On-Supporting Energy Balanced K-Barrier Coverage In Wireless Sensor Networks

Size: px
Start display at page:

Download "On-Supporting Energy Balanced K-Barrier Coverage In Wireless Sensor Networks"

Transcription

1 On-Supporting Energy Balanced K-Barrier Coverage In Wireless Sensor Networks Chih-Yung Chang w Li-Ling Hung Aletheia University Yu-Chieh Chen u.edu.tw Ming-Hsien Li du.tw ABSTRACT The k-barrier coverage problem is known as the problem of detecting the intruders by at least k sensors when the intruders moving along the crossing paths from one boundary to another. This paper proposes decentralized algorithms to cope with the k- barrier coverage problem. For a given value k, the proposed algorithms find out the maximum disjoint sets of sensors such that each set of sensors meets the requirement of k-barrier coverage for users. Three mechanisms, called Basic, Backtracking, and Branch, are proposed for constructing as more as possible the disjoint sets of sensors that satisfy the requirement of k-barrier coverage. Performance study reveals that the proposed algorithms achieve near-optimal performance. Categories and Subject Descriptors C.. [Computer Communication Networks]: Network Architecture and Design Wireless communication General Terms Algorithms, Performance, Design. Keywords Distributed, Barrier Coverage, Wireless Sensor Networks. INTRODUCTION Wireless sensor networks (WSNs) have a wide range of potential applications. One of the most important goals of these applications is to detect intruders as they cross a border or as they penetrate a protected region. This type of coverage is referred to as barrier coverage[-][-], where the sensors form a barrier for detecting the intruders. The k-barrier coverage problem [] aims at determining the minimum number of sensors deployed in the given WSN so that all crossing paths through the region are covered by at least k active sensors, where a crossing path is any path that crosses the width of the region completely. The barrier coverage is the abbreviation of k-barrier coverage when the value of k is one. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. IWCMC 9, June, 9, Leipzig, Germany. Copyright 9 ACM /9/...$. The k-barrier coverage problem is an important issue for many applications, such as intrusion detection, object tracking, and border surveillance. For any crossing path, detecting the intruder by multiple sensors is desired for these applications, because it increases the reliability or security. Such k-barrier coverage minimizes the risk of possibly missed intruders. In the relevant research of k-barrier coverage, Kumar et al. [] discusses the number demanded for sensor nodes from the probability point of view such that the probability that any crossing path is detected by at least k (k is greater or equal to ) sensor nodes is greater than.99. However, given a densely deployed WSN, Kumar et al. [] did not explicitly determine the set of active sensors that guarantee the surveillance quality of k-barrier coverage. Vu et al. [] separately proposes the centralized and distributed algorithm to support the network environment with -barrier coverage. Chen et al. [] proposes a mechanism to measure the barrier coverage degree in the network environment and find out the appropriate number of sensors to maintain -barrier coverage. Chen et al. [] designs a localized algorithm to divide the network environment into several blocks and prove if each block is with k-barrier coverage, then the whole network is also k-barrier coverage. However, the abovementioned previous work didn t find out the specific set of the sensors to achieve the k-barrier coverage purpose. If more sets of sensors with k-barrier coverage capability, we can schedule these sets in turn to extend the network lifetime. Previous study [] presented a centralized mechanism that applies the graph theorem to connect the sensors whose sensing range are overlapping for establishing the maximum number of disjoint paths. Each established path guarantees one-barrier coverage and hence the set of active sensors can be determined for providing k-barrier coverage for a maximal k. However, the centralized mechanism developed in [] has several drawbacks. Firstly, it requires global information. Each sensor in the network needs to flood its location information to sink node. Then the sink node finds the maximum disjoint paths and then floods the result to all sensor nodes. In total, twice flooding operations are applied in the WSN, which consumes a considerable energy of sensors. Moreover, sensor nodes closer to the sink node will die earlier due to the heavy workload for relaying packets. The centralized mechanism also lacks scalability and flexibility. This paper aims to develop a decentralized scheme to cope with the k-barrier coverage problem. The proposed mechanism finds a maximal number of disjoint sets of sensors such that each set is composed of minimum number of sensors but supports k- barrier coverage. The sets of sensors can be active in turn to reduce the energy consumption and achieve load balance purpose.

2 . Algorithms for Constructing a Defense Barrier with k-barrier Coverage The WSN discussed in this paper is a rectangle region R which is surrounded by borders of two neighboring countries. The four notations L sourth, L north, L left, L right denote the four boundaries of R. Sensor nodes are randomly deployed in the network. Each sensor has a unique ID and is aware of its own location and the boundary information including the coordinates of four points of R. A crossing path is a movement trajectory that starts from L sourth to L north and crosses the width of R. Figures (a) and (b) depict the valid and invalid crossing paths, respectively. Through the exchange of the beacon with one hop neighbors, each sensor can collect the ID and location information of its neighboring sensors. (a) Valid crossing path (b) Invalid crossing path Figure. An example illustrating the valid and invalid crossing paths Figure shows another type of barrier, say c, which initially branches and then merges at some defense circles. Since any crossing path will be detected by at least two sensors of c, defense barrier c supports -barrier coverage. Figure. A branch defense barrier supporting -barrier coverage. One challenge of the k-barrier coverage problem is that there are a huge number of barriers and each Defense Barrier with degree k, says DB-k, is composed of k disjoint barriers. How to locally construct a DB-k that is composed of a minimal number of sensors will be a big challenge... Network Initialization Initially, the network is partitioned into the M N equal-sized grids as shown in Fig. (a). According to the partition, each grid is assigned with a coordinates. The rules for assigning coordinates are described below. The most left-up grid is initially assigned with (, ). As shown in Fig. (a), the x-coordinate and y- coordinate are increased by one if the location of a grid shifts one position toward right and down directions, respectively. To guarantee that any sensor s sensing range can fully cover its grid, the length of each grid is r, as shown in Fig. (b). Since the grid size and the boundaries of R are predefined, each sensor is aware of its coordinates of the located grid. Based on the neighboring information, each sensor can derive the coverage degrees of its own and its neighboring grids. More specifically, a grid is p-covered if there are p sensors in that grid. The partitioning of the network region into grids can simplify the k-barrier coverage problem. By this way, a DB-k can be constructed from L left to L right grid by grid, such that each grid contains k sensors. c r S (,) (,) (,N) (,) (M,) r S Sensor i (a) Topology of the Coarse- (b) Grid size in Coarse-Grain Grain Approach. Approach. Figure. The grid topology and the corresponding grid size. Let notations g(x, y) denote the coordinates of grid g and N(x,y) denote the number of sensor nodes in grid g(x, y). A Weighted Grid Matrix (WGM) is an M N sized matrix where each entry corresponds to a grid and records the number of sensors located at that grid. Figure gives an example of WGM. We emphasize that the WGM is a tool that is used to help understand the proposed mechanisms from the conceptual point of view. The developed mechanisms presented in this paper are totally decentralized. M N Figure. An example of Weighted Grid Matrix (WGM)... Approaches to K-Barrier Coverage Problem In each grid, a Decision Maker (DM) will be elected for executing the proposed mechanism. The DM of a grid is the sensor with the minimum ID since the initial energy of each sensor is equal. Figure defines a priority table where the middle grid of the table is defined as a defense grid. Let sensor A play the role of DM in the defense grid and it has determined to join the DB-k. In Fig., the number labeled on each grid denotes the priority of that grid. The right grid will be the best candidate to join the DB-k because a straight defense barrier will be easily constructed with fewer sensors. The priority of right-up grid is higher than that of right-down grid because that we expect to select sensors to join the DB-k from top to bottom. With this property, sensors located at the top region can be fully utilized. The top and down grids have a higher priority than left grids because that they are closer to the right boundary of R. 8 Figure. A priority table for selecting the neighboring grids to construct a defense barrier. Let the length and width of region R be L W and the length of each grid is e. It implies that region R contains L / e W / e grids. The Decision Maker of g(x,y) is denoted as DM g(x,y). Based on the priority table as shown in Fig., the following proposes three mechanisms to construct a DB-k. r s

