Vision Graph Construction in Wireless Multimedia Sensor Networks
|
|
- Rhoda Greene
- 5 years ago
- Views:
Transcription
1 University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Conference and Worksho Paers Comuter Science and Engineering, Deartment of 21 Vision Grah Construction in Wireless Multimedia Sensor Networks Xin Dong University of Nebraska-Lincoln, xdong@cse.unl.edu Mehmet C. Vuran University of Nebraska-Lincoln, mcvuran@cse.unl.edu Follow this and additional works at: htt://digitalcommons.unl.edu/cseconfwork Dong, Xin and Vuran, Mehmet C., "Vision Grah Construction in Wireless Multimedia Sensor Networks" (21). CSE Conference and Worksho Paers htt://digitalcommons.unl.edu/cseconfwork/285 This Article is brought to you for free and oen access by the Comuter Science and Engineering, Deartment of at DigitalCommons@University of Nebraska - Lincoln. It has been acceted for inclusion in CSE Conference and Worksho Paers by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln.
2 Vision Grah Construction in Wireless Multimedia Sensor Networks Xin Dong and Mehmet C. Vuran Cyber-Physical Networking Laboratory Deartment of Comuter Science & Engineering University of Nebraska-Lincoln, Lincoln, NE {xdong, Abstract In Wireless multimedia sensor networks (WMSNs), the camera nodes connected in the vision grah share overlaed field of views (FOVs) and they deend on the densely deloyed relay nodes in the communication network grah to communicate with each other. Given a uniformly deloyed camera sensor network with relay nodes, the roblem is to find the number of hos for the vision-grah-neighbor-searching messages to construct the vision grah in an energy efficient way. In this aer, mathematical models are develoed to analyze the FOV overla of the camera nodes and the multi-ho communications in two dimensional toologies, which are utilized to analyze the relation between vision grah construction and maximum ho count. In addition, simulations are conducted to verify the models. I. INTRODUCTION Recently, the advances in low cost CMOS imaging sensors have made wireless multimedia sensor networks (WMSNs) ossible [1][5]. In WMSNs, multile camera sensors are deloyed to monitor an area. Potential alications of WMSNs include surveillance, traffic tracking, wildlife monitoring, and battlefield monitoring. The challenges faced by scalar wireless sensor networks, such as energy constraints, limited rocessing caabilities, unreliability and low accuracy of obtained data, are only exacerbated in WMSNs. To imrove the sensing quality, a certain level of collaboration among sensor nodes are required. In [1], collaborative multimedia in-network rocessing is suggested, which can utilize the comutational caacity of sensors as well as reduce communication cost and energy consumtion. In [2], scalar sensors are exloited to hel camera nodes detect events in WMSNs. More directly, camera sensors can collaborate with each other to accomlish tasks. This is achieved by exloiting the overlaed field-of-views of the camera sensors. In a WMSN, each camera sensor has its own directional sensing range, known as the field-of-view (FOV), and cameras may have overlaed FOVs such that if an event occurs in this overlaed area, several cameras may cature this event in different ersectives. These camera nodes form a vision grah [4], in which an edge between two cameras indicates they share an overlaed FOV and the two cameras are called vision grah neighbors. Some research exloits the characteristics of the overlaed FOVs in collaboration of camera sensor nodes. In [6], routing aths are established based on the overlaed FOVs of camera nodes. In [3] and [8], overlaed FOVs are exloited to define correlation among camera nodes and this correlation is used for cooerative video rocessing. Meanwhile, in [4], the images of the overlaed FOVs have been exlored to calibrate the camera nodes. To construct vision grahs in WMSNs, two methods are widely used in literature. The cameras nodes may know their locations and directions ariori[3], or reference objects are used for camera nodes to calculate overlaed FOVs [7][8]. However, in these works, simle flooding is emloyed to exchange information among camera nodes. It is well known that for large scale WSNs, flooding is imractical in terms of communication cost and network congestion. In this aer, we roose a limited-ho-number multi-ho communication for constructing the vision grah in WMSNs. Given a uniformly deloyed camera sensor network with relay nodes, we are interested in finding the maximum allowed ho count for the vision-grah-neighbor-searching messages (hello message) in order to construct the vision grah in an energy efficient way. Mathematical models are develoed to analyze the robability of constructing the vision grah for different message lifetime (maximum ho count). This is achieved by develoing a robabilistic model of the overlaed FOV for different distance and the robabilistic model of the roagation distance for different message life time. In [9], the authors have roosed a method to analyze the robability distribution of multi-ho communications in WSNs. However, only one dimensional toology is considered and the channel is assumed to be erfect. In this aer, we roose a recursive method to analyze the multi-ho communications of WMSNs in two dimensional toologies. Moreover, a more ractical channel model is adoted to cature the feature of wireless communication. In addition, simulations are conducted to verify our models. To the best of our knowledge, this is the first aer to address the communication roblem of constructing the vision grah in WMSNs. Our main contributions are: The robabilistic model of two cameras having an overlaed FOV with resect to their distance; The 2-D multi-ho communication model that mas maximum ho number to connectivity; The mathematical model to calculate the needed maximum ho number to construct the vision grah for a given WMSN. The remainder of this aer is organized as follows: The robabilistic models for the overlaed FOV, the multi-ho communication and the vision grah construction are develoed in Section II. Simulations and Numerical analysis of those models are rovided in Section III. Furthermore, the conclusions are
