/redistribution requires IEEE perission. See for ore inforation.

3 3 Packet Delivery Cost: The delivery cost of a packet is defined as the total transission power consued until either the packet lifetie τ epires or all its destination nodes in a ulticast group have received the packet. III. COOPERATIVE MULTICAST SCHEME AND THEORETICAL MODEL In this section we first propose a general cooperative ulticast schee adopting two-hop relay as routing protocol then develop a Markov chain theoretical odel to depict packet delivery process under such a schee and derive soe related basic probabilities. A. Cooperative Multicast Schee Algorith Cooperative Multicast Schee CMfgpτ:. For a transitter T and its desired receiver R in current tie slot.. if both T and R are in the sae ulticast group and T is a source node in the ulticast group then 3. T perfors a source-to-destination transission with R; 4. end if 5. if both T and R are in the sae ulticast group and T is not a source node in the ulticast group then 6. With cooperative probability p T perfors a destination-to-destination transission with R; 7. end if 8. if T and R are in different ulticast groups then 9. T flips a fair coin; 0. if it is head then. T perfors a source-to-relay transission with R;. else 3. T perfors a relay-to-destination transission with R; 4. end if 5. end if The proposed general cooperative ulticast schee is suarized in Algorith. To support these transissions in Algorith we assue that each node has n + individual queues in its buffer: one source-queue used to store locally generated packets waiting for their copies to be delivered one already-delivered-queue used to store these packets whose f copies have already been delivered out but their reception statuses are not confired yet n relay-queues used to store packets originated fro other ulticast groups one queue per ulticast group and one cooperative-queue used to store packets that will be forwarded to their destination nodes with cooperative probability p. The four types of transissions in Algorith are defined as follows. Source-to-destination transission: T delivers to R a packet that R is requesting the packet is chosen as follows: T first checks its source-queue starting fro its head-of-line packet to find the packet; if it fails then it retrieves the packet fro its already-delivered-queue. Destination-to-destination transission: If there eists a packet that R is requesting in the cooperative-queue of T then T delivers a copy of the packet to R; otherwise T reains idle. Source-to-relay transission: If R does not carry a copy of the head-of-line packet fro T s source-queue then T delivers a copy of the packet to R; otherwise T reains idle. If f copies of the packet have been delivered to different relay nodes then T puts the packet to the end of the alreadydelivered-queue and then reoves it fro the source-queue. Relay-to-destination transission: If there eists a packet that R is requesting in the relay-queue intended for R then T delivers a copy of the packet to R; otherwise T reains idle. Reark : The two-hop relay since first proposed by Grossglauser and Tse in [9] has been etensively eplored in literature and proved to be a siple and efficient routing protocol for MANETs the network topology varies draatically and no conteporaneous end-to-end path ay ever eist at any given tie instant. Furtherore under such a routing protocol the network perforance can be analytically studied in the challenging MANETs. This paper eplores a general cooperative ulticast schee adopting two-hop relay as routing protocol and analytically studies packet delivery probability/cost perforance in the MANETs. B. Markov Chain Theoretical Model Without loss of generality we focus on a tagged ulticast group with a source node S and g destination nodes D D D g. For a given packet at the source node S we use two-tuple i j to denote a general state that i relay nodes are carrying a copy of the packet and j destination nodes have received the packet 0 i f and 0 j g. If j < g then the general state corresponds to a transient state; otherwise it is an absorbing state. Fro the operation of the general cooperative ulticast schee we know that if the tagged ulticast group is currently in transient state i j then only one of twelve transition scenarios shown in Fig. ay happen in the net tie slot: SD scenario: source-to-destination transission only i.e. S successfully delivers the packet to a destination node that has not received the packet while none of relay and destination nodes delivers the packet to other destination nodes. Under this transition scenario the state i j ay transit to i j +. SR scenario: source-to-relay transission only i.e. S successfully delivers a copy of the packet to a relay node that does not carry the packet while none of relay and destination nodes delivers the packet to other destination nodes. The state i j ay transit to i +j under the SR transition scenario. DD k scenario: k siultaneous destination-todestination transissions only i.e. k destination-todestination transissions happen siultaneously each transission indicates that a destination node successfully delivers the packet to another one that has not received the packet while other transition scenarios c 07 IEEE. Personal use is peritted but republication/redistribution requires IEEE perission. See for ore inforation.

4 Fig The transition diagra of a general transient state i j do not happen. Under such a transition scenario the state i j ay transit to i j + k. RD k scenario: k siultaneous relay-to-destination transissions only i.e. k relay-to-destination transissions happen siultaneously each transission indicates that a relay node successfully delivers the packet to a destination node that has not received the packet while other transition scenarios such as SD SR and DD k do not happen. Under the RD k scenario the state i j ay transit to i j + k k i and j + k g. SD +RD k scenario: one source-to-destination and k relay-to-destination transissions only i.e. these k + transissions happen siultaneously while the SR and DD k scenarios do not happen. Under such a scenario the state i j ay transit to i j + k + k i and j + k + g. SR+RD k scenario: one source-to-relay and k relay-todestination transissions only i.e. these k + transissions happen siultaneously while the SD and DD k scenarios do not happen. Under this scenario the state i j ay transit to i +j+ k k i and j + k g. SD +DD k scenario: one source-to-destination and k destination-to-destination transissions only i.e. these k + transissions happen siultaneously while the SR and RD scenarios do not happen. The state i j ay transit to i j + k +under the scenario k j and j + k + g. SR + DD k scenario: one source-to-relay and k destination-to-destination transissions only i.e. these k + transissions happen siultaneously while the SD and RD scenarios do not happen. Under such a scenario the state i j ay transit to i +j + k k j and j + k g. RD k + DD k scenario: k relay-to-destination and k destination-to-destination transissions only i.e. these k +k transissions happen siultaneously while the SD and SR scenarios do not happen. Under this scenario the target state is i j + k + k k i k j and j + k + k g. SR +RD k +DD k scenario: one source-to-relay k relay-to-destination and k destination-to-destination transissions only i.e. these k + k + transissions happen siultaneously while the SD scenario does not happen. Under this scenario the state i j ay transit to i +j + k + k k i k j and j + k + k g. SD + RD k + DD k scenario: one source-todestination k relay-to-destination and k destination-todestination transissions only i.e. these k +k + transissions happen siultaneously while the SR scenario does not happen. Under this scenario the target state is i j + k + k + k i k j and j + k + k + g. Self-loop scenario: transition fro i j to i j i.e. the packet is not delivered fro a node to another. Based on the transition diagra in Fig. the packet delivery process under the general cooperative ulticast schee is odeled as a discrete-tie two-diensional absorbing Markov chain shown in Fig. 3. C. Basic Results We present soe basic results related to the general cooperative ulticast schee and the Markov chain theoretical odel which will help us to analyze packet delivery probability/cost perforance in section IV. Lea : For a tagged ulticast group we use p and p to denote the probability that S perfors a source-todestination transission and the probability that S perfors a source-to-relay transission respectively. Then we have g p = k g k g α k n g ϕi k= i=0 g k g k g k + i k 9 n g ϕi k= i=0 4 i + g p = α 9 n g i n g i i= n g i n g i + + n g 8 i i= n g i 9 i 5 ϕi = n g i i n g i c 07 IEEE. Personal use is peritted but republication/redistribution requires IEEE perission. See for ore inforation.

5 5 = = = = = = = = = Fig. 3. Absorbing Markov chain for the packet delivery process under the general cooperative ulticast schee. For each transient state the following transition scenarios are not shown for siplicity: SD+RD k SR+RD k SD+DD k SR+DD k RD k +DD k SR+RD k +DD k SD+RD k +DD k and Self-loop. For the tagged ulticast group with source node S and g destination nodes and a given packet at S suppose that i j is the transient state of the Markov chain in Fig. 3 in current tie slot 0 i f 0 j g. Under the transient state we use μ μ and μ 3 to denote the nuber of destination nodes that have not received the given packet the nuber of relay nodes carrying a copy of the packet and the nuber of relay nodes carrying no copy of the packet respectively which can be easily deterined as μ = g j 6 μ = i 7 μ 3 = n g i. 8 Then we establish the following Leas. Lea : We use P SD μ and P SR μ 3 to denote the probability that in the net tie slot S successfully delivers a copy of the packet to a destination node i.e. a successful source-to-destination transission and the probability that S successfully delivers a copy of the packet to a relay node i.e. a successful source-to-relay transission respectively. Then we have P SD μ = μ g p 9 μ 3 P SR μ 3 = n g p. 0 Lea 3: We use P RD μ μ to denote the probability that successful relay-to-destination transissions will happen siultaneously in the net tie slot. Here each transission indicates that a relay node successfully delivers a copy of the packet to a destination node of the tagged ulticast group and in{μ μ }.Thenwehave μ μ P RD μ μ = g λ λ λ i λ λ i = α i α α i α l i l i li w i wi h ψki i = if i li w i wi h ψki i 9 z = if i = c 07 IEEE. Personal use is peritted but republication/redistribution requires IEEE perission. See for ore inforation.

