SlideShare a Scribd company logo
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.2, No.3, September 2010
DOI :10.5121/jgraphoc.2010.2307 78
A BATTERY POWER SCHEDULING
POLICY WITH HARDWARE SUPPORT IN
MOBILE DEVICES
B.Malarkodi, B.Prasana and B.Venkataramani
Department of ECE
National Institute of Technology
Tiruchirappalli,India
Email id: malark@nitt.edu, bvenki@nitt.edu
ABSTRACT
. A major issue in the ad hoc networks with energy constraints is to find ways that increase their
lifetime. The use of multihop radio relaying requires a sufficient number of relaying nodes to
maintainnetwork connectivity. Hence, battery power is a precious resource that must be used
efficiently in order to avoid early termination of any node. In this paper, a new battery power
scheduling policy based on dynamic programming is proposed for mobile devices.This policy
makes use of the state information of each cell provided by the smart battery package and uses
the strategy of dynamic programming to optimally satisfy a request for power. Using extensive
simulation it is proved that dynamic programming based schedulingpolicyimproves the lifetime
of the mobile nodes.Also a hardware support is proposed to succeeds in distinguishing between
real-time and non-real-time traffic and provides the appropriate grade of service, to meet the
time constraints associated with real time traffic.
Keywords
lifetime; battery; dynamic programming;mobile nodes; Scheduling;hardware unit
1.INTRODUCTION
The nodes of an ad hoc wireless network, a group of uncoordinated heterogeneous nodes that
self organise themselves to form a network have constrained battery resources. Advaces in
battery technologies have been negligible as compared to the recent advances in the field of
mobile computing and communication. The increasing gap between power consumption
requirements and energy density(energy stored per unit weight of a battery) tends to increase the
size of the batteries and hence increases the need for energy management. The lifetime of the ad
hoc networks can be defined as the time between the start of the network to the death of the first
node. The death of even a single node may lead to partitioning of the network and hence may
terminate many of the on going transmissions. In view of this, the strategies to increase the
lifetime of ad hoc networks become important. Towards this purpose, a new battery power
scheduling policy based on dynamic programming is proposed in this paper.
The rest of the paper is organised as follows. Section 2 provides an overview of battery
characteristics. Section 3 describes the existing work in this area.In section 4, the description of
the proposed scheduling policy is described and Section 5 presents the implementation
andsection 6 explains the simulation results. Section 7 describes the hardware support proposed
and section 8 ends with the conclusions.
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.2, No.3, September 2010
79
2. OVERVIEW OF BATTERY CHARACTERISTICS
A battery consists of an array of one or more electro chemical cells. It can be characterised
either by its voltages or by its initial and remaining capacities. The behaviour of the batteries is
governed by the following major chemical effects:
Rate and recovery capacity effects: As the intensity of the discharge current increases, an
insoluble component develops between the inner and outer surfaces of the cathode of the
batteries. The inner surface becomes inaccessible as a result of this phenomenon, rendering the
cell unusable even while a sizable amount of active materials still exists. This effect termed as
rate capacity effect depends on the actual capacity of the cell and the discharge current.
Recovery capacity effect is concerned with the recovery of charges under idle conditions. Due
to this effect, on increasing the idle time of the batteries, one may be able to completely utilize
the theoretical capacity of the batteries.
Battery capacities: The amount of active materials (the materials that react chemically to
produce electrical energy when battery is discharged and restored when battery is charged)
contained in the battery refers to its theoretical capacity ( T ) and hence total number of such
discharges cannot exceed the battery’s theoretical capacity. Whenever the battery discharges,
the theoretical capacity of the battery decreases. Nominal capacity ( N ) corresponds to the
capacity actually available when the battery is discharged at a specific constant current.
Whenever the battery discharges, nominal capacity decreases, and increases probabilistically as
the battery remains idle and also called as recovery state of the battery. This is due to the
recovery capacity effect. The energy delivered under a given load is said to be the actual
capacity of the battery. A battery may exceed the actual capacity but not the theoretical
capacity. This is due to the rate capacity effect. By increasing the idle time, one may be able to
utilize the maximum capacity of the battery. The lifetime of a node is the same as the actual
capacity of the battery.
3.RELATED WORK
Battery models depict the characteristics of the batteries used in real life. The following models
are discussed in [1]. It summarizes the pros and cons of each of the models, namely analytical
model, stochastic models, electric current models and electro-chemical models. The authors of
[2] have shown that the pulsed dicharged current applied for bursty stochastic transmissions
improves the battery life time better than that using constant discharge. In [3], different battery
mangement techniques are presented and compared analytically. It is also shown by simulation
that the lifetime of the battery can be maximized under simple traffic management schemes.
When energy needs to be drained from the battery, one of the several cells of the battery is
chosen to provide the energy, while the rest of the cells may potentially recover part of their
charge.Thus efficient battery discharge strategies can increase the battery lifetime, if they take
advantage of this recovery mechanism. The authors of [3] have assumed each node to contain a
battery package with L cells and have proposed three battery scheduling policies for scheduling
them. Further, the battery behaviour under two different modes of pulse discharge are studied.
In a battery of L cells, a subset of cells can be scheduled for transmitting a given packet leaving
other cells to recover their charge. The following approaches are applied to select the subset of
cells namely delay free approaches and no delay free approaches [3].
No delay free approaches consider a battery management technique that involves coordination
among the cells of the array and drains current from the cells according to their state of charge.
Because of the availability of smart battery packages it is possible to track the discharged
capacity of the cells. The goal is to monitor the cell’s status and make them recover as much as
they need to obtain the maximum available capacity from the discharge process [3].
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.2, No.3, September 2010
80
In [4], a framework has been developed to compute the optimal dicharge policy that maximizes
the battery lifetime. But this strategy requires significant time and memory for computation.
Hence, a strategy known as Maximum Charge scheduling policy which aims to efficiently
choose the cell to be discharged, so as to approximate the optimal is proposed in [4]. Here, the
total energy delivered is computed using the theory of stochastic Dynamic programming. In
[5], a number of suboptimal policies are proposed and the performance using them is evaluated
through simulation and the results are compared. The performance ratio of various policies for
different values of cell , nominal and theoretical capacities are plotted as a function of average
