Vision Graph Construction in Wireless Multimedia Sensor Networks

Size: px
Start display at page:

Download "Vision Graph Construction in Wireless Multimedia Sensor Networks"

Transcription

1 University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Conference and Worksho Paers Comuter Science and Engineering, Deartment of 21 Vision Grah Construction in Wireless Multimedia Sensor Networks Xin Dong University of Nebraska-Lincoln, xdong@cse.unl.edu Mehmet C. Vuran University of Nebraska-Lincoln, mcvuran@cse.unl.edu Follow this and additional works at: htt://digitalcommons.unl.edu/cseconfwork Dong, Xin and Vuran, Mehmet C., "Vision Grah Construction in Wireless Multimedia Sensor Networks" (21). CSE Conference and Worksho Paers htt://digitalcommons.unl.edu/cseconfwork/285 This Article is brought to you for free and oen access by the Comuter Science and Engineering, Deartment of at DigitalCommons@University of Nebraska - Lincoln. It has been acceted for inclusion in CSE Conference and Worksho Paers by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln.

2 Vision Grah Construction in Wireless Multimedia Sensor Networks Xin Dong and Mehmet C. Vuran Cyber-Physical Networking Laboratory Deartment of Comuter Science & Engineering University of Nebraska-Lincoln, Lincoln, NE {xdong, Abstract In Wireless multimedia sensor networks (WMSNs), the camera nodes connected in the vision grah share overlaed field of views (FOVs) and they deend on the densely deloyed relay nodes in the communication network grah to communicate with each other. Given a uniformly deloyed camera sensor network with relay nodes, the roblem is to find the number of hos for the vision-grah-neighbor-searching messages to construct the vision grah in an energy efficient way. In this aer, mathematical models are develoed to analyze the FOV overla of the camera nodes and the multi-ho communications in two dimensional toologies, which are utilized to analyze the relation between vision grah construction and maximum ho count. In addition, simulations are conducted to verify the models. I. INTRODUCTION Recently, the advances in low cost CMOS imaging sensors have made wireless multimedia sensor networks (WMSNs) ossible [1][5]. In WMSNs, multile camera sensors are deloyed to monitor an area. Potential alications of WMSNs include surveillance, traffic tracking, wildlife monitoring, and battlefield monitoring. The challenges faced by scalar wireless sensor networks, such as energy constraints, limited rocessing caabilities, unreliability and low accuracy of obtained data, are only exacerbated in WMSNs. To imrove the sensing quality, a certain level of collaboration among sensor nodes are required. In [1], collaborative multimedia in-network rocessing is suggested, which can utilize the comutational caacity of sensors as well as reduce communication cost and energy consumtion. In [2], scalar sensors are exloited to hel camera nodes detect events in WMSNs. More directly, camera sensors can collaborate with each other to accomlish tasks. This is achieved by exloiting the overlaed field-of-views of the camera sensors. In a WMSN, each camera sensor has its own directional sensing range, known as the field-of-view (FOV), and cameras may have overlaed FOVs such that if an event occurs in this overlaed area, several cameras may cature this event in different ersectives. These camera nodes form a vision grah [4], in which an edge between two cameras indicates they share an overlaed FOV and the two cameras are called vision grah neighbors. Some research exloits the characteristics of the overlaed FOVs in collaboration of camera sensor nodes. In [6], routing aths are established based on the overlaed FOVs of camera nodes. In [3] and [8], overlaed FOVs are exloited to define correlation among camera nodes and this correlation is used for cooerative video rocessing. Meanwhile, in [4], the images of the overlaed FOVs have been exlored to calibrate the camera nodes. To construct vision grahs in WMSNs, two methods are widely used in literature. The cameras nodes may know their locations and directions ariori[3], or reference objects are used for camera nodes to calculate overlaed FOVs [7][8]. However, in these works, simle flooding is emloyed to exchange information among camera nodes. It is well known that for large scale WSNs, flooding is imractical in terms of communication cost and network congestion. In this aer, we roose a limited-ho-number multi-ho communication for constructing the vision grah in WMSNs. Given a uniformly deloyed camera sensor network with relay nodes, we are interested in finding the maximum allowed ho count for the vision-grah-neighbor-searching messages (hello message) in order to construct the vision grah in an energy efficient way. Mathematical models are develoed to analyze the robability of constructing the vision grah for different message lifetime (maximum ho count). This is achieved by develoing a robabilistic model of the overlaed FOV for different distance and the robabilistic model of the roagation distance for different message life time. In [9], the authors have roosed a method to analyze the robability distribution of multi-ho communications in WSNs. However, only one dimensional toology is considered and the channel is assumed to be erfect. In this aer, we roose a recursive method to analyze the multi-ho communications of WMSNs in two dimensional toologies. Moreover, a more ractical channel model is adoted to cature the feature of wireless communication. In addition, simulations are conducted to verify our models. To the best of our knowledge, this is the first aer to address the communication roblem of constructing the vision grah in WMSNs. Our main contributions are: The robabilistic model of two cameras having an overlaed FOV with resect to their distance; The 2-D multi-ho communication model that mas maximum ho number to connectivity; The mathematical model to calculate the needed maximum ho number to construct the vision grah for a given WMSN. The remainder of this aer is organized as follows: The robabilistic models for the overlaed FOV, the multi-ho communication and the vision grah construction are develoed in Section II. Simulations and Numerical analysis of those models are rovided in Section III. Furthermore, the conclusions are

