• 沒有找到結果。

Exponential replicate broadcasting mechanism for adaptive bandwidth allocation in mobile networks

N/A
N/A
Protected

Academic year: 2021

Share "Exponential replicate broadcasting mechanism for adaptive bandwidth allocation in mobile networks"

Copied!
15
0
0

加載中.... (立即查看全文)

全文

(1)

Exponential replicate broadcasting mechanism for

adaptive bandwidth allocation in mobile networks

Chi-Kun Lin

1

, Gwo-Jiun Horng

2*

, Chi-Hsuan Wang

1

and Jar-Ferr Yang

1

Abstract

This paper proposes an exponential replicate broadcasting (ERB) algorithm for data dissemination to improve data access efficiency. The proposed ERB algorithm first constructs a broadcast tree to determine the broadcast frequency of each data and splits the broadcast tree into some broadcast wood to generate the broadcast program. In addition, this paper develops an analytical model to derive the mean access latency of the generated broadcast program. In light of the derived results, both the index channel's bandwidth and the data channel's bandwidth can be optimally allocated to maximize bandwidth utilization. This paper presents experiments to help evaluate the effectiveness of the proposed strategy. From the experimental results, it can be seen that the proposed mechanism is feasible in practice.

Keywords: ERB algorithm; Skewed broadcast; Indexing technique; Access time; Tuning time; Bandwidth allocation

1 Introduction

Mobile web services are a new generation of web services accessible to mobile clients through the air in support of anytime-and-anywhere access to services [1,2]. Further-more, owing to the characteristics of wireless environ-ments including device mobility, scarce bandwidth, and limited battery power, accessing services in wireless-oriented service environments has become an emerging challenge to the data-management and telecommunication communities [3].

In essence, there are two fundamental modes for data service dissemination in a wireless region: the broadcasting mode and the on-demand mode [4]. In a broadcasting mode, data is broadcast periodically to mobile devices according to a broadcast program in the region [5-14]. To fetch a data record, mobile clients have to wait until the target data appears on the broadcast channel. In this way, a broadcast-based system can serve thousands of mobile users simultaneously, since the broadcast cost is identical regardless of the number of users. The other data dissemination mode is the on-demand mode. This mode is similar to the traditional client-server approach. In the on-demand mode, a mobile node first sends its

query on an uplink channel and the server sends the requested data to the client through the downlink channel. In this paper, we consider data disseminated in a broadcast-based wireless environment.

In the literature, access efficiency and energy consump-tion are two issues of concern in assessing the performance of wireless communication systems [4,15]. Access efficiency can be evaluated by access time, which means the time that has elapsed from the moment a client requests data to the moment the client retrieves the target item. Energy consumption concerns the battery power consumed by the client to retrieve the requested data, and it can be quantified according to tune-in time [15]; in other words, according to the amount of time the mobile device stays active‘listening’ to the broadcast channel.

The plain broadcast scheme is the simplest approach to generating data broadcast programs and has been adopted in earlier research [3,16]. Using this approach, the server broadcasts all data records in a round robin manner. Therefore, this method is easily implemented. Furthermore, since the plain broadcast scheme treats all data items equally, the average waiting time for each packet of data equals half of the overall broadcast period. As a result, it is clear that this scheme is not feasible for cases in which data access frequencies are not uniform.

An alternative data dissemination mechanism is the broadcast disks scheme, which permits data items to be * Correspondence:grojium@gmail.com

2

Department of Computer Science and Information Engineering, Southern Taiwan University of Science and Technology, Tainan, Taiwan

Full list of author information is available at the end of the article

© 2014 Lin et al.; licensee Springer. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited.

(2)

broadcast with different frequencies [5]. This algorithm first divides data items into a few groups (i.e., disks) such that data items with similar popularity are assigned to the same disks. Afterwards, it determines the rotation speed of each disk according to the popularity of data items. In this way, one can construct a broadcast program that adjusts the trade-off between the access time of hot data and that of cold data.

In addition to access efficiency, power conservation is critical for mobile nodes owing to limited battery capacities [17-19]. To facilitate power saving, it is neces-sary for mobile devices to support two operation modes: the active mode and the doze mode [20]. Mobile clients normally operate in the active mode, and they can switch to the energy-saving doze mode when mobile devices become idle. Thus, keeping mobile devices in the doze mode for as long as possible could be achieved through the application of an air index technique.

By broadcasting the arrival time of data items to clients, mobile devices can stay in the doze mode until the requested data arrives. In this way, the tune-in time can be reduced to the initial index probe time plus the data-retrieval time. At present, several research efforts have addressed reducing the initial probe time [15,21-26]. These studies complement our work in different aspects.

In this paper, we investigate the effects of data-access frequency and data size on access efficiency. And we propose the ERB algorithm for skewed data access to generate an efficient broadcast cycle. The ERB algorithm first generates a broadcast tree to determine the broadcast frequency of each data record. After that, the broadcast tree is split into broadcast wood to balance the inter-broadcast time of successive copies of data. In order to reduce the tune-in time, we further separate one indi-vidual channel from the broadcast channel to broadcast index packets.

The rest of this paper is organized as follows: Section 2 introduces related data-broadcast research. The system architecture used throughout this paper is presented as well. Section 3 discusses the proposed ERB algorithm and its role in improving data access latency. Section 4 establishes an analytical model for optimizing index-channel and data-index-channel bandwidth allocation. Section 5 discusses the proposed dynamic broadcast adaptive for weight change. Section 6 discusses experiments serving to evaluate the performance of the proposed mechanism. Finally, section 7 remarks on the conclusions drawn.

2 Related work

This section reviews important attempts at applying data broadcasting, bandwidth allocation in mobile networks. This paper develops an analytical model to approximate the proposed ERB algorithm. This model makes it con-venient to efficiently evaluate the mean access time of the

generated broadcast program. Moreover, in light of the derived access time, both the index channel's optimum bandwidth allocation and the data channel's optimum bandwidth allocation are formulated.

In order to assess the feasibility and efficiency of our mechanism, we conducted several experiments. Results reveal that the proposed ERB algorithm performs well in terms of data-access efficiency. Moreover, the optimum bandwidth allocation yields a significant performance improvement in tune-in time. As a consequence, it can be seen from experimental results that putting the proposed mechanism into practice is entirely feasible.