packet size.
The size of the packet is specified in terms of number of charge units to be discharged from a
battery[4]. In [4], the size of the packets corresponding to each traffic burst is assumed to be
poisson distributed. The poisson process is the oldest process that has been used to model
interarrival times of traffic streams. With poisson traffic, clustering occur in short term but
smoothes out over the long term. A queue may build up in the short run but over a long period,
the buffers are cleared out. Hence, only modest sized buffers are needed. This model can
describe short length dependence traffic accurately. But it is not adequate to describe the
phenomenon of real traffic because of long range dependence in network traffic [6].
In view of this, alternate traffic models such as self similar model has been proposed in the
literature[6]. In this paper, the burst size is assumed to be uniformly distributed in the interval
(0,N] where N is a variable. Using dynamic programming (DP), the battery recovery capacity is
optimized and lifetimes obtained are compared with two scheduling policies both using Round
Robin scheme one using delay free approach with high internal resistance of the cell and
another using no delay approach with low internal resistance .
4. PROPOSED SCHEME
With the advent of Smart Battery Packages (such as Linuxsbs), it is possible to find the state of
each cell (i.e) the nominal and theoritical capacities of each cell. In round robin delay free
approach, for scheduling the state information is ignored. In round robin no delay free
approach the state of the battery package is compared against a threshold for scheduling. as. In
any case the search for optimality must also be balanced against the need to accurately model
the batteries and to keep the overall system as simple as possible. Every discharge policy tries to
take advantage of recovery capacity effect which can be stated as the ability of a cell to recover
probabilistically one charge unit in one time slot when it is idle. Our scheduling policy tries to
take advantage of the inherent mathematical pattern that is present in cells that are recovering a
unit of charge i.e, the recovery of one charge unit in that time slot by each cell is mutually
independent of charge recovery by any other cell.
Assume there are L cells each numbered from 0.....L-1, the probability of recovery of cell i
whose state is defined by the two tuple set (Ni,Ti) is given by [7]
P(ri) = exp(-gc * (N-Ni)-φ(Ti)) if 0< Ni < N && 0< Ti < T
P(ri) = 0 otherwise (1)
Where
gc – device dependent parameter which gives the internal resistance or conductance of the cell.
N – the rated nominal capacity of the cell under fully charged condition.
Ni - the available nominal capacity of the cell
T – the maximum capacity of the cell (a direct function of the amount of active materials
initially present)
Ti – the available maximum capacity (a direct function of the amount of active materials present
at that instant)
The sum of the probability of recoveries is given by
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.2, No.3, September 2010
81
P(R) = ∑
−
=
1
0
)(
L
i
irP
(2)
Assuming each cell has a pulsed discharged profile and a generalized pulsed discharge model
for the battery, we propose that each request can be optimally satisfied if P(R) is maximized.
Expressing the result mathematically, we assume a request of size K arrives(i.e the next burst to
be transmitted has K packets). For a cell i, its state is given by the 2-tuple set (Ni , Ti),
Let ai be the amount of charge units supplied by the ith
cell.
P(R) must be maximized subject to the constraint
Ka
L
i
i =∑
−
=
1
0 (3)
and P(ri) = exp(-gc*(N-(Ni-ai)-φ(Ti-ai)) for all i=0,1,…..L-1
Since we assume a pulse discharge profile, each cell discharges the required amount of charge
units for a fraction of the time slot.
5. IMPLEMENTATION USING DYNAMIC PROGRAMMING
There are O(2L
) ways by which a request of size K can be satisfied. Hence implementing the
above mentioned idea in an efficient and optimized manner presents a big challenge.
Fortunately the problem of satisfying optimally the request of size K contains an optimal
substructure and hence is solvable by the strategy of dynamic programming(DP) as proposed in
[4] and [5].
Dynamic Programming is typically applied to optimization problems. In such problems there
can be many possible solutions. Each solution has a value and we wish to find a solution with
the optimum value [8] and [9]. The development of a DP algorithm can be broken into a
sequence of 4 steps
1. Characterize the structure of the optimal solution
2. Recursively define the value of an optimal solution
3. Compute the value of the optimal solution in a bottom-up fashion.
4. Construct an optimal solution from computed information.
Basically the DP protocol works as follows. It computes in a bottom up manner, the optimal
power requirements for each burst size up to the maximum burst. So in that sense the protocol is
burst size independent.
We know that for any random access MAC protocol, for transmitting any burst, the transmitter
has to wait for a duration of time equal to at least the minimum contention window (the wait
could be longer as the size of the contention window increases due to collisions). So if we could
pipeline the execution of the DP protocol with the contention window period of the previous
burst, we could effectively absorb the overhead in executing the algorithm. So we neglect the
delay caused by it in our simulation. This is a valid assumption because the size of the
contention window is similar to the running time of the DP algorithm.
Following step 1, the sub problems are nothing but the optimal ways to satisfy the request of
size j (0≤ j< K).
Now the recurrence relation connecting the various sub problems can be given as follows
P[i] = max{P[i-k] – exp(-gc*(N-Ni +set[i-k][j])- φ(Ti – set[i-k][j])) + exp(-gc*(N-Ni +set[i-k][j]+
k)- φ(Ti – set[i-k][j] - k) }
if i>0 (4)
For j=0….L-1
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.2, No.3, September 2010
82
k=1….min(Nj,Tj)
set[i-k][j] defines the amount of charge units taken from the cell j for satisfying the request of
size (i-k).
6.SIMULATION RESULTS
First we assume a device which has very high internal resistance (high value of gc parameter)
and then we show that DP protocol gives a much better performance measured in terms of
battery lifetime than the existing ROUND ROBIN protocol by way of extensive simulations
through ‘C’ language in Windows XP environment and present our results through tabulations
and graphs.
Next we assume that the device has very low internal resistance and so we have assumed the
existing protocol to be NO-DELAY FREE protocol. Since the round-robin protocol is no-delay
free our performance metric also includes the average packet delay, apart from the usual
lifetime of the battery, again we present our extensive simulation results through tabulations and
graphs.
Assumptions made during the simulation:
N=10 (nominal capacity is assumed to be10 charge units)
T=15 (theoritical capacity is assumed to be 15 charge units)
gc=2 (device dependent parameter which gives the internal resistance of the cell)
.
Traffic bursts assumed:
1)variable traffic burst(with maximum burst size fixed).
2)constant traffic burst size,assuming that in each time slot the burst of constant size is
transmitted.
the results of these two simulations are presented in a tabular form.
Table 1.Probabilistic distribution of traffic bursts with maximum burst size fixed.
Maximum size of the burst Lifetime Lifetime
(DP) (round-robin)
8 30 17
6 34 23
5 38 30
4 51 32
2 93 64
Table 2. constant size burst mode traffic
Burst size Lifetime Lifetime
(DP) (round-robin)
8 13 10
6 18 10
5 22 19
4 29 20
2 69 52