3 A. Simple Algorithm(SA) The following proposes a Simple Algorithm(SA) for constructing a DB-k. In the Simple CGA Algorithm, DM current denotes the DM who owns the authority to select the DM of the next defense grid. The DM prev denote the previous DM that selects DM current to participate in the DB-k while the DM next denote the DM that is selected to participate in the DB-k by DM current. Let notation N(DM) denote the number of sensors in DM s grid. To clearly describe which neighbor is earlier selected by DM, we refer DM.[Priority=h] to the neighboring DM whose priority is h. Initially, the SA selects a leftmost grid that contains at least k sensors. Then the DM of selected grid has the authority for constructing DB-k and will play the role of DM current. The DM current will be responsible for selecting the best grid to join the DB-k from eight neighboring grids according to their priorities so that the DB-k can be constructed grid by grid. The selected grid should satisfy the criteria that there are at least k sensors in that grid. As soon as the decision has been made, the DM current applies Hand_Over procedure to transfer the authority to the DM next which is the DM of the selected grid. Then the DM current waits for the acknowledgement replied from DM next. The DM next applies Hand_Over procedure again to continuously transfer the authority to the next grid until a selected DM reaches to the right boundary. If it is the case, the DM in the right boundary reports success to sink node and its DM prev. Any DM current that fails to select a valid grid from its neighboring grids will report failure to sink node and its DM prev. Recall that the DM current waits for the result returned from DM next. If the result is success, it simply returns a success message to its DM prev. On the contrary, it returns failed to its DM prev. The DM that receives a success message should further apply the check rule to check if it is a redundant DM. Figure depicts an example for constructing a DB-. The number marked in each grid represents the number of sensors in that grid. Since the sensing range of each sensor can cover the grid where it located, the number in each grid also represents the coverage degree of that grid. Initially, the SA selects a grid from first column and hence the grid (, ) is selected since it contains at least three sensors. At this moment, the DM of grid g(, ) plays the DM current role and has authority to determine the DM next. According to the priority table, DM g(, ) selects the neighboring grid g(, ) to join the DB-, and transfers the authority to DM g(, ) by executing Hand_Over procedure. Then DM g(, ) selects grid g(, ) to join the DB-. The construction of DB- is executed grid by grid until the selected grid reaches to the right boundary. The major advantage of SA is simple and easy to be implemented. However, The SA might be failure in constructing a DB-k. Figure shows a failure example of SA. In Fig., DM g(, ) can not find any grid that contains at least three sensor in its neighboring grids. To explore as more as possible the feasible solutions, the following gives a backtracking mechanism which improves the SA Figure. An example by applying the SA Algorithm B. Backtracking Algorithm(BTA) The basic concept of Backtracking Algorithm(BTA) it is that it allows DM current, say DM x, to transfer the authority to the previous DM, say DM prev =DM y, if the Hand_Over rule is failed at DM x. As soon as the DM y gets the decision authority, it again plays the role of DM current and tries to find the feasible DM next other than DM x to construct a DB-k. The BA mechanism shown below provides more opportunities to construct a feasible DB-k since it allows the construction of DB-k to backtrack the visited grid. The BTA and SA have similar operations if the construction of a defense barrier is successful. However, if a DM current fails to find a feasible grid from its eight neighboring grids, it returns a grid failure message to the DM prev. This message triggers the manager DM prev who stays in the waiting state. Upon receiving the failure message, the DM prev continuously executes and the same procedure as SA and then selects the next grid from the unconsidered grids according to their priorities. This design gives more opportunities for constructing a feasible defense barrier. In the worst case that the authority is backtracked to the leftmost grid, the DM of leftmost grid gives the sink node a final report of path failure. Figure gives an example that SA fails but BA successes to construct a DB-. In this example, the DM g(,) can not find any feasible neighboring grid that satisfies DB-. Applying the proposed BA, the DM g(,) executes the operation depicted in column and hence returns a grid failure message to DM prev =DM (,). Upon receiving the failure message, the DM (,) selects DM g(,) whose priority is next to the DM g(,) but satisfies the requirement of -coverage. Then DM g(,) executes Hand_Over procedure and the DB- is successfully constructed grid by grid Figure. An example by applying the proposed BTA. Although BTA provides more opportunities than SA for constructing a DB-k, however, only those grids which contain at least k sensors will be considered to join the DB-k., The next subsection proposes a BRA algorithm that fully utilizes those grids that contain less than k sensors. C. Branch Mechanism(BRA) The main idea of BRA is to give more opportunities for the neighboring grids to join the DB-k even though each of the neighboring grids contains less than k sensors but the Since the random deployment might cause an imbalanced distribution of sensor nodes, the number of sensors in each grid might be different. Though some grids contain less than k sensors, however, they can contribute their potential coverage for a DB-k. In constructing a DB-k, The BTA and SA did not consider those grids that contain less than k sensors in each grid. Recall that a DB-k can be composed of i curves, say DB-m, DB-m,, DB-m i, where k= m i ++ m i, for all m i <k. That is, a curve with DB-k can have i branches DB-m, DB-m,, DB-m i from some grid. The