In [5], this scheme assumes that data items are of equal sizes. In terms of practicality, it is not efficient to apply the broadcast disks to the varied-size data items. Moreover, it is hard for system developers to define the similarity of data popularity so as to partition data items into disks. The determination of the relative broadcast frequency for each disk is also imprecise. In this paper, we propose a ERB algorithm for varied-size data items to tackle the above drawbacks. The ERB algorithm grows a broadcast tree to determine the broadcast frequency of each data record. After that, we split the broadcast tree into some broadcast wood with similar sizes so as to place those data items in the broadcast cycle. The details are described clearly in section 3.

J. Xu et al. present exponential-index technology that enables some flexibility in trade-off between tune-in time and access latency [21]. As shown in Figure 1, the expo-nential index adopts a flat broadcast and disseminates data items in the ascending order of their identifiers. These researchers further group data items into a chunk and maintain one index table for each chunk. The number of entries in an index table is determined by the index base. Then the exponential-index technology can adjust the trade-off between access efficiency and energy con-sumption by tuning the index base and the chunk-size parameters.

Therefore, the bandwidth of an exponential index in broadcasting index information is only dominated by the index base and chunk size. The current study further examines the effects of data placement on broadcast programs and establishes an analytical model to derive the optimum bandwidth allocation for index packets and data elements. The performance comparison between our mechanism and the exponential index is demonstrated in section 5.

The system architecture in this paper is depicted in Figure 2. As shown in Figure 2, the proposed ERB algo-rithm schedules data items in a server's database to construct a broadcast program. According to the broadcast program, the system disseminates these data records periodically through the data channel. In addition, in order to reduce power consumption, some effective indexing

(3)

techniques can generate index packets. Those index packets contain information for mobile nodes, such as data identifiers and the nearest data-appearance time. Index packets are broadcast through the index channel.

On the other hand, when a user submits queries to a mobile client, the mobile equipment first fetches an index packet from the index channel to get the arrival time of the target data. Then the mobile device switches from the active mode to the doze mode for energy savings until the target item appears on the data channel [20]. After that, the mobile client downloads the target data transaction so as to process the user's request.

Servers' databases maintain some auxiliary information for each data item. As depicted in Table 1, each data entry consists of three attributes: the data identifier, the data-access probability, and the data size. Addressing these factors, this paper proposes an efficient TAB algorithm to generate a skewed broadcast program. Afterwards, the paper proposes an analytical model to approximate the mean access time of our mechanism. We also derive the optimum index-channel and

data-channel bandwidth allocations. Details are presented in the following sections.

3 Exponential replicate broadcasting

In this section, we propose the ERB algorithm as a way to improve the performance of existing data-broadcasting mechanisms. According to the statistical probability of data access, the ERB algorithm broadcasts a significant number of copies for popular data in a broadcast cycle to diminish the average access time. In addition, the proposed algorithm balances the inter-broadcast time of successive copies of a single packet of data even though data-item sizes can vary.

The notation for the ERB algorithm is summarized in Table 2. Consider the case in which a server's database contains N data items for broadcasting. The data-access probability and the data size for each data item are given as well. In terms of these factors, the ERB algorithm should construct an efficient broadcast program to reduce access time. In fact, the ERB algorithm can be split into three different steps: data-item reordering, broadcast-tree

Figure 1 An example of an exponential index.

(4)

construction, and wood-size equalization. The details for each step are described as follows.

3.1 Data-item reordering

The first step of the ERB algorithm is to sort all data records in the database by their access frequency and size. More precisely, after performing the data-item reor-dering, we would get a broadcast cycle [D1, D2, …, DN] such that (1) Pr(Di)≥ Pr(Dj) and (2) if Pr(Di) = Pr(Dj), then S(Di)≤ S(Dj) for any integers i < j≤ N. To reduce the average access time, it is beneficial to broadcast hot-ter data more frequently [27,28]. Therefore, sorting data records from hottest to coldest can make it convenient to determine the broadcast frequency of each data item.

The second step is to determine the broadcast frequency (i.e., the number of replicates) for each data item. Note that the replication of a data record would reduce the access time of that data; however, the replication would lengthen the whole broadcast cycle and increase the access time of other records. Therefore, this paper pro-poses a broadcast-tree construction algorithm to balance the trade-off between these two factors.

As a matter of fact, the broadcast-tree construction yields broadcast trees in a top-down manner. Figure 3 presents the scenario of the broadcast tree construction. First of all, the broadcast tree construction starts with the sorted data from the data-item reordering (refer to Figure 3a). Then, after some evaluation, the algorithm iteratively moves data items with high access probabil-ities to the lower level so as to double their broadcast

frequencies (Figure 3b,c). Finally, we can get a broadcast tree by copying the nodes at each level, resulting in a full binary tree as drawn in Figure 3d.

3.2 Broadcast-tree construction

Once the broadcast tree is built, the broadcast fre-quency ni for each data item Di is determined as well. The number of replicates in the broadcast tree stands for the data's broadcast frequency. Thus, take the broadcast tree in Figure 3 as an example. In this case, we have n1= 4, n2= n3= 2, and n4= n5=… = n11= 1. Specifically, the criterion for estimating which data items should be moved to the next level is determined by the following theorem.

Theorem 1 Suppose that saplingℜ of height h has m

data records at depth h (as shown in Figure 4a). Let di denote the depth of data item Diinℜ and let S(Di) rep-resent its data size(i.e., the broadcast frequency ni¼ 2di

and the broadcast length L¼X

N

i¼1

niS Dð Þ). Assume thati the bandwidth of the data channel is B. Then the re-duced average access time, achieved by moving data items D1,…, Dr(1≤ r ≤ m) to the next level h + 1, can be formulated by L 2hþ2B Xr i¼1 Pr Dð Þi −1 B Xr i¼1 Pr Dð Þi 4 þ 2 h−1XN i¼rþ1 Pr Dð Þi ni ! Xr i¼1 S Dð Þi ! ð1Þ

Proof Consider the average access time before and

after moving data to the next level. Figure 4 shows that, before data are moved, one can perform an approximate calculation of the mean access time TBE by using the equation TBE¼ XN i¼1 Pr Dð Þi LBE 2niB þS Dð Þi B   ð2Þ

where LBEdenotes the current broadcast length. Likewise,

after data are moved, the average access time TAFcan be

estimated by means of the equation TAF¼ Xr i¼1 Pr Dð Þi LAF 2⋅ 2nð iÞB þS Dð Þi B   þX N i¼rþ1 Pr Dð Þi LAF 2niBþ S Dð Þi B   ð3Þ

where the later broadcast cycle length LAF is equal to

Table 2 Notation used in the ERB mechanism

Notation Definition

N The number of data items

Pr(Di) The access probability of data item Di

S(Di) The size of data item Di

ni The broadcast frequency of data item Di

ℜ Sapling

ℑ Broadcast tree

h Tree height

L The length of a broadcast cycle

B The bandwidth of a broadcast channel

τ Maximum tree height of a broadcast tree

wi The i-th broadcast wood

Table 1 Data structure in servers’ databases

Data identifier Access probability Size

D1 Pr(D1) S(D1)