3 r v 1 2 c d c 1 2 Camera Node drawn in Section IV. Fig. 1. Overlaed FOV The system overview. II. SYSTEM MODEL Relay Node We consider alications in which the camera sensors are randomly deloyed. To connect these camera sensors, other relay nodes are also randomly deloyed among them by Poisson random rocess. After deloyment, the camera sensors send hello messages that have a maximum allowed ho count to find their vision grah neighbors. In each transmission, the sender broadcast a hello message unless the message achieves its maximum allowed ho count. When a camera sensor receives a hello message from its eers, it uses the location and direction information to calculate if the source of the message is its vision grah neighbor. Hence the vision grah is constructed in a distributed manner. Denote the robability of constructing the vision grah v, our goal is to relate this robability to the maximum allowed ho count, n, of the hello message. v is given as v (n) = vc (d, n)dd, (1) v (d)dd where vc (d, n) is the robability of successfully connected vision grah neighbors given the distance d and the maximum ho number n whereas v (d) is the robability of having vision grah neighbors given distance d. v (d) is related to the FOV of the camera and it is develoed in Section II-A, while vc (d, n) is related to the multi-ho communication of the sensors, and the model is rovided in Section II-B. In Section II-C, those two models are utilized to develo the model for vision grah construction. A. Overlaed Field of View The FOV of a camera is modeled as a fan sector in a 2D lane, as shown in Fig. 1. It is defined by a tule (r v,α), where r v is the FOV radius, which determines the maximum distance the camera can observe, and α is the visual angle, which deicts the width of the FOV. The overla model is shown in Fig. 1. It is observed that given the distance d of two cameras, when these two cameras are at some secific directions, they will have overlaed FOV and become vision grah neighbors. Given the assumtion that the direction of the camera is uniformly distributed, the robability that two cameras are vision grah neighbors is equal to the ortion of directions at which they have an overlaed FOV. When given the direction of the first camera at angle θ 1, there exists a range [θ2 min,θ2 max ], such that when the direction of the second camera, θ 2, is in this range, these two cameras have an overlaed FOV. As θ 1 changes, the range of θ 2 changes too. With the ranges of θ 1 and θ 2 in which the two camera nodes can have an overlaed FOV at distance d, the robability of having an overlaed FOV at distance d, which is denoted as o (d), is the integral of the ranges divided by the maximum range. Thus, o (d) = 1 2π 2 i θ max,i 1 θ min,i 1 (θ max,i 2 θ min,i 2 )dθ 1. (2) In Table I, the ranges of θ 1 and θ 2, in which two camera nodes have an overlaed FOV for different distance, d, are listed. For a given d, the range of θ 1 is divided into categories, and in each category, the range of θ 2 can be exressed by the value of θ 1. Note in the tables, the range of θ 1 is only considered as in range [,π]. For the range [π, 2π], it is a mirror of [,π]. Also note that the camera visual angle α imacts the boundary conditions in (2), as shown in Table I and in three different cases ([, π 4 ], [ π 4, π 3 ], [ π 3, π 2 ]), the exressions are different. Here, we assume the visual angle of the camera α is in the range of [ π 4, π 3 ]. The variables a 1 a 6 in Table I are given as follows: a 1 =cos 1 d, (3) 2r v a 2 = tan 1 r v sin (θ ) d r v cos (θ ), (4) a 3 =sin 1 r v d, (5) a 4 =cos 1 d tan2 (θ )+ rv 2 + rv 2 tan 2 (θ ) d 2 tan 2 (θ ) r v (1 + tan 2, (θ )) (6) a 5 =cos 1 d tan2 (θ ) rv 2 + rv 2 tan 2 (θ ) d 2 tan 2 (θ ) r v (1 + tan 2, (θ )) (7) a 6 =cos 1 d tan2 (θ + )+ rv 2 + rv 2 tan 2 (θ + ) d 2 tan 2 (θ + ) r v (1 + tan 2, (θ + )) (8) where θ = θ 1 α and θ + = θ 1 + α. As exected, it is noticed from Table I that when the two cameras are close to each other, the ranges in which they can be vision grah neighbors are larger, which means the robability that they are vision grah neighbors is greater. B. Multi-ho Communication In this section, we develo a model to analyze multiho communication of two camera nodes in wireless sensor networks. In the analysis, the distance of camera node A and B is denoted as l and the density of the relay nodes is λ. In addition, log-normal shadowing model is emloyed to reresent the channel. In our model, Cd n reresents the event that two nodes at distance d can communicate through exactly n hos, while C d n reresents the oosite. The robability of event Cn d is

4 TABLE I THE POSSIBLE RANGES OF θ 1 AND θ 2 TO HAVE AN OVERLAPPED FOV FOR DIFFERENT DISTANCE d. 2rv <d 2r v 1 [,α cos 1 d ] [π a 2r 1 α, π + a 1 + α] v 2 [α cos 1 d,α] 2r v [π a 1 α, π a 2 + α] 3 [α, cos 1 d + α] [π a 2r 1 α, π a 4 + α] v r v <d 2r v 1 [,α cos 1 rv d ] [ a 3 + π α, a 3 + π + α] 2 [α cos 1 r v d,α] [ a 3 + π α, π a 2 + α] 3 [α, cos 1 rv d + α] [ a 3 + π α, π a 4 + α] 4 [cos 1 rv d + α, cos 1 + α] [π a d 2r 2 α, π a 4 + α] v 5 [cos 1 d + α, sin 1 rv 2r v d + α] [π a 5 α, π a 4 + α] 2r v cos(2α) <d r 1 [,α] [, 2π] 2 [α, cos 1 d + α] 2r v [π + a 2 α, π + α] 3 [cos 1 d + α, π α] 2r v [π a 5 α, π + α] 4 [π α, α + π [π a 5 α, a 6 + π + α] 5 [α + π 2,π] [π a 4 α, a 6 + π + α] <d 2r v cos(2α) 1 [,α] [, 2π] 2 [α, π α] [π a 2 α, π + α] 3 [π α, cos 1 d + α] 2r v [π a 2 α, a 6 + π + α] 4 [cos 1 d 2r v + α, α + π [π a 5 α, a 6 + π + α] 5 [α + π 2,π] [π a 4 α, a 6 + π + α] denoted as c (d, n) and the robability of event C n d is q c(d, n). In addition, P c (d, n) denotes the robability that two nodes can communicate at a distance d through u to n hos. Adoting the shadowing channel model [11], the signal noise ratio (SNR), φ, in db is exressed as φ(x σ,l)=p t PL(d ) 1η log 1 ( d d ) X σ P n, (9) where P t is the transmission ower, PL(d ) is the attenuation at the reference distance d, X σ is the shadowing effect random variable and P n is the noise floor. The symbol error rate, s (X σ,d) is calculated by s (X σ,d)=q (β 2 (φ(x σ,d) β 1 )), (1) where β 1 and β 2 are two arameters obtained by exeriments [12]. Note that other error rate models can be used in our scheme. For examle, a means to calculate the error rate for MicaZ mote is develoed in [1]. The robability that two nodes can communicate in one ho is: c (d, 1) = { Cd 1 } = (1 s (N,d)) L f Xσ (X σ )dx σ, (11) where L is the acket length in symbols, and f Xσ (X σ ) is the df of the shadowing effect random variable, X σ, which is Gaussian. For the one ho situation, the robability that two nodes can communicate within u to 1 ho is given simly by P c (d, 1) = c (d, 1). (12) Fig. 2. The multi-ho model. When the number of hos is greater than 2, we develo our model as shown in Fig. 2. The event that node A has a n- ho communication ath to node B equals to the event that there is node x at osition (ρ x,θ x ), which has a 1-ho ath to A a (n 1)-ho communication ath to node B. Assume the location of the intermediate node, x, is(ρ x,θ x ), where ρ x is the distance between x and B, and θ x is the angle of x with resect to vector BA. Thus, the distance between x and A can be exressed as ρ xa = (l ρ x cos θ x ) 2 +(ρ x sin θ x ) 2. (13) Given Poisson rocess density λ, the robability that at osition (ρ x,θ x ) there is a node is e (ρ x,θ x )=1 e λρxδρxδθx λρ x Δρ x Δθ x. (14) The aroximation holds when the area ρ x Δρ x Δθ x. The ranges of ρ x and θ x are <ρ x and θ x 2π. The robability of 1-ho communication between x and A is c (ρ xa, 1), where ρ xa is the distance from A to x. Recursively, the robability that node x has a (n 1)-ho communication ath to node B is c (ρ x,n 1). Therefore, c (d, n) =1 ρ x θ x (1 (λρ x Δρ x Δθ x ) c (ρ xa, 1) c (ρ x,n 1)). (15) In (15),1 (λρ x Δρ x Δθ x ) c (ρ xa, 1) c (ρ x,n 1) defines the robability that there is no intermediate node at (ρ x,θ x ) which satisfies the requirements. Since the relay nodes are deloyed indeendently, the roduct over ρ x and θ x is the robability that there is no intermediate node at the whole lanar which has 1-ho communication to A and n 1 communication to B. This is equal to the robability that A and B cannot communicate in n hos. Finally, subtracting that robability from 1 is the robability that the two camera nodes, A and B, can have a n-ho communication. Also, the robability that two nodes at distance l can communicate within u to n hos is P c (d, n) = { Cd} 1 { + C1 d,cd} 2 + { + C1 d, C } d,..., 2 (n 1) C d,cd n. (16)