4 following proposes a algorithm BRA to improve the utilization of those grids that contain less than k sensors. Let weak grid represents the grid contains less than k sensors. A grid contains at least k sensors is called qualified grid. The BRA can construct more defense barriers with the DB-k than SA and BTA by inviting weak grids when all neighboring grids of DM current are weak grids. That is, the BRA gives more opportunities for the weak grids to join the DB-k and hence balances the energy consumption of sensors and prolongs the network lifetime. Similar to SA and BTA, the BRA selects a qualified grid from the leftmost column to the rightmost column. As soon as a DM current fails to find a qualified grid, it tries to select some weak grids that the total number of sensors in the selected weak grids is equal to or lager than k. The BRA Mechanism calls the Branch procedure that aims to find a set of neighboring grids so that the sensors in these grids can cooperatively contribute k- barrier coverage. In the Branch procedure, the DMs of the selected grids will play the role of DM current and then further execute the Branch procedure until the right boundary is reached. In BRA, if DM current receives a success message from the Branch procedure, it further replies a success message to the DM prev. Figure 8 gives an example for constructing a DB- by applying BRA. Initially, the BRA selects grid g(,) to be the starting grid. Different from the SA and BTA, when the BRA fails to find a qualified grid from its neighboring girds, it considers the weak grids for constructing as more as possible DB-k. Herein, the weak grid located in the upper row has higher priority to be selected. Hence the priority table is changed as shown in Fig. 9. As shown in Fig. 8, according to the new priority table, DM g(,) selects a qualified grid g(, ) which contains sensor nodes to join the DB- and then transfers the authority to DM g(,) by sending a selection message. The selection message contains the location information of DM g(,) and the required coverage degree k. Based on the new priority table, the selected DM will further select the DM next in the qualified grid until DM g(,) is selected. However, DM g(,) can not find any qualified grid from its neighboring grids. Therefore, DM g(,) will initiate a branch message trying to select weak grids DM g(,) and DM g(,) to construct a DB- according to the priority table shown in Fig. 9. The branch message sent by DM g(,) contains the location information of DM g(,) and the required coverage degree for each weak grid. In this example, DM g(,) and DM g(,) will be notified that the required coverage degrees are and, respectively. On obtaining the authority, DM g(,) and DM g(,) individually apply the same BRA Mechanism to construct the -coverage and -coverage branches, respectively. By applying the BRA, a branched DB- can be successfully constructed as shown in Fig. 8. The BRA approach not only improves the defense strength of barrier coverage but also balances the energy consumption of sensors in the network. The BTA mechanism presented in previous subsection can be further integrated with the BRA Mechanism when the BRA fails to find satisfied weak grids at some DM current. In the experiment, we will investigate the performance improvement of the mechanism by integrating Branch and Backtracking schemes Cover -Cover -Cover Figure 8. An example of BRA. Simulation Results 8 Figure 9. The priority table of BRA This section studies the performance of the proposed SA, BTA, and BRA mechanisms and their combinations against the Maximum Disjoint Paths (MDP) mechanism which is a centralized algorithm proposed in []. Table lists the simulation parameters and their corresponding values referred to the typical Berkeley motes. Sensing Range m Comm. Range m Table. Simulation Parameters Simulation Parameters Monitoring Number of Grid Size Area Sensors m (m),,, Deployment Random In addition to the theoretical analysis of the communication complexity, Fig. further investigates the control overhead of MDP and the three proposed mechanisms. Since the control overhead of MDP is exponentially increased with the value k, the three proposed mechanisms outperform MDP in terms of control overhead. Whenever the DM current fails to find the qualified grid, the BTA applies the backtracking policy to find the next grid backward and thus creates more control overheads than the other two proposed mechanisms. Though the BRA does not consider the backward grids, however, it applies branch policy aiming to give more opportunities for the weak grids. Hence the BRA creates more control overhead than SA. Figure. The communication overheads of SA, BTA, BRA, and MDP in the monitoring area with sensor nodes. Table compares the SA, BTA, BRA and MDP mechanisms in terms of the maximum k of the constructed DB-k, the utilization of sensors as well as the average number of sensors per DB-. It is known that the strength of the constructed DB-k increases with the value of k. Since the centralized MDP tries all possible paths, it constructs a DB-k with the maximal k and the result can be treated as the optimal solution. The SA has a poor

5 performance because that the DM current in SA only looks forward to find DM next without applying branch and backtracking policies. As soon as a DM current fails to find the next qualified grid, the construction of DB-k is failure. As a result, it constructs a DB-k with smallest k (degree of barrier coverage) and results in the lowest utilization of the sensor nodes. Nevertheless, the SA always looks forward to construct a DB-k and the constructed DBk is composed of several straight line segments. Hence its average number of sensors per DB- outperforms the other three compared mechanisms. The BTA constructs higher degree of defense barrier than the SA because it adopts backtracking policy whenever a dead end grid is encountered. Therefore, BTA gives more opportunities to construct a DB-k with higher degree than SA. The BRA adopts the branch policy to construct the DB-k and hence further utilize the weak grids.consequently, the BRA outperforms SA and BTA in terms of the maximal value of defense degree. branch policy to utilize the weak grids first and then applies SA to construct DB- as more as possible. Whenever the DM current fails to find the next qualified grid, the backtracking policy is further applied. In Fig., the two combination mechanisms outperform the other three compared mechanisms. In comparison, BRA+SA+BTA mechanism has a better performance than SA+BRA+BTA mechanism in terms of the number of constructed DB-. This is because that the branch policy applied first in the BRA+SA+BTA mechanism help to utilize the weak grids and thus gives more opportunities to construct a successful DB-. Table. The comparison of SA, BTA, BRA and MDP in terms of k, utilization, and average number of active sensor per DB-. SA BTA BRA (Branch at first) MDP Maximum k (coverage degree of defense barrier) 9 Utilization of sensors in the Network 8.% 9.%.%.% Average number of waked up sensors per DB Figure investigates the numbers of DB- and DB- constructed by applying SA, BTA, BRA and MDP by varying the number of deployed sensors ranging from to. The BRA adopts branch policy to further invite the weak grids participating in the defense barrier. Therefore, the BRA outperforms BTA and SA and approaches to the optimal performance produced by MDP. Figure. The numbers of DB- and DB- constructed by applying SA, BTA, BRA and MDP It is interesting that the backtracking and branch policies can be integrated to obtain a better performance in constructing a DBk. Figure investigates the performance improvement by integrating the SA, BTA, BRA with different orders. The individual SA, BTA and BRA are compared with the combinational mechanisms in terms of the number of constructed DB-. The SA+BRA+BTA mechanism applies SA algorithm first and then further applies branch and backtracking policies whenever the DM current fails to find the next qualified grid. Unlike SA+BRA+BTA mechanism, the BRA+SA+BTA mechanism adopts Figure. The comparison of SA, BTA, BRA and their combinations in terms of the different order for constructing DB-. Conclusions Barrier Coverage is an important application for country s boundary defense and intruder detection. This paper initially partitions the network region into grids to simplify the problem. Then we propose a decentralized SA mechanism to cope with the k-barrier coverage problem. In addition, the BTA and BRA mechanisms that adopt branch and backtracking policies are proposed to further improve the performance of SA. Simulation study shows that the proposed BRA outperforms SA and BTA and likely approaches to the optimal performance of constructing DBk in case of k. In addition, the combinational mechanism BRA+SA+BTA outperforms the other compared mechanisms in terms of the number of constructed DB-k.. References []. S. Kumar, T. H. Lai, and A. Arora, Barrier Coverage with Wireless Sensors, in MobiCom, pp. 8-98,. []. A. Schrijver. Combinatorial Optimization : Polyhedra and efficiency, Springer, ISBN ,. []. Changxiang Shen, Weifang Cheng, Xiangke Liao, and Shaoliang Peng, Barrier Coverage with Mobile Sensors, in ISPAN 8, pp. 99-, 8. []. Ai Chen, Ten H. Lai, and Dong Xuan, Measuring and Guaranteeing Quality of Barrier-Coverage in Wireless Sensor Networks, in ACM MobiHoc, pp. -, 8. []. Ai Chen, Santosh Kumor, and Ten H. Lai, Designing Localized Algorithms for Barrier Coverage, in ACM MobiCom, pp. -,. 8

Temporal Error Concealment Algorithm Using Adaptive Multi- Side Boundary Matching Principle

Temporal Error Concealment Algorithm Using Adaptive Multi- Side Boundary Matching Principle 184 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.12, December 2008 Temporal Error Concealment Algorithm Using Adaptive Multi- Side Boundary Matching Principle Seung-Soo

More information

System Level Simulation of Scheduling Schemes for C-V2X Mode-3

System Level Simulation of Scheduling Schemes for C-V2X Mode-3 1 System Level Simulation of Scheduling Schemes for C-V2X Mode-3 Luis F. Abanto-Leon, Arie Koppelaar, Chetan B. Math, Sonia Heemstra de Groot arxiv:1807.04822v1 [eess.sp] 12 Jul 2018 Eindhoven University

More information

An Efficient Event Handling Protocol for Wireless Sensor and Actor Networks

An Efficient Event Handling Protocol for Wireless Sensor and Actor Networks An Efficient Event Handling Protocol for Wireless Sensor and Actor Networks Charalampos Konstantopoulos Department of Informatics University of Piraeus, Greece Email:konstant@unipi.gr Ioannis E. Venetis