3 r v 1 2 c d c 1 2 Camera Node drawn in Section IV. Fig. 1. Overlaed FOV The system overview. II. SYSTEM MODEL Relay Node We consider alications in which the camera sensors are randomly deloyed. To connect these camera sensors, other relay nodes are also randomly deloyed among them by Poisson random rocess. After deloyment, the camera sensors send hello messages that have a maximum allowed ho count to find their vision grah neighbors. In each transmission, the sender broadcast a hello message unless the message achieves its maximum allowed ho count. When a camera sensor receives a hello message from its eers, it uses the location and direction information to calculate if the source of the message is its vision grah neighbor. Hence the vision grah is constructed in a distributed manner. Denote the robability of constructing the vision grah v, our goal is to relate this robability to the maximum allowed ho count, n, of the hello message. v is given as v (n) = vc (d, n)dd, (1) v (d)dd where vc (d, n) is the robability of successfully connected vision grah neighbors given the distance d and the maximum ho number n whereas v (d) is the robability of having vision grah neighbors given distance d. v (d) is related to the FOV of the camera and it is develoed in Section II-A, while vc (d, n) is related to the multi-ho communication of the sensors, and the model is rovided in Section II-B. In Section II-C, those two models are utilized to develo the model for vision grah construction. A. Overlaed Field of View The FOV of a camera is modeled as a fan sector in a 2D lane, as shown in Fig. 1. It is defined by a tule (r v,α), where r v is the FOV radius, which determines the maximum distance the camera can observe, and α is the visual angle, which deicts the width of the FOV. The overla model is shown in Fig. 1. It is observed that given the distance d of two cameras, when these two cameras are at some secific directions, they will have overlaed FOV and become vision grah neighbors. Given the assumtion that the direction of the camera is uniformly distributed, the robability that two cameras are vision grah neighbors is equal to the ortion of directions at which they have an overlaed FOV. When given the direction of the first camera at angle θ 1, there exists a range [θ2 min,θ2 max ], such that when the direction of the second camera, θ 2, is in this range, these two cameras have an overlaed FOV. As θ 1 changes, the range of θ 2 changes too. With the ranges of θ 1 and θ 2 in which the two camera nodes can have an overlaed FOV at distance d, the robability of having an overlaed FOV at distance d, which is denoted as o (d), is the integral of the ranges divided by the maximum range. Thus, o (d) = 1 2π 2 i θ max,i 1 θ min,i 1 (θ max,i 2 θ min,i 2 )dθ 1. (2) In Table I, the ranges of θ 1 and θ 2, in which two camera nodes have an overlaed FOV for different distance, d, are listed. For a given d, the range of θ 1 is divided into categories, and in each category, the range of θ 2 can be exressed by the value of θ 1. Note in the tables, the range of θ 1 is only considered as in range [,π]. For the range [π, 2π], it is a mirror of [,π]. Also note that the camera visual angle α imacts the boundary conditions in (2), as shown in Table I and in three different cases ([, π 4 ], [ π 4, π 3 ], [ π 3, π 2 ]), the exressions are different. Here, we assume the visual angle of the camera α is in the range of [ π 4, π 3 ]. The variables a 1 a 6 in Table I are given as follows: a 1 =cos 1 d, (3) 2r v a 2 = tan 1 r v sin (θ ) d r v cos (θ ), (4) a 3 =sin 1 r v d, (5) a 4 =cos 1 d tan2 (θ )+ rv 2 + rv 2 tan 2 (θ ) d 2 tan 2 (θ ) r v (1 + tan 2, (θ )) (6) a 5 =cos 1 d tan2 (θ ) rv 2 + rv 2 tan 2 (θ ) d 2 tan 2 (θ ) r v (1 + tan 2, (θ )) (7) a 6 =cos 1 d tan2 (θ + )+ rv 2 + rv 2 tan 2 (θ + ) d 2 tan 2 (θ + ) r v (1 + tan 2, (θ + )) (8) where θ = θ 1 α and θ + = θ 1 + α. As exected, it is noticed from Table I that when the two cameras are close to each other, the ranges in which they can be vision grah neighbors are larger, which means the robability that they are vision grah neighbors is greater. B. Multi-ho Communication In this section, we develo a model to analyze multiho communication of two camera nodes in wireless sensor networks. In the analysis, the distance of camera node A and B is denoted as l and the density of the relay nodes is λ. In addition, log-normal shadowing model is emloyed to reresent the channel. In our model, Cd n reresents the event that two nodes at distance d can communicate through exactly n hos, while C d n reresents the oosite. The robability of event Cn d is
4 TABLE I THE POSSIBLE RANGES OF θ 1 AND θ 2 TO HAVE AN OVERLAPPED FOV FOR DIFFERENT DISTANCE d. 2rv <d 2r v 1 [,α cos 1 d ] [π a 2r 1 α, π + a 1 + α] v 2 [α cos 1 d,α] 2r v [π a 1 α, π a 2 + α] 3 [α, cos 1 d + α] [π a 2r 1 α, π a 4 + α] v r v <d 2r v 1 [,α cos 1 rv d ] [ a 3 + π α, a 3 + π + α] 2 [α cos 1 r v d,α] [ a 3 + π α, π a 2 + α] 3 [α, cos 1 rv d + α] [ a 3 + π α, π a 4 + α] 4 [cos 1 rv d + α, cos 1 + α] [π a d 2r 2 α, π a 4 + α] v 5 [cos 1 d + α, sin 1 rv 2r v d + α] [π a 5 α, π a 4 + α] 2r v cos(2α) <d r 1 [,α] [, 2π] 2 [α, cos 1 d + α] 2r v [π + a 2 α, π + α] 3 [cos 1 d + α, π α] 2r v [π a 5 α, π + α] 4 [π α, α + π [π a 5 α, a 6 + π + α] 5 [α + π 2,π] [π a 4 α, a 6 + π + α] <d 2r v cos(2α) 1 [,α] [, 2π] 2 [α, π α] [π a 2 α, π + α] 3 [π α, cos 1 d + α] 2r v [π a 2 α, a 6 + π + α] 4 [cos 1 d 2r v + α, α + π [π a 5 α, a 6 + π + α] 5 [α + π 2,π] [π a 4 α, a 6 + π + α] denoted as c (d, n) and the robability of event C n d is q c(d, n). In addition, P c (d, n) denotes the robability that two nodes can communicate at a distance d through u to n hos. Adoting the shadowing channel model [11], the signal noise ratio (SNR), φ, in