6 6 In Lea 3 l i w i z and ψ are defined in the following forulas. i l i = n g k j 3 w i = g j= i h j 4 j= z = n ψ = k=0 ki k k j + h j 5 j= hi h=0 hi h k+h 8 ki+hi k h 6 k + h + + k 0 =0and h 0 =0. Lea 4: We use P DD μ to denote the probability that successful destination-to-destination transissions will happen siultaneously in the net tie slot in{μ g } and g is the floor function of g.thenwe have μ g μ P DD μ = p α i α l i+g+ g li+g+ γ γ γ i γ 7 w i = wi ψki if i γ i = p α l i+g+ i li+g+ w i wi α h ψki i = 9 z if i =. 8 The basic idea of the proof of Lea 3 is suarized as follows. For relay nodes carrying a copy of the packet originated fro the tagged ulticast group we first show how the probability P RD μ μ is related to the probability that these relay nodes perfor relay-to-destination transissions siultaneously. Then the probability is derived as the product of the probabilities that one of these relay nodes perfors a relay-to-destination transission whics deterined based on the probabilities of its sub-events. Finally by suarizing these results P RD μ μ can be derived. The derivations of Lea 4 is siilar to that of Lea 3.The detailed proofs of these Leas can be found in Appendi. In Appendi we also give soe other basic results the proofs of which are siilar to those of Leas 3 and 4. IV. PACKET DELIVERY PROBABILITY/COST MODELING Based on the Markov chain theoretical odel and related basic results this section derives analytical epressions for the epected packet delivery probability/cost. A. Epected Packet Delivery Probability We use β to denote the total nuber of transient states in the Markov chain shown in Fig. 3. Since all β transient states are evenly divided into g rows and each row has f + transient states in the Markov chain we have β = gf +. We nuber these β transient states and f + absorbing states sequentially as β+ f + in a left-to-right and top-to-down way. For a given packet originated fro a tagged ulticast group we use N d to denote the packet delivery probability i.e. the ratio of the nuber of destination nodes that have received the packet before the lifetie τ epires to the total nuber of destination nodes g and then the epected value E{N d } of N d can be deterined as E{N d } = g f+ Mk l d 9 g k=0 l= the lth state of the kth row corresponds to the state witnde d d β + f + in the Markov chain shown in Fig. 3 Mk l denotes the nuber of destination nodes that have received the packet in state d d denotes the probability that the Markov chain starting fro the initial state reaches state d after τ tie slots and d is given by d =f +k + l. 0 To derive E{N d }wefirstdeterinemk l. Since each state of the kth row in the Markov chain indicates that k destination nodes have received the packet we have Mk l =k. We then deterine d.letp =p ij β+f+ β+f+ be the transition atri of the Markov chain. The entry p ij of the atri P denotes the transition probability that the Markov chain starting fro state i will be in state j after tie slot. The P can be rewritten as [ ] Q R P = O I the atri Q =q ij β β defines the transition probabilities aong β transient states the atri R =r ij β f+ defines the transition probabilities fro β transient states to f +absorbing states O is a f +-by-β zero atri and I is a f +-by-f +identity atri. After τ tie slots the τ-step transition atri P τ of P can be calculated as [ P τ Q τ NI Q τ ] R = 3 O I N =I Q is the fundaental atri of the Markov chain and I is a β-by-β identity atri. We define atri W =w ij β β as W = Q τ and define B =b it β f+ as B = N I Q τ R. Sincew ij denotes the probability that the Markov chain reaches transient state j fro starting transient state i after τ tie slots and b it denotes the probability that the Markov chain reaches absorbing state t fro starting transient state i after τ tie slots d is deterined as d = { w d if d β b d if β + d β + f c 07 IEEE. Personal use is peritted but republication/redistribution requires IEEE perission. See for ore inforation.

7 7 B. Epected Packet Delivery Cost For a given packet originated fro a tagged ulticast group we use C p to denote the packet delivery cost i.e. the total transission power consued until either the lifetie τ epires or all g destination nodes in the tagged ulticast group have received the packet and then the epected value E{C p } of C p can be deterined as E{C p } = g f+ Ck l d 5 k=0 l= Ck l denotes the transission power consued in the lth state of the kth row in Fig. 3. Consider one unit transission power is consued when a node delivers a packet to another node. Since the lth state of the kth row in the Markov chain indicates that the packet has been delivered to l relay nodes and k destination nodes Ck l is deterined as Ck l =k + l. 6 The unknown atrices Q and R can be easily obtained according to the transition probabilities fro a state of the Markov chain to another in Fig. 3. The transition probability under each transient scenario in Fig. can be deterined as follows: for SD scenario P SD μ P SDRD μ μ P SDDD μ +P SDRDDD μ μ for SR scenario P SR μ 3 P SRRD μ μ μ 3 P SRDD μ μ 3 +P SRRDDD μ μ for DD k scenario P DD k μ P SDDD k μ P SRDD k μ μ 3 P RDDD kμ μ for RD k scenario P RD k μ μ P SDRD k μ μ P SRRD k μ μ μ 3 P RDDD k μ μ for SD + RD k scenario P SDRD k μ μ P SDRDDD k μ μ for SR +RD k scenario P SRRD k μ μ μ 3 P SRRDDD k μ μ for SD + DD k scenario P SDDD k μ P SDRDDD kμ μ for SR + DD k scenario P SRDD k μ μ 3 P SRRDDD kμ μ for RD k +DD k scenario P RDDD k k μ μ P SDRDDD k k μ μ P SRRDDD k k μ μ for SR + RD k + DD k scenario P SRRDDD k k μ μ for SD + RD k + DD k scenario P SDRDDD k k μ μ and for self-loop scenario the su of all the above transition probabilities. V. NUMERICAL RESULTS In this section we first provide siulation studies to validate our theoretical odels on packet delivery probability/cost and then apply these odels to eplore how syste paraeters would affect the packet delivery probability/cost in a MANET. a E{N d } vs. g b E{C p} vs. g Fig. 4. Coparisons between theoretical results and the siulation ones for odel validation. A. Model Validation A C++ siulator was developed to siulate the packet delivery process under the general cooperative ulticast schee in the considered MANET. We set the guard factor as Δ= and hence the paraeter α in transission scheduling odel is deterined as α = in{8}. Besides the i.i.d. obility odel considered in this paper we also ipleent the following two obility odels: Rando Walk Model [30]: At the beginning of every tie slot each node will independently and randoly select one cell aong its current cell and its eight neighbor cells with probability /9 and then oves into the selected cell and stays in it for the reaining tie slot. Rando Waypoint Model [3]: At the beginning of every tie slot each node will independently and randoly generate a -tuple y the and y are uniforly selected fro [/ 3/] and then oves a distance c 07 IEEE. Personal use is peritted but republication/redistribution requires IEEE perission. See for ore inforation.