5 The first term in (16) is the robability of communication in 1 ho, the second term is the robability that the two camera nodes cannot communicate in 1 ho but can communicate in 2 hos. Generally, the nth term is the robability that the two camera nodes cannot communicate within u to (n 1) hos but can communicate in n hos. The sum is the robability that the two nodes can communicate within u to n hos. Assume that given distance, d, C1 l,..., C d n and C1 d,...,cn d are indeendent1, thus, we have P c (d, n) = { Cd} 1 { } { } + C1 d C 2 d + + { } { } C1 d C(n 1) d {Cd n } = c (d, 1) + q c (d, 1) c (d, 2) + (17) ( n 1 ) + q c (d, i) c (d, n). i=1 C. Vision Grah Construction The communication range of nodes in WSNs is short, hence a camera node s vision grah neighbors may be several hos away. On the other hand, two closely located camera nodes may not be vision grah neighbors. Given a uniformly deloyed camera sensor network with relay sensors, we show the robability of vision grah construction as a function of the maximum allowed ho count of the hello messages. Assume the camera node deloyment is a Poisson oint rocess and denote the camera node density as κ. Giventhe distance d, the robability that a camera node has vision grah neighbors at distance d is v (d) = ( 1 e κaμ) o (d) κa μ o (l), (18) where o (d) is the robability that two cameras have an overlaed FOV when the distance is d, which is rovided in Section II-A, and A μ is the size of an infinitely small circle area, which is exressed as A(μ) =2πd dd. The aths to some far away vision grah neighbors may not be established because of the limitation of the maximum message ho number. Thus, we consider the robability of constructing the vision grah as the ratio of the connected vision grah neighbors against all vision grah neighbors. Given a camera node A, the robability that there are camera nodes at distance d which are vision grah neighbors of A and they can communicate within n-hos is vc (l, n) = v (d)p c (d, n), (19) where v (d) is given in (18) and P c (d, n) is given in (17). The robability of constructing the vision grah using n-ho communication is v (n) = = = vc (d, n)dd v (d)dd 2πκd o (d)p c (d, n)dd 2πκd o (d)dd o (d)p c (d, n)d dd, o (d)d dd (2) 1 In [9], it is ointed out that in reality it is not the case, however, the simulation shows it is a reasonable simlification. TABLE II PARAMETER LIST. Parameter r v P t d PL d η Value 1 m dbm 1 m 55.4 dbm 4.7 Parameter σ P n λ β 1 β 2 Value dbm Probability of vision grah conscruction (%) Theoretical analysis Simulation Maximum ho number Fig. 3. The comarison of the theoretical analysis and the simulation results for constructing the vision grah. III. NUMERICAL ANALYSIS In this section, numerical analysis of the system model is erformed using Matlab. We first use TOSSIM simulation to verify our model in Section III-A, after which the camera FOV overla model, the multi-ho communication model as well as the model for constructing vision grah in WMSNs are analyzed in Section III-B. The arameters used in the analysis are listed in Table II. A. Model Verification To verify the models, we have simulated the WMSNs using TOSSIM. In the simulations, 1 network toologies are generated by a Poisson rocess, and the size of the field is 5 m 5 m. In each toology, two cameras nodes are set with random distance and random direction. Unless otherwise noted, he vision angle of each camera is 5π 18. Note all the camera airs in the 1 toologies are vision grah neighbors. Since we consider the ratio of the successful connected vision grah neighbors over all vision grah neighbors, if the two cameras are not vision grah neighbors, they do not have imact on the result. The other arameters are set the same as in Table II. In Fig. 3, the theoretical and the simulation results of the robability of constructing the vision grah are shown. It is observed from Fig. 3 that the mathematical model catures the characteristics of the FOV overla and the multi-ho communication. For our settings, instead of unlimited flooding, 5-ho broadcast is sufficient to construct the vision grah with a high confidence (91%). In other words, when deloying the WMSN, the camera nodes need to broadcast a hello message with maximum ho count of 5 to find the vision grah neighbors. B. Model Analysis In this section, the mathematical models are analyzed. In Fig. 4(a), the robability of camera FOV overlaing over