More information

ITU-T Y.4552/Y.2078 (02/2016) Application support models of the Internet of things

ITU-T Y.4552/Y.2078 (02/2016) Application support models of the Internet of things I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU Y.4552/Y.2078 (02/2016) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET

More information

Parameters optimization for a scalable multiple description coding scheme based on spatial subsampling

Parameters optimization for a scalable multiple description coding scheme based on spatial subsampling Parameters optimization for a scalable multiple description coding scheme based on spatial subsampling ABSTRACT Marco Folli and Lorenzo Favalli Universitá degli studi di Pavia Via Ferrata 1 100 Pavia,

More information

6Harmonics. 6Harmonics Inc. is pleased to submit the enclosed comments to Industry Canada s Gazette Notice SMSE

6Harmonics. 6Harmonics Inc. is pleased to submit the enclosed comments to Industry Canada s Gazette Notice SMSE November 4, 2011 Manager, Fixed Wireless Planning, DGEPS, Industry Canada, 300 Slater Street, 19th Floor, Ottawa, Ontario K1A 0C8 Email: Spectrum.Engineering@ic.gc.ca RE: Canada Gazette Notice SMSE-012-11,

More information

Broadcast Networks with Arbitrary Channel Bit Rates

Broadcast Networks with Arbitrary Channel Bit Rates 1 Time Slicing in Mobile TV Broadcast Networks with Arbitrary Channel Bit Rates Cheng-Hsin Hsu Joint work with Mohamed Hefeeda Simon Fraser University, Canada April 23, 2009 Outline 2 Motivation Problem

More information

Seamless Workload Adaptive Broadcast

Seamless Workload Adaptive Broadcast Seamless Workload Adaptive Broadcast Yang Guo, Lixin Gao, Don Towsley, and Subhabrata Sen Computer Science Department ECE Department Networking Research University of Massachusetts University of Massachusetts

More information

Mitigation of Cascading Outages and Prevention of Blackouts:System-Wide Corrective Control

Mitigation of Cascading Outages and Prevention of Blackouts:System-Wide Corrective Control 10th Mediterranean Conference on Power Generation, Transmission, Distribution and Energy Conversion 6-9 November 2016 Belgrade, Serbia Mitigation of Cascading Outages and Prevention of Blackouts:System-Wide

More information

REDUCING DYNAMIC POWER BY PULSED LATCH AND MULTIPLE PULSE GENERATOR IN CLOCKTREE

REDUCING DYNAMIC POWER BY PULSED LATCH AND MULTIPLE PULSE GENERATOR IN CLOCKTREE Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.210

More information

This is a repository copy of Virtualization Framework for Energy Efficient IoT Networks.

This is a repository copy of Virtualization Framework for Energy Efficient IoT Networks. This is a repository copy of Virtualization Framework for Energy Efficient IoT Networks. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/92732/ Version: Accepted Version Proceedings

More information

A combination of approaches to solve Task How Many Ratings? of the KDD CUP 2007

A combination of approaches to solve Task How Many Ratings? of the KDD CUP 2007 A combination of approaches to solve Tas How Many Ratings? of the KDD CUP 2007 Jorge Sueiras C/ Arequipa +34 9 382 45 54 orge.sueiras@neo-metrics.com Daniel Vélez C/ Arequipa +34 9 382 45 54 José Luis

More information

On the Characterization of Distributed Virtual Environment Systems

On the Characterization of Distributed Virtual Environment Systems On the Characterization of Distributed Virtual Environment Systems P. Morillo, J. M. Orduña, M. Fernández and J. Duato Departamento de Informática. Universidad de Valencia. SPAIN DISCA. Universidad Politécnica

More information

MVP: Capture-Power Reduction with Minimum-Violations Partitioning for Delay Testing

MVP: Capture-Power Reduction with Minimum-Violations Partitioning for Delay Testing MVP: Capture-Power Reduction with Minimum-Violations Partitioning for Delay Testing Zhen Chen 1, Krishnendu Chakrabarty 2, Dong Xiang 3 1 Department of Computer Science and Technology, 3 School of Software

More information

Post-Routing Layer Assignment for Double Patterning

Post-Routing Layer Assignment for Double Patterning Post-Routing Layer Assignment for Double Patterning Jian Sun 1, Yinghai Lu 2, Hai Zhou 1,2 and Xuan Zeng 1 1 Micro-Electronics Dept. Fudan University, China 2 Electrical Engineering and Computer Science

More information

An optimal broadcasting protocol for mobile video-on-demand

An optimal broadcasting protocol for mobile video-on-demand An optimal broadcasting protocol for mobile video-on-demand Regant Y.S. Hung H.F. Ting Department of Computer Science The University of Hong Kong Pokfulam, Hong Kong Email: {yshung, hfting}@cs.hku.hk Abstract

More information

Combining Pay-Per-View and Video-on-Demand Services

Combining Pay-Per-View and Video-on-Demand Services Combining Pay-Per-View and Video-on-Demand Services Jehan-François Pâris Department of Computer Science University of Houston Houston, TX 77204-3475 paris@cs.uh.edu Steven W. Carter Darrell D. E. Long

More information

Alcatel-Lucent 5620 Service Aware Manager. Unified management of IP/MPLS and Carrier Ethernet networks and the services they deliver

Alcatel-Lucent 5620 Service Aware Manager. Unified management of IP/MPLS and Carrier Ethernet networks and the services they deliver Alcatel-Lucent 5620 Service Aware Manager Unified management of IP/MPLS and Carrier Ethernet networks and the services they deliver [The Alcatel-Lucent 5620 SAM] was the most cost-effective and the shortest

More information

Adaptive Key Frame Selection for Efficient Video Coding

Adaptive Key Frame Selection for Efficient Video Coding Adaptive Key Frame Selection for Efficient Video Coding Jaebum Jun, Sunyoung Lee, Zanming He, Myungjung Lee, and Euee S. Jang Digital Media Lab., Hanyang University 17 Haengdang-dong, Seongdong-gu, Seoul,

More information

COPY RIGHT. To Secure Your Paper As Per UGC Guidelines We Are Providing A Electronic Bar Code

COPY RIGHT. To Secure Your Paper As Per UGC Guidelines We Are Providing A Electronic Bar Code COPY RIGHT 2018IJIEMR.Personal use of this material is permitted. Permission from IJIEMR must be obtained for all other uses, in any current or future media, including reprinting/republishing this material

More information

The comparison of actual system with expected system is done with the help of control mechanism. False True

The comparison of actual system with expected system is done with the help of control mechanism. False True Question No: 1 ( Marks: 1 ) - Please choose one ERP s major objective is to tightly integrate the functional areas of the organization and to enable seamless information flows across the functional areas.