8 8 of and y along the horizontal and vertical directions respectively. Etensive siulations have been conducted to validate our theoretical odels. For the setting of n = 00 =6p = 0.5f =4andτ = 000 the corresponding theoretical and siulation results are suarized in Fig. 4 to show how the epected packet delivery probability/cost vary as g increases. Each siulated value is calculated as the average value over 0 6 slots. Fig. 4 shows clearly that under i.i.d. obility odel our theoretical results agree well with the siulation ones indicating that our theoretical odels can accurately predict the packet delivery probability/cost perforance under the general cooperative ulticast schee. Another interesting observation fro Fig. 4 is that the siulation results under the rando walk and rando waypoint odels are siilar to those under i.i.d. obility odels. Thus our theoretical odels although are developed under the i.i.d. obility odel can be used to predict the packet delivery probability/cost behavior under the rando walk and rando waypoint odels as well. Reark : In this paper these network functions like i.i.d. node obility transission-group based scheduling schee and packet delivery process of our cooperative ulticast schee can be easily ipleented by a custoized C++ siulator now publicly available at [3] without going through a coplicated network siulator like NS3 and OPNET. As shown in [3] [33] for a cell-partitioned network the average delay and network throughput capacity under the i.i.d. obility odel are also identical to those under other non-i.i.d. obility odels as long as they have the sae steady-state distribution of nodes locations like the rando walk and rando waypoint obility odels. Therefore our theoretical odels although were developed for the packet delivery probability under the i.i.d. obility odel can also be used to predict the packet delivery probability/cost perforance in MANETs under the rando walk and rando waypoint obility odels. a E{N d } vs. p b E{C p} vs. p B. Perforance Analysis To eplore the ipact of syste paraeters on the packet delivery perforance we suarize in Fig. 5 how the epected packet delivery probability/cost E{N d }E{C p }vary with p under a setting of n = 00 =6 f =4 τ = 3000 and g = {9 9 39}. Fig. 5 shows that for a fied setting of g asp increases both the E{N d } and E{C p } increase onotonously. This is because an increase of p iplies that ore destination nodes will willing to forward packets for each other leading to the increase of packet delivery probability at the cost of power consuption on the destination nodes. The results in Fig. 5 indicate that in practice the setting of cooperative probability p should be carefully selected in order to aintain a high delivery probability perforance and a relatively low delivery cost. Fig. 5a also illustrates that as g increases the E{N d } decreases if p is relatively sall; otherwise it increases. This is because an increase of g leads to both positive and negative effects on E{N d }: On one hand it increases the probability with which each destination node receives a packet due to destination cooperation; on the other hand it decreases Fig. 5. Perforance E{N d }E{C p} versusp. the probability since destination nodes are less interested in forwarding packet for each other. As shown in Fig. 5a when p is relatively sall the latter negative effect doinates; as p further increases the forer positive effect is becoing the doinating one. We now proceed to eplore how the replication paraeter f affects the perforance E{N d } E{C p }. For a setting of n = 00 = 6 g = 9 p = 0.5 τ = 3000 and n = { } we suarize in Fig. 6 how E{N d } and E{C p } vary with f. Fig.6showsthatasf increases both the E{N d } and E{C p } onotonously increases. This is ainly due to that an increase of f will increase transission opportunities fro source node to relay nodes and thus increases the packet delivery cost and the opportunities that the destination nodes receive the packet fro the relay nodes resulting in a higher packet delivery probability. Finally we eaine in Fig. 7 how the E{N d } and E{C p } vary with the nuber of nodes n. For a setting of =6 g = 7 p =0.5 f =5and τ = { } Fig.7shows c 07 IEEE. Personal use is peritted but republication/redistribution requires IEEE perission. See for ore inforation.

9 9 a E{N d } vs. f a E{N d } vs. n b E{C f } vs. f b E{C f } vs. n Fig. 6. Perforance E{N d }E{C p} versusf. Fig. 7. Perforance E{N d }E{C p} versusn. that for a fied setting of packet lifetie τ asn increases both the E{N d } and E{C p } first increase and then decrease. Actually an increase in the nuber of nodes n has two-fold effects the perforance E{N d }E{C p }. On one hand when the networs sparse i.e. n is very sall a bigger n will lead to a higher packet delivery speed at which a packet is distributed out and thus higher packet delivery probability and delivery cost. On the other hand a bigger n will lead to a lower packet delivery speed due to the effects of wireless interference and ediu access contention issues in a crowed network and thus lower packet delivery probability and delivery cost. C. Perforance Coparison In this subsection we copare the packet delivery probability/cost perforance of state-of-the-art schees and that of the general cooperative ulticast schee proposed in this paper. Specifically we choose two well-known schees for coparison naely two-hop relay [4] with full cooperation schee A for short and two-hop relay [3] with noncooperation schee B for short fro Section I. The corresponding results are suarized in Fig. 5. Fig. 5 illustrates the perforance coparison between our schee and schee A i.e. the special case of our schee by setting p =. As shown in Fig. 5 that for the schee A all destination nodes are willing to forward packet for each other and thus take full advantage of each transission opportunity to increase the packet delivery probabilitye{n d } while incurring high delivery cost i.e. total transission power consued E{C p }. For eaple with the setting of g=39 and p =E{N d } resp. E{C p } under schee A is 0.98 resp while that is 0.87 resp by adopting our schee with the setting of p =0.5. Fig. 5 also illustrates the perforance coparison between our schee and schee B i.e. the special case of our schee by setting p = 0. We can see fro Fig. 5 that with the setting of g=39 and p =0E{N d } resp. E{C p } under schee B is 0.48 resp..7. This is because for the c 07 IEEE. Personal use is peritted but republication/redistribution requires IEEE perission. See for ore inforation.

10 0 schee B destination nodes ay waste a lot of transission opportunities because all of the are not willing to forward packet for each other resulting in the decreasing of packet delivery probability while conserving their own transission power consued. VI. CONCLUSION This paper proposed a general cooperative ulticast schee to fully consider the iportant issue of destination nodes cooperative behaviors. A Markov chain theoretical odel was developed to depict packet delivery process under the general schee based on which and soe related basic probabilities analytical epressions were derived for the packet delivery probability/cost. Etensive siulations illustrate that our theoretical odels can accurately predict the packet delivery probability/cost perforance under the general schee. Our results indicate that through a proper setting of cooperative probability p a high packet delivery probability can be achieved while aintaining a relatively low delivery cost. It is epected that the general schee can facilitate future MANETs to support various applications with different cooperative desires aong destination nodes. One interesting direction is to further etend the developed theoretical odel to analyze packet delivery probability/cost perforance in ulti-hop relay MANETs. APPENDIX Proof of Lea : Source node S can perfor a sourceto-destination transission if and only if the following four events happen in the sae tie slot: S ovesintoanactive cell; There eists at least one destination node of S in the active cell and its eight neighbor cells; 3 There are i other nodes in the active cell ecept S and corresponding g destination nodes 0 i n g ;4S is randoly chosen as a transitter. Regarding the second event suppose that there are k destination nodes of S in the active cell or no destination node is in the active cell but there eist k destination nodes in the eight neighbor cells of this cell k. Notice that these two cases are utually eclusive. Then the probability that S is chosen as a transitter is k+i+ resp. i+ under the forer case resp. under the latter case. We use q and q to denote the product of probabilities of these four events under the forer case and that under the latter case respectively. Then we have q = = α k= q = g k g k α g 8 = k 9 n g ϕi i + k= i=0 8 ϕi = n g i i n g i. The forula 4 can then be derived by adding q and q together. Siilarly S can perfor a source-to-relay transission if and only if the following four events happen in the sae tie slot: S oves into an active cell; No destination node of S is in this cell and its eight neighbor cells; 3 There eists at least one other node in this cell and its eight neighbor cells ecept S; 4S is randoly chosen as a transitter. Regarding the third event suppose that there are i other nodes in the active cell or no other node is in this cell but there eist i other nodes in the eight neighbor cells of this cell i n g. Notice that these two cases are utually eclusive. Then the probability that S is randoly chosen as a transitter is i+ resp. under the forer case resp. under the latter case. By suing up the product of probabilities of these four events under the forer case and that under the latter case the forula 5 can then be derived. Proof of Lea : In the net tie slot source node S ay deliver a copy of the packet to one of the μ destination nodes that do not receive the packet whics called an event. Notice that there are μ utually eclusive events. The probability of such an event is p g. By suing up the probabilities of these μ events we have P SD μ = μ g p. 9 Siilarly in the net tie slot S ay deliver a copy of the packet to one of μ 3 relay nodes that do not carry a copy of the packet. Notice that these μ 3 events are utually eclusive and each event denotes a transission fro S to a single p relay node. The probability of such an event is n g.by suing up the probabilities of these μ 3 events we have μ 3 P SR μ 3 = n g p. 30 Proof of Lea 3: To derive P RD μ μ we focus on specific relay nodes carrying a copy of the packet and use P Tr Tr Tr to denote the probability that these relay nodes will perfor relay-to-destination transissions siultaneously a counity-transission for short in the net tie slot Tr i denotes a relay-to-destination transission and i. Each transitting relay node in a successful counitytransission can deliver a copy of the packet to a destination node and μ destination nodes have not received the packet in the current tie slot. Thus the probability that a successful counity-transission happens is g k g k g k n g μ ϕi k + i + P Tr Tr g Tr. Since μ relay nodes is carrying the packet currently there are μ i=0 distinct counitytransissions. By suing up the probabilities of these μ 7 counity-transissions we have P RD μ μ = μ μ g P Tr Tr Tr. 3 The basic idea to deterine P Tr Tr Tr is that we first treat the event Tr Tr Tr as siultaneous but utually independent relay-to-destination transissions then deterine the probability that each transission happens c 07 IEEE. Personal use is peritted but republication/redistribution requires IEEE perission. See for ore inforation.