6 Probability of overla (%) α=π/4 α=5π/18 α=11π/36 α=π/ Distance (m) (a) Probability of multi ho connectivity (%) ho 2 hos 3 hos 4 hos 5 hos 6 hos 7 hos 8 hos Distance (m) (b) Probability of vision grah conscruction (%) α=π/4 2 α=5π/18 α=11π/36 α=π/ Maximum ho count (c) Fig. 4. (a) The robability of FOV overla, (b) the robability of multi-ho connectivity and (c) the robability vision grah construction. distance is shown for different camera vision angles. It is observed that when the camera vision angle is larger, the robability that two cameras have an overlaed FOV is greater. At the distance of 5 m, if the camera vision angle is π 3,itis 12% more likely to have a vision grah neighbor than camera vision angle of π 4. Also, the decrease of the robability over distance is not constant. Around distance of 1 m, which is the vision range, there is a shar dro. Thus, most vision grah neighbors will be in a close distance. The robability of connectivity for the multi-ho communication is deicted in Fig. 4(b), where the ho counts are the maximum allowed ho counts. It is shown that if the 1- ho coverage is r, the coverage for n-ho is slightly more than nr. For examle, at 9% connectivity, the coverage of 1-ho is 4.57 m, however, the coverage of 3-ho is 14.73, m and the overage of 5-ho is m. The reason behind this is that the log-normal channel model does not have a cut-off value as the maximum transmission range. Thus, beyond the 9% connectivity range, there are still some nodes that receive the message. Accordingly, their transmission can increase the coverage in the next ho. In addition, because the maximum distance of two vision grah neighbors in our setting is 2 m, we would assume the needed ho count is 4. The robability of constructing the vision grah as a function of maximum ho counts is shown in Fig. 4(c) for different camera vision angles. It is exected that because when the camera vision angle is greater, the two cameras are more likely to be vision grah neighbors, thus given a maximum ho count, the robability of constructing the vision grah is lower. However, the analysis shows the decrease of the robability is not significant. In fact, when the maximum ho count is 2, where the difference is most notable, the robability of constructing the vision grah for camera vision angle of π 4 is 52.8%, and for camera vision angle of π 3, the robability is 48.28%. IV. CONCLUSIONS In this aer, we address the issue of constructing vision grahs in WMSNs. A mathematical model for the camera field of view overlaing is develoed to analyze the robability of having vision grah neighbor over distance. Meanwhile, a multi-ho communication model with a realistic channel model is develoed to analyze the robability of multi-ho connectivity. Simulations are established to verify these models, which show that the mathematical models cature the characteristics of the FOV overlaing and the multi-ho communication. For our settings, instead of unlimited flooding, 5-ho broadcast is sufficient to construct the vision grah with high robability. REFERENCES [1] I. F. Akyildiz, T. Melodia, and K. R. Chowdhury, A survey on wireless multimedia sensor networks, Comuter Networks, vol. 51, no. 4, , 27. [2] A. Czarlinska and D. Kundur, Reliable Event-Detection in Wireless Visual Sensor Networks Through Scalar Collaboration and Game-Theoretic Consideration, IEEE Transactions on Multimedia, vol. 1, no. 5, , 28. [3] R. Dai and I. F. Akyildiz, A satial correlation model for visual information in wireless multimedia sensor networks, IEEE Transactions on Multimedia, vol. 11, no. 6, , 29. [4] D. Devarajan, Z. Cheng, and R. Radke, Calibrating distributed camera networks, Proceedings of the IEEE (Secial Issue on Distributed Smart Cameras), vol. 96, no. 1, 29. [5] S. Stanislava and H. Wendi, A Survey of Visual Sensor Networks, Advances in Multimedia, vol. 29, 29. [6] T. Ko and N. Berry, On scaling distributed low-ower wireless image sensors, in Proc. System Sciences, 26. HICSS 6. Proceedings of the 39th Annual Hawaii International Conference on, vol. 9, 26. [7] P. Kulkarni, P. Shenoy, and D. Ganesan, Aroximate initialization of camera sensor networks, Lecture Notes in Comuter Science, vol. 4373,. 67, 27. [8] H. Ma and Y. Liu, Correlation based video rocessing in video sensor networks, in Proc. IEEE Intl. Conf on Wireless Networks, Communications and Mobile Comuting, vol. 2, 25. [9] S. Vural and E. Ekici, Probability distribution of multiho distance in one-dimensional sensor networks, Comuter Networks Journal (Elsevier), vol. 51, no. 13, , 27. [1] M. C. Vuran and I. F. Akyildiz, Error control in wireless sensor networks: a cross layer analysis, IEEE/ACM Transactions on Networking (TON), vol. 17, no. 4, , 29. [11] M. Zuniga and B. Krishnamachari, Analyzing the transitional region in low ower wireless links in Proc. IEEE SECON 4, , Oct. 24. [12] htt://

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms

More information

An Analysis of TCP over Random Access Satellite Links

An Analysis of TCP over Random Access Satellite Links An Analysis of over Random Access Satellite Links Chunmei Liu and Eytan Modiano Massachusetts Institute of Technology Cambridge, MA 0239 Email: mayliu, modiano@mit.edu Abstract This aer analyzes the erformance

More information

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications

Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications Bartłomiej Błaszczyszyn Paul Muhlethaler Nadjib Achir INRIA/ENS INRIA Rocquencourt INRIA Rocquencourt

More information

Session 5: Review of Classical Astrodynamics

Session 5: Review of Classical Astrodynamics Session 5: Review of Classical Astrodynamics In revious lectures we described in detail the rocess to find the otimal secific imulse for a articular situation. Among the mission requirements that serve

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data Quality Technology & Quantitative Management Vol. 1, No.,. 51-65, 15 QTQM IAQM 15 Lower onfidence Bound for Process-Yield Index with Autocorrelated Process Data Fu-Kwun Wang * and Yeneneh Tamirat Deartment

More information

Modeling and Estimation of Full-Chip Leakage Current Considering Within-Die Correlation

Modeling and Estimation of Full-Chip Leakage Current Considering Within-Die Correlation 6.3 Modeling and Estimation of Full-Chi Leaage Current Considering Within-Die Correlation Khaled R. eloue, Navid Azizi, Farid N. Najm Deartment of ECE, University of Toronto,Toronto, Ontario, Canada {haled,nazizi,najm}@eecg.utoronto.ca

More information

Optimal Recognition Algorithm for Cameras of Lasers Evanescent

Optimal Recognition Algorithm for Cameras of Lasers Evanescent Otimal Recognition Algorithm for Cameras of Lasers Evanescent T. Gaudo * Abstract An algorithm based on the Bayesian aroach to detect and recognise off-axis ulse laser beams roagating in the atmoshere

More information

On the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1

On the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 On the Relationshi Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 Imad Antonios antoniosi1@southernct.edu CS Deartment MO117 Southern Connecticut State University 501 Crescent St.