More information

Interleaved Source Coding (ISC) for Predictive Video Coded Frames over the Internet

Interleaved Source Coding (ISC) for Predictive Video Coded Frames over the Internet Interleaved Source Coding (ISC) for Predictive Video Coded Frames over the Internet Jin Young Lee 1,2 1 Broadband Convergence Networking Division ETRI Daejeon, 35-35 Korea jinlee@etri.re.kr Abstract Unreliable

More information

Feasibility Study of Stochastic Streaming with 4K UHD Video Traces

Feasibility Study of Stochastic Streaming with 4K UHD Video Traces Feasibility Study of Stochastic Streaming with 4K UHD Video Traces Joongheon Kim and Eun-Seok Ryu Platform Engineering Group, Intel Corporation, Santa Clara, California, USA Department of Computer Engineering,

More information

THE NEXT GENERATION OF CITY MANAGEMENT INNOVATE TODAY TO MEET THE NEEDS OF TOMORROW

THE NEXT GENERATION OF CITY MANAGEMENT INNOVATE TODAY TO MEET THE NEEDS OF TOMORROW THE NEXT GENERATION OF CITY MANAGEMENT INNOVATE TODAY TO MEET THE NEEDS OF TOMORROW SENSOR Owlet is the range of smart control solutions offered by the Schréder Group. Owlet helps cities worldwide to reduce

More information

Chapter 12. Synchronous Circuits. Contents

Chapter 12. Synchronous Circuits. Contents Chapter 12 Synchronous Circuits Contents 12.1 Syntactic definition........................ 149 12.2 Timing analysis: the canonic form............... 151 12.2.1 Canonic form of a synchronous circuit..............

More information

An Interactive Broadcasting Protocol for Video-on-Demand

An Interactive Broadcasting Protocol for Video-on-Demand An Interactive Broadcasting Protocol for Video-on-Demand Jehan-François Pâris Department of Computer Science University of Houston Houston, TX 7724-3475 paris@acm.org Abstract Broadcasting protocols reduce

More information

FRAME ERROR RATE EVALUATION OF A C-ARQ PROTOCOL WITH MAXIMUM-LIKELIHOOD FRAME COMBINING

FRAME ERROR RATE EVALUATION OF A C-ARQ PROTOCOL WITH MAXIMUM-LIKELIHOOD FRAME COMBINING FRAME ERROR RATE EVALUATION OF A C-ARQ PROTOCOL WITH MAXIMUM-LIKELIHOOD FRAME COMBINING Julián David Morillo Pozo and Jorge García Vidal Computer Architecture Department (DAC), Technical University of

More information

System Quality Indicators

System Quality Indicators Chapter 2 System Quality Indicators The integration of systems on a chip, has led to a revolution in the electronic industry. Large, complex system functions can be integrated in a single IC, paving the

More information

AppNote - Managing noisy RF environment in RC3c. Ver. 4

AppNote - Managing noisy RF environment in RC3c. Ver. 4 AppNote - Managing noisy RF environment in RC3c Ver. 4 17 th October 2018 Content 1 Document Purpose... 3 2 Reminder on LBT... 3 3 Observed Issue and Current Understanding... 3 4 Understanding the RSSI

More information

Reduction of Clock Power in Sequential Circuits Using Multi-Bit Flip-Flops

Reduction of Clock Power in Sequential Circuits Using Multi-Bit Flip-Flops Reduction of Clock Power in Sequential Circuits Using Multi-Bit Flip-Flops A.Abinaya *1 and V.Priya #2 * M.E VLSI Design, ECE Dept, M.Kumarasamy College of Engineering, Karur, Tamilnadu, India # M.E VLSI

More information

DM Scheduling Architecture

DM Scheduling Architecture DM Scheduling Architecture Approved Version 1.0 19 Jul 2011 Open Mobile Alliance OMA-AD-DM-Scheduling-V1_0-20110719-A OMA-AD-DM-Scheduling-V1_0-20110719-A Page 2 (16) Use of this document is subject to

More information

Design and Analysis of Modified Fast Compressors for MAC Unit

Design and Analysis of Modified Fast Compressors for MAC Unit Design and Analysis of Modified Fast Compressors for MAC Unit Anusree T U 1, Bonifus P L 2 1 PG Student & Dept. of ECE & Rajagiri School of Engineering & Technology 2 Assistant Professor & Dept. of ECE

More information

ITU-T Y Functional framework and capabilities of the Internet of things

ITU-T Y Functional framework and capabilities of the Internet of things I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Y.2068 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (03/2015) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL

More information

22/9/2013. Acknowledgement. Outline of the Lecture. What is an Agent? EH2750 Computer Applications in Power Systems, Advanced Course. output.

22/9/2013. Acknowledgement. Outline of the Lecture. What is an Agent? EH2750 Computer Applications in Power Systems, Advanced Course. output. Acknowledgement EH2750 Computer Applications in Power Systems, Advanced Course. Lecture 2 These slides are based largely on a set of slides provided by: Professor Rosenschein of the Hebrew University Jerusalem,

More information

Distributed Cluster Processing to Evaluate Interlaced Run-Length Compression Schemes

Distributed Cluster Processing to Evaluate Interlaced Run-Length Compression Schemes Distributed Cluster Processing to Evaluate Interlaced Run-Length Compression Schemes Ankit Arora Sachin Bagga Rajbir Singh Cheema M.Tech (IT) M.Tech (CSE) M.Tech (CSE) Guru Nanak Dev University Asr. Thapar

More information

Interleaved Source Coding (ISC) for Predictive Video over ERASURE-Channels

Interleaved Source Coding (ISC) for Predictive Video over ERASURE-Channels Interleaved Source Coding (ISC) for Predictive Video over ERASURE-Channels Jin Young Lee, Member, IEEE and Hayder Radha, Senior Member, IEEE Abstract Packet losses over unreliable networks have a severe

More information

Increasing Capacity of Cellular WiMAX Networks by Interference Coordination

Increasing Capacity of Cellular WiMAX Networks by Interference Coordination Universität Stuttgart INSTITUT FÜR KOMMUNIKATIONSNETZE UND RECHNERSYSTEME Prof. Dr.-Ing. Dr. h. c. mult. P. J. Kühn Increasing Capacity of Cellular WiMAX Networks by Interference Coordination Marc Necker

More information

Video conferencing and display solutions

Video conferencing and display solutions Video conferencing and display solutions LG & Cisco enabling seamless video conferencing and enhanced visual display New work forces, changing business environments As people s work practices change, the

More information

Data Converters and DSPs Getting Closer to Sensors

Data Converters and DSPs Getting Closer to Sensors Data Converters and DSPs Getting Closer to Sensors As the data converters used in military applications must operate faster and at greater resolution, the digital domain is moving closer to the antenna/sensor

More information

Design of Fault Coverage Test Pattern Generator Using LFSR

Design of Fault Coverage Test Pattern Generator Using LFSR Design of Fault Coverage Test Pattern Generator Using LFSR B.Saritha M.Tech Student, Department of ECE, Dhruva Institue of Engineering & Technology. Abstract: A new fault coverage test pattern generator

More information

Area-efficient high-throughput parallel scramblers using generalized algorithms

Area-efficient high-throughput parallel scramblers using generalized algorithms LETTER IEICE Electronics Express, Vol.10, No.23, 1 9 Area-efficient high-throughput parallel scramblers using generalized algorithms Yun-Ching Tang 1, 2, JianWei Chen 1, and Hongchin Lin 1a) 1 Department

More information

Error Resilient Video Coding Using Unequally Protected Key Pictures

Error Resilient Video Coding Using Unequally Protected Key Pictures Error Resilient Video Coding Using Unequally Protected Key Pictures Ye-Kui Wang 1, Miska M. Hannuksela 2, and Moncef Gabbouj 3 1 Nokia Mobile Software, Tampere, Finland 2 Nokia Research Center, Tampere,

More information

Bringing an all-in-one solution to IoT prototype developers

Bringing an all-in-one solution to IoT prototype developers Bringing an all-in-one solution to IoT prototype developers W H I T E P A P E R V E R S I O N 1.0 January, 2019. MIKROE V E R. 1.0 Click Cloud Solution W H I T E P A P E R Page 1 Click Cloud IoT solution