D2 Pr(D2) S(D2)

D3 Pr(D3) S(D3)

(5)

LBEþ

Xr i¼1

niS Dð Þ. Therefore, we can obtain the reducedi

access time TBE−TAF¼ Xr i¼1 Pr Dð Þi 4niB LBE − Xr i¼1 Pr Dð Þi 4niB þ XN i¼rþ1 Pr Dð Þi 2niB ! Xr j¼1 njS Dj  ! ¼ LBE 2hþ2B Xr i¼1 Pr Dð Þi −1 B Xr i¼1 Pr Dð Þi 4 þ 2 h−1XN i¼rþ1 Pr Dð Þi ni ! Xr j¼1 S Dj  ! ð4Þ

According to theorem 1, the constancy of bandwidth B facilitates the broadcast tree construction procedure. The broadcast tree construction starts with the sorted data elements from the data item reordering.

Afterward, we use theorem 1 to determine the optimal cutpoint c for each level and move data records D1, …, Dc to the next floor so as to reduce the overall access time. In addition, note that the maximum height of the generated broadcast tree is limited by parameter τ. This factor can prevent the following procedures from taking too much execution time.

Broadcast-tree construction procedure 0. Initial settings: Let h = 0, m = N, L¼X

N i¼1 S Dð Þ andi ni= 1 for i = 1, 2,…, N 1. LetF rð Þ ¼ L 2hþ2 Xr i¼1 Pr Dð Þ−i Xr i¼1 Pr Dð Þi 4 þ 2 h−1XN i¼rþ1 Pr Dð Þi ni ! Xr i¼1 S Dð Þi !

Find the cutpoint c such that F cð Þ ¼ max 1≤r≤mfF rð Þg. 2. If F(c)≤ 0 or h > τ, then return the expanded full binary treeℑ.

3. else move the data items {D1, …, Dc} to the next level.

4. Set h = h + 1, m = c, L¼ L þX c

i¼1

niS Dð Þ, and ni i= 2h for i = 1, 2,…, c. Then go to step 1.

3.3 Wood-size equalization

Once the number of duplicates for each data item is obtained, we determine the replicated data placement in the broadcast cycle. Clearly, to achieve a better per-formance, the inter-broadcast time of successive copies of data should be the same. However, it is known that such an optimum placement problem associated with the variant data sizes is an NP-complete problem [29].

Figure 3 The scenario of the broadcast tree construction. (a) Sapling with heights 0, (b) 1, and (c) 2. (d) Broadcast tree with height.

(6)

Consequently, in this subsection, we develop a wood-size equalization algorithm to place those data items in the broadcast cycle.

The functionality of the wood-size equalization is to split broadcast treeℑ of height h into 2hpieces of broad-cast wood (w1, …, w2h) with similar sizes. Actually, the wood size equalization is a recurrence in structure. It splits the broadcast tree in a bottom-up manner. Given broadcast tree ℑ, we first get 2h/2 broadcast woods by applying the wood size equalization to the left subtree of ℑ and get the other 2h/2 broadcast woods from the right subtree of ℑ. Afterward, the Root-cutting proced-ure permits the distribution of the the data in the root to these woods such that each broadcast wood has a similar size. The wood-size equalization can be stated as follows.

Basically, the root-cutting procedure adopts a greedy strategy to divide the root node. More precisely, the root-cutting procedure iteratively splits the data ai with the largest data size from the root and attaches it to the minimum-sized wood wc until all the data in the root are allocated. Thus, we can summarize the root-cutting procedure in the following algorithmic form.

An example of the proposed wood size equalization is illustrated in Figure 5. Consider broadcast tree ℑ of height 2 in Figure 3d. In the beginning, we recursively apply wood size equalization, resulting in the intermedium tree with four broadcast woods shown in Figure 5a. After performing the root-cutting procedure, we get four indi-vidual broadcast woods as drawn in Figure 5b.

Wood size equalization (WSE,ℑ)

//Let h: = the height of broadcast treeℑ, //R: = the root node of treeℑ

//ℑLandℑRdenote the left and the right subtrees ofℑ. 1. Ifh= 0, then returnℑ.

2. else(w1,…, w2h−1) := WSE(ℑL), 3.(w2h−1þ1,…, w2h) := WSE(ℑR), 4. returnRoot-Cutting(R,β1,…, β2h).

Root-cutting procedure(R, w1,…, wv)

1.Sort the data items in root R according to their sizes into a non-increasing order a1,…, ak.

(i.e., S(ai)≥ S(aj) iff 1≤ i ≤ j ≤ k). 2. Fori= 1 to k

3.Find the wood wcwith the smallest size.

4. Split the data item aifrom the root and attach it to the top of wood wc.

5. return(w1,…, wv).

Upon completion of the wood size equalization, one can obtain the broadcast cycle by sequentially broadcasting each wood from top to bottom. Therefore, in this case, we can get the broadcast program as shown in Figure 6. 3.4 Complexity analysis

In this subsection, the time complexity of the ERB algo-rithm is studied. Recall that the ERB algoalgo-rithm contains three steps. The first step is the data-item reordering, which requires time complexity O(NlogN) for sorting N data items. In addition, the second step, broadcast-tree construction, builds a broadcast tree having a height of at mostτ . For each level, it takes at most O(N) time to determine the fittest cutpoint. And then, it requires O (2τN) time to expand from a sapling to a full binary tree. Finally, the wood size equalization is a recurrence in structure, and it requires a time complexity of O(τ NlogN +τ 2τN). Besides, because the value τ is relatively insignificant for the large value of N, we concluded that the proposed ERB algorithm takes only a time complexity of O(NlogN) in total.

4 Optimum bandwidth allocation

In this section, we develop an analytical model to ap-proximate the average access time of the proposed ERB algorithm (refer to theorem 3). Afterward, this analytical model helps derive the optimum bandwidth allocation for our system architecture and minimize the average access time (refer to theorem 4). The details are described as follows.