db is exressed as φ(x σ,l)=p t PL(d ) 1η log 1 ( d d ) X σ P n, (9) where P t is the transmission ower, PL(d ) is the attenuation at the reference distance d, X σ is the shadowing effect random variable and P n is the noise floor. The symbol error rate, s (X σ,d) is calculated by s (X σ,d)=q (β 2 (φ(x σ,d) β 1 )), (1) where β 1 and β 2 are two arameters obtained by exeriments [12]. Note that other error rate models can be used in our scheme. For examle, a means to calculate the error rate for MicaZ mote is develoed in [1]. The robability that two nodes can communicate in one ho is: c (d, 1) = { Cd 1 } = (1 s (N,d)) L f Xσ (X σ )dx σ, (11) where L is the acket length in symbols, and f Xσ (X σ ) is the df of the shadowing effect random variable, X σ, which is Gaussian. For the one ho situation, the robability that two nodes can communicate within u to 1 ho is given simly by P c (d, 1) = c (d, 1). (12) Fig. 2. The multi-ho model. When the number of hos is greater than 2, we develo our model as shown in Fig. 2. The event that node A has a n- ho communication ath to node B equals to the event that there is node x at osition (ρ x,θ x ), which has a 1-ho ath to A a (n 1)-ho communication ath to node B. Assume the location of the intermediate node, x, is(ρ x,θ x ), where ρ x is the distance between x and B, and θ x is the angle of x with resect to vector BA. Thus, the distance between x and A can be exressed as ρ xa = (l ρ x cos θ x ) 2 +(ρ x sin θ x ) 2. (13) Given Poisson rocess density λ, the robability that at osition (ρ x,θ x ) there is a node is e (ρ x,θ x )=1 e λρxδρxδθx λρ x Δρ x Δθ x. (14) The aroximation holds when the area ρ x Δρ x Δθ x. The ranges of ρ x and θ x are <ρ x and θ x 2π. The robability of 1-ho communication between x and A is c (ρ xa, 1), where ρ xa is the distance from A to x. Recursively, the robability that node x has a (n 1)-ho communication ath to node B is c (ρ x,n 1). Therefore, c (d, n) =1 ρ x θ x (1 (λρ x Δρ x Δθ x ) c (ρ xa, 1) c (ρ x,n 1)). (15) In (15),1 (λρ x Δρ x Δθ x ) c (ρ xa, 1) c (ρ x,n 1) defines the robability that there is no intermediate node at (ρ x,θ x ) which satisfies the requirements. Since the relay nodes are deloyed indeendently, the roduct over ρ x and θ x is the robability that there is no intermediate node at the whole lanar which has 1-ho communication to A and n 1 communication to B. This is equal to the robability that A and B cannot communicate in n hos. Finally, subtracting that robability from 1 is the robability that the two camera nodes, A and B, can have a n-ho communication. Also, the robability that two nodes at distance l can communicate within u to n hos is P c (d, n) = { Cd} 1 { + C1 d,cd} 2 + { + C1 d, C } d,..., 2 (n 1) C d,cd n. (16)
5 The first term in (16) is the robability of communication in 1 ho, the second term is the robability that the two camera nodes cannot communicate in 1 ho but can communicate in 2 hos. Generally, the nth term is the robability that the two camera nodes cannot communicate within u to (n 1) hos but can communicate in n hos. The sum is the robability that the two nodes can communicate within u to n hos. Assume that given distance, d, C1 l,..., C d n and C1 d,...,cn d are indeendent1, thus, we have P c (d, n) = { Cd} 1 { } { } + C1 d C 2 d + + { } { } C1 d C(n 1) d {Cd n } = c (d, 1) + q c (d, 1) c (d, 2) + (17) ( n 1 ) + q c (d, i) c (d, n). i=1 C. Vision Grah Construction The communication range of nodes in WSNs is short, hence a camera node s vision grah neighbors may be several hos away. On the other hand, two closely located camera nodes may not be vision grah neighbors. Given a uniformly deloyed camera sensor network with relay sensors, we show the robability of vision grah construction as a function of the maximum allowed ho count of the hello messages. Assume the camera node deloyment is a Poisson oint rocess and denote the camera node density as κ. Giventhe distance d, the robability that a camera node has vision grah neighbors at distance d is v (d) = ( 1 e κaμ) o (d) κa μ o (l), (18) where o (d) is the robability that two cameras have an overlaed FOV when the distance is d, which is rovided in Section II-A, and A μ is the size of an infinitely small circle area, which is exressed as A(μ) =2πd dd. The aths to some far away vision grah neighbors may not be established because of the limitation of the maximum message ho number. Thus, we consider the robability of constructing the vision grah as the ratio of the connected vision grah neighbors against all vision grah neighbors. Given a camera node A, the robability that there are camera nodes at distance d which are vision grah neighbors of A and they can communicate within n-hos is vc (l, n) = v (d)p c (d, n), (19) where v (d) is given in (18) and P c (d, n) is given in (17). The robability of constructing the vision grah using n-ho communication is v (n) = = = vc (d, n)dd v (d)dd 2πκd o (d)p c (d, n)dd 2πκd o (d)dd o (d)p c (d, n)d dd, o (d)d dd (2) 1 In [9], it is ointed out that in reality it is not the case, however, the simulation shows it is a reasonable simlification. TABLE II PARAMETER LIST. Parameter r v P t d PL d η Value 1 m dbm 1 m 55.4 dbm 4.7 Parameter σ P n λ β 1 β 2 Value dbm Probability of vision grah conscruction (%) Theoretical analysis Simulation Maximum ho number Fig. 3. The comarison of the theoretical analysis and the simulation results for constructing the vision grah. III. NUMERICAL ANALYSIS In this section, numerical analysis of the system model is erformed using Matlab. We first use TOSSIM simulation to verify our model in Section III-A, after which the camera FOV overla model, the multi-ho communication model as well as the model for constructing vision grah in WMSNs are analyzed in Section III-B. The arameters used in the analysis are listed in Table II. A. Model Verification To verify the models, we have simulated the WMSNs using TOSSIM. In the simulations, 1 network toologies are generated by a Poisson rocess, and the size of