11 and finally ultiply the probabilities of all transissions. First consider a general transission Tr i perfored by a specific relay node e.g. R i i. This transission will happen if and only if the following five events happen in the sae tie slot: R i oves into an active cell; There are in total other nodes in the sae cell as R i and the eight neighbor cells of the cell ecept source node S its g destination nodes specific relay nodes g destination nodes of R i s local traffic and i j= k j other nodes in the sae cells as these i specific relay nodes and their neighbor cells 0 n g i k j aong the k nodes are j= in the sae cell as R i and the other k nodes are in the eight neighbor cells of the cell; 3 There are destination nodes of S in the cell and the eight neighbor cells of the cell aong the h destination nodes are in the cell and the other h destination nodes are in the eight neighbor cells g i h j ; 4 R i and one destination node j= are chosen as a transitter and a receiver respectively; 5 R i chooses to perfor relay-to-destination transission Tr i with the receiver. The probabilities that the above events happen are calculated as α i l i α li ki k k k=0 8 ki k w i wi hi h h 8 hi h h i k+h+ + = h=0 and respectively. Here l i = n g w i = g i j= i j= k j and h j. By ultiplying the probabilities of these events the probability of the transission Tr i is derived i. Siilarly we can also get the probability of the transission Tr. P Tr Tr Tr follows by ultiplying the probabilities of these transissions. Then is derived by substituting P Tr Tr Tr into 3. Proof of Lea 4: To derive P DD μ we focus on specific destination nodes each of which has received the packet. We use Tr i to denote a destination-to-destination transission and use P Td Td Td to denote the probability that these destination nodes will perfor such transissions siultaneously a counity-transission for short in the net tie slot i. In a successful counity-transission each transitting destination node can deliver a copy of the packet to other destination node. Thus the probability that a successful counity-transission happens can be deterined as μ g P Td Td Td.Sinceg μ destination nodes have received the packet in the current tie slot there are in total g μ distinct counity-transissions. By suing up the probabilities of these g μ counity-transissions we have μ g μ P DD μ = g P Td Td Td. 3 The basic idea to deterine P Td Td Td is that we first treat the event Td Td Td as siultaneous yet utually independent destination-to-destination transissions then deterine the probability that each transission happens and finally ultiply the probabilities of all transissions. First consider a general transission Td i perfored by a specific destination node e.g. D i i. This transission will happen if and only if the following five events happen in the sae tie slot: D i oves into an active cell; There are in total other nodes in the sae cell as D i and the eight neighbor cells ecept the g destination nodes of the tagged ulticast group and i k j j= other nodes in the sae cells as these i specific destination nodes and their neighbor cells0 n g i j= k j aong the k nodes are in the sae cell as D i and the other k nodes are in the eight neighbor cells of the cell; 3 There are other destination nodes in the cell and the eight neighbor cells of the cell ecept the specific destination nodes aong the h destination nodes are in the cell and the other h destination nodes are in the eight neighbor cells g = i j= h j ;4D i and one destination node are chosen as a transitter and a receiver respectively; 5 D i chooses to perfor destination-to-destination transission Td i with the receiver. The probabilities that the above events happen are calculated as α i l i α li ki k k k=0 8 ki k w i wi hi h h 8 hi h h i k+h+ + h=0 and p respectively. Here l i = n g g i j= i j= k j and w i = h j. By ultiplying the probabilities of these events the probability of the transission Td i is deterined i. Siilarly we can also get the probability of the transission Td. By ultiplying the probabilities of these transissions P Td Td Td follows. Then 7 follows by substituting P Td Td Td into 3. Other Basic Results: We use P SDRD μ μ to denote the probability that a successful source-to-destination transission and successful relay-to-destination transissions will happen siultaneously in the net tie slot in{μ μ }.Thenwehave P SDRD μ μ = μ μ + g + ρ ρ ρ i ρ c 07 IEEE. Personal use is peritted but republication/redistribution requires IEEE perission. See for ore inforation.

12 ρ i = α i α α i α ki+hi l i l i+g li w i wi h ψki i = li+g w i = if i wi h ψki i 9+ z ki hi if i = We use P SRRD μ μ μ 3 to denote the probability that a successful source-to-relay transission and successful relay-to-destination transissions will happen siultaneously in the net tie slot in{μ μ }.Thenwe have P SRRD μ μ μ 3 = μ μ μ3 g θ θ θ i θ + 35 p α l i+g+ i li+g+ w i wi α = ψ if i ε i = l i+g+ w i α i α ψ ki+hi li+g+ = wi 9+ z ki hi if i = We use P RDDD μ μ to denote the probability that successful relay-to-destination transissions and successful destination-to-destination transissions will happen siultaneously in the net tie slot in{μ μ } and in{μ g }. Thenwe have θ i = α i α α i α l i l i+g li w i wi h ψki i = if i li+g ki k k=0 k i+ r r=0 k+r 8 ki+ k r k+r+ 9+ z ki if i = We use P SRDD μ μ 3 to denote the probability that a successful source-to-relay transission and successful destination-to-destination transissions will happen siultaneously in the net tie slot in{μ g }. Then we have μ g μ μ3 P SRDD μ μ 3 = g δ δ δ i δ + 37 p α i α l i+g+ ψ if i l δ i = i+g+ r α i α k+r 8 ki+ k r k+r+ k i+ 9+ z ki if i = We use P SDDD μ to denote the probability that a successful source-to-destination transission and successful destination-to-destination transissions will happen siultaneously in the net tie slot in{μ g }. Then we have μ g μ P SDDD μ = ε ε ε i ε + 39 li+g+ li+g+ g w i = k=0 ki k wi r=0 P RDDD μ μ = ε i = α i α p α i α p α i α l i ψ 9+ μ g μ μ + g + 4 ϑ ϑ ϑ i ϑ ϑ + 4 li w i l i +g l i +g = wi ψki if i li +g w i = li +g w i = + n j= wi ψki if <i + wi h ψki i if i = +. + h j j= k j 43 We use P SRRDDD μ μ μ 3 to denote the probability that a source-to-relay transission successful relayto-destination transissions and successful destination-todestination transissions will happen siultaneously in the net tie slot in{μ μ } and in{μ g }. Thenwehave μ g μ μ3 μ P SRRDDD μ μ = g + ζ ζ ζ i ζ + ζ c 07 IEEE. Personal use is peritted but republication/redistribution requires IEEE perission. See for ore inforation.