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 4, July 2013

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 4, July 2013 Switch less Bidirectional RF Amplifier for 2.4 GHz Wireless Sensor Networks Hilmi Kayhan Yılmaz and Korkut Yeğin Department of Electrical and Electronics Eng. Yeditepe University, Istanbul, 34755 Turkey

More information

Timing Error Detection: An Adaptive Scheme To Combat Variability EE241 Final Report Nathan Narevsky and Richard Ott {nnarevsky,

Timing Error Detection: An Adaptive Scheme To Combat Variability EE241 Final Report Nathan Narevsky and Richard Ott {nnarevsky, Timing Error Detection: An Adaptive Scheme To Combat Variability EE241 Final Report Nathan Narevsky and Richard Ott {nnarevsky, tomott}@berkeley.edu Abstract With the reduction of feature sizes, more sources

More information

An Experimental Comparison of Fast Algorithms for Drawing General Large Graphs

An Experimental Comparison of Fast Algorithms for Drawing General Large Graphs An Experimental Comparison of Fast Algorithms for Drawing General Large Graphs Stefan Hachul and Michael Jünger Universität zu Köln, Institut für Informatik, Pohligstraße 1, 50969 Köln, Germany {hachul,

More information

International Research Journal of Engineering and Technology (IRJET) e-issn: Volume: 03 Issue: 07 July p-issn:

International Research Journal of Engineering and Technology (IRJET) e-issn: Volume: 03 Issue: 07 July p-issn: IC Layout Design of Decoder Using Electrical VLSI System Design 1.UPENDRA CHARY CHOKKELLA Assistant Professor Electronics & Communication Department, Guru Nanak Institute Of Technology-Ibrahimpatnam (TS)-India

More information

Random Access Scan. Veeraraghavan Ramamurthy Dept. of Electrical and Computer Engineering Auburn University, Auburn, AL

Random Access Scan. Veeraraghavan Ramamurthy Dept. of Electrical and Computer Engineering Auburn University, Auburn, AL Random Access Scan Veeraraghavan Ramamurthy Dept. of Electrical and Computer Engineering Auburn University, Auburn, AL ramamve@auburn.edu Term Paper for ELEC 7250 (Spring 2005) Abstract: Random Access

More information

Melodic Pattern Segmentation of Polyphonic Music as a Set Partitioning Problem

Melodic Pattern Segmentation of Polyphonic Music as a Set Partitioning Problem Melodic Pattern Segmentation of Polyphonic Music as a Set Partitioning Problem Tsubasa Tanaka and Koichi Fujii Abstract In polyphonic music, melodic patterns (motifs) are frequently imitated or repeated,

More information

Multi-Shaped E-Beam Technology for Mask Writing

Multi-Shaped E-Beam Technology for Mask Writing Multi-Shaped E-Beam Technology for Mask Writing Juergen Gramss a, Arnd Stoeckel a, Ulf Weidenmueller a, Hans-Joachim Doering a, Martin Bloecker b, Martin Sczyrba b, Michael Finken b, Timo Wandel b, Detlef

More information

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS)

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational

More information

IC Layout Design of Decoders Using DSCH and Microwind Shaik Fazia Kausar MTech, Dr.K.V.Subba Reddy Institute of Technology.

IC Layout Design of Decoders Using DSCH and Microwind Shaik Fazia Kausar MTech, Dr.K.V.Subba Reddy Institute of Technology. IC Layout Design of Decoders Using DSCH and Microwind Shaik Fazia Kausar MTech, Dr.K.V.Subba Reddy Institute of Technology. T.Vijay Kumar, M.Tech Associate Professor, Dr.K.V.Subba Reddy Institute of Technology.

More information

Modified Generalized Integrated Interleaved Codes for Local Erasure Recovery

Modified Generalized Integrated Interleaved Codes for Local Erasure Recovery Modified Generalized Integrated Interleaved Codes for Local Erasure Recovery Xinmiao Zhang Dept. of Electrical and Computer Engineering The Ohio State University Outline Traditional failure recovery schemes

More information

PoE: Adding Power to (IoT)

PoE: Adding Power to (IoT) Sponsored by: PoE: Adding Power to (IoT) Sponsored by: December 20th, 2018 1 Today s Speakers Sponsored by: Steve Bell Senior Analyst - IoT Heavy Reading Mohammad Shahid Khan Chief Manager (PLM & AE),

More information

MULTI-STATE VIDEO CODING WITH SIDE INFORMATION. Sila Ekmekci Flierl, Thomas Sikora

MULTI-STATE VIDEO CODING WITH SIDE INFORMATION. Sila Ekmekci Flierl, Thomas Sikora MULTI-STATE VIDEO CODING WITH SIDE INFORMATION Sila Ekmekci Flierl, Thomas Sikora Technical University Berlin Institute for Telecommunications D-10587 Berlin / Germany ABSTRACT Multi-State Video Coding

More information

Hardware Implementation of Viterbi Decoder for Wireless Applications

Hardware Implementation of Viterbi Decoder for Wireless Applications Hardware Implementation of Viterbi Decoder for Wireless Applications Bhupendra Singh 1, Sanjeev Agarwal 2 and Tarun Varma 3 Deptt. of Electronics and Communication Engineering, 1 Amity School of Engineering

More information

Data flow architecture for high-speed optical processors

Data flow architecture for high-speed optical processors Data flow architecture for high-speed optical processors Kipp A. Bauchert and Steven A. Serati Boulder Nonlinear Systems, Inc., Boulder CO 80301 1. Abstract For optical processor applications outside of

More information

Music Source Separation

Music Source Separation Music Source Separation Hao-Wei Tseng Electrical and Engineering System University of Michigan Ann Arbor, Michigan Email: blakesen@umich.edu Abstract In popular music, a cover version or cover song, or

More information

A, B B, C. Internetwork Router. A, C Gossip Server

A, B B, C. Internetwork Router. A, C Gossip Server Directional Gossip: Gossip in a Wide Area Network Meng-Jang Lin University of Texas at Austin Department of Electrical and Computer Engineering Austin, TX Keith Marzullo University of California, San Diego

More information

The Design of Efficient Viterbi Decoder and Realization by FPGA

The Design of Efficient Viterbi Decoder and Realization by FPGA Modern Applied Science; Vol. 6, No. 11; 212 ISSN 1913-1844 E-ISSN 1913-1852 Published by Canadian Center of Science and Education The Design of Efficient Viterbi Decoder and Realization by FPGA Liu Yanyan

More information

Color Quantization of Compressed Video Sequences. Wan-Fung Cheung, and Yuk-Hee Chan, Member, IEEE 1 CSVT

Color Quantization of Compressed Video Sequences. Wan-Fung Cheung, and Yuk-Hee Chan, Member, IEEE 1 CSVT CSVT -02-05-09 1 Color Quantization of Compressed Video Sequences Wan-Fung Cheung, and Yuk-Hee Chan, Member, IEEE 1 Abstract This paper presents a novel color quantization algorithm for compressed video

More information

Implementation of BIST Test Generation Scheme based on Single and Programmable Twisted Ring Counters

Implementation of BIST Test Generation Scheme based on Single and Programmable Twisted Ring Counters IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) e-issn: 2278-1684, p-issn: 2320-334X Implementation of BIST Test Generation Scheme based on Single and Programmable Twisted Ring Counters N.Dilip

More information

Region Adaptive Unsharp Masking based DCT Interpolation for Efficient Video Intra Frame Up-sampling