the field is 5 m 5 m. In each toology, two cameras nodes are set with random distance and random direction. Unless otherwise noted, he vision angle of each camera is 5π 18. Note all the camera airs in the 1 toologies are vision grah neighbors. Since we consider the ratio of the successful connected vision grah neighbors over all vision grah neighbors, if the two cameras are not vision grah neighbors, they do not have imact on the result. The other arameters are set the same as in Table II. In Fig. 3, the theoretical and the simulation results of the robability of constructing the vision grah are shown. It is observed from Fig. 3 that the mathematical model catures the characteristics of the FOV overla and the multi-ho communication. For our settings, instead of unlimited flooding, 5-ho broadcast is sufficient to construct the vision grah with a high confidence (91%). In other words, when deloying the WMSN, the camera nodes need to broadcast a hello message with maximum ho count of 5 to find the vision grah neighbors. B. Model Analysis In this section, the mathematical models are analyzed. In Fig. 4(a), the robability of camera FOV overlaing over
6 Probability of overla (%) α=π/4 α=5π/18 α=11π/36 α=π/ Distance (m) (a) Probability of multi ho connectivity (%) ho 2 hos 3 hos 4 hos 5 hos 6 hos 7 hos 8 hos Distance (m) (b) Probability of vision grah conscruction (%) α=π/4 2 α=5π/18 α=11π/36 α=π/ Maximum ho count (c) Fig. 4. (a) The robability of FOV overla, (b) the robability of multi-ho connectivity and (c) the robability vision grah construction. distance is shown for different camera vision angles. It is observed that when the camera vision angle is larger, the robability that two cameras have an overlaed FOV is greater. At the distance of 5 m, if the camera vision angle is π 3,itis 12% more likely to have a vision grah neighbor than camera vision angle of π 4. Also, the decrease of the robability over distance is not constant. Around distance of 1 m, which is the vision range, there is a shar dro. Thus, most vision grah neighbors will be in a close distance. The robability of connectivity for the multi-ho communication is deicted in Fig. 4(b), where the ho counts are the maximum allowed ho counts. It is shown that if the 1- ho coverage is r, the coverage for n-ho is slightly more than nr. For examle, at 9% connectivity, the coverage of 1-ho is 4.57 m, however, the coverage of 3-ho is 14.73, m and the overage of 5-ho is m. The reason behind this is that the log-normal channel model does not have a cut-off value as the maximum transmission range. Thus, beyond the 9% connectivity range, there are still some nodes that receive the message. Accordingly, their transmission can increase the coverage in the next ho. In addition, because the maximum distance of two vision grah neighbors in our setting is 2 m, we would assume the needed ho count is 4. The robability of constructing the vision grah as a function of maximum ho counts is shown in Fig. 4(c) for different camera vision angles. It is exected that because when the camera vision angle is greater, the two cameras are more likely to be vision grah neighbors, thus given a maximum ho count, the robability of constructing the vision grah is lower. However, the analysis shows the decrease of the robability is not significant. In fact, when the maximum ho count is 2, where the difference is most notable, the robability of constructing the vision grah for camera vision angle of π 4 is 52.8%, and for camera vision angle of π 3, the robability is 48.28%. IV. CONCLUSIONS In this aer, we address the issue of constructing vision grahs in WMSNs. A mathematical model for the camera field of view overlaing is develoed to analyze the robability of having vision grah neighbor over distance. Meanwhile, a multi-ho communication model with a realistic channel model is develoed to analyze the robability of multi-ho connectivity. Simulations are established to verify these models, which show that the mathematical models cature the characteristics of the FOV overlaing and the multi-ho communication. For our settings, instead of unlimited flooding, 5-ho broadcast is sufficient to construct the vision grah with high robability. REFERENCES [1] I. F. Akyildiz, T. Melodia, and K. R. Chowdhury, A survey on wireless multimedia sensor networks, Comuter Networks, vol. 51, no. 4, , 27. [2] A. Czarlinska and D. Kundur, Reliable Event-Detection in Wireless Visual Sensor Networks Through Scalar Collaboration and Game-Theoretic Consideration, IEEE Transactions on Multimedia, vol. 1, no. 5, , 28. [3] R. Dai and I. F. Akyildiz, A satial correlation model for visual information in wireless multimedia sensor networks, IEEE Transactions on Multimedia, vol. 11, no. 6, , 29. [4] D. Devarajan, Z. Cheng, and R. Radke, Calibrating distributed camera networks, Proceedings of the IEEE (Secial Issue on Distributed Smart Cameras), vol. 96, no. 1, 29. [5] S. Stanislava and H. Wendi, A Survey of Visual Sensor Networks, Advances in Multimedia, vol. 29, 29. [6] T. Ko and N. Berry, On scaling distributed low-ower wireless image sensors, in Proc. System Sciences, 26. HICSS 6. Proceedings of the 39th Annual Hawaii International Conference on, vol. 9, 26. [7] P. Kulkarni, P. Shenoy, and D. Ganesan, Aroximate initialization of camera sensor networks, Lecture Notes in Comuter Science, vol. 4373,. 67, 27. [8] H. Ma and Y. Liu, Correlation based video rocessing in video sensor networks, in Proc. IEEE Intl. Conf on Wireless Networks, Communications and Mobile Comuting, vol. 2, 25. [9] S. Vural and E. Ekici, Probability distribution of multiho distance in one-dimensional sensor networks, Comuter Networks Journal (Elsevier), vol. 51, no. 13, , 27. [1] M. C. Vuran and I. F. Akyildiz, Error control in wireless sensor networks: a cross layer analysis, IEEE/ACM Transactions on Networking (TON), vol. 17, no. 4, , 29. [11] M. Zuniga and B. Krishnamachari, Analyzing the transitional region in low ower wireless links in Proc. IEEE SECON 4, , Oct. 24. [12] htt://
MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK
Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment
More informationShadow Computing: An Energy-Aware Fault Tolerant Computing Model
Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms
More informationAn Analysis of TCP over Random Access Satellite Links
An Analysis of over Random Access Satellite Links Chunmei Liu and Eytan Modiano Massachusetts Institute of Technology Cambridge, MA 0239 Email: mayliu, modiano@mit.edu Abstract This aer analyzes the erformance
More informationAnalysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks
Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their
More informationMODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL
Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management
More informationVehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications
Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications Bartłomiej Błaszczyszyn Paul Muhlethaler Nadjib Achir INRIA/ENS INRIA Rocquencourt INRIA Rocquencourt
More informationSession 5: Review of Classical Astrodynamics
Session 5: Review of Classical Astrodynamics In revious lectures we described in detail the rocess to find the otimal secific imulse for a articular situation. Among the mission requirements that serve
More informationImproved Capacity Bounds for the Binary Energy Harvesting Channel
Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,
More informationLower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data
Quality Technology & Quantitative Management Vol. 1, No.,. 51-65, 15 QTQM IAQM 15 Lower onfidence Bound for Process-Yield Index with Autocorrelated Process Data Fu-Kwun Wang * and Yeneneh Tamirat Deartment
More informationModeling and Estimation of Full-Chip Leakage Current Considering Within-Die Correlation
6.3 Modeling and Estimation of Full-Chi Leaage Current Considering Within-Die Correlation Khaled R. eloue, Navid Azizi, Farid N. Najm Deartment of ECE, University of Toronto,Toronto, Ontario, Canada {haled,nazizi,najm}@eecg.utoronto.ca
More informationOptimal Recognition Algorithm for Cameras of Lasers Evanescent
Otimal Recognition Algorithm for Cameras of Lasers Evanescent T. Gaudo * Abstract An algorithm based on the Bayesian aroach to detect and recognise off-axis ulse laser beams roagating in the atmoshere
More informationOn the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1
On the Relationshi Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 Imad Antonios antoniosi1@southernct.edu CS Deartment MO117 Southern Connecticut State University 501 Crescent St.
More informationA continuous review inventory model with the controllable production rate of the manufacturer
Intl. Trans. in O. Res. 12 (2005) 247 258 INTERNATIONAL TRANSACTIONS IN OERATIONAL RESEARCH A continuous review inventory model with the controllable roduction rate of the manufacturer I. K. Moon and B.
More informationOptimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging
1 Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie, Member, IEEE, arxiv:1401.0340v3 [cs.it] 27 Ar 2014
More informationPlotting the Wilson distribution
, Survey of English Usage, University College London Setember 018 1 1. Introduction We have discussed the Wilson score interval at length elsewhere (Wallis 013a, b). Given an observed Binomial roortion
More informationECE 534 Information Theory - Midterm 2
ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You
More informationq-ary Symmetric Channel for Large q
List-Message Passing Achieves Caacity on the q-ary Symmetric Channel for Large q Fan Zhang and Henry D Pfister Deartment of Electrical and Comuter Engineering, Texas A&M University {fanzhang,hfister}@tamuedu
More informationCombining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)
Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment
More informationChapter 1 Fundamentals
Chater Fundamentals. Overview of Thermodynamics Industrial Revolution brought in large scale automation of many tedious tasks which were earlier being erformed through manual or animal labour. Inventors
More informationAnalyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems
Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems Hsiao-Lan Chiang, Tobias Kadur, and Gerhard Fettweis Vodafone Chair for Mobile Communications Technische Universität
More informationSpatial Outage Capacity of Poisson Bipolar Networks
Satial Outage Caacity of Poisson Biolar Networks Sanket S. Kalamkar and Martin Haenggi Deartment of Electrical Engineering, University of Notre Dame, Notre Dame, IN 46556, USA E-mail: skalamka@nd.edu,
More informationOn split sample and randomized confidence intervals for binomial proportions
On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have
More informationAnytime communication over the Gilbert-Eliot channel with noiseless feedback
Anytime communication over the Gilbert-Eliot channel with noiseless feedback Anant Sahai, Salman Avestimehr, Paolo Minero Deartment of Electrical Engineering and Comuter Sciences University of California
More informationAge of Information: Whittle Index for Scheduling Stochastic Arrivals
Age of Information: Whittle Index for Scheduling Stochastic Arrivals Yu-Pin Hsu Deartment of Communication Engineering National Taiei University yuinhsu@mail.ntu.edu.tw arxiv:80.03422v2 [math.oc] 7 Ar
More informationUnderstanding and Using Availability
Understanding and Using Availability Jorge Luis Romeu, Ph.D. ASQ CQE/CRE, & Senior Member Email: romeu@cortland.edu htt://myrofile.cos.com/romeu ASQ/RD Webinar Series Noviembre 5, J. L. Romeu - Consultant
More informationPower Aware Wireless File Downloading: A Constrained Restless Bandit Approach
PROC. WIOP 204 Power Aware Wireless File Downloading: A Constrained Restless Bandit Aroach Xiaohan Wei and Michael J. Neely, Senior Member, IEEE Abstract his aer treats ower-aware throughut maximization
More informationDistributed Rule-Based Inference in the Presence of Redundant Information
istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced
More informationUnderstanding and Using Availability
Understanding and Using Availability Jorge Luis Romeu, Ph.D. ASQ CQE/CRE, & Senior Member C. Stat Fellow, Royal Statistical Society Past Director, Region II (NY & PA) Director: Juarez Lincoln Marti Int
More informationEmbedded acoustic emission system based on rock sound source crowd location
Qing EURASIP Journal on Embedded Systems (2017) 2017:11 DOI 10.116/s13639-016-004-4 EURASIP Journal on Embedded Systems RESEARCH Embedded acoustic emission system based on rock sound source crowd location
More informationLightning Attachment Models and Perfect Shielding Angle of Transmission Lines
Lightning Attachment Models and Perfect Shielding Angle of Transmission Lines Pantelis N. Mikrooulos 1 and Thomas E. Tsovilis High Voltage Laboratory, School of Electrical & Comuter Engineering, Faculty
More informationApproximating min-max k-clustering
Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost
More informationDeveloping A Deterioration Probabilistic Model for Rail Wear
International Journal of Traffic and Transortation Engineering 2012, 1(2): 13-18 DOI: 10.5923/j.ijtte.20120102.02 Develoing A Deterioration Probabilistic Model for Rail Wear Jabbar-Ali Zakeri *, Shahrbanoo
More informationAn Investigation on the Numerical Ill-conditioning of Hybrid State Estimators
An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators S. K. Mallik, Student Member, IEEE, S. Chakrabarti, Senior Member, IEEE, S. N. Singh, Senior Member, IEEE Deartment of Electrical
More informationFinite-State Verification or Model Checking. Finite State Verification (FSV) or Model Checking
Finite-State Verification or Model Checking Finite State Verification (FSV) or Model Checking Holds the romise of roviding a cost effective way of verifying imortant roerties about a system Not all faults
More informationOn the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting
On the Role of Finite Queues in Cooerative Cognitive Radio Networks with Energy Harvesting Mohamed A. Abd-Elmagid, Tamer Elatt, and Karim G. Seddik Wireless Intelligent Networks Center (WINC), Nile University,
More informationDiverse Routing in Networks with Probabilistic Failures
Diverse Routing in Networks with Probabilistic Failures Hyang-Won Lee, Member, IEEE, Eytan Modiano, Senior Member, IEEE, Kayi Lee, Member, IEEE Abstract We develo diverse routing schemes for dealing with
More informationTowards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK
Towards understanding the Lorenz curve using the Uniform distribution Chris J. Stehens Newcastle City Council, Newcastle uon Tyne, UK (For the Gini-Lorenz Conference, University of Siena, Italy, May 2005)
More informationAn Analysis of Reliable Classifiers through ROC Isometrics
An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit
More informations v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4
Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work
More informationModeling Residual-Geometric Flow Sampling
Modeling Residual-Geometric Flow Samling Xiaoming Wang Amazon.com Seattle, WA 98101 USA Email: xmwang@gmail.com Xiaoyong Li Texas A&M University College Station, TX 77843 USA Email: xiaoyong@cse.tamu.edu
More informationThe Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule
The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca
More informationECE 6960: Adv. Random Processes & Applications Lecture Notes, Fall 2010
ECE 6960: Adv. Random Processes & Alications Lecture Notes, Fall 2010 Lecture 16 Today: (1) Markov Processes, (2) Markov Chains, (3) State Classification Intro Please turn in H 6 today. Read Chater 11,
More informationA Special Case Solution to the Perspective 3-Point Problem William J. Wolfe California State University Channel Islands
A Secial Case Solution to the Persective -Point Problem William J. Wolfe California State University Channel Islands william.wolfe@csuci.edu Abstract In this aer we address a secial case of the ersective
More informationCharacterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations
Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations PINAR KORKMAZ, BILGE E. S. AKGUL and KRISHNA V. PALEM Georgia Institute of
More informationThe Noise Power Ratio - Theory and ADC Testing
The Noise Power Ratio - Theory and ADC Testing FH Irons, KJ Riley, and DM Hummels Abstract This aer develos theory behind the noise ower ratio (NPR) testing of ADCs. A mid-riser formulation is used for
More informationElastic Model of Deformable Fingertip for Soft-fingered Manipulation
IEEE TRANSACTION ON ROBOTICS, VOL. 1, NO. 11, NOVEMBER 25 1 Elastic Model of Deformable Fingerti for Soft-fingered Maniulation Takahiro Inoue, Student Member, IEEE, and Shinichi Hirai, Member, IEEE Abstract
More informationDelay characterization of multi-hop transmission in a Poisson field of interference
1 Delay characterization of multi-ho transmission in a Poisson field of interference Kostas Stamatiou and Martin Haenggi, Senior Member, IEEE Abstract We evaluate the end-to-end delay of a multi-ho transmission
More informationA Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition
A Qualitative Event-based Aroach to Multile Fault Diagnosis in Continuous Systems using Structural Model Decomosition Matthew J. Daigle a,,, Anibal Bregon b,, Xenofon Koutsoukos c, Gautam Biswas c, Belarmino
More informationSystem Reliability Estimation and Confidence Regions from Subsystem and Full System Tests
009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract
More informationEstimation of Separable Representations in Psychophysical Experiments
Estimation of Searable Reresentations in Psychohysical Exeriments Michele Bernasconi (mbernasconi@eco.uninsubria.it) Christine Choirat (cchoirat@eco.uninsubria.it) Raffaello Seri (rseri@eco.uninsubria.it)
More information4. Score normalization technical details We now discuss the technical details of the score normalization method.
SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules
More informationFeedback-error control
Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller
More informationResearch of PMU Optimal Placement in Power Systems
Proceedings of the 5th WSEAS/IASME Int. Conf. on SYSTEMS THEORY and SCIENTIFIC COMPUTATION, Malta, Setember 15-17, 2005 (38-43) Research of PMU Otimal Placement in Power Systems TIAN-TIAN CAI, QIAN AI
More informationAutomatic Generation and Integration of Equations of Motion for Linked Mechanical Systems
Automatic Generation and Integration of Equations of Motion for Linked Mechanical Systems D. Todd Griffith a, John L. Junkins a, and James D. Turner b a Deartment of Aerosace Engineering, Texas A&M University,
More informationInformation collection on a graph
Information collection on a grah Ilya O. Ryzhov Warren Powell October 25, 2009 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements
More informationEstimating function analysis for a class of Tweedie regression models
Title Estimating function analysis for a class of Tweedie regression models Author Wagner Hugo Bonat Deartamento de Estatística - DEST, Laboratório de Estatística e Geoinformação - LEG, Universidade Federal
More informationAmin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE)
KAUST Reository Outage erformance of cognitive radio systems with Imroer Gaussian signaling Item tye Authors Erint version DOI Publisher Journal Rights Conference Paer Amin Osama; Abediseid Walid; Alouini
More informationLDPC codes for the Cascaded BSC-BAWGN channel
LDPC codes for the Cascaded BSC-BAWGN channel Aravind R. Iyengar, Paul H. Siegel, and Jack K. Wolf University of California, San Diego 9500 Gilman Dr. La Jolla CA 9093 email:aravind,siegel,jwolf@ucsd.edu
More informationInformation collection on a graph
Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements
More informationAn Outdoor Recreation Use Model with Applications to Evaluating Survey Estimators
United States Deartment of Agriculture Forest Service Southern Research Station An Outdoor Recreation Use Model with Alications to Evaluating Survey Estimators Stanley J. Zarnoch, Donald B.K. English,
More informationA Simple Throughput Model for TCP Veno
A Simle Throughut Model for TCP Veno Bin Zhou, Cheng Peng Fu, Dah-Ming Chiu, Chiew Tong Lau, and Lek Heng Ngoh School of Comuter Engineering, Nanyang Technological University, Singaore 639798 Email: {zhou00,
More informationOptimal Power Control over Fading Cognitive Radio Channels by Exploiting Primary User CSI
Otimal Power Control over Fading Cognitive Radio Channels by Exloiting Primary User CSI Rui Zhang Abstract arxiv:0804.67v2 [cs.it] 7 Feb 2009 This aer is concerned with sectrum sharing cognitive radio
More informationA Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression
Journal of Modern Alied Statistical Methods Volume Issue Article 7 --03 A Comarison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Ghadban Khalaf King Khalid University, Saudi
More informationHetNets: what tools for analysis?
HetNets: what tools for analysis? Daniela Tuninetti (Ph.D.) Email: danielat@uic.edu Motivation Seven Ways that HetNets are a Cellular Paradigm Shift, by J. Andrews, IEEE Communications Magazine, March
More informationA Study of Active Queue Management for Congestion Control
A Study of Active Queue Management for Congestion Control Victor Firoiu vfiroiu@nortelnetworks.com Nortel Networks 3 Federal St. illerica, MA 1821 USA Marty orden mborden@tollbridgetech.com Tollridge Technologies
More informationAnalysis of M/M/n/K Queue with Multiple Priorities
Analysis of M/M/n/K Queue with Multile Priorities Coyright, Sanjay K. Bose For a P-riority system, class P of highest riority Indeendent, Poisson arrival rocesses for each class with i as average arrival
More informationarxiv: v1 [quant-ph] 22 Apr 2017
Quaternionic Quantum Particles SERGIO GIARDINO Institute of Science and Technology, Federal University of São Paulo (Unifes) Avenida Cesare G. M. Lattes 101, 147-014 São José dos Camos, SP, Brazil arxiv:1704.06848v1
More informationFor q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i
Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:
More informationEvent-triggering stabilization of complex linear systems with disturbances over digital channels
Event-triggering stabilization of comlex linear systems with disturbances over digital channels Mohammad Javad Khojasteh, Mojtaba Hedayatour, Jorge Cortés, Massimo Franceschetti Abstract As stos and auses
More informationSampling and Distortion Tradeoffs for Bandlimited Periodic Signals
Samling and Distortion radeoffs for Bandlimited Periodic Signals Elaheh ohammadi and Farokh arvasti Advanced Communications Research Institute ACRI Deartment of Electrical Engineering Sharif University
More informationHidden Predictors: A Factor Analysis Primer
Hidden Predictors: A Factor Analysis Primer Ryan C Sanchez Western Washington University Factor Analysis is a owerful statistical method in the modern research sychologist s toolbag When used roerly, factor
More informationANALYTIC APPROXIMATE SOLUTIONS FOR FLUID-FLOW IN THE PRESENCE OF HEAT AND MASS TRANSFER
Kilicman, A., et al.: Analytic Aroximate Solutions for Fluid-Flow in the Presence... THERMAL SCIENCE: Year 8, Vol., Sul.,. S59-S64 S59 ANALYTIC APPROXIMATE SOLUTIONS FOR FLUID-FLOW IN THE PRESENCE OF HEAT
More informationEvaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models
Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu
More informationOptimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging
Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie Wireless Intelligent Networks Center WINC, Nile University,
More informationDeriving Indicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V.