13 3 ζ i = α i α p α i α α i α l i l i +g li w i = if i li +g w i wi ψki = if <i + r wi ψki l i +g li +g ki k=0 k r=0 k+r n + h j k j j= j= k+r 8 ki+ k r 9++ if i = We use P SDRDDD μ μ to denote the probability that a source-to-destination transission successful relay-to-destination transissions and successful destination-to-destination transissions will happen siultaneously in the net tie slot in{μ μ } and in{μ g }. Thenwehave μ μ g μ P SDRDDD μ μ = α i α l i + + g + + ϱ ϱ ϱ i ϱ + ϱ li w i = wi ψki if i l p α i +g i li +g w i wi α k ϱ i = i=0 = ψ if <i + l α i +g i li +g w i wi α = ψ ki+hi 9++ z + + if i = + +. REFERENCES 47 [] S. Shakkottai X. Liu and R. Srikant The ulticast capacity of large ultihop wireless networks IEEE/ACM Transactions on Networking vol. 8 no. 5 pp October 00. [] Z. Qian X. Tian X. Chen W. Huang and X. Wang Multicast capacity in MANET witnfrastructure support IEEE Transactions On Parallel and Distributed Systes vol. 5 no. 7 pp July 04. [3] Z. Li C. Wang C. Jiang and X. Li Multicast capacity scaling for inhoogeneous obile ad hoc networks Ad Hoc Networks vol. no. pp January 03. [4] S. Zhou and L. Ying On delay constrained ulticast capacity of largescale obile ad-hoc networks in INFOCOM 00. [5] J. P. Jeong T. He and D. H. C. Du TMA: Trajectory-based ultianycast forwarding for efficient ulticast data delivery in vehicular networks Coputer Networks vol. 57 no. 3 pp Septeber 03. [6] X. Ge J. Yang H. Gharavi and Y. Sun Energy efficiency challenges of 5G sall cell networks IEEE Counications Magazine vol. 55 no. 5 pp May 07. [7] T. Han X. Ge L. Wang K. S. Kwak Y. Han and X. Liu 5G converged cell-less counications in sart cities IEEE Counications Magazine vol. 55 no. 3 pp March 07. [8] X. Ge S. Tu G. Mao C. Wang and T. Han 5G ultra-dense cellular networks IEEE Wireless Counications vol. 3 no. pp February 06. [9] Z. Su Q. Xu Y. Hui M. Wen and S. Guo A gae theoretic approach to parked vehicle assisted content delivery in vehicular ad hoc networks IEEE DOI: 0.09/TVT [0] B. Yang Y. Cai Y. Chen and X. Jiang On the eact ulticast delay in obile ad hoc networks with f-cast relay Ad Hoc Networks vol.33 pp October 05. [] X. Wang W. Huang S. Wang J. Zhang and C. Hu Delay and capacity tradeoff analysis for otioncast IEEE/ACM Transactions on Networking vol. 9 no. 5 pp October 0. [] C. Hu X. Wang and F. Wu Motioncast: On the capacity and delay tradeoffs in MobiHoc 009. [3] X. Wang Y. Bei Q. Peng and L. Fu Speed iproves delay-capacity trade-off in otioncast IEEE Transactions on Parallel and Distributed Systes vol. no. 5 pp May 0. [4] X. Wang Q. Peng and Y. Li Cooperation achieves optial ulticast capacity-delay scaling in MANET IEEE Transactions on Counications vol. 60 no. 0 pp October 0. [5] J. Liu X. Jiang H. Nishiyaa and N. Kato Multicast capacity delay and delay jitter in interittently connected obile networks in INFOCOM 0. [6] J. Zhang Y. Li Z. Liu F. Wu F. Yang and X. Wang On ulticast capacity and delay in cognitive radio obile ad hoc networks IEEE Transactions Wireless Counications vol. 4 no. 0 pp March 05. [7] Y. Chen J. Liu X. Jiang and O. Takahashi Throughput analysis in obile ad hoc networks with directional antennas Ad Hoc Networks vol. no. 3 pp. 35 May 03. [8] C. Zhang X. Zhu and Y. Fang On the iproveent of scaling laws for large-scale MANETs with network coding IEEE Transactions on Selected Areas in Counications vol. 7 no. 5 pp June 009. [9] P. Li Y. Fang J. Li and X. Huang Sooth trade-offs between throughput and delay in obile ad hoc networks IEEE Transactions on Mobile Coputing vol. no. 3 pp March 0. [0] P. Li and Y. Fang On the throughput capacity of heterogeneous wireless networks IEEE Transactions on Mobile Coputing vol. no. pp Deceber 0. [] J. Liu X. Jiang H. Nishiyaa and N. Kato Delay and capacity in ad hoc obile networks with f-cast relay algoriths IEEE Transactions on Wireless Counications vol. 0 no. 8 pp August 0. [] Z. Kong E. M. Yeh and E. Soljanin Coding iproves the throughputdelay tradeoff in obile wireless networks IEEE Transactions on Inforation Theory vol. 58 no. pp Noveber 0. [3] M. J. Neely and E. Modiano Capacity and delay tradeoffs for ad-hoc obile networks IEEE Transactions on Inforation Theory vol. 5 no. 6 pp June 005. [4] P. Gupta and P. Kuar The capacity of wireless networks IEEE Transactions on Inforation Theory vol. 46 no. pp March 000. [5] S. R. Kulkarni and P. Viswanath A deterinistic approach to throughput scaling in wireless networks IEEE Transactions on Inforation Theory vol. 50 no. 6 p June 004. [6] M. Franceschetti O. Dousse D. N. C. Tse and P. Thiran Closing the gap in the capacity of wireless networks via percolation theory IEEE Transactions on Inforation Theory vol. 53 no. 3 pp March 007. [7] J. Zhang X. Wang X. Tian Y. Wang X. Chu and Y. Cheng Optial ulticast capacity and delay tradeoffs in MANETs IEEE Transactions on Mobile Coputing vol. 3 no. 5 pp May 04. [8] P. Li Y. Fang and J. Li Throughput delay and obility in wireless ad hoc networks in INFOCOM 00. [9] M. Grossglauser and D. N. Tse Mobility increases the capacity of ad hoc wireless networks in INFOCOM 00. [30] A. E. Gaal J. Maen B. Prabhakar and D. Shah Optial throughput-delay scaling in wireless networks-part i: The fuid odel IEEE Transactions on Inforation Theory vol. 5 no. 6 pp June 006. [3] S. Zhou and L. Ying On delay constrained ulticast capacity of large scale obile ad-hoc networks in INFOCOM c 07 IEEE. Personal use is peritted but republication/redistribution requires IEEE perission. See for ore inforation.

Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs

Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs 01 7th International ICST Conference on Communications and Networking in China (CHINACOM) Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs Jiajia Liu Tohoku University Sendai,

More information

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer

More information

Generalized Two-Hop Relay for Flexible Delay Control in MANETs

Generalized Two-Hop Relay for Flexible Delay Control in MANETs Generalized Two-Hop Relay for Flexible Delay Control in MANETs 12 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

The Throughput-Outage Tradeoff of Wireless One-Hop Caching Networks

The Throughput-Outage Tradeoff of Wireless One-Hop Caching Networks The Throughput-Outage Tradeoff of Wireless One-Hop Caching Networks Mingyue Ji, Student Meber, IEEE, Giuseppe Caire, Fellow, IEEE, and Andreas F. Molisch, Fellow, IEEE arxiv:3.637v [cs.it] 8 Jul 05 The

More information

Analytical Model of Epidemic Routing for Delay-Tolerant Networks Qingshan Wang School of Mathematics Hefei University of Technology Hefei, China

Analytical Model of Epidemic Routing for Delay-Tolerant Networks Qingshan Wang School of Mathematics Hefei University of Technology Hefei, China Analytical Model of Epideic Routing for Delay-Tolerant etwors Qingshan Wang School of Matheatics Hefei University of Technology Hefei, China qswang@hfut.edu.cn Zygunt J. Haas School of Electrical and Coputer

More information

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks 1 Optial Resource Allocation in Multicast Device-to-Device Counications Underlaying LTE Networks Hadi Meshgi 1, Dongei Zhao 1 and Rong Zheng 2 1 Departent of Electrical and Coputer Engineering, McMaster

More information

SPECTRUM sensing is a core concept of cognitive radio

SPECTRUM sensing is a core concept of cognitive radio World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile

More information

On the Design of MIMO-NOMA Downlink and Uplink Transmission

On the Design of MIMO-NOMA Downlink and Uplink Transmission On the Design of MIMO-NOMA Downlink and Uplink Transission Zhiguo Ding, Meber, IEEE, Robert Schober, Fellow, IEEE, and H. Vincent Poor, Fellow, IEEE Abstract In this paper, a novel MIMO-NOMA fraework for

More information

Device-to-Device Collaboration through Distributed Storage

Device-to-Device Collaboration through Distributed Storage Device-to-Device Collaboration through Distributed Storage Negin Golrezaei, Student Meber, IEEE, Alexandros G Diakis, Meber, IEEE, Andreas F Molisch, Fellow, IEEE Dept of Electrical Eng University of Southern

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

Fairness via priority scheduling

Fairness via priority scheduling Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation

More information

Analyzing Simulation Results

Analyzing Simulation Results Analyzing Siulation Results Dr. John Mellor-Cruey Departent of Coputer Science Rice University johnc@cs.rice.edu COMP 528 Lecture 20 31 March 2005 Topics for Today Model verification Model validation Transient

More information

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp

More information

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China 6th International Conference on Machinery, Materials, Environent, Biotechnology and Coputer (MMEBC 06) Solving Multi-Sensor Multi-Target Assignent Proble Based on Copositive Cobat Efficiency and QPSO Algorith

More information

Interactive Markov Models of Evolutionary Algorithms

Interactive Markov Models of Evolutionary Algorithms Cleveland State University EngagedScholarship@CSU Electrical Engineering & Coputer Science Faculty Publications Electrical Engineering & Coputer Science Departent 2015 Interactive Markov Models of Evolutionary

More information

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair Proceedings of the 6th SEAS International Conference on Siulation, Modelling and Optiization, Lisbon, Portugal, Septeber -4, 006 0 A Siplified Analytical Approach for Efficiency Evaluation of the eaving

More information

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13 CSE55: Randoied Algoriths and obabilistic Analysis May 6, Lecture Lecturer: Anna Karlin Scribe: Noah Siegel, Jonathan Shi Rando walks and Markov chains This lecture discusses Markov chains, which capture

More information

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials Inforation Processing Letters 107 008 11 15 www.elsevier.co/locate/ipl Low coplexity bit parallel ultiplier for GF generated by equally-spaced trinoials Haibin Shen a,, Yier Jin a,b a Institute of VLSI

More information

1646 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 64, NO. 4, APRIL 2016

1646 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 64, NO. 4, APRIL 2016 646 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 64, NO. 4, APRIL 6 On the Throughput Capacity Study for Aloha Mobile Ad Hoc Networks Yin Chen, Member, IEEE, Yulong Shen, Member, IEEE, Jinxiao Zhu, Xiaohong

More information

New Slack-Monotonic Schedulability Analysis of Real-Time Tasks on Multiprocessors

New Slack-Monotonic Schedulability Analysis of Real-Time Tasks on Multiprocessors New Slack-Monotonic Schedulability Analysis of Real-Tie Tasks on Multiprocessors Risat Mahud Pathan and Jan Jonsson Chalers University of Technology SE-41 96, Göteborg, Sweden {risat, janjo}@chalers.se