Region Adaptive Unsharp Masking based DCT Interpolation for Efficient Video Intra Frame Up-sampling International Conference on Electronic Design and Signal Processing (ICEDSP) 0 Region Adaptive Unsharp Masking based DCT Interpolation for Efficient Video Intra Frame Up-sampling Aditya Acharya Dept. of

More information

A parallel HEVC encoder scheme based on Multi-core platform Shu Jun1,2,3,a, Hu Dong1,2,3,b

A parallel HEVC encoder scheme based on Multi-core platform Shu Jun1,2,3,a, Hu Dong1,2,3,b 4th National Conference on Electrical, Electronics and Computer Engineering (NCEECE 2015) A parallel HEVC encoder scheme based on Multi-core platform Shu Jun1,2,3,a, Hu Dong1,2,3,b 1 Education Ministry

More information

SIC Vector Generation Using Test per Clock and Test per Scan

SIC Vector Generation Using Test per Clock and Test per Scan International Journal of Emerging Engineering Research and Technology Volume 2, Issue 8, November 2014, PP 84-89 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) SIC Vector Generation Using Test per Clock

More information

Department of Electrical and Computer Engineering University of Wisconsin Madison. Fall Final Examination CLOSED BOOK

Department of Electrical and Computer Engineering University of Wisconsin Madison. Fall Final Examination CLOSED BOOK Department of Electrical and Computer Engineering University of Wisconsin Madison Fall 2014-2015 Final Examination CLOSED BOOK Kewal K. Saluja Date: December 14, 2014 Place: Room 3418 Engineering Hall

More information

IMPLEMENTATION OF SIGNAL SPACING STANDARDS

IMPLEMENTATION OF SIGNAL SPACING STANDARDS IMPLEMENTATION OF SIGNAL SPACING STANDARDS J D SAMPSON Jeffares & Green Inc., P O Box 1109, Sunninghill, 2157 INTRODUCTION Mobility, defined here as the ease at which traffic can move at relatively high

More information

OPERATIONS SEQUENCING IN A CABLE ASSEMBLY SHOP

OPERATIONS SEQUENCING IN A CABLE ASSEMBLY SHOP OPERATIONS SEQUENCING IN A CABLE ASSEMBLY SHOP Ahmet N. Ceranoglu* 1, Ekrem Duman*, M. Hamdi Ozcelik**, * Dogus University, Dept. of Ind. Eng., Acibadem, Istanbul, Turkey ** Yapi Kredi Bankasi, Dept. of

More information

II. SYSTEM MODEL In a single cell, an access point and multiple wireless terminals are located. We only consider the downlink

II. SYSTEM MODEL In a single cell, an access point and multiple wireless terminals are located. We only consider the downlink Subcarrier allocation for variable bit rate video streams in wireless OFDM systems James Gross, Jirka Klaue, Holger Karl, Adam Wolisz TU Berlin, Einsteinufer 25, 1587 Berlin, Germany {gross,jklaue,karl,wolisz}@ee.tu-berlin.de

More information

Power Reduction Approach by using Multi-Bit Flip-Flops

Power Reduction Approach by using Multi-Bit Flip-Flops International Journal of Emerging Engineering Research and Technology Volume 2, Issue 4, July 2014, PP 60-77 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Power Reduction Approach by using Multi-Bit

More information

2D Interleaver Design for Image Transmission over Severe Burst-Error Environment

2D Interleaver Design for Image Transmission over Severe Burst-Error Environment 2D Interleaver Design for Image Transmission over Severe Burst- Environment P. Hanpinitsak and C. Charoenlarpnopparut Abstract The aim of this paper is to design sub-optimal 2D interleavers and compare

More information

Color Image Compression Using Colorization Based On Coding Technique

Color Image Compression Using Colorization Based On Coding Technique Color Image Compression Using Colorization Based On Coding Technique D.P.Kawade 1, Prof. S.N.Rawat 2 1,2 Department of Electronics and Telecommunication, Bhivarabai Sawant Institute of Technology and Research

More information

Automatically Creating Biomedical Bibliographic Records from Printed Volumes of Old Indexes

Automatically Creating Biomedical Bibliographic Records from Printed Volumes of Old Indexes Automatically Creating Biomedical Bibliographic Records from Printed Volumes of Old Indexes Daniel X. Le and George R. Thoma National Library of Medicine Bethesda, MD 20894 ABSTRACT To provide online access

More information

802.11ac Channel Planning

802.11ac Channel Planning 802.11ac Channel Planning The forthcoming 802.11ac Gigabit Wi-Fi amendment will bring with it support for larger channels at 80 MHz and 160 MHz widths. This is one of the primary drivers behind the increased

More information

Route optimization using Hungarian method combined with Dijkstra's in home health care services

Route optimization using Hungarian method combined with Dijkstra's in home health care services Research Journal of Computer and Information Technology Sciences ISSN 2320 6527 Route optimization using Hungarian method combined with Dijkstra's method in home health care services Abstract Monika Sharma

More information

Smart Traffic Control System Using Image Processing

Smart Traffic Control System Using Image Processing Smart Traffic Control System Using Image Processing Prashant Jadhav 1, Pratiksha Kelkar 2, Kunal Patil 3, Snehal Thorat 4 1234Bachelor of IT, Department of IT, Theem College Of Engineering, Maharashtra,

More information

DIFFERENTIAL CONDITIONAL CAPTURING FLIP-FLOP TECHNIQUE USED FOR LOW POWER CONSUMPTION IN CLOCKING SCHEME

DIFFERENTIAL CONDITIONAL CAPTURING FLIP-FLOP TECHNIQUE USED FOR LOW POWER CONSUMPTION IN CLOCKING SCHEME DIFFERENTIAL CONDITIONAL CAPTURING FLIP-FLOP TECHNIQUE USED FOR LOW POWER CONSUMPTION IN CLOCKING SCHEME Mr.N.Vetriselvan, Assistant Professor, Dhirajlal Gandhi College of Technology Mr.P.N.Palanisamy,

More information

Bridging the Gap Between CBR and VBR for H264 Standard

Bridging the Gap Between CBR and VBR for H264 Standard Bridging the Gap Between CBR and VBR for H264 Standard Othon Kamariotis Abstract This paper provides a flexible way of controlling Variable-Bit-Rate (VBR) of compressed digital video, applicable to the

More information

Optimum Frame Synchronization for Preamble-less Packet Transmission of Turbo Codes

Optimum Frame Synchronization for Preamble-less Packet Transmission of Turbo Codes ! Optimum Frame Synchronization for Preamble-less Packet Transmission of Turbo Codes Jian Sun and Matthew C. Valenti Wireless Communications Research Laboratory Lane Dept. of Comp. Sci. & Elect. Eng. West

More information

Design Project: Designing a Viterbi Decoder (PART I)

Design Project: Designing a Viterbi Decoder (PART I) Digital Integrated Circuits A Design Perspective 2/e Jan M. Rabaey, Anantha Chandrakasan, Borivoje Nikolić Chapters 6 and 11 Design Project: Designing a Viterbi Decoder (PART I) 1. Designing a Viterbi

More information

LOW POWER AND HIGH PERFORMANCE SHIFT REGISTERS USING PULSED LATCH TECHNIQUE

LOW POWER AND HIGH PERFORMANCE SHIFT REGISTERS USING PULSED LATCH TECHNIQUE OI: 10.21917/ijme.2018.0088 LOW POWER AN HIGH PERFORMANCE SHIFT REGISTERS USING PULSE LATCH TECHNIUE Vandana Niranjan epartment of Electronics and Communication Engineering, Indira Gandhi elhi Technical