More information

A continuous review inventory model with the controllable production rate of the manufacturer

A continuous review inventory model with the controllable production rate of the manufacturer Intl. Trans. in O. Res. 12 (2005) 247 258 INTERNATIONAL TRANSACTIONS IN OERATIONAL RESEARCH A continuous review inventory model with the controllable roduction rate of the manufacturer I. K. Moon and B.

More information

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging 1 Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie, Member, IEEE, arxiv:1401.0340v3 [cs.it] 27 Ar 2014

More information

Plotting the Wilson distribution

Plotting the Wilson distribution , Survey of English Usage, University College London Setember 018 1 1. Introduction We have discussed the Wilson score interval at length elsewhere (Wallis 013a, b). Given an observed Binomial roortion

More information

ECE 534 Information Theory - Midterm 2

ECE 534 Information Theory - Midterm 2 ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You

More information

q-ary Symmetric Channel for Large q

q-ary Symmetric Channel for Large q List-Message Passing Achieves Caacity on the q-ary Symmetric Channel for Large q Fan Zhang and Henry D Pfister Deartment of Electrical and Comuter Engineering, Texas A&M University {fanzhang,hfister}@tamuedu

More information

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO) Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment

More information

Chapter 1 Fundamentals

Chapter 1 Fundamentals Chater Fundamentals. Overview of Thermodynamics Industrial Revolution brought in large scale automation of many tedious tasks which were earlier being erformed through manual or animal labour. Inventors

More information

Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems

Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems Hsiao-Lan Chiang, Tobias Kadur, and Gerhard Fettweis Vodafone Chair for Mobile Communications Technische Universität

More information

Spatial Outage Capacity of Poisson Bipolar Networks

Spatial Outage Capacity of Poisson Bipolar Networks Satial Outage Caacity of Poisson Biolar Networks Sanket S. Kalamkar and Martin Haenggi Deartment of Electrical Engineering, University of Notre Dame, Notre Dame, IN 46556, USA E-mail: skalamka@nd.edu,

More information

On split sample and randomized confidence intervals for binomial proportions

On split sample and randomized confidence intervals for binomial proportions On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have

More information

Anytime communication over the Gilbert-Eliot channel with noiseless feedback

Anytime communication over the Gilbert-Eliot channel with noiseless feedback Anytime communication over the Gilbert-Eliot channel with noiseless feedback Anant Sahai, Salman Avestimehr, Paolo Minero Deartment of Electrical Engineering and Comuter Sciences University of California

More information

Age of Information: Whittle Index for Scheduling Stochastic Arrivals

Age of Information: Whittle Index for Scheduling Stochastic Arrivals Age of Information: Whittle Index for Scheduling Stochastic Arrivals Yu-Pin Hsu Deartment of Communication Engineering National Taiei University yuinhsu@mail.ntu.edu.tw arxiv:80.03422v2 [math.oc] 7 Ar

More information

Understanding and Using Availability

Understanding and Using Availability Understanding and Using Availability Jorge Luis Romeu, Ph.D. ASQ CQE/CRE, & Senior Member Email: romeu@cortland.edu htt://myrofile.cos.com/romeu ASQ/RD Webinar Series Noviembre 5, J. L. Romeu - Consultant

More information

Power Aware Wireless File Downloading: A Constrained Restless Bandit Approach

Power Aware Wireless File Downloading: A Constrained Restless Bandit Approach PROC. WIOP 204 Power Aware Wireless File Downloading: A Constrained Restless Bandit Aroach Xiaohan Wei and Michael J. Neely, Senior Member, IEEE Abstract his aer treats ower-aware throughut maximization

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

Understanding and Using Availability

Understanding and Using Availability Understanding and Using Availability Jorge Luis Romeu, Ph.D. ASQ CQE/CRE, & Senior Member C. Stat Fellow, Royal Statistical Society Past Director, Region II (NY & PA) Director: Juarez Lincoln Marti Int

More information

Embedded acoustic emission system based on rock sound source crowd location

Embedded acoustic emission system based on rock sound source crowd location Qing EURASIP Journal on Embedded Systems (2017) 2017:11 DOI 10.116/s13639-016-004-4 EURASIP Journal on Embedded Systems RESEARCH Embedded acoustic emission system based on rock sound source crowd location

More information

Lightning Attachment Models and Perfect Shielding Angle of Transmission Lines

Lightning Attachment Models and Perfect Shielding Angle of Transmission Lines Lightning Attachment Models and Perfect Shielding Angle of Transmission Lines Pantelis N. Mikrooulos 1 and Thomas E. Tsovilis High Voltage Laboratory, School of Electrical & Comuter Engineering, Faculty

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

Developing A Deterioration Probabilistic Model for Rail Wear

Developing A Deterioration Probabilistic Model for Rail Wear International Journal of Traffic and Transortation Engineering 2012, 1(2): 13-18 DOI: 10.5923/j.ijtte.20120102.02 Develoing A Deterioration Probabilistic Model for Rail Wear Jabbar-Ali Zakeri *, Shahrbanoo

More information

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators S. K. Mallik, Student Member, IEEE, S. Chakrabarti, Senior Member, IEEE, S. N. Singh, Senior Member, IEEE Deartment of Electrical

More information

Finite-State Verification or Model Checking. Finite State Verification (FSV) or Model Checking

Finite-State Verification or Model Checking. Finite State Verification (FSV) or Model Checking Finite-State Verification or Model Checking Finite State Verification (FSV) or Model Checking Holds the romise of roviding a cost effective way of verifying imortant roerties about a system Not all faults

More information

On the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting

On the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting On the Role of Finite Queues in Cooerative Cognitive Radio Networks with Energy Harvesting Mohamed A. Abd-Elmagid, Tamer Elatt, and Karim G. Seddik Wireless Intelligent Networks Center (WINC), Nile University,