More information

Fundamental mobility properties for realistic performance analysis of intermittently connected mobile networks

Fundamental mobility properties for realistic performance analysis of intermittently connected mobile networks Fundaental obility properties for realistic perforance analysis of interittently connected obile networks Apoorva Jindal, Konstantinos Psounis Departent of Electrical Engineering-Systes University of Southern

More information

Impact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels

Impact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 9 proceedings Ipact of Iperfect Channel State Inforation on ARQ

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

Energy Efficient Predictive Resource Allocation for VoD and Real-time Services

Energy Efficient Predictive Resource Allocation for VoD and Real-time Services Energy Efficient Predictive Resource Allocation for VoD and Real-tie Services Changyang She and Chenyang Yang 1 arxiv:1707.01673v1 [cs.it] 6 Jul 2017 Abstract This paper studies how to exploit the predicted

More information

On Constant Power Water-filling

On Constant Power Water-filling On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives

More information

A Study of Information Dissemination Under Multiple Random Walkers and Replication Mechanisms

A Study of Information Dissemination Under Multiple Random Walkers and Replication Mechanisms A Study of Inforation Disseination Under Multiple Rando Walkers and Replication Mechaniss Konstantinos Oikonoou Dept. of Inforatics Ionian University Corfu, Greece okon@ionio.gr Diitrios Kogias Dept. of

More information

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna

More information

An Extension to the Tactical Planning Model for a Job Shop: Continuous-Time Control

An Extension to the Tactical Planning Model for a Job Shop: Continuous-Time Control An Extension to the Tactical Planning Model for a Job Shop: Continuous-Tie Control Chee Chong. Teo, Rohit Bhatnagar, and Stephen C. Graves Singapore-MIT Alliance, Nanyang Technological Univ., and Massachusetts

More information

Revisiting the performance of the modular clock algorithm for distributed blind rendezvous in cognitive radio networks

Revisiting the performance of the modular clock algorithm for distributed blind rendezvous in cognitive radio networks Revisiting the perforance of the odular clock algorith for distributed blind rendezvous in cognitive radio networks Michel Barbeau, Gier Cervera, Joaquin Garcia-Alfaro, Evangelos Kranakis To cite this

More information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information Cite as: Straub D. (2014). Value of inforation analysis with structural reliability ethods. Structural Safety, 49: 75-86. Value of Inforation Analysis with Structural Reliability Methods Daniel Straub

More information

8.1 Force Laws Hooke s Law

8.1 Force Laws Hooke s Law 8.1 Force Laws There are forces that don't change appreciably fro one instant to another, which we refer to as constant in tie, and forces that don't change appreciably fro one point to another, which

More information

IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 60, NO. 2, FEBRUARY ETSP stands for the Euclidean traveling salesman problem.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 60, NO. 2, FEBRUARY ETSP stands for the Euclidean traveling salesman problem. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 60, NO., FEBRUARY 015 37 Target Assignent in Robotic Networks: Distance Optiality Guarantees and Hierarchical Strategies Jingjin Yu, Meber, IEEE, Soon-Jo Chung,

More information

Warning System of Dangerous Chemical Gas in Factory Based on Wireless Sensor Network

Warning System of Dangerous Chemical Gas in Factory Based on Wireless Sensor Network 565 A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 59, 07 Guest Editors: Zhuo Yang, Junie Ba, Jing Pan Copyright 07, AIDIC Servizi S.r.l. ISBN 978-88-95608-49-5; ISSN 83-96 The Italian Association

More information

Content Caching and Delivery in Wireless Radio Access Networks

Content Caching and Delivery in Wireless Radio Access Networks Content Caching and Delivery in Wireless Radio Access Networks Meixia Tao, Deniz Gündüz, Fan Xu, and Joan S. Pujol Roig Abstract arxiv:904.07599v [cs.it] 6 Apr 209 Today s obile data traffic is doinated

More information

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding Lai Wei, Student Meber, IEEE, David G. M. Mitchell, Meber, IEEE, Thoas

More information

Distributed Power Control in Full Duplex Wireless Networks

Distributed Power Control in Full Duplex Wireless Networks Distributed Power Control in Full Duplex Wireless Networks Yu Wang and Shiwen Mao Departent of Electrical and Coputer Engineering, Auburn University, Auburn, AL 36849-5201 Eail: yzw0049@tigerail.auburn.edu,

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

Estimation of the Mean of the Exponential Distribution Using Maximum Ranked Set Sampling with Unequal Samples

Estimation of the Mean of the Exponential Distribution Using Maximum Ranked Set Sampling with Unequal Samples Open Journal of Statistics, 4, 4, 64-649 Published Online Septeber 4 in SciRes http//wwwscirporg/ournal/os http//ddoiorg/436/os4486 Estiation of the Mean of the Eponential Distribution Using Maiu Ranked

More information

3D acoustic wave modeling with a time-space domain dispersion-relation-based Finite-difference scheme

3D acoustic wave modeling with a time-space domain dispersion-relation-based Finite-difference scheme P-8 3D acoustic wave odeling with a tie-space doain dispersion-relation-based Finite-difference schee Yang Liu * and rinal K. Sen State Key Laboratory of Petroleu Resource and Prospecting (China University

More information

THE Internet of Things (IoT) has been widely developed

THE Internet of Things (IoT) has been widely developed Coputation Rate Maxiization in UAV-Enabled Wireless Powered Mobile-Edge Coputing Systes Fuhui Zhou, Meber, IEEE, Yongpeng Wu, Senior Meber, IEEE, Rose Qingyang Hu, Senior Meber, IEEE, and Yi Qian, Senior

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths

More information

IN modern society that various systems have become more

IN modern society that various systems have become more Developent of Reliability Function in -Coponent Standby Redundant Syste with Priority Based on Maxiu Entropy Principle Ryosuke Hirata, Ikuo Arizono, Ryosuke Toohiro, Satoshi Oigawa, and Yasuhiko Takeoto

More information

Studying Large Scale System Using Decentralized Control

Studying Large Scale System Using Decentralized Control Studyin Lare Scale Syste Usin Decentralized Control MRHOJJAI, SAKRAMINEJAD, MRAZMDIDEH Mechanic Electronic Institute, Junior Collee of asa, IRAN hojatir@ailco, sakrain@ailco, ahdiehlady@yahooco Abstract:

More information

Distributed Subgradient Methods for Multi-agent Optimization

Distributed Subgradient Methods for Multi-agent Optimization 1 Distributed Subgradient Methods for Multi-agent Optiization Angelia Nedić and Asuan Ozdaglar October 29, 2007 Abstract We study a distributed coputation odel for optiizing a su of convex objective functions

More information

Sparse beamforming in peer-to-peer relay networks Yunshan Hou a, Zhijuan Qi b, Jianhua Chenc

Sparse beamforming in peer-to-peer relay networks Yunshan Hou a, Zhijuan Qi b, Jianhua Chenc 3rd International Conference on Machinery, Materials and Inforation echnology Applications (ICMMIA 015) Sparse beaforing in peer-to-peer relay networs Yunshan ou a, Zhijuan Qi b, Jianhua Chenc College

More information

Algebraic Approach for Performance Bound Calculus on Transportation Networks

Algebraic Approach for Performance Bound Calculus on Transportation Networks Algebraic Approach for Perforance Bound Calculus on Transportation Networks (Road Network Calculus) Nadir Farhi, Habib Haj-Sale & Jean-Patrick Lebacque Université Paris-Est, IFSTTAR, GRETTIA, F-93166 Noisy-le-Grand,

More information

A DESIGN GUIDE OF DOUBLE-LAYER CELLULAR CLADDINGS FOR BLAST ALLEVIATION

A DESIGN GUIDE OF DOUBLE-LAYER CELLULAR CLADDINGS FOR BLAST ALLEVIATION International Journal of Aerospace and Lightweight Structures Vol. 3, No. 1 (2013) 109 133 c Research Publishing Services DOI: 10.3850/S201042862013000550 A DESIGN GUIDE OF DOUBLE-LAYER CELLULAR CLADDINGS

More information

Content-Type Coding. arxiv: v2 [cs.it] 3 Jun Linqi Song UCLA

Content-Type Coding. arxiv: v2 [cs.it] 3 Jun Linqi Song UCLA Content-Type Coding Linqi Song UCLA Eail: songlinqi@ucla.edu Christina Fragouli UCLA and EPFL Eail: christina.fragouli@ucla.edu arxiv:1505.03561v [cs.it] 3 Jun 015 Abstract This paper is otivated by the

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

Data-Driven Imaging in Anisotropic Media

Data-Driven Imaging in Anisotropic Media 18 th World Conference on Non destructive Testing, 16- April 1, Durban, South Africa Data-Driven Iaging in Anisotropic Media Arno VOLKER 1 and Alan HUNTER 1 TNO Stieltjesweg 1, 6 AD, Delft, The Netherlands