Since gc = 2, the device has very high internal resistance. Hence the recovery capacity effect is
considered to be negligible. So we assume the lifetime of the battery to be defined as the
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.2, No.3, September 2010
83
number of requests successfully satisfied (number of traffic bursts transmitted successfully).
With this assumption we calculate and tabulate the lifetimes of the battery assuming various
bursts as in tables 1 and 2.
Thus we find that our DP protocol performs significantly better under highly constrained
circumstances (such as devices with very high internal resistance) as indicated by tables 1 and 2.
Now the second case involves the device with very low resistance, that is low gc . Hence the
recovery capacity of the device is very high. In such cases the existing protocols use a NO-
DELAY FREE approach. That is traffic shaping techniques are employed wherein a burst is not
transmitted immediately if the cell does not have sufficient power to transmit it. Rather it is
forced to wait till the cell recovers sufficient charge to transmit it. Thus a new concept of packet
delay is introduced .
Assumptions made during the simulation:
N=10 (nominal capacity is assumed to be 10 charge units)
T=50 (theoritical capacity is assumed to be 15 charge units)
gc=0.5 (device dependent parameter which gives the internal resistance of the cell)
FRAME SIZE = 10 ms.
Here variable traffic burst(with maximum burst size fixed) is assumed.
Now we present a table 3 comparing the lifetimes of our DP protocol with no-delay free round-
robin protocol for probabilistic distribution of traffic bursts with maximum burst size fixed..
Let Ti be the fraction time for which the cell supplies charge. Since in our DP protocol , the
probability that the cell supplies charge or not for the current request depends on the state of the
cell which in turn depends on the distribution of the traffic burst, it is fair to assume that on an
average L/2 cells are used to satisfy a request. Thus the time taken in case of our DP protocol is
(L/2 )* Ti.
Typical values of Ti are 500 microseconds[2] . So in this case, the average packet delay is 2.5
ms.
Now we present a table 4 showing the average packet delay for the various traffic bursts
Table 3. lifetimes with low internal resistances
Maximum size Lifetime Lifetime
of the burst (DP) (round robin with
no-delay free)
7 128 45
6 141 58
5 178 81
4 202 144
Table 4. average packet delay for the various traffic burst
Maximum size Average packet delay(s)
of the burst
7 0.131556
6 0.126379
5 0.038395
4 0.117153
Thus we find that our protocol offers a significantly better performance as compared to round
robin with no-delay free in case of a device with very low internal resistance.
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.2, No.3, September 2010
84
In most of the communication protocols the maximum burst size is known apriori and so we fix
the maximum value of ‘k’ and since ‘L’ is a device parameter it is a constant and so is N.
This algorithm need not deal with variablevariable sized objects and so the need for recompiling
and relinking doesn’t exist. So for faster execution we may use an on-chip programming cache
containing the binaries of this algorithm along with the on-chip data cache containing the states
of the various cells (which is maintained by the smart battery package).
So this algorithm is further optimized and its execution takes typically negligible overhead. If an
ARM core is used this algorithm can be used as a fast interrupt.
7.HARDWARE SUPPORT
The dynamic programming algorithm splits the request to be distributed among ‘L’ cells (some
cells may satisfy trivial requests for 0 charge units meaning that they are in recovery state).So
any efficient mechanism is requires the pulses drawn from each of the ‘L’ cells into a single cell
so that it may be used to power the burst to be transmitted.
Also this dynamic programming algorithm and hardware mechanism is typically an overkill for
non-burst mode transmission, i.e., those transmissions which require acknowledgements for
every packet, so we have a mechanism to bypass this hardware unit for burstmode transmission
(typically a two way switch)
Two way Switch:
The CPU is able to detect that what follows is a burst mode or non-burst mode traffic and it
sends a signal S2 to the switch depending on S2 ; level switch is positioned
If S2 = 1 (means real time traffic) the switch connects C to B
Else (means non real time traffic) the switch connects C to A
Current summing circuit:
This is used in case of real time traffic; since the pulse comes out discrete instants of time, we
need a mechanism to sum the pulses up with as little overhead as possible. So we use the
hardware block of current summing circuit. Typical implementations use a capacitor (with very
large time constant) for charging up on occurrence of the pulse.In order to protect against its
discharge between successivecharging instants we use a capacitor with very large time constant.
At the end of the Lth
charging instant a signal is sent which switches on the transistor through
which the capacitor discharges.
Figure.1Two way Switch
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.2, No.3, September 2010
85
8.CONCLUSIONS
A new battery power scheduling policy based on dynamic programming is proposed for mobile
devices. Through extensive simulations, it is shown that the proposed DP protocol increases the
lifetime of nodes compared to two of the existing protocols using round robin scheme. The
average packet delay obtained using the proposed DP approach is found to be smaller than that
obtained using round robin protocol with no delay free approach.In addition to the simulation,on
chip programming cache is proposed for faster execution so as to have a negligible overhead. A
hardware mechanism with two way switch is proposed for bursty and non bursty transmission.
REFERENCES
[1] K.Lahiri , A. Raghunathan, S.Dey and D. panigrahi, “Battery driven system design: A new frontier in
low power design”, Proceedings of IEEE ASP-DAC/VLSI DESIGN 2002, pp. 261-267 January 2002.
[2] C.F. Chiasserini and R.R. Rao, “Pulsed Battery Discharge in communication devices”, Proceedings of
ACM MOBICOM 1999, pp. 88-95 November 1995.
[3] C.F. Chiasserini and R.R. Rao, “Energy efficient battery management”, Proceedings of IEEE
INFOCOM 2000, Volume 2, pp. 396-403, March 2000
[4]Saswati Sarkar and Maria Adamou,”A framework for Optimal Battery management For Wireless
Nodes,”IEEE Journal on selected Areas in Communications,Vol.21,NO.2,February 2003
[5]Maria Adamou and Saswati Sarkar,’Computationally Simple Battery Management Techniques for
Wireless Nodes,”in Proc.European Wireless,Florence,Italy,2002,pp.218-223.
[6] Michela Becchi,”From Poisson process to Self similar: A survey of Network traffic
models”,www.cse.wustl.edu/cse 567-06.
[7] S. Jayashree, B.S.Manoj, and C.Siva Ram Murthy, “A novel battery aware MAC protocol for ad hoc
wireless networks”, HiPC 2004, LNCS 3296, pp. 19-29, 2004.
[8] http://en.wikipedia.org/wiki/Dynamic_programming
[9]Richard Ernest Bellman, ”Dynamic Programming,”Courier Dover Publications 2003.
Authors: B. Malarkodi joined as lecturer in the department of Electronics and Communication
Engineering ,National Institute of Technology, Tiruchirappalli in the year 1990. Now she is working as
an Associate Professor in the same department. She is having twenty years of teaching experience and her
research interests are in the field of mobile ad hoc networks and wireless communication.
Dr.B.Venkataramani is working as a Professor in the department of Electronics and Communication
Engineering , National Institute of Technology, Tiruchirappalli and he is having twenty three years of
teaching experience and his research interests are in the field of VLSI design, DSP application in
Communication and Networking.