More information

Diverse Routing in Networks with Probabilistic Failures

Diverse Routing in Networks with Probabilistic Failures Diverse Routing in Networks with Probabilistic Failures Hyang-Won Lee, Member, IEEE, Eytan Modiano, Senior Member, IEEE, Kayi Lee, Member, IEEE Abstract We develo diverse routing schemes for dealing with

More information

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK Towards understanding the Lorenz curve using the Uniform distribution Chris J. Stehens Newcastle City Council, Newcastle uon Tyne, UK (For the Gini-Lorenz Conference, University of Siena, Italy, May 2005)

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4 Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work

More information

Modeling Residual-Geometric Flow Sampling

Modeling Residual-Geometric Flow Sampling Modeling Residual-Geometric Flow Samling Xiaoming Wang Amazon.com Seattle, WA 98101 USA Email: xmwang@gmail.com Xiaoyong Li Texas A&M University College Station, TX 77843 USA Email: xiaoyong@cse.tamu.edu

More information

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca

More information

ECE 6960: Adv. Random Processes & Applications Lecture Notes, Fall 2010

ECE 6960: Adv. Random Processes & Applications Lecture Notes, Fall 2010 ECE 6960: Adv. Random Processes & Alications Lecture Notes, Fall 2010 Lecture 16 Today: (1) Markov Processes, (2) Markov Chains, (3) State Classification Intro Please turn in H 6 today. Read Chater 11,

More information

A Special Case Solution to the Perspective 3-Point Problem William J. Wolfe California State University Channel Islands

A Special Case Solution to the Perspective 3-Point Problem William J. Wolfe California State University Channel Islands A Secial Case Solution to the Persective -Point Problem William J. Wolfe California State University Channel Islands william.wolfe@csuci.edu Abstract In this aer we address a secial case of the ersective

More information

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations PINAR KORKMAZ, BILGE E. S. AKGUL and KRISHNA V. PALEM Georgia Institute of

More information

The Noise Power Ratio - Theory and ADC Testing

The Noise Power Ratio - Theory and ADC Testing The Noise Power Ratio - Theory and ADC Testing FH Irons, KJ Riley, and DM Hummels Abstract This aer develos theory behind the noise ower ratio (NPR) testing of ADCs. A mid-riser formulation is used for

More information

Elastic Model of Deformable Fingertip for Soft-fingered Manipulation

Elastic Model of Deformable Fingertip for Soft-fingered Manipulation IEEE TRANSACTION ON ROBOTICS, VOL. 1, NO. 11, NOVEMBER 25 1 Elastic Model of Deformable Fingerti for Soft-fingered Maniulation Takahiro Inoue, Student Member, IEEE, and Shinichi Hirai, Member, IEEE Abstract

More information

Delay characterization of multi-hop transmission in a Poisson field of interference

Delay characterization of multi-hop transmission in a Poisson field of interference 1 Delay characterization of multi-ho transmission in a Poisson field of interference Kostas Stamatiou and Martin Haenggi, Senior Member, IEEE Abstract We evaluate the end-to-end delay of a multi-ho transmission

More information

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition A Qualitative Event-based Aroach to Multile Fault Diagnosis in Continuous Systems using Structural Model Decomosition Matthew J. Daigle a,,, Anibal Bregon b,, Xenofon Koutsoukos c, Gautam Biswas c, Belarmino

More information

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests 009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract

More information

Estimation of Separable Representations in Psychophysical Experiments

Estimation of Separable Representations in Psychophysical Experiments Estimation of Searable Reresentations in Psychohysical Exeriments Michele Bernasconi (mbernasconi@eco.uninsubria.it) Christine Choirat (cchoirat@eco.uninsubria.it) Raffaello Seri (rseri@eco.uninsubria.it)

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

Feedback-error control

Feedback-error control Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller

More information

Research of PMU Optimal Placement in Power Systems

Research of PMU Optimal Placement in Power Systems Proceedings of the 5th WSEAS/IASME Int. Conf. on SYSTEMS THEORY and SCIENTIFIC COMPUTATION, Malta, Setember 15-17, 2005 (38-43) Research of PMU Otimal Placement in Power Systems TIAN-TIAN CAI, QIAN AI

More information

Automatic Generation and Integration of Equations of Motion for Linked Mechanical Systems

Automatic Generation and Integration of Equations of Motion for Linked Mechanical Systems Automatic Generation and Integration of Equations of Motion for Linked Mechanical Systems D. Todd Griffith a, John L. Junkins a, and James D. Turner b a Deartment of Aerosace Engineering, Texas A&M University,

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell October 25, 2009 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

Estimating function analysis for a class of Tweedie regression models

Estimating function analysis for a class of Tweedie regression models Title Estimating function analysis for a class of Tweedie regression models Author Wagner Hugo Bonat Deartamento de Estatística - DEST, Laboratório de Estatística e Geoinformação - LEG, Universidade Federal

More information

Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE)

Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE) KAUST Reository Outage erformance of cognitive radio systems with Imroer Gaussian signaling Item tye Authors Erint version DOI Publisher Journal Rights Conference Paer Amin Osama; Abediseid Walid; Alouini

More information

LDPC codes for the Cascaded BSC-BAWGN channel

LDPC codes for the Cascaded BSC-BAWGN channel LDPC codes for the Cascaded BSC-BAWGN channel Aravind R. Iyengar, Paul H. Siegel, and Jack K. Wolf University of California, San Diego 9500 Gilman Dr. La Jolla CA 9093 email:aravind,siegel,jwolf@ucsd.edu

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

An Outdoor Recreation Use Model with Applications to Evaluating Survey Estimators

An Outdoor Recreation Use Model with Applications to Evaluating Survey Estimators United States Deartment of Agriculture Forest Service Southern Research Station An Outdoor Recreation Use Model with Alications to Evaluating Survey Estimators Stanley J. Zarnoch, Donald B.K. English,

More information

A Simple Throughput Model for TCP Veno

A Simple Throughput Model for TCP Veno A Simle Throughut Model for TCP Veno Bin Zhou, Cheng Peng Fu, Dah-Ming Chiu, Chiew Tong Lau, and Lek Heng Ngoh School of Comuter Engineering, Nanyang Technological University, Singaore 639798 Email: {zhou00,

More information

Optimal Power Control over Fading Cognitive Radio Channels by Exploiting Primary User CSI

Optimal Power Control over Fading Cognitive Radio Channels by Exploiting Primary User CSI Otimal Power Control over Fading Cognitive Radio Channels by Exloiting Primary User CSI Rui Zhang Abstract arxiv:0804.67v2 [cs.it] 7 Feb 2009 This aer is concerned with sectrum sharing cognitive radio

More information

A Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression

A Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Journal of Modern Alied Statistical Methods Volume Issue Article 7 --03 A Comarison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Ghadban Khalaf King Khalid University, Saudi

More information

HetNets: what tools for analysis?