(7)

It can be seen from Figure 7 that the access time of the proposed ERB algorithm can be decomposed into two portions: index access time and data access time. When a user submits queries to mobile clients, the mobile device needs to read an index packet from the index channel. The time interval between the moment that the user sends a query and the moment that the mobile device gets one index packet is called the index access time. Likewise, the data access time is defined as the time interval between the moment that the mobile client finishes the index packet and the moment that the mobile device obtains the target data packet. As a result, by the above definitions, we have the following lemma:

Lemma 1 Let the random variable Taccess denote the total access time of a query. And let the random vari-ables TIaccess and TDaccess represent the index-access time and data-access time of the query, respectively. Thus, it is clear that

Taccess ¼ TIaccessþ TDaccess ð5Þ

Therefore, according to lemma 1, we know that the index access time and data access time should be calcu-lated first to obtain the total access time. In order to get the index access time, we consider the index channel as shown in Figure 8. It can be seen from Figure 8 that the index access time TIaccess is determined by the time the mobile device submits its query. Consequently, if we assume that a uniform distribution characterizes the

duration of time extending from the starting point of the current index packets to the moment the mobile device submits its query [30], then the average index access time can be arrived at by the following lemma:

Lemma 2 Let Sindex represent the size of each index packet and BIdenote the bandwidth of the index chan-nel. Assume that the interval between the starting point of the current index packet and the moment the mobile client submits its query follows a uniform distribution over 0;Sindex

BI

h 

. Then the average index access time can be formulated as E T Iaccess¼ Z Sindex BI 0 2⋅Sindex BI −t   ⋅ Sindex BI  −1 dt ð6Þ

Proof Without loss of generality, we consider the case in which the mobile user submits a query during the j-th index packet broadcast time as in Figure 8. Let T1denote the random variable representing the time interval between the starting point of the j-th index packet broadcast cycle and the moment that the mobile device submits its query. Thus, it is clear that the index access time TI

access can be formulated as TIaccess ¼ Sindex BI if T1¼ 0 2Sindex BI −T1 if 0< T1< Sindex BI 8 > < > : ð7Þ

Figure 6 The generated broadcast program.

(8)

In addition, if we further assume that the random vari-able T1follows a uniform distribution over 0;SindexBI

h 

, then the mean index access time can be computed by

E T Iaccess¼ Z Sindex BI 0 2⋅Sindex BI −t   ⋅ Sindex BI  −1 dt ð8Þ

On the other hand, since each data item Di has its own access probability Pr(Di), the average data access time can be expressed as a weighted summation of the average access time of all data items. In terms of mathe-matic form, the mean data access time can be formu-lated as follows:

Lemma 3Suppose that the server database contains N data items D1, D2, …, DN for broadcasting. Furthermore, let Pr(Di) denote the access probability of the data item Di, for i = 1, 2,…, N. Then the expected value of the data access time can be expressed by

E T Daccess¼X

N

i¼1

E T½ accessð ÞDi ⋅ Pr Dð Þi ð9Þ

where Taccess(Di) stands for the random variable repre-senting the access time of the specific data item Di.

As a consequence, in order to obtain the average data access time, we need to get the average access time for each data item first. Figure 9 depicts the sketch of the data item D3's access time. As shown in Figure 9, the access time of an arbitrary data item Di can be further decomposed into two parts: waiting time and retrieval time. The waiting time of an arbitrary data item Di is defined as the time interval between the moment the mobile device gets an index packet and the moment the data channel starts to broadcast the target data item Di. And the retrieval time represents the time interval during which the mobile equipment downloads the target data item. Thus, by the above definition, we have the following lemma:

Lemma 4 Let Twait(Di) denote the random variable representing the waiting time of the data item Di and

Tret(Di) denote the retrieval time of the data item Di. Then we have

Taccessð Þ ¼ TDi waitð Þ þ TDi retð ÞDi ð10Þ

In addition, the retrieval time Tret(Di) can be determined by its data size S(Di) divided by the data channel band-width BD. That is

Tretð Þ ¼Di

S Dð Þi

BD

ð11Þ

On the other hand, it is not easy to derive the waiting time Twait(Di) directly for some data items Di because the proposed ERB algorithm broadcasts duplicates for those data items with high-access probability. Further-more, the positions of the replicated data items in the broadcast cycle also determine the data items' waiting time. Therefore, in this paper, we introduce a specific Li [k]-function to represent the position of the kth replicate of the data item Diin the broadcast cycle.

Definition 1The length L of a broadcast cycle is defined as the total number of data bits in this broadcast cycle. And the term Li[k] is defined as the total number of broadcasted bits before broadcasting the k-th replicate of the data item Diin a broadcast cycle.

Example Take the broadcast cycle depicted in Figure 6 as an example. In this case, we have the equations L1[1] = S (D11) + S(D4) + S(D3), L1[2] = L1[1] + S(D1) + S(D8) + S(D2), L1[3] = L1[2] + S(D1) + S(D5) + S(D10) + S(D7) + S(D3), and L1[4] = L1[3] + S(D1) + S(D9) + S(D6) + S(D2). The length of the broadcast cycle L is equal to L1[4] + S(D1).

As a result, we know that the Li[k]-function can help describe any broadcast program accurately. Consider the case in which, after this work performs the proposed ERB algorithm, the data item Di has ni duplicates in a broadcast cycle, and these niduplicates are located at Li[1], Li[2], …, Li[ni], respectively (see Figure 10). Subsequently, the following theorem can yield the data item's waiting time Twait(Di) relative to the proposed ERB scheme.

(9)

Theorem 2Let BDbe the bandwidth of the data chan-nel. Suppose that the broadcast program obtained by performing the ERB algorithm is given in terms of the Li [k]-function. Moreover, let the random variable T repre-sent the time interval between the starting point of the current broadcast cycle and the moment that the mobile client starts to wait for the target data item. Then the random variable Twait(Di) can be formulated as

Twaitð Þ ¼Di Li½ 1 BD −T if 0≤T <Li½ 1 BD Li½kþ 1 BD −T if Li½ k BD ≤T < Li½kþ 1 BD for k ¼ 1; 2; …; ni−1 L−T þ Li½ 1 BD if Li½ ni BD ≤T < L BD 8 > > > > > > > < > > > > > > > : ð12Þ

Besides, if we assume that the random variable T follows a uniform distribution over 0; L

BD

h 

, then the average wait-ing time E[Twait(Di)] can be further simplified as

E T½ waitð ÞDi  ¼ 1 2BDL L−Li½  þ Lni i½ 1 ð Þ2þX ni−1 k¼1 Li½kþ 1−Li½ k ð Þ2 " # ð13Þ

Proof Without loss of generality, we assume that the mobile client starts to wait for the target data item Diin the m-th broadcast cycle as in Figure 10. Since the data Di is broadcast ni times during a broadcast cycle, the mobile client retrieves the nearest replicate of the target Diaccording to the entry time the mobile client starts to wait. So with time T being the time at which the mobile device starts to wait, we now consider three cases for calculating the waiting time.