More information

Birthday Paradox Calculations and Approximation

Birthday Paradox Calculations and Approximation Birthday Paradox Calculations and Approxiation Joshua E. Hill InfoGard Laboratories -March- v. Birthday Proble In the birthday proble, we have a group of n randoly selected people. If we assue that birthdays

More information

Green Inter-Cluster Interference Management in Uplink of Multi-Cell Processing Systems

Green Inter-Cluster Interference Management in Uplink of Multi-Cell Processing Systems IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Green Inter-Cluster Interference Manageent in Uplink of Multi-Cell Processing Systes Efstathios Katranaras, Meber, IEEE, Muhaad Ali Iran, Senior Meber, IEEE,

More information

A NEW ROBUST AND EFFICIENT ESTIMATOR FOR ILL-CONDITIONED LINEAR INVERSE PROBLEMS WITH OUTLIERS

A NEW ROBUST AND EFFICIENT ESTIMATOR FOR ILL-CONDITIONED LINEAR INVERSE PROBLEMS WITH OUTLIERS A NEW ROBUST AND EFFICIENT ESTIMATOR FOR ILL-CONDITIONED LINEAR INVERSE PROBLEMS WITH OUTLIERS Marta Martinez-Caara 1, Michael Mua 2, Abdelhak M. Zoubir 2, Martin Vetterli 1 1 School of Coputer and Counication

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

Solutions of some selected problems of Homework 4

Solutions of some selected problems of Homework 4 Solutions of soe selected probles of Hoework 4 Sangchul Lee May 7, 2018 Proble 1 Let there be light A professor has two light bulbs in his garage. When both are burned out, they are replaced, and the next

More information

arxiv: v1 [cs.ds] 17 Mar 2016

arxiv: v1 [cs.ds] 17 Mar 2016 Tight Bounds for Single-Pass Streaing Coplexity of the Set Cover Proble Sepehr Assadi Sanjeev Khanna Yang Li Abstract arxiv:1603.05715v1 [cs.ds] 17 Mar 2016 We resolve the space coplexity of single-pass

More information

Novel Realization of Adaptive Sparse Sensing With Sparse Least Mean Fourth Algorithms

Novel Realization of Adaptive Sparse Sensing With Sparse Least Mean Fourth Algorithms ovel Realization of Adaptive Sparse Sensing With Sparse Least ean Fourth Algoriths Guan Gui Li Xu Xiao-ei Zhu and Zhang-in Chen 3. Dept. of Electronics and Inforation Systes Akita Prefectural University

More information

ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER

ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER IEPC 003-0034 ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER A. Bober, M. Guelan Asher Space Research Institute, Technion-Israel Institute of Technology, 3000 Haifa, Israel

More information

Adaptation to the Primary User CSI in Cognitive Radio Sensing and Access

Adaptation to the Primary User CSI in Cognitive Radio Sensing and Access Adaptation to e Priary User CSI in Cognitive Radio Sensing and Access Yuan Lu, Alexandra Duel-Hallen Departent of Electrical and Coputer Engineering Nor Carolina State University Raleigh, NC, 2766 {ylu8,

More information

The proofs of Theorem 1-3 are along the lines of Wied and Galeano (2013).

The proofs of Theorem 1-3 are along the lines of Wied and Galeano (2013). A Appendix: Proofs The proofs of Theore 1-3 are along the lines of Wied and Galeano (2013) Proof of Theore 1 Let D[d 1, d 2 ] be the space of càdlàg functions on the interval [d 1, d 2 ] equipped with

More information

The Transactional Nature of Quantum Information

The Transactional Nature of Quantum Information The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.

More information

MULTIAGENT Resource Allocation (MARA) is the

MULTIAGENT Resource Allocation (MARA) is the EDIC RESEARCH PROPOSAL 1 Designing Negotiation Protocols for Utility Maxiization in Multiagent Resource Allocation Tri Kurniawan Wijaya LSIR, I&C, EPFL Abstract Resource allocation is one of the ain concerns

More information

4920 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 12, DECEMBER 2015

4920 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 12, DECEMBER 2015 4920 IEEE TRASACTIOS O COMMUICATIOS, VOL. 63, O. 12, DECEMBER 2015 Energy Efficient Coordinated Beaforing for Multicell Syste: Duality-Based Algorith Design and Massive MIMO Transition Shiwen He, Meber,

More information

arxiv: v3 [cs.ds] 22 Mar 2016

arxiv: v3 [cs.ds] 22 Mar 2016 A Shifting Bloo Filter Fraewor for Set Queries arxiv:1510.03019v3 [cs.ds] Mar 01 ABSTRACT Tong Yang Peing University, China yangtongeail@gail.co Yuanun Zhong Nanjing University, China un@sail.nju.edu.cn

More information

Proceedings of the 35th Hawaii International Conference on System Sciences

Proceedings of the 35th Hawaii International Conference on System Sciences -7695-45-9/ $7. (c) IEEE roceedings of the 5th Annual Hawaii International Conference on Syste Sciences (HICSS-5 ) -7695-45-9/ $7. IEEE roceedings of the 5th Hawaii International Conference on Syste Sciences

More information

arxiv: v1 [cs.ni] 7 Apr 2010

arxiv: v1 [cs.ni] 7 Apr 2010 Optial Tradeoff between Exposed and Hidden Nodes in Large Wireless Networks arxiv:004.058v [cs.ni] 7 Apr 200 P.M. van de Ven,2 A.J.E.M. Janssen 2,3 J.S.H. van Leeuwaarden,2 June 5, 208 Abstract Wireless

More information

Replication Strategies in Unstructured Peer-to-Peer Networks

Replication Strategies in Unstructured Peer-to-Peer Networks Replication Strategies in Unstructured Peer-to-Peer Networks Edith Cohen AT&T Labs Research 180 Park Avenue Florha Park, NJ 07932, USA edith@research.att.co Scott Shenker ICSI Berkeley, CA 94704 USA shenker@icsi.berkeley.edu

More information

A Capacity Upper Bound for Large Wireless Networks with Generally Distributed Nodes

A Capacity Upper Bound for Large Wireless Networks with Generally Distributed Nodes Capacity Upper Bound for Large Wireless Networks with Generally Distributed Nodes Guoqiang Mao, Zihuai Lin School of Electrical and Information Engineering The University of Sydney Email: {guoqiang.mao,

More information

Error Exponents in Asynchronous Communication

Error Exponents in Asynchronous Communication IEEE International Syposiu on Inforation Theory Proceedings Error Exponents in Asynchronous Counication Da Wang EECS Dept., MIT Cabridge, MA, USA Eail: dawang@it.edu Venkat Chandar Lincoln Laboratory,

More information

Applying Genetic Algorithms to Solve the Fuzzy Optimal Profit Problem

Applying Genetic Algorithms to Solve the Fuzzy Optimal Profit Problem JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 8, 563-58 () Applying Genetic Algoriths to Solve the Fuzzy Optial Profit Proble FENG-TSE LIN AND JING-SHING YAO Departent of Applied Matheatics Chinese Culture

More information

Sharp Time Data Tradeoffs for Linear Inverse Problems

Sharp Time Data Tradeoffs for Linear Inverse Problems Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used

More information

Defect-Aware SOC Test Scheduling

Defect-Aware SOC Test Scheduling Defect-Aware SOC Test Scheduling Erik Larsson +, Julien Pouget*, and Zebo Peng + Ebedded Systes Laboratory + LIRMM* Departent of Coputer Science Montpellier 2 University Linköpings universitet CNRS Sweden

More information

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Soft Coputing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Beverly Rivera 1,2, Irbis Gallegos 1, and Vladik Kreinovich 2 1 Regional Cyber and Energy Security Center RCES

More information

The Role of Feedback in the choice between Routing and Coding for Wireless Unicast

The Role of Feedback in the choice between Routing and Coding for Wireless Unicast The Role of Feedbac in the choice between Routing and Coding for Wireless Unicast Raarishna Guadi CSL and ECE, University of Illinois, Urbana, USA guadi2@illinois.edu Laurent Massoulie Thoson Corporate

More information

Internet-Based Teleoperation of Carts Considering Effects of Time Delay via Continuous Pole Placement

Internet-Based Teleoperation of Carts Considering Effects of Time Delay via Continuous Pole Placement Aerican Journal of Engineering and Applied Sciences Original Research Paper Internet-Based Teleoperation of Carts Considering Effects of Tie Delay via Continuous Pole Placeent Theophilus Okore-Hanson and