More Related Content

What's hot

IRJET- Frequency-Based Energy Management in Islanded Microgrid
IRJET-  	  Frequency-Based Energy Management in Islanded MicrogridIRJET-  	  Frequency-Based Energy Management in Islanded Microgrid
IRJET- Frequency-Based Energy Management in Islanded Microgrid
IRJET Journal
 
D010232026
D010232026D010232026
D010232026
IOSR Journals
 
ENERGY EFFICIENT GRID AND TREE BASED ROUTING PROTOCOL
ENERGY EFFICIENT GRID AND TREE BASED ROUTING PROTOCOLENERGY EFFICIENT GRID AND TREE BASED ROUTING PROTOCOL
ENERGY EFFICIENT GRID AND TREE BASED ROUTING PROTOCOL
ijwmn
 
H011137281
H011137281H011137281
H011137281
IOSR Journals
 
G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...
G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...
G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...
IJCI JOURNAL
 
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkA Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
IJCNCJournal
 
Evaluate the performance of K-Means and the fuzzy C-Means algorithms to forma...
Evaluate the performance of K-Means and the fuzzy C-Means algorithms to forma...Evaluate the performance of K-Means and the fuzzy C-Means algorithms to forma...
Evaluate the performance of K-Means and the fuzzy C-Means algorithms to forma...
IJECEIAES
 
Recent Developments in Routing Algorithms for Achieving Elongated Life in WSN
Recent Developments in Routing Algorithms for Achieving Elongated Life in WSNRecent Developments in Routing Algorithms for Achieving Elongated Life in WSN
Recent Developments in Routing Algorithms for Achieving Elongated Life in WSN
ijsrd.com
 
Transforming an Existing Distribution Network Into Autonomous MICRO-GRID usin...
Transforming an Existing Distribution Network Into Autonomous MICRO-GRID usin...Transforming an Existing Distribution Network Into Autonomous MICRO-GRID usin...
Transforming an Existing Distribution Network Into Autonomous MICRO-GRID usin...
IJERA Editor
 
F011136467
F011136467F011136467
F011136467
IOSR Journals
 
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
ijasuc
 
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’S
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’SAN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’S
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’S
IJCNCJournal
 
IRJET- A Review on Computational Determination of Global Maximum Power Point ...
IRJET- A Review on Computational Determination of Global Maximum Power Point ...IRJET- A Review on Computational Determination of Global Maximum Power Point ...
IRJET- A Review on Computational Determination of Global Maximum Power Point ...
IRJET Journal
 