Case 1: 0≤T <Li½ 1

BD

In this case, the mobile client starts to wait before the first replicate of the target item in the m-th broadcast cycle is broadcast. Therefore, the waiting time can be obtained by

Twaitð Þ ¼Di

Li½ 1

BD −T

ð14Þ

Figure 10 The broadcast deployment for data itemDi(Li-function).

(10)

Case 2:Li½ k

BD ≤T <

Li½kþ1

BD ; k ¼ 1; 2; …; ni−1:

In this case, the mobile client retrieves the (k + 1)-th replicate of the target data item in the m-th broadcast cycle. Thus, the waiting time can be computed by

Twaitð Þ ¼Di Li½kþ 1 BD −T ð15Þ Case 3:Li½ ni BD ≤T < L BD

In this case, all the replicates of the target data item in the m-th broadcast cycle were broadcast when the mobile device began to wait. Thus, the mobile client would download the first replicate of the target data in the (m + 1)-th broadcast cycle. In other words, the waiting time can be formulated as

Twaitð Þ ¼Di L−T þ Li

1 ½  BD

ð16Þ

On the other hand, if we further assume that the random variable T satisfies a uniform distribution over 0; L

BD

h 

, then the expected value of the waiting time can be derived by

E T½ waitð ÞDi  ¼ Z Li½ 1 BD 0 Li½ 1 BD −t   ⋅ L BD  −1 dt þXni−1 k¼1 Z Li½kþ 1 BD Li½ k BD Li½kþ 1 BD −t   ⋅ L BD  −1 dt þ Z L BD Li½ ni BD L−t þ Li½ 1 BD   ⋅ L BD  −1 dt ¼ 1 2BDL L−L i½  þ Lni i½ 1 ð Þ2þXni−1 k¼1 Li½kþ 1−Li½ k ð Þ2 " # ð17Þ

According to the above lemmas and theorems, the average access time can be computed as well. We now summarize the derivation of the average access time via the following theorem.

Theorem 3 The average access time E[Taccess] can be derived by E T½ access ¼ 3Sindex 2BI þXN i¼1 Pr Dð Þ⋅i 1 2BDL L−Li½  þ Lni i½ 1 ð Þ2 þX ni−1 k¼1 Li½kþ 1−Li½ k ð Þ2 2 6 4 3 7 5 þS Dð Þi BD 8 > < > : 9 > = > ; ð18Þ

Proof Based on lemma 1, it is clear that

E T½ access ¼ E TIaccess   þ E TD access   ð19Þ

Furthermore, after applying lemma 3 and lemma 4 to the above equation, we get

E T½ access ¼ E TIaccess   þXN i¼1 Pr Dð Þ⋅ E Ti ½ waitð ÞDi  þ S Dð Þi BD   ð20Þ

Finally, lemma 2 and theorem 2 permit us to calculate the average access time E[Taccess] as follows:

3Sindex 2BI þXN i¼1 Pr Dð Þ⋅i 1 2BDL L−Li½  þ Lni i½ 1 ð Þ2 þXni−1 k¼1 Li½kþ 1−Li½ k ð Þ2 2 6 4 3 7 5 þS Dð Þi BD 8 > < > : 9 > = > ; ð21Þ

From theorem 3, we not only can estimate the average access time of a query for any broadcast program, but also determine the optimum bandwidth allocation for both the index channel and the data channel. Consider the case in which the overall channel bandwidth for data broadcasting is B. Then for the proposed ERB algorithm to achieve the minimum access time, the optimum bandwidth allocation is given by the following theorem.

Theorem 4Let B denote the total bandwidth for data broadcasting. Then the optimum bandwidth settings ne-cessary for index channel BoptI and data channel BoptD to achieve the minimum average access time can be formu-lated as BoptI ¼ ffiffiffiffiffiffiffiffiffiffiffiffiffi 3Sindex p ffiffiffiffiffiffiffiffiffiffiffiffiffi 3Sindex p þp B; Bffiffiffiffiffi2ξ opt D ¼ ffiffiffiffiffi 2ξ p ffiffiffiffiffiffiffiffiffiffiffiffiffi 3Sindex p þp B;ffiffiffiffiffi2ξ ð22Þ whereξ ¼XN i¼1 Pr Dð Þi⋅ 1 2L⋅ L−Li½  þ Lni i½ 1 ð Þ2 þXni−1 k¼1 Li½kþ 1−Li½ k ð Þ2 2 6 4 3 7 5 þ S Dð Þi 8 > < > : 9 > = > ;

Proof According to theorem 3, the average access time E[Taccess] is equal to

E T½ access ¼ 3Sindex 2BI þ ξ BD ð23Þ

Denote the estimation functionΦ(BI, BD) as

Φ Bð I; BDÞ ¼ 3Sindex 2BI þ ξ BD ð24Þ

As a consequence, to minimize the average access time E[Taccess], we need to choose the values BI and BD to minimize the estimation function Φ(BI, BD) subject to the constraint BI+ BD= B.

(11)

the optimum bandwidth of the index channel BI satisfies the equation dΓ Bð ÞI dBI jBI¼Bopt I ¼ 0 ð25Þ

After substituting this into the estimation function, we have dΓ Bð ÞI dBI jBI¼Bopt I ¼ − 3Sindex 2BI2 þ ξ B−BI ð Þ2 ! jBI¼Bopt I ¼ 0 ð26Þ That is, BoptI ¼ ffiffiffiffiffiffiffiffiffiffiffiffiffi 3Sindex p ffiffiffiffiffiffiffiffiffiffiffiffiffi 3Sindex p þp Bffiffiffiffiffi2ξ ð27Þ

Also, the optimum bandwidth of the data channel BoptD can arrived at through the following equation:

BoptD ¼ B−BoptI ¼ ffiffiffiffiffi 2ξ p ffiffiffiffiffiffiffiffiffiffiffiffiffi 3Sindex p þp Bffiffiffiffiffi2ξ ð28Þ 5 Performance evaluation 5.1 Simulation Environment

In order to assess the performance of the proposed system architecture, we conducted several experiments. Table 3 shows the parameter settings in our experiments. We assumed that the number of total data records for broad-casting varied from 50 to 100. And each data item con-tained two attributes: data size and data access frequency.