More information

Section 6.8 Synthesis of Sequential Logic Page 1 of 8

Section 6.8 Synthesis of Sequential Logic Page 1 of 8 Section 6.8 Synthesis of Sequential Logic Page of 8 6.8 Synthesis of Sequential Logic Steps:. Given a description (usually in words), develop the state diagram. 2. Convert the state diagram to a next-state

More information

data and is used in digital networks and storage devices. CRC s are easy to implement in binary

data and is used in digital networks and storage devices. CRC s are easy to implement in binary Introduction Cyclic redundancy check (CRC) is an error detecting code designed to detect changes in transmitted data and is used in digital networks and storage devices. CRC s are easy to implement in

More information

21 December Mr. Michael Helm Director General Telecommunications Policy Branch Industry Canada 300 Slater Street Ottawa, Ontario, K1A 0C8

21 December Mr. Michael Helm Director General Telecommunications Policy Branch Industry Canada 300 Slater Street Ottawa, Ontario, K1A 0C8 21 December 2001 Don Woodford Director - Government & Regulatory Affairs Mr. Michael Helm Director General Telecommunications Policy Branch Industry Canada 300 Slater Street Ottawa, Ontario, K1A 0C8 Dear

More information

invr User s Guide Rev 1.4 (Aug. 2004)

invr User s Guide Rev 1.4 (Aug. 2004) Contents Contents... 2 1. Program Installation... 4 2. Overview... 4 3. Top Level Menu... 4 3.1 Display Window... 9 3.1.1 Channel Status Indicator Area... 9 3.1.2. Quick Control Menu... 10 4. Detailed

More information

Improving Bandwidth Efficiency on Video-on-Demand Servers y

Improving Bandwidth Efficiency on Video-on-Demand Servers y Improving Bandwidth Efficiency on Video-on-Demand Servers y Steven W. Carter and Darrell D. E. Long z Department of Computer Science University of California, Santa Cruz Santa Cruz, CA 95064 Abstract.

More information

Broken Wires Diagnosis Method Numerical Simulation Based on Smart Cable Structure

Broken Wires Diagnosis Method Numerical Simulation Based on Smart Cable Structure PHOTONIC SENSORS / Vol. 4, No. 4, 2014: 366 372 Broken Wires Diagnosis Method Numerical Simulation Based on Smart Cable Structure Sheng LI 1*, Min ZHOU 2, and Yan YANG 3 1 National Engineering Laboratory

More information

BAL Real Power Balancing Control Performance Standard Background Document

BAL Real Power Balancing Control Performance Standard Background Document BAL-001-2 Real Power Balancing Control Performance Standard Background Document July 2013 3353 Peachtree Road NE Suite 600, North Tower Atlanta, GA 30326 404-446-2560 www.nerc.com Table of Contents Table

More information

UW-Madison's 2009 ACM-ICPC Individual Placement Test October 4th, 1:00-6:00pm, CS1350

UW-Madison's 2009 ACM-ICPC Individual Placement Test October 4th, 1:00-6:00pm, CS1350 UW-Madison's 2009 ACM-ICPC Individual Placement Test October 4th, 1:00-6:00pm, CS1350 Overview: This test consists of seven problems, which will be referred to by the following names (respective of order):

More information

ITU-T Y Specific requirements and capabilities of the Internet of things for big data

ITU-T Y Specific requirements and capabilities of the Internet of things for big data I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Y.4114 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (07/2017) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL

More information

New Single Edge Triggered Flip-Flop Design with Improved Power and Power Delay Product for Low Data Activity Applications

New Single Edge Triggered Flip-Flop Design with Improved Power and Power Delay Product for Low Data Activity Applications American-Eurasian Journal of Scientific Research 8 (1): 31-37, 013 ISSN 1818-6785 IDOSI Publications, 013 DOI: 10.589/idosi.aejsr.013.8.1.8366 New Single Edge Triggered Flip-Flop Design with Improved Power

More information

Abstract 1. INTRODUCTION. Cheekati Sirisha, IJECS Volume 05 Issue 10 Oct., 2016 Page No Page 18532

Abstract 1. INTRODUCTION. Cheekati Sirisha, IJECS Volume 05 Issue 10 Oct., 2016 Page No Page 18532 www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 5 Issue 10 Oct. 2016, Page No. 18532-18540 Pulsed Latches Methodology to Attain Reduced Power and Area Based

More information

Selective Intra Prediction Mode Decision for H.264/AVC Encoders

Selective Intra Prediction Mode Decision for H.264/AVC Encoders Selective Intra Prediction Mode Decision for H.264/AVC Encoders Jun Sung Park, and Hyo Jung Song Abstract H.264/AVC offers a considerably higher improvement in coding efficiency compared to other compression

More information

DM DiagMon Architecture

DM DiagMon Architecture DM DiagMon Architecture Approved Version 1.0 20 Dec 2011 Open Mobile Alliance OMA-AD-DM-DiagMon-V1_0-20111220-A [OMA-Template-ArchDoc-20110121-I] OMA-AD-DM-DiagMon-V1_0-20111220-A Page 2 (13) Use of this

More information

A Light Weight Method for Maintaining Clock Synchronization for Networked Systems

A Light Weight Method for Maintaining Clock Synchronization for Networked Systems 1 A Light Weight Method for Maintaining Clock Synchronization for Networked Systems David Salyers, Aaron Striegel, Christian Poellabauer Department of Computer Science and Engineering University of Notre

More information

Solution of Linear Systems

Solution of Linear Systems Solution of Linear Systems Parallel and Distributed Computing Department of Computer Science and Engineering (DEI) Instituto Superior Técnico November 30, 2011 CPD (DEI / IST) Parallel and Distributed

More information

Performance Evaluation of Error Resilience Techniques in H.264/AVC Standard

Performance Evaluation of Error Resilience Techniques in H.264/AVC Standard Performance Evaluation of Error Resilience Techniques in H.264/AVC Standard Ram Narayan Dubey Masters in Communication Systems Dept of ECE, IIT-R, India Varun Gunnala Masters in Communication Systems Dept

More information

HIGH PERFORMANCE AND LOW POWER ASYNCHRONOUS DATA SAMPLING WITH POWER GATED DOUBLE EDGE TRIGGERED FLIP-FLOP

HIGH PERFORMANCE AND LOW POWER ASYNCHRONOUS DATA SAMPLING WITH POWER GATED DOUBLE EDGE TRIGGERED FLIP-FLOP HIGH PERFORMANCE AND LOW POWER ASYNCHRONOUS DATA SAMPLING WITH POWER GATED DOUBLE EDGE TRIGGERED FLIP-FLOP 1 R.Ramya, 2 C.Hamsaveni 1,2 PG Scholar, Department of ECE, Hindusthan Institute Of Technology,

More information

Operating Bio-Implantable Devices in Ultra-Low Power Error Correction Circuits: using optimized ACS Viterbi decoder

Operating Bio-Implantable Devices in Ultra-Low Power Error Correction Circuits: using optimized ACS Viterbi decoder Operating Bio-Implantable Devices in Ultra-Low Power Error Correction Circuits: using optimized ACS Viterbi decoder Roshini R, Udhaya Kumar C, Muthumani D Abstract Although many different low-power Error

More information

Robert Alexandru Dobre, Cristian Negrescu

Robert Alexandru Dobre, Cristian Negrescu ECAI 2016 - International Conference 8th Edition Electronics, Computers and Artificial Intelligence 30 June -02 July, 2016, Ploiesti, ROMÂNIA Automatic Music Transcription Software Based on Constant Q

More information