Small Signal Stability Improvement and Congestion Management Using PSO Based ...
Small Signal Stability Improvement and Congestion Management Using PSO Based ...Small Signal Stability Improvement and Congestion Management Using PSO Based ...
Small Signal Stability Improvement and Congestion Management Using PSO Based ...
IDES Editor
 
Maximum Loadability Enhancement with a Hybrid Optimization Method
Maximum Loadability Enhancement with a Hybrid Optimization MethodMaximum Loadability Enhancement with a Hybrid Optimization Method
Maximum Loadability Enhancement with a Hybrid Optimization Method
journalBEEI
 
Cost Allocation of Reactive Power Using Matrix Methodology in Transmission Ne...
Cost Allocation of Reactive Power Using Matrix Methodology in Transmission Ne...Cost Allocation of Reactive Power Using Matrix Methodology in Transmission Ne...
Cost Allocation of Reactive Power Using Matrix Methodology in Transmission Ne...
IJAAS Team
 
3 3 energy efficient topology
3 3 energy efficient topology3 3 energy efficient topology
3 3 energy efficient topologyIAEME Publication
 
Energy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksEnergy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networks
ijassn
 

What's hot (20)

IRJET- Frequency-Based Energy Management in Islanded Microgrid
IRJET-  	  Frequency-Based Energy Management in Islanded MicrogridIRJET-  	  Frequency-Based Energy Management in Islanded Microgrid
IRJET- Frequency-Based Energy Management in Islanded Microgrid
 
D010232026
D010232026D010232026
D010232026
 
ENERGY EFFICIENT GRID AND TREE BASED ROUTING PROTOCOL
ENERGY EFFICIENT GRID AND TREE BASED ROUTING PROTOCOLENERGY EFFICIENT GRID AND TREE BASED ROUTING PROTOCOL
ENERGY EFFICIENT GRID AND TREE BASED ROUTING PROTOCOL
 
H011137281
H011137281H011137281
H011137281
 
EH-WSN
EH-WSNEH-WSN
EH-WSN
 
G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...
G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...
G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...
 
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkA Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
 
Evaluate the performance of K-Means and the fuzzy C-Means algorithms to forma...
Evaluate the performance of K-Means and the fuzzy C-Means algorithms to forma...Evaluate the performance of K-Means and the fuzzy C-Means algorithms to forma...
Evaluate the performance of K-Means and the fuzzy C-Means algorithms to forma...
 
Recent Developments in Routing Algorithms for Achieving Elongated Life in WSN
Recent Developments in Routing Algorithms for Achieving Elongated Life in WSNRecent Developments in Routing Algorithms for Achieving Elongated Life in WSN
Recent Developments in Routing Algorithms for Achieving Elongated Life in WSN
 
Transforming an Existing Distribution Network Into Autonomous MICRO-GRID usin...
Transforming an Existing Distribution Network Into Autonomous MICRO-GRID usin...Transforming an Existing Distribution Network Into Autonomous MICRO-GRID usin...
Transforming an Existing Distribution Network Into Autonomous MICRO-GRID usin...
 
F011136467
F011136467F011136467
F011136467
 
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
 
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’S
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’SAN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’S
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’S
 
IRJET- A Review on Computational Determination of Global Maximum Power Point ...
IRJET- A Review on Computational Determination of Global Maximum Power Point ...IRJET- A Review on Computational Determination of Global Maximum Power Point ...
IRJET- A Review on Computational Determination of Global Maximum Power Point ...
 
Small Signal Stability Improvement and Congestion Management Using PSO Based ...
Small Signal Stability Improvement and Congestion Management Using PSO Based ...Small Signal Stability Improvement and Congestion Management Using PSO Based ...
Small Signal Stability Improvement and Congestion Management Using PSO Based ...
 
Maximum Loadability Enhancement with a Hybrid Optimization Method
Maximum Loadability Enhancement with a Hybrid Optimization MethodMaximum Loadability Enhancement with a Hybrid Optimization Method
Maximum Loadability Enhancement with a Hybrid Optimization Method
 
Cost Allocation of Reactive Power Using Matrix Methodology in Transmission Ne...
Cost Allocation of Reactive Power Using Matrix Methodology in Transmission Ne...Cost Allocation of Reactive Power Using Matrix Methodology in Transmission Ne...
Cost Allocation of Reactive Power Using Matrix Methodology in Transmission Ne...
 
3 3 energy efficient topology
3 3 energy efficient topology3 3 energy efficient topology
3 3 energy efficient topology
 
paper11
paper11paper11
paper11
 
Energy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksEnergy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networks
 

Similar to A Battery Power Scheduling Policy with Hardware Support In Mobile Devices

17 storage size determination for grid-connected
17 storage size determination for grid-connected17 storage size determination for grid-connected
17 storage size determination for grid-connected
Ali Aliali
 
Wevj 10-00017-v2
Wevj 10-00017-v2Wevj 10-00017-v2
Wevj 10-00017-v2
Yogesh Mahadik
 
Two-way Load Flow Analysis using Newton-Raphson and Neural Network Methods
Two-way Load Flow Analysis using Newton-Raphson and Neural Network MethodsTwo-way Load Flow Analysis using Newton-Raphson and Neural Network Methods
Two-way Load Flow Analysis using Newton-Raphson and Neural Network Methods
IRJET Journal
 
Design and implementation of battery charger using ultrasparse matrix rectifi...
Design and implementation of battery charger using ultrasparse matrix rectifi...Design and implementation of battery charger using ultrasparse matrix rectifi...
Design and implementation of battery charger using ultrasparse matrix rectifi...
IAEME Publication
 