In our experiments, the data sizes followed a normal distribution with the mean varying from 50 KB to 150 KB and a variance of 900 KB2. The modeling of the data access probabilities rested on the Zipf distribution

of the data item Diwas assumed to be

Pr Dð Þ ¼i 1 i  θ XN j¼1 1 j θ  ð29Þ

where the value of skew factorθ ranged from 0.5 to 1.5.

We did not employ any indexing technology for the index channel in our system, and in this way, we could realize the actual effects of the proposed method. The index packet size was assumed to be 128 bytes. Further, the total available bandwidth including the index and data channel was set to 80 KB/s [3].

In addition to the proposed system architecture, we implemented a plain broadcast, broadcast disks, and an exponential index scheme for comparison. In line with the simulation model in [1], the broadcast disk technology was implemented with three broadcast disks. And the relative frequencies between these disks were dominated by parameterΔ. More precisely, the broadcast frequency of the disk i was determined by ref_freq(i) = (3− i) Δ + 1. In the experiments, we considered three kinds of broad-cast disk schemes:Δ = 1, 2, and 3.

For each experiment, we generated five different datasets, each one containing 50 ~ 100 data records for broadcasting. In addition, for each data set, we generated 5,000 queries and calculated the corresponding access time and tune-in time to evaluate access efficiency and power conservation. The inter-arrival time of queries followed an exponential distribution with an arrival rate ofλ = 1. The simulator and query generator were coded in MATLAB.

5.2 Experimental results

This work applies average tune-in time and average access time as the performance measurement. It allows devices to power on when they need to access data so that these two values are lower than the ones gained by other method. It means that this device can stay in sleep mode longer and save more energy.

Figure 11 shows the average access time and tune-in time of different schemes with the number of data items varying from 50 to 100. In this experiment, we considered the case in which the Zipf parameter was set at 0.9 and the data-size generation process was a normal distribution with a mean of 100 KB and a variance of 900 KB2.

It can be seen from Figure 11a that even though we sacrificed some bandwidth to broadcast index packets, our mechanism still achieved a lower access time than the broadcast disks did. Furthermore, as presented in Figure 11a, this phenomenon became more prominent as the number of data items increased. Figure 11b shows the effects of our system on power conservation. As shown Table 3 Parameter setting

Parameters Values

The number of data items (N) 50 ~ 100

Bandwidth (B) 80 KB/s

Index packet size (Sindex) 128 bytes

The sizes of data items (S(Di)) Normal distribution (mean 50 ~ 150 KB, variance 900 KB2) The access probabilities (Pr(Di)) Zipf distribution

(θ = 0.5 ~ 1.5)

The number of requests 5,000

(12)

in Figure 11b, the average tune-in time of our mechanism was lower than that of the exponential index scheme. This finding demonstrates the importance of efficient bandwidth allocation in power conservation.

Figure 12 presents our comparison of the access latency and tune-in time in various average data sizes. Without loss of generality, we considered the number of data records to be set at 75 and the Zipf parameter at 0.9 in this experiment. Furthermore, the data-size generation process followed a normal distribution with a mean ranging from 50 to 100 KB.

As shown in Figure 12a, the average access latency of all schemes increased as the average data size increased. Nevertheless, our mechanism consistently outperformed all the other schemes for various data sizes. In addition, the slope of our mechanism proved to be smaller than that of the broadcast disks. A similar condition appeared in our comparison of the tune-in time. As depicted in Figure 12b, because our system used the optimum band-width allocation, our mechanism could achieve a better

performance in power conservation than the exponential index scheme.

Regarding the effects of the skewness of the data access probabilities, Figure 13 depicts our comparison of the average access time and tune-in time in various Zipf parameters. In this experiment, the Zipf parameter representing the skewness of data access frequencies varied from 0.5 to 1.5. The number of data records was 100 and the data size had a normal distribution with a mean of 100 KB and a variance of 900 KB2.

It can be seen from Figure 13a that our mechanism sig-nificantly outperforms all the other schemes. Furthermore, the performance gain of our mechanism becomes more and more conspicuous as the value of the skew factor increases. This indicates that an efficient determination of the data-broadcast frequency is critical, especially the more skewed the data access is. In terms of power conser-vation, Figure 13b shows that the skew factor only slightly

Figure 12 Performance comparison in various average data size. (a) Average access time, (b) average tune-in time. Figure 11 The average access time (a) and tune-in time (b) for

(13)

affects the tune-in time of our mechanism and the expo-nential index scheme.

Regarding the accuracy of our approximation model, Figure 14 presents our comparison between the analytical results and the experimental results. We obtained each point depicted in the curve of approximation by calculat-ing the derived access time in theorem 3. Each point shown in the curve of the simulation results represents the average access time of 5,000 data queries on various parameters. Again, Figure 14 shows that the curve of our approximation is close to that of the numerical results.

In conclusion, even though our system releases some bandwidth to broadcast index packets, our experimen-tal results show that our mechanism exhibits better access latency than the plain broadcast and broadcast disks scheme do, especially when the data access prob-abilities are skewed. In terms of power conservation, it is clear that our system can reduce much more tune-in

time if a proper indexing technology is applied to our index channel. In addition, the numerical results of our ex-periments confirm the accuracy of the proposed approxi-mation model.

6 Dynamic broadcast adaptive for weight change

The proposed TAB algorithm first constructs a broadcast tree to determine the broadcast frequency of each data, and splits the broadcast tree into some broadcast wood to generate the broadcast program. In addition, this paper develops an analytical model to derive the mean access latency of the generated broadcast program. In light of the derived result, the bandwidth for both index channel and data channel can be optimally allocated to maximize bandwidth utilization. In this section, we improved the dynamic broadcast adaptive method, not

Figure 14 Average access time for experimental and analytical results.

Figure 13 Performance comparison in various skew factors. (a) Access time, (b) tune-in time.

(14)

only to solve but also for high efficiency and performance of the facture environment.

We found that the proposed algorithm is presently in the broadcast structure. The wireless broadcast scheduling has been considered the data item frequency of the fixed and it has an unreasonable supposition. The data item frequency would be the request of the client for a change under the factual dynamic environments. Each of the data item has a frequency value itself and the each frequency of data item should been computed for its weight value and adjusted for dynamic broadcast adaptive so the frequency of data item has no fixed probability value.

The weight of data item can be modeled as a Wnewi ¼ α⋅ NWiþ 1−αð Þ⋅tWi for 0 <α < 1, where NWiis the weight value of Di, where Wiis the total weight value of Di, where Iiis the index value of Difor maximum heap tree and tWi is the time weight value of Di.