More information

2 Q 10. Likewise, in case of multiple particles, the corresponding density in 2 must be averaged over all

2 Q 10. Likewise, in case of multiple particles, the corresponding density in 2 must be averaged over all Lecture 6 Introduction to kinetic theory of plasa waves Introduction to kinetic theory So far we have been odeling plasa dynaics using fluid equations. The assuption has been that the pressure can be either

More information

Content-aware Cooperative Transmission in HetNets with Consideration of Base Station Height

Content-aware Cooperative Transmission in HetNets with Consideration of Base Station Height This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content ay change prior to final publication. Citation inforation: DOI.9/TVT.8.8966, IEEE

More information

On Distribution and Limits of Information Dissemination Latency and Speed In Mobile Cognitive Radio Networks

On Distribution and Limits of Information Dissemination Latency and Speed In Mobile Cognitive Radio Networks This paper was presented as part of the Mini-Conference at IEEE INFOCOM 11 On Distribution and Limits of Information Dissemination Latency and Speed In Mobile Cognitive Radio Networks Lei Sun Wenye Wang

More information

Controlled Flooding Search with Delay Constraints

Controlled Flooding Search with Delay Constraints Controlled Flooding Search with Delay Constraints Nicholas B. Chang and Mingyan Liu Departent of Electrical Engineering and Coputer Science University of Michigan, Ann Arbor, MI 4809-222 Eail: {changn,ingyan}@eecs.uich.edu

More information

Chapter 11: Vibration Isolation of the Source [Part I]

Chapter 11: Vibration Isolation of the Source [Part I] Chapter : Vibration Isolation of the Source [Part I] Eaple 3.4 Consider the achine arrangeent illustrated in figure 3.. An electric otor is elastically ounted, by way of identical isolators, to a - thick

More information

Mathematical Model and Algorithm for the Task Allocation Problem of Robots in the Smart Warehouse

Mathematical Model and Algorithm for the Task Allocation Problem of Robots in the Smart Warehouse Aerican Journal of Operations Research, 205, 5, 493-502 Published Online Noveber 205 in SciRes. http://www.scirp.org/journal/ajor http://dx.doi.org/0.4236/ajor.205.56038 Matheatical Model and Algorith

More information

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography Tight Bounds for axial Identifiability of Failure Nodes in Boolean Network Toography Nicola Galesi Sapienza Università di Roa nicola.galesi@uniroa1.it Fariba Ranjbar Sapienza Università di Roa fariba.ranjbar@uniroa1.it

More information

arxiv: v1 [cs.dc] 19 Jul 2011

arxiv: v1 [cs.dc] 19 Jul 2011 DECENTRALIZED LIST SCHEDULING MARC TCHIBOUKDJIAN, NICOLAS GAST, AND DENIS TRYSTRAM arxiv:1107.3734v1 [cs.dc] 19 Jul 2011 ABSTRACT. Classical list scheduling is a very popular and efficient technique for

More information

A Model for the Selection of Internet Service Providers

A Model for the Selection of Internet Service Providers ISSN 0146-4116, Autoatic Control and Coputer Sciences, 2008, Vol. 42, No. 5, pp. 249 254. Allerton Press, Inc., 2008. Original Russian Text I.M. Aliev, 2008, published in Avtoatika i Vychislitel naya Tekhnika,

More information

Research Article Rapidly-Converging Series Representations of a Mutual-Information Integral

Research Article Rapidly-Converging Series Representations of a Mutual-Information Integral International Scholarly Research Network ISRN Counications and Networking Volue 11, Article ID 5465, 6 pages doi:1.54/11/5465 Research Article Rapidly-Converging Series Representations of a Mutual-Inforation

More information

A remark on a success rate model for DPA and CPA

A remark on a success rate model for DPA and CPA A reark on a success rate odel for DPA and CPA A. Wieers, BSI Version 0.5 andreas.wieers@bsi.bund.de Septeber 5, 2018 Abstract The success rate is the ost coon evaluation etric for easuring the perforance

More information

Iterative Decoding of LDPC Codes over the q-ary Partial Erasure Channel

Iterative Decoding of LDPC Codes over the q-ary Partial Erasure Channel 1 Iterative Decoding of LDPC Codes over the q-ary Partial Erasure Channel Rai Cohen, Graduate Student eber, IEEE, and Yuval Cassuto, Senior eber, IEEE arxiv:1510.05311v2 [cs.it] 24 ay 2016 Abstract In

More information

RANDOM GRADIENT EXTRAPOLATION FOR DISTRIBUTED AND STOCHASTIC OPTIMIZATION

RANDOM GRADIENT EXTRAPOLATION FOR DISTRIBUTED AND STOCHASTIC OPTIMIZATION RANDOM GRADIENT EXTRAPOLATION FOR DISTRIBUTED AND STOCHASTIC OPTIMIZATION GUANGHUI LAN AND YI ZHOU Abstract. In this paper, we consider a class of finite-su convex optiization probles defined over a distributed

More information

Controlled Flooding Search with Delay Constraints

Controlled Flooding Search with Delay Constraints Controlled Flooding Search with Delay Constraints Nicholas B. Chang and Mingyan Liu Departent of Electrical Engineering and Coputer Science University of Michigan, Ann Arbor, MI 48109-2122 Eail: {changn,ingyan}@eecs.uich.edu

More information

Comparison of Stability of Selected Numerical Methods for Solving Stiff Semi- Linear Differential Equations

Comparison of Stability of Selected Numerical Methods for Solving Stiff Semi- Linear Differential Equations International Journal of Applied Science and Technology Vol. 7, No. 3, Septeber 217 Coparison of Stability of Selected Nuerical Methods for Solving Stiff Sei- Linear Differential Equations Kwaku Darkwah

More information

2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 2 IEEE. Personal use of this aterial is peritted. Perission fro IEEE ust be obtained for all other uses, in any current or future edia, including reprinting/republishing this aterial for advertising or

More information

On the hyperbolicity of two- and three-layer shallow water equations. 1 Introduction

On the hyperbolicity of two- and three-layer shallow water equations. 1 Introduction On the hyperbolicity of two- and three-layer shallow water equations M. Castro, J.T. Frings, S. Noelle, C. Parés, G. Puppo RWTH Aachen, Universidad de Málaga, Politecnico di Torino E-ail: frings@igp.rwth-aachen.de

More information

An Approximate Model for the Theoretical Prediction of the Velocity Increase in the Intermediate Ballistics Period

An Approximate Model for the Theoretical Prediction of the Velocity Increase in the Intermediate Ballistics Period An Approxiate Model for the Theoretical Prediction of the Velocity... 77 Central European Journal of Energetic Materials, 205, 2(), 77-88 ISSN 2353-843 An Approxiate Model for the Theoretical Prediction

More information

Chapter 6 1-D Continuous Groups

Chapter 6 1-D Continuous Groups Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:

More information

UNCERTAINTIES IN THE APPLICATION OF ATMOSPHERIC AND ALTITUDE CORRECTIONS AS RECOMMENDED IN IEC STANDARDS

UNCERTAINTIES IN THE APPLICATION OF ATMOSPHERIC AND ALTITUDE CORRECTIONS AS RECOMMENDED IN IEC STANDARDS Paper Published on the16th International Syposiu on High Voltage Engineering, Cape Town, South Africa, 2009 UNCERTAINTIES IN THE APPLICATION OF ATMOSPHERIC AND ALTITUDE CORRECTIONS AS RECOMMENDED IN IEC

More information

A MAXIMUM-LIKELIHOOD DECODER FOR JOINT PULSE POSITION AND AMPLITUDE MODULATIONS

A MAXIMUM-LIKELIHOOD DECODER FOR JOINT PULSE POSITION AND AMPLITUDE MODULATIONS The 18th Annual IEEE International Syposiu on Personal, Indoor and Mobile Radio Counications (PIMRC 07) A MAXIMUM-LIKELIHOOD DECODER FOR JOINT PULSE POSITION AND AMPLITUDE MODULATIONS Chadi Abou-Rjeily,

More information

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation

More information

Power-Controlled Feedback and Training for Two-way MIMO Channels

Power-Controlled Feedback and Training for Two-way MIMO Channels 1 Power-Controlled Feedback and Training for Two-way MIMO Channels Vaneet Aggarwal, and Ashutosh Sabharwal, Senior Meber, IEEE arxiv:0901188v3 [csit] 9 Jan 010 Abstract Most counication systes use soe

More information

Heavy Traffic Optimal Resource Allocation Algorithms for Cloud Computing Clusters

Heavy Traffic Optimal Resource Allocation Algorithms for Cloud Computing Clusters Heavy Traffic Optial Resource Allocation Algoriths for Cloud Coputing Clusters Siva Thea aguluri and R. Srikant Departent of C and CSL University of Illinois at Urbana-Chapaign siva.thea@gail.co; rsrikant@illinois.edu

More information