HetNets: what tools for analysis? HetNets: what tools for analysis? Daniela Tuninetti (Ph.D.) Email: danielat@uic.edu Motivation Seven Ways that HetNets are a Cellular Paradigm Shift, by J. Andrews, IEEE Communications Magazine, March

More information

A Study of Active Queue Management for Congestion Control

A Study of Active Queue Management for Congestion Control A Study of Active Queue Management for Congestion Control Victor Firoiu vfiroiu@nortelnetworks.com Nortel Networks 3 Federal St. illerica, MA 1821 USA Marty orden mborden@tollbridgetech.com Tollridge Technologies

More information

Analysis of M/M/n/K Queue with Multiple Priorities

Analysis of M/M/n/K Queue with Multiple Priorities Analysis of M/M/n/K Queue with Multile Priorities Coyright, Sanjay K. Bose For a P-riority system, class P of highest riority Indeendent, Poisson arrival rocesses for each class with i as average arrival

More information

arxiv: v1 [quant-ph] 22 Apr 2017

arxiv: v1 [quant-ph] 22 Apr 2017 Quaternionic Quantum Particles SERGIO GIARDINO Institute of Science and Technology, Federal University of São Paulo (Unifes) Avenida Cesare G. M. Lattes 101, 147-014 São José dos Camos, SP, Brazil arxiv:1704.06848v1

More information

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:

More information

Event-triggering stabilization of complex linear systems with disturbances over digital channels

Event-triggering stabilization of complex linear systems with disturbances over digital channels Event-triggering stabilization of comlex linear systems with disturbances over digital channels Mohammad Javad Khojasteh, Mojtaba Hedayatour, Jorge Cortés, Massimo Franceschetti Abstract As stos and auses

More information

Sampling and Distortion Tradeoffs for Bandlimited Periodic Signals

Sampling and Distortion Tradeoffs for Bandlimited Periodic Signals Samling and Distortion radeoffs for Bandlimited Periodic Signals Elaheh ohammadi and Farokh arvasti Advanced Communications Research Institute ACRI Deartment of Electrical Engineering Sharif University

More information

Hidden Predictors: A Factor Analysis Primer

Hidden Predictors: A Factor Analysis Primer Hidden Predictors: A Factor Analysis Primer Ryan C Sanchez Western Washington University Factor Analysis is a owerful statistical method in the modern research sychologist s toolbag When used roerly, factor

More information

ANALYTIC APPROXIMATE SOLUTIONS FOR FLUID-FLOW IN THE PRESENCE OF HEAT AND MASS TRANSFER

ANALYTIC APPROXIMATE SOLUTIONS FOR FLUID-FLOW IN THE PRESENCE OF HEAT AND MASS TRANSFER Kilicman, A., et al.: Analytic Aroximate Solutions for Fluid-Flow in the Presence... THERMAL SCIENCE: Year 8, Vol., Sul.,. S59-S64 S59 ANALYTIC APPROXIMATE SOLUTIONS FOR FLUID-FLOW IN THE PRESENCE OF HEAT

More information

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu

More information

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie Wireless Intelligent Networks Center WINC, Nile University,

More information

Deriving Indicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V.

Deriving Indicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V. Deriving ndicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V. Deutsch Centre for Comutational Geostatistics Deartment of Civil &

More information

On Code Design for Simultaneous Energy and Information Transfer

On Code Design for Simultaneous Energy and Information Transfer On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Email: anshoo@nus.edu.sg Mehul Motani Electrical and Comuter

More information

On the relationship between sound intensity and wave impedance

On the relationship between sound intensity and wave impedance Buenos Aires 5 to 9 Setember, 16 Acoustics for the 1 st Century PROCEEDINGS of the nd International Congress on Acoustics Sound Intensity and Inverse Methods in Acoustics: Paer ICA16-198 On the relationshi

More information

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES AARON ZWIEBACH Abstract. In this aer we will analyze research that has been recently done in the field of discrete

More information

1. Introduction. 2. Background of elliptic curve group. Identity-based Digital Signature Scheme Without Bilinear Pairings

1. Introduction. 2. Background of elliptic curve group. Identity-based Digital Signature Scheme Without Bilinear Pairings Identity-based Digital Signature Scheme Without Bilinear Pairings He Debiao, Chen Jianhua, Hu Jin School of Mathematics Statistics, Wuhan niversity, Wuhan, Hubei, China, 43007 Abstract: Many identity-based

More information

OPTIMIZATION OF EARTH FLIGHT TEST TRAJECTORIES TO QUALIFY PARACHUTES FOR USE ON MARS

OPTIMIZATION OF EARTH FLIGHT TEST TRAJECTORIES TO QUALIFY PARACHUTES FOR USE ON MARS OPTIMIZATION OF EARTH FLIGHT TEST TRAJECTORIES TO QUALIFY PARACHUTES FOR USE ON MARS Christoher L. Tanner (1) (1) Sace Systems Design Laboratory, Daniel Guggenheim School of Aerosace Engineering Georgia

More information

Algorithms for Air Traffic Flow Management under Stochastic Environments

Algorithms for Air Traffic Flow Management under Stochastic Environments Algorithms for Air Traffic Flow Management under Stochastic Environments Arnab Nilim and Laurent El Ghaoui Abstract A major ortion of the delay in the Air Traffic Management Systems (ATMS) in US arises

More information

A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION

A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION O P E R A T I O N S R E S E A R C H A N D D E C I S I O N S No. 27 DOI:.5277/ord73 Nasrullah KHAN Muhammad ASLAM 2 Kyung-Jun KIM 3 Chi-Hyuck JUN 4 A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST

More information

Modeling Residual-Geometric Flow Sampling

Modeling Residual-Geometric Flow Sampling 1 Modeling Residual-Geometric Flow Samling Xiaoming Wang, Xiaoyong Li, and Dmitri Loguinov Abstract Traffic monitoring and estimation of flow arameters in high seed routers have recently become challenging