With the data broadcast technique, the mobile server continually broadcasts data items in a broadcast channel and the mobile clients access their required data items by listening to the broadcast channel. The tuning time and the access time are two performance measures in data broadcasting environments. However, in real life applica-tions, the contents of the data items change frequently. In this paper, we proposed the dynamic broadcast adaptive by using the cooperative data item weight game method com-bined maximum heap tree algorithm to data item frequency change is shown in Figure 15. We define a normal form of data item weight game which consists of objects.

6.1 Players of data item

A set of agents who play the game, ND= {1,…, n }, with typical element i∈ ND. In the strategies, for each i∈ ND there is a nonempty set of strategies Siwith typical element si∈ Si, Si= {(Di− 1), (Di+ 1) }. For weight function ui, S↦ ℜ assigned to each players of data item i, where strategies profile is equal to s∈ S = ×i∈ NSi. It can be written as a normal form game G =〈N, { Si}i∈ N, { ui}i∈ N〉.

6.2 Best response functions for interaction

Nash equilibrium is a strategy profile where every data weight is underlined. This suggests an alternative def-inition for Nash equilibrium involving best-response

functions. The best-response function for data item i∈ N is set-weight valued function Bi such that Bið Þ ¼s−i

si∈Siuiðsi; s−iÞ≥ui s′i; s−i

  ; ∀s′ i∈Sig . So that Bi(s− i)⊆ Si ‘tells’ data item i what to do when the other data items play s− i.

In the broadcast method, the broadcast should decision the index and context of data item for broadcast cycle before the cycle of broadcast initial (Figure 16). The server has been not modified index and data item context for broadcast cycle. In this paper, we proposed that the data item of broadcast cycle (m) has been modified and response for next broadcast cycle (m + 1). The index report of next broadcast cycle is updated time.

7 Conclusion

Data broadcasting involves important data dissemination technology for accessing mobile services in wireless networks. In general, there are two main approaches to data broadcast, viz., push-based broadcast and on-demand broadcast [32]. Mobile internet and mobile services that make use of mobile data are increasingly popular [33-43]. Among others, access efficiency and power conservation are two critical performance indexes for assessing the effectiveness of wireless communication systems. In this paper, we present an ERB algorithm to reduce the response time of mobile clients' requests. We provide an analytical model to measure the expected access latency of the generated broadcast program. This analytical model helps formulate the optimum bandwidth allocation for index and data channels. From the experimental results, it can be seen that our mechanism outperforms the existing data broadcast schemes in terms of access time. Moreover, the optimum bandwidth allocation also brings a signifi-cant improvement in energy conservation. Based on these advantages, it can be seen that the proposed mechanism is scalable and can feasibly increase the efficiency of data dissemination in broadcast-based systems.

Competing interests

The authors declare that they have no competing interests. Acknowledgement

We thank the National Science Council of Taiwan for funding this research (Project no.: NSC 102-2218-E-268-001).

(15)

Taiwan.2Department of Computer Science and Information Engineering, Southern Taiwan University of Science and Technology, Tainan, Taiwan.

Received: 28 February 2014 Accepted: 6 June 2014 Published: 18 August 2014

References

1. ST Cheng, JP Liu, JL Kao, CM Chen, A new framework for mobile web services, in Proceedings of the IEEE Symposium Applications and the Internet (Nara, 2002), pp. 218–222

2. X Yang, A Bouguettaya, B Medjahed, H Long, W He, Organizing and accessing web services on air. IEEE Trans. Syst. Man Cybern. A 33, 6 (2003) 3. T Imielinski, B Badrinath, Mobile wireless computing: challenges in data

management. Commun. ACM 37, 10 (1994)

4. T Imielinski, S Viswanathan, BR Badrinath, Data on air: organization and access. IEEE Trans. Knowl. Data Eng. 9(3), 353–372 (1997)

5. S Acharya, R Alonso, M Franklin, S Zdonik, Broadcast disks: data management for asymmetric communications environments, in Proceedings of the ACM SIGMOD Conference on Management of Data (San Jose, California, 1995), pp. 199–210

6. J-L Huang, M-S Chen, Dependent data broadcasting for unordered queries in a multiple channel mobile environment. IEEE Trans. Knowl. Data Eng. 16, 9 (2004) 7. P Sumari, RM Darus, H Kamarulhaili, Data organization for broadcasting in

mobile computing, in Proceedings of International Conference on Geometric Modeling and Graphics (2003), pp. 49–54

8. S Hameed, N Vaidya, Efficient algorithms for scheduling data broadcast. ACM/Baltzer Wireless Networks (WINET) 5(3), 183–193 (1999)

9. G Lee, S-C Lo, Broadcast data allocation for efficient access of multiple data items in mobile environments. ACM Mobile Netw. Appl.(MONET) 8, 365–375 (2003) 10. W Sun, W Shi, B Shi, Y Yu, A cost-efficient scheduling algorithm of on-demand

broadcasts. Wirel. Netw. 9, 239–247 (2003)

11. K-F Jea, M-H Chen, A data broadcast scheme based on prediction for the wireless environment, in Proceedings of the 9th International Conference Parallel and Distributed Systems (ICPADS‘02) (Taiwan, 2002), pp. 369–374 12. H-P Hung, M-S Chen, On exploring channel allocation in the diverse data

broadcasting environment, in Proceedings of the 25th IEEE International Con-ference Distributed Computing Systems (738, Columbus, 2005), pp. 729–738 13. L-S Juhn, L-M Tseng, Fast data broadcasting and receiving scheme for

popular video service. IEEE Trans. Broadcasting 44(1), 100–105 (1998) 14. W Chung, TJ Endres, CD Long, A data broadcasting system expanding the

information capacity of existing analog communication systems. IEEE Trans. Broadcasting 51, 2 (2005)

15. T Imielinski, S Viswanathan, BR Badrinath, Energy efficient indexing on air, in Proceedings ACM SIGMOD‘94 (Minneapolis, MN, 1994), pp. 25–36 16. G Herman, G Gopal, K Lee, A Weinrib, The datacycle architecture for very

high throughput database systems, in Proceedings of the ACM SIGMOD Conference on Management of Data (1987), pp. 97–103

17. X Yang, A Bouguettaya, Adaptive data access in broadcast-based wireless environments. IEEE Trans. Knowl. Data Eng. 17(3), 326–338 (2005) 18. L Yin, G Cao, Adaptive power-aware prefetch in wireless networks. IEEE

Trans. Wireless Commun. 3(5), 1648–1658 (2004)