An in-depth study of the electrical characterization of supercapacitors for r...
An in-depth study of the electrical characterization of supercapacitors for r...An in-depth study of the electrical characterization of supercapacitors for r...
An in-depth study of the electrical characterization of supercapacitors for r...
VIT-AP University
 
Implementation and Calculation of State of Charge for Electric Vehicles
Implementation and Calculation of State of Charge for Electric VehiclesImplementation and Calculation of State of Charge for Electric Vehicles
Implementation and Calculation of State of Charge for Electric Vehicles
IRJET Journal
 
Implementation and Calculation of State of Charge for Electric Vehicles
Implementation and Calculation of State of Charge for Electric VehiclesImplementation and Calculation of State of Charge for Electric Vehicles
Implementation and Calculation of State of Charge for Electric Vehicles
IRJET Journal
 
A BATTERY CHARGING SYSTEM & APPENDED ZCS (PWM) RESONANT CONVERTER DC-DC BUCK:...
A BATTERY CHARGING SYSTEM & APPENDED ZCS (PWM) RESONANT CONVERTER DC-DC BUCK:...A BATTERY CHARGING SYSTEM & APPENDED ZCS (PWM) RESONANT CONVERTER DC-DC BUCK:...
A BATTERY CHARGING SYSTEM & APPENDED ZCS (PWM) RESONANT CONVERTER DC-DC BUCK:...
ELELIJ
 
A battery charging system & appended zcs (pwm) resonant converter dc dc buck ...
A battery charging system & appended zcs (pwm) resonant converter dc dc buck ...A battery charging system & appended zcs (pwm) resonant converter dc dc buck ...
A battery charging system & appended zcs (pwm) resonant converter dc dc buck ...
hunypink
 
Machine Learning Systems Based on xgBoost and MLP Neural Network Applied in S...
Machine Learning Systems Based on xgBoost and MLP Neural Network Applied in S...Machine Learning Systems Based on xgBoost and MLP Neural Network Applied in S...
Machine Learning Systems Based on xgBoost and MLP Neural Network Applied in S...
aciijournal
 
Machine learning systems based on xgBoost and MLP neural network applied in s...
Machine learning systems based on xgBoost and MLP neural network applied in s...Machine learning systems based on xgBoost and MLP neural network applied in s...
Machine learning systems based on xgBoost and MLP neural network applied in s...
aciijournal
 
Machine Learning Systems Based on xgBoost and MLP Neural Network Applied in S...
Machine Learning Systems Based on xgBoost and MLP Neural Network Applied in S...Machine Learning Systems Based on xgBoost and MLP Neural Network Applied in S...
Machine Learning Systems Based on xgBoost and MLP Neural Network Applied in S...
aciijournal
 
Integration of Supercapacitor in Photovoltaic Energy Storage: Modelling and C...
Integration of Supercapacitor in Photovoltaic Energy Storage: Modelling and C...Integration of Supercapacitor in Photovoltaic Energy Storage: Modelling and C...
Integration of Supercapacitor in Photovoltaic Energy Storage: Modelling and C...
Asoka Technologies
 
A robust state of charge estimation for multiple models of lead acid battery ...
A robust state of charge estimation for multiple models of lead acid battery ...A robust state of charge estimation for multiple models of lead acid battery ...
A robust state of charge estimation for multiple models of lead acid battery ...
journalBEEI
 
Particle swarm optimized power
Particle swarm optimized powerParticle swarm optimized power
Particle swarm optimized power
ijfcstjournal
 
Review on Optimal Allocation of Capacitor in Radial Distribution System
Review on Optimal Allocation of Capacitor in Radial Distribution SystemReview on Optimal Allocation of Capacitor in Radial Distribution System
Review on Optimal Allocation of Capacitor in Radial Distribution System
IRJET Journal
 
Machine learning systems based on xgBoost and MLP neural network applied in s...
Machine learning systems based on xgBoost and MLP neural network applied in s...Machine learning systems based on xgBoost and MLP neural network applied in s...
Machine learning systems based on xgBoost and MLP neural network applied in s...
aciijournal
 
Machine Learning Systems Based on xgBoost and MLP Neural Network Applied in S...
Machine Learning Systems Based on xgBoost and MLP Neural Network Applied in S...Machine Learning Systems Based on xgBoost and MLP Neural Network Applied in S...
Machine Learning Systems Based on xgBoost and MLP Neural Network Applied in S...
aciijournal
 
Optimized Power Flows in Microgrid with and without Distributed Energy Storag...
Optimized Power Flows in Microgrid with and without Distributed Energy Storag...Optimized Power Flows in Microgrid with and without Distributed Energy Storag...
Optimized Power Flows in Microgrid with and without Distributed Energy Storag...
Power System Operation
 
Paper id 36201537
Paper id 36201537Paper id 36201537
Paper id 36201537IJRAT
 

Similar to A Battery Power Scheduling Policy with Hardware Support In Mobile Devices (20)

17 storage size determination for grid-connected
17 storage size determination for grid-connected17 storage size determination for grid-connected
17 storage size determination for grid-connected
 
Wevj 10-00017-v2
Wevj 10-00017-v2Wevj 10-00017-v2
Wevj 10-00017-v2
 
Two-way Load Flow Analysis using Newton-Raphson and Neural Network Methods
Two-way Load Flow Analysis using Newton-Raphson and Neural Network MethodsTwo-way Load Flow Analysis using Newton-Raphson and Neural Network Methods
Two-way Load Flow Analysis using Newton-Raphson and Neural Network Methods
 
Design and implementation of battery charger using ultrasparse matrix rectifi...
Design and implementation of battery charger using ultrasparse matrix rectifi...Design and implementation of battery charger using ultrasparse matrix rectifi...
Design and implementation of battery charger using ultrasparse matrix rectifi...
 