More information

End-to-End Delay Minimization in Thermally Constrained Distributed Systems

End-to-End Delay Minimization in Thermally Constrained Distributed Systems End-to-End Delay Minimization in Thermally Constrained Distributed Systems Pratyush Kumar, Lothar Thiele Comuter Engineering and Networks Laboratory (TIK) ETH Zürich, Switzerland {ratyush.kumar, lothar.thiele}@tik.ee.ethz.ch

More information

Stochastic Optimal Linear Control of Wireless Networked Control Systems with Delays and Packet Losses

Stochastic Optimal Linear Control of Wireless Networked Control Systems with Delays and Packet Losses Stochastic Otimal Linear Control of Wireless Networked Control Systems with Delays and Packet Losses arxiv:446v [cssy 6 Oct 24 Zhuwei Wang, Xiaodong Wang, Fellow, IEEE, and Lihan Liu Abstract In this aer,

More information

Mobility-Induced Service Migration in Mobile. Micro-Clouds

Mobility-Induced Service Migration in Mobile. Micro-Clouds arxiv:503054v [csdc] 7 Mar 205 Mobility-Induced Service Migration in Mobile Micro-Clouds Shiiang Wang, Rahul Urgaonkar, Ting He, Murtaza Zafer, Kevin Chan, and Kin K LeungTime Oerating after ossible Deartment

More information

Extreme Value FEC for Reliable Broadcasting in Wireless Networks

Extreme Value FEC for Reliable Broadcasting in Wireless Networks Extreme Value FEC for Reliable Broadcasting in Wireless Networks Weiyao Xiao and David Starobinski Deartment of Electrical and Comuter Engineering Boston University, Boston, MA 225 Email:{weiyao, staro}@bu.edu

More information

Distributed K-means over Compressed Binary Data

Distributed K-means over Compressed Binary Data 1 Distributed K-means over Comressed Binary Data Elsa DUPRAZ Telecom Bretagne; UMR CNRS 6285 Lab-STICC, Brest, France arxiv:1701.03403v1 [cs.it] 12 Jan 2017 Abstract We consider a networ of binary-valued

More information

Slash Distributions and Applications

Slash Distributions and Applications CHAPTER 2 Slash Distributions and Alications 2.1 Introduction The concet of slash distributions was introduced by Kafadar (1988) as a heavy tailed alternative to the normal distribution. Further literature

More information

Adaptive estimation with change detection for streaming data

Adaptive estimation with change detection for streaming data Adative estimation with change detection for streaming data A thesis resented for the degree of Doctor of Philosohy of the University of London and the Diloma of Imerial College by Dean Adam Bodenham Deartment

More information

START Selected Topics in Assurance

START Selected Topics in Assurance START Selected Toics in Assurance Related Technologies Table of Contents Introduction Statistical Models for Simle Systems (U/Down) and Interretation Markov Models for Simle Systems (U/Down) and Interretation

More information

STABILITY ANALYSIS AND CONTROL OF STOCHASTIC DYNAMIC SYSTEMS USING POLYNOMIAL CHAOS. A Dissertation JAMES ROBERT FISHER

STABILITY ANALYSIS AND CONTROL OF STOCHASTIC DYNAMIC SYSTEMS USING POLYNOMIAL CHAOS. A Dissertation JAMES ROBERT FISHER STABILITY ANALYSIS AND CONTROL OF STOCHASTIC DYNAMIC SYSTEMS USING POLYNOMIAL CHAOS A Dissertation by JAMES ROBERT FISHER Submitted to the Office of Graduate Studies of Texas A&M University in artial fulfillment

More information

Factors Effect on the Saturation Parameter S and there Influences on the Gain Behavior of Ytterbium Doped Fiber Amplifier

Factors Effect on the Saturation Parameter S and there Influences on the Gain Behavior of Ytterbium Doped Fiber Amplifier Australian Journal of Basic and Alied Sciences, 5(12): 2010-2020, 2011 ISSN 1991-8178 Factors Effect on the Saturation Parameter S and there Influences on the Gain Behavior of Ytterbium Doed Fiber Amlifier

More information

Pressure-sensitivity Effects on Toughness Measurements of Compact Tension Specimens for Strain-hardening Solids

Pressure-sensitivity Effects on Toughness Measurements of Compact Tension Specimens for Strain-hardening Solids American Journal of Alied Sciences (9): 19-195, 5 ISSN 1546-939 5 Science Publications Pressure-sensitivity Effects on Toughness Measurements of Comact Tension Secimens for Strain-hardening Solids Abdulhamid

More information

3312 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 5, MAY 2016

3312 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 5, MAY 2016 3312 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 5, MAY 2016 L -Problem-Based Transmission Rate Allocation With Packet Loss and Power Metrics Over Satellite Networks Igor Bisio, Senior Member,

More information

Damage Identification from Power Spectrum Density Transmissibility

Damage Identification from Power Spectrum Density Transmissibility 6th Euroean Worksho on Structural Health Monitoring - h.3.d.3 More info about this article: htt://www.ndt.net/?id=14083 Damage Identification from Power Sectrum Density ransmissibility Y. ZHOU, R. PERERA

More information

Homework Set #3 Rates definitions, Channel Coding, Source-Channel coding

Homework Set #3 Rates definitions, Channel Coding, Source-Channel coding Homework Set # Rates definitions, Channel Coding, Source-Channel coding. Rates (a) Channels coding Rate: Assuming you are sending 4 different messages using usages of a channel. What is the rate (in bits

More information

The directivity of the forced radiation of sound from panels and openings including the shadow zone

The directivity of the forced radiation of sound from panels and openings including the shadow zone The directivity of the forced radiation of sound from anels and oenings including the shadow zone J. Davy RMIT University, Alied Physics, GPO Box 476V, 3001 Melbourne, Victoria, Australia john.davy@rmit.edu.au

More information

Delay Performance of Threshold Policies for Dynamic Spectrum Access

Delay Performance of Threshold Policies for Dynamic Spectrum Access IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL., NO. 7, JULY 83 Delay Performance of Threshold Policies for Dynamic Sectrum Access Rong-Rong Chen and Xin Liu Abstract In this aer, we analyze the delay

More information

Simplifications to Conservation Equations

Simplifications to Conservation Equations Chater 5 Simlifications to Conservation Equations 5.1 Steady Flow If fluid roerties at a oint in a field do not change with time, then they are a function of sace only. They are reresented by: ϕ = ϕq 1,

More information