19. MA Viredaz, LS Brakmo, WR Hamburgen, Energy management on handheld devices. ACM Queue 1, 44–52 (2003)

20. KL Tan, BC Ooi, Data Dissemination in Wireless Computing Environments (Kluwer Academic, Norwell, MA, USA, 2000)

21. J Xu, W-C Lee, X Tang, Exponential index: a parameterized distributed indexing scheme for data on air, in Proceedings of the 2nd ACM/USENIX International Conference Mobile Systems, Applications, and Services (MobiSys‘04) (Boston, 2004), pp. 153–164

22. M Chen, PS Yu, K Wu, Indexed sequential data broadcasting in wireless mobile computing, in Proceedings of the 17th International Conference Distributed Computing Systems (Baltimore, 1997), pp. 124–131

23. M-S Chen, K-L Wu, PS Yu, Optimizing index allocation for sequential data broadcasting in wireless mobile computing. IEEE Trans. Knowl. Data Eng. 15, 1 (2003)

24. N Shivakumar, S Venkatasubramanian, Efficient indexing for broadcast based wireless systems. J Mobile Netw Appl 1(4), 433–446 (1996)

25. Q Hu, W-C Lee, D Lee, Indexing techniques for wireless data broadcast under data clustering and scheduling, in Proceedings of the 8th International

–358

26. WC Lee, DL Lee, Using signature techniques for information filtering in wireless and mobile environments. J Distrib. Parallel Databases 4(3), 205–227 (1996) 27. Y Huang, P Sistla, O Wolfson, Data replication for mobile computers, in

Proceedings of the ACM SIGMOD Conference on Management of Data (Minneapolis, MN, 1994), pp. 13–24

28. O Wolfson, A Milo, The multicast policy and its relationship to replicated data placement. ACM Trans. Database Syst. 16(1), 181–205 (1991) 29. M Sipser, Introduction to the Theory of Computation. Massacbusetts Institute

of Technology (Thomson Course Technology, Boston, 1996) 30. RD Yates, DJ Goodman, Probability and Stochastic Processes: A Friendly

Introduction for Electrical and Computer Engineers, 2nd edn. (Wiley, New York, 2004)

31. GK Zipf, Human Behaviour and the Principle of Least Effort (Addison Wesley, Reading, 1949)

32. H Wang, Y Xiao, LC Shu, Scheduling periodic continuous queries in real-time data broadcast environments. IEEE Trans. Comput. 61(9), 1325–1340 (2012) 33. A Molnar, CH Muntean, Cost-oriented adaptive multimedia delivery. IEEE

Trans. Broadcasting 59(3), 484–499 (2013)

34. G-J Horng, C-H Wang, S-T Cheng, C-W Hsu, S-F Su, Tree-based adaptive broadcasting of bandwidth allocation for vehicle ad hoc networks, in 12th IEEE International Conference on High Performance Computing and Communications (HPCC-2010) (Melbourne, 2010), pp. 391–397

35. L Yung-Liang, J Jehn-Ruey, Pricing resources in LTE networks through multi-objective optimization. Sci. World J. 2014, (2014). Article ID 394082. 9 pages 36. G Wei, AV Vasilakos, Y Zheng, N Xiong, A game-theoretic method of fair

resource allocation for cloud computing services. J. Supercomput. 54(2), 252–269 (2010)

37. M Reza Rahimi, J Ren, CH Liu, AV Vasilakos, N Venkatasubramanian, Mobile cloud computing: a survey, state of art and future directions. MONET 19(2), 133–143 (2014)

38. M Reza Rahimi, N Venkatasubramanian, AV Vasilakos, MuSIC: Mobility-Aware Optimal Service Allocation in Mobile Cloud Computing, in IEEE International Conference on Cloud Computing, (CLOUD) (Santa Clara, 2013), pp. 75–82 39. T Jiang, H Wang, AV Vasilakos, QoE-driven channel allocation schemes for

multimedia transmission of priority-based secondary users over cognitive radio networks. IEEE J Select. Areas Commun. 30(7), 1215–1224 (2012) 40. X Wang, AV Vasilakos, M Chen, Y Liu, TT Kwon, A survey of green mobile

networks: opportunities and challenges. MONET 17(1), 4–20 (2012) 41. S Zhijie, L Jun, R Zimmermann, AV Vasilakos, Peer-to-peer media streaming:

insights and new developments. Proc. IEEE 99(12), 2089–2109 (2011) 42. L Zhou, Y Zhang, K Song, W Jing, AV Vasilakos, Distributed media

services in P2P-based vehicular networks. IEEE Trans. Vehicular Technol. 60(2), 692–703 (2011)

43. PP Demestichas, VAG Stavroulaki, LM Papadopoulou, AV Vasilakos, ME Theologou, Service configuration and traffic distribution in composite radio environments. IEEE Trans. Syst. Man Cybern. C 34(1), 69–81 (2004) doi:10.1186/1687-1499-2014-136

Cite this article as: Lin et al.: Exponential replicate broadcasting mechanism for adaptive bandwidth allocation in mobile networks. EURASIP Journal on Wireless Communications and Networking 2014 2014:136.

Submit your manuscript to a

journal and benefi t from:

7 Convenient online submission 7 Rigorous peer review

7 Immediate publication on acceptance 7 Open access: articles freely available online 7 High visibility within the fi eld

7 Retaining the copyright to your article

數據

Figure 1 An example of an exponential index.
Table 1 Data structure in servers ’ databases
Figure 4 Move data items { D 1 , …, D r } to the next level. From (a) sapling with height h to (b) new sapling with height h + 1.
Figure 5 The scenario of the wood size equalization. Before (a) and after (b) performing wood cutting procedure.
+7

參考文獻

相關文件

3 The teaching modes of ELA in English include collaboration between non-language subject teachers and English Language teachers to conduct cross-curricular English

Our environmental policy is to promote environmental education in schools, to maintain a management system to improve the environmental quality of our activities, to adopt

Our environmental policy is to promote environmental education in schools, to enhance our staff’s environmental awareness by encouraging them to participate in

Our environmental policy is to promote environmental education in schools, to enhance our staff’s environmental awareness by encouraging them to participate in environmental

Our environmental policy is to promote environmental education in schools, to enhance our staff’s environmental awareness by encouraging them to participate in environmental

The temperature angular power spectrum of the primary CMB from Planck, showing a precise measurement of seven acoustic peaks, that are well fit by a simple six-parameter

Numerical experiments indicate that our alternative reconstruction formulas perform significantly better than the standard scaling function series (1.1) for smooth f and are no

To complete the “plumbing” of associating our vertex data with variables in our shader programs, you need to tell WebGL where in our buffer object to find the vertex data, and