Deriving ndicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V. Deutsch Centre for Comutational Geostatistics Deartment of Civil &
More informationOn Code Design for Simultaneous Energy and Information Transfer
On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Email: anshoo@nus.edu.sg Mehul Motani Electrical and Comuter
More informationOn the relationship between sound intensity and wave impedance
Buenos Aires 5 to 9 Setember, 16 Acoustics for the 1 st Century PROCEEDINGS of the nd International Congress on Acoustics Sound Intensity and Inverse Methods in Acoustics: Paer ICA16-198 On the relationshi
More informationRANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES
RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES AARON ZWIEBACH Abstract. In this aer we will analyze research that has been recently done in the field of discrete
More information1. Introduction. 2. Background of elliptic curve group. Identity-based Digital Signature Scheme Without Bilinear Pairings
Identity-based Digital Signature Scheme Without Bilinear Pairings He Debiao, Chen Jianhua, Hu Jin School of Mathematics Statistics, Wuhan niversity, Wuhan, Hubei, China, 43007 Abstract: Many identity-based
More informationOPTIMIZATION OF EARTH FLIGHT TEST TRAJECTORIES TO QUALIFY PARACHUTES FOR USE ON MARS
OPTIMIZATION OF EARTH FLIGHT TEST TRAJECTORIES TO QUALIFY PARACHUTES FOR USE ON MARS Christoher L. Tanner (1) (1) Sace Systems Design Laboratory, Daniel Guggenheim School of Aerosace Engineering Georgia
More informationAlgorithms for Air Traffic Flow Management under Stochastic Environments
Algorithms for Air Traffic Flow Management under Stochastic Environments Arnab Nilim and Laurent El Ghaoui Abstract A major ortion of the delay in the Air Traffic Management Systems (ATMS) in US arises
More informationA MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION
O P E R A T I O N S R E S E A R C H A N D D E C I S I O N S No. 27 DOI:.5277/ord73 Nasrullah KHAN Muhammad ASLAM 2 Kyung-Jun KIM 3 Chi-Hyuck JUN 4 A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST
More informationModeling Residual-Geometric Flow Sampling
1 Modeling Residual-Geometric Flow Samling Xiaoming Wang, Xiaoyong Li, and Dmitri Loguinov Abstract Traffic monitoring and estimation of flow arameters in high seed routers have recently become challenging
More informationEnd-to-End Delay Minimization in Thermally Constrained Distributed Systems
End-to-End Delay Minimization in Thermally Constrained Distributed Systems Pratyush Kumar, Lothar Thiele Comuter Engineering and Networks Laboratory (TIK) ETH Zürich, Switzerland {ratyush.kumar, lothar.thiele}@tik.ee.ethz.ch
More informationStochastic Optimal Linear Control of Wireless Networked Control Systems with Delays and Packet Losses
Stochastic Otimal Linear Control of Wireless Networked Control Systems with Delays and Packet Losses arxiv:446v [cssy 6 Oct 24 Zhuwei Wang, Xiaodong Wang, Fellow, IEEE, and Lihan Liu Abstract In this aer,
More informationMobility-Induced Service Migration in Mobile. Micro-Clouds
arxiv:503054v [csdc] 7 Mar 205 Mobility-Induced Service Migration in Mobile Micro-Clouds Shiiang Wang, Rahul Urgaonkar, Ting He, Murtaza Zafer, Kevin Chan, and Kin K LeungTime Oerating after ossible Deartment
More informationExtreme Value FEC for Reliable Broadcasting in Wireless Networks
Extreme Value FEC for Reliable Broadcasting in Wireless Networks Weiyao Xiao and David Starobinski Deartment of Electrical and Comuter Engineering Boston University, Boston, MA 225 Email:{weiyao, staro}@bu.edu
More informationDistributed K-means over Compressed Binary Data
1 Distributed K-means over Comressed Binary Data Elsa DUPRAZ Telecom Bretagne; UMR CNRS 6285 Lab-STICC, Brest, France arxiv:1701.03403v1 [cs.it] 12 Jan 2017 Abstract We consider a networ of binary-valued
More informationSlash Distributions and Applications
CHAPTER 2 Slash Distributions and Alications 2.1 Introduction The concet of slash distributions was introduced by Kafadar (1988) as a heavy tailed alternative to the normal distribution. Further literature
More informationAdaptive estimation with change detection for streaming data
Adative estimation with change detection for streaming data A thesis resented for the degree of Doctor of Philosohy of the University of London and the Diloma of Imerial College by Dean Adam Bodenham Deartment
More informationSTART Selected Topics in Assurance
START Selected Toics in Assurance Related Technologies Table of Contents Introduction Statistical Models for Simle Systems (U/Down) and Interretation Markov Models for Simle Systems (U/Down) and Interretation
More informationSTABILITY ANALYSIS AND CONTROL OF STOCHASTIC DYNAMIC SYSTEMS USING POLYNOMIAL CHAOS. A Dissertation JAMES ROBERT FISHER
STABILITY ANALYSIS AND CONTROL OF STOCHASTIC DYNAMIC SYSTEMS USING POLYNOMIAL CHAOS A Dissertation by JAMES ROBERT FISHER Submitted to the Office of Graduate Studies of Texas A&M University in artial fulfillment
More informationFactors Effect on the Saturation Parameter S and there Influences on the Gain Behavior of Ytterbium Doped Fiber Amplifier
Australian Journal of Basic and Alied Sciences, 5(12): 2010-2020, 2011 ISSN 1991-8178 Factors Effect on the Saturation Parameter S and there Influences on the Gain Behavior of Ytterbium Doed Fiber Amlifier
More informationPressure-sensitivity Effects on Toughness Measurements of Compact Tension Specimens for Strain-hardening Solids
American Journal of Alied Sciences (9): 19-195, 5 ISSN 1546-939 5 Science Publications Pressure-sensitivity Effects on Toughness Measurements of Comact Tension Secimens for Strain-hardening Solids Abdulhamid
More information3312 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 5, MAY 2016
3312 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 5, MAY 2016 L -Problem-Based Transmission Rate Allocation With Packet Loss and Power Metrics Over Satellite Networks Igor Bisio, Senior Member,
More informationDamage Identification from Power Spectrum Density Transmissibility
6th Euroean Worksho on Structural Health Monitoring - h.3.d.3 More info about this article: htt://www.ndt.net/?id=14083 Damage Identification from Power Sectrum Density ransmissibility Y. ZHOU, R. PERERA
More informationHomework Set #3 Rates definitions, Channel Coding, Source-Channel coding
Homework Set # Rates definitions, Channel Coding, Source-Channel coding. Rates (a) Channels coding Rate: Assuming you are sending 4 different messages using usages of a channel. What is the rate (in bits
More informationThe directivity of the forced radiation of sound from panels and openings including the shadow zone
The directivity of the forced radiation of sound from anels and oenings including the shadow zone J. Davy RMIT University, Alied Physics, GPO Box 476V, 3001 Melbourne, Victoria, Australia john.davy@rmit.edu.au
More informationDelay Performance of Threshold Policies for Dynamic Spectrum Access
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL., NO. 7, JULY 83 Delay Performance of Threshold Policies for Dynamic Sectrum Access Rong-Rong Chen and Xin Liu Abstract In this aer, we analyze the delay
More informationSimplifications to Conservation Equations
Chater 5 Simlifications to Conservation Equations 5.1 Steady Flow If fluid roerties at a oint in a field do not change with time, then they are a function of sace only. They are reresented by: ϕ = ϕq 1,
More information