An in-depth study of the electrical characterization of supercapacitors for r...
An in-depth study of the electrical characterization of supercapacitors for r...An in-depth study of the electrical characterization of supercapacitors for r...
An in-depth study of the electrical characterization of supercapacitors for r...
 
Implementation and Calculation of State of Charge for Electric Vehicles
Implementation and Calculation of State of Charge for Electric VehiclesImplementation and Calculation of State of Charge for Electric Vehicles
Implementation and Calculation of State of Charge for Electric Vehicles
 
Implementation and Calculation of State of Charge for Electric Vehicles
Implementation and Calculation of State of Charge for Electric VehiclesImplementation and Calculation of State of Charge for Electric Vehicles
Implementation and Calculation of State of Charge for Electric Vehicles
 
A BATTERY CHARGING SYSTEM & APPENDED ZCS (PWM) RESONANT CONVERTER DC-DC BUCK:...
A BATTERY CHARGING SYSTEM & APPENDED ZCS (PWM) RESONANT CONVERTER DC-DC BUCK:...A BATTERY CHARGING SYSTEM & APPENDED ZCS (PWM) RESONANT CONVERTER DC-DC BUCK:...
A BATTERY CHARGING SYSTEM & APPENDED ZCS (PWM) RESONANT CONVERTER DC-DC BUCK:...
 
A battery charging system & appended zcs (pwm) resonant converter dc dc buck ...
A battery charging system & appended zcs (pwm) resonant converter dc dc buck ...A battery charging system & appended zcs (pwm) resonant converter dc dc buck ...
A battery charging system & appended zcs (pwm) resonant converter dc dc buck ...
 
Machine Learning Systems Based on xgBoost and MLP Neural Network Applied in S...
Machine Learning Systems Based on xgBoost and MLP Neural Network Applied in S...Machine Learning Systems Based on xgBoost and MLP Neural Network Applied in S...
Machine Learning Systems Based on xgBoost and MLP Neural Network Applied in S...
 
Machine learning systems based on xgBoost and MLP neural network applied in s...
Machine learning systems based on xgBoost and MLP neural network applied in s...Machine learning systems based on xgBoost and MLP neural network applied in s...
Machine learning systems based on xgBoost and MLP neural network applied in s...
 
Machine Learning Systems Based on xgBoost and MLP Neural Network Applied in S...
Machine Learning Systems Based on xgBoost and MLP Neural Network Applied in S...Machine Learning Systems Based on xgBoost and MLP Neural Network Applied in S...
Machine Learning Systems Based on xgBoost and MLP Neural Network Applied in S...
 
Integration of Supercapacitor in Photovoltaic Energy Storage: Modelling and C...
Integration of Supercapacitor in Photovoltaic Energy Storage: Modelling and C...Integration of Supercapacitor in Photovoltaic Energy Storage: Modelling and C...
Integration of Supercapacitor in Photovoltaic Energy Storage: Modelling and C...
 
A robust state of charge estimation for multiple models of lead acid battery ...
A robust state of charge estimation for multiple models of lead acid battery ...A robust state of charge estimation for multiple models of lead acid battery ...
A robust state of charge estimation for multiple models of lead acid battery ...
 
Particle swarm optimized power
Particle swarm optimized powerParticle swarm optimized power
Particle swarm optimized power
 
Review on Optimal Allocation of Capacitor in Radial Distribution System
Review on Optimal Allocation of Capacitor in Radial Distribution SystemReview on Optimal Allocation of Capacitor in Radial Distribution System
Review on Optimal Allocation of Capacitor in Radial Distribution System
 
Machine learning systems based on xgBoost and MLP neural network applied in s...
Machine learning systems based on xgBoost and MLP neural network applied in s...Machine learning systems based on xgBoost and MLP neural network applied in s...
Machine learning systems based on xgBoost and MLP neural network applied in s...
 
Machine Learning Systems Based on xgBoost and MLP Neural Network Applied in S...
Machine Learning Systems Based on xgBoost and MLP Neural Network Applied in S...Machine Learning Systems Based on xgBoost and MLP Neural Network Applied in S...
Machine Learning Systems Based on xgBoost and MLP Neural Network Applied in S...
 
Optimized Power Flows in Microgrid with and without Distributed Energy Storag...
Optimized Power Flows in Microgrid with and without Distributed Energy Storag...Optimized Power Flows in Microgrid with and without Distributed Energy Storag...
Optimized Power Flows in Microgrid with and without Distributed Energy Storag...
 
Paper id 36201537
Paper id 36201537Paper id 36201537
Paper id 36201537
 

More from graphhoc

ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
graphhoc
 
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
graphhoc
 
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSDISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
graphhoc
 
Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet  Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet
graphhoc
 
A Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control ManetA Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control Manet
graphhoc
 
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 A Review of the Energy Efficient and Secure Multicast Routing Protocols for ... A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
graphhoc
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text
graphhoc
 
Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective  Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective
graphhoc
 
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
graphhoc
 
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidanceFault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
graphhoc
 
Enhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksEnhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networks
graphhoc
 
Simulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networksSimulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networks
graphhoc
 
Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...
graphhoc
 
Simulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real lifeSimulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real life
graphhoc
 
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
graphhoc
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
graphhoc
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
graphhoc
 
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles  An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
graphhoc
 
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATIONACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
graphhoc
 
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
graphhoc
 

More from graphhoc (20)

ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
 
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
 
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSDISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
 
Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet  Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet
 
A Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control ManetA Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control Manet
 
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 A Review of the Energy Efficient and Secure Multicast Routing Protocols for ... A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text
 
Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective  Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective
 
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
 
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidanceFault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
 
Enhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksEnhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networks
 
Simulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networksSimulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networks
 
Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...
 
Simulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real lifeSimulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real life
 
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
 
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles  An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
 
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATIONACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
 
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
 

Recently uploaded

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 

Recently uploaded (20)

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 

A Battery Power Scheduling Policy with Hardware Support In Mobile Devices

  • 1. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.2, No.3, September 2010 DOI :10.5121/jgraphoc.2010.2307 78 A BATTERY POWER SCHEDULING POLICY WITH HARDWARE SUPPORT IN MOBILE DEVICES B.Malarkodi, B.Prasana and B.Venkataramani Department of ECE National Institute of Technology Tiruchirappalli,India Email id: malark@nitt.edu, bvenki@nitt.edu ABSTRACT . A major issue in the ad hoc networks with energy constraints is to find ways that increase their lifetime. The use of multihop radio relaying requires a sufficient number of relaying nodes to maintainnetwork connectivity. Hence, battery power is a precious resource that must be used efficiently in order to avoid early termination of any node. In this paper, a new battery power scheduling policy based on dynamic programming is proposed for mobile devices.This policy makes use of the state information of each cell provided by the smart battery package and uses the strategy of dynamic programming to optimally satisfy a request for power. Using extensive simulation it is proved that dynamic programming based schedulingpolicyimproves the lifetime of the mobile nodes.Also a hardware support is proposed to succeeds in distinguishing between real-time and non-real-time traffic and provides the appropriate grade of service, to meet the time constraints associated with real time traffic. Keywords lifetime; battery; dynamic programming;mobile nodes; Scheduling;hardware unit 1.INTRODUCTION The nodes of an ad hoc wireless network, a group of uncoordinated heterogeneous nodes that self organise themselves to form a network have constrained battery resources. Advaces in battery technologies have been negligible as compared to the recent advances in the field of mobile computing and communication. The increasing gap between power consumption requirements and energy density(energy stored per unit weight of a battery) tends to increase the size of the batteries and hence increases the need for energy management. The lifetime of the ad hoc networks can be defined as the time between the start of the network to the death of the first node. The death of even a single node may lead to partitioning of the network and hence may terminate many of the on going transmissions. In view of this, the strategies to increase the lifetime of ad hoc networks become important. Towards this purpose, a new battery power scheduling policy based on dynamic programming is proposed in this paper. The rest of the paper is organised as follows. Section 2 provides an overview of battery characteristics. Section 3 describes the existing work in this area.In section 4, the description of the proposed scheduling policy is described and Section 5 presents the implementation andsection 6 explains the simulation results. Section 7 describes the hardware support proposed and section 8 ends with the conclusions.
  • 2. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.2, No.3, September 2010 79 2. OVERVIEW OF BATTERY CHARACTERISTICS A battery consists of an array of one or more electro chemical cells. It can be characterised either by its voltages or by its initial and remaining capacities. The behaviour of the batteries is governed by the following major chemical effects: Rate and recovery capacity effects: As the intensity of the discharge current increases, an insoluble component develops between the inner and outer surfaces of the cathode of the batteries. The inner surface becomes inaccessible as a result of this phenomenon, rendering the cell unusable even while a sizable amount of active materials still exists. This effect termed as rate capacity effect depends on the actual capacity of the cell and the discharge current. Recovery capacity effect is concerned with the recovery of charges under idle conditions. Due to this effect, on increasing the idle time of the batteries, one may be able to completely utilize the theoretical capacity of the batteries. Battery capacities: The amount of active materials (the materials that react chemically to produce electrical energy when battery is discharged and restored when battery is charged) contained in the battery refers to its theoretical capacity ( T ) and hence total number of such discharges cannot exceed the battery’s theoretical capacity. Whenever the battery discharges, the theoretical capacity of the battery decreases. Nominal capacity ( N ) corresponds to the capacity actually available when the battery is discharged at a specific constant current. Whenever the battery discharges, nominal capacity decreases, and increases probabilistically as the battery remains idle and also called as recovery state of the battery. This is due to the recovery capacity effect. The energy delivered under a given load is said to be the actual capacity of the battery. A battery may exceed the actual capacity but not the theoretical capacity. This is due to the rate capacity effect. By increasing the idle time, one may be able to utilize the maximum capacity of the battery. The lifetime of a node is the same as the actual capacity of the battery. 3.RELATED WORK Battery models depict the characteristics of the batteries used in real life. The following models are discussed in [1]. It summarizes the pros and cons of each of the models, namely analytical model, stochastic models, electric current models and electro-chemical models. The authors of [2] have shown that the pulsed dicharged current applied for bursty stochastic transmissions improves the battery life time better than that using constant discharge. In [3], different battery mangement techniques are presented and compared analytically. It is also shown by simulation that the lifetime of the battery can be maximized under simple traffic management schemes. When energy needs to be drained from the battery, one of the several cells of the battery is chosen to provide the energy, while the rest of the cells may potentially recover part of their charge.Thus efficient battery discharge strategies can increase the battery lifetime, if they take advantage of this recovery mechanism. The authors of [3] have assumed each node to contain a battery package with L cells and have proposed three battery scheduling policies for scheduling them. Further, the battery behaviour under two different modes of pulse discharge are studied. In a battery of L cells, a subset of cells can be scheduled for transmitting a given packet leaving other cells to recover their charge. The following approaches are applied to select the subset of cells namely delay free approaches and no delay free approaches [3]. No delay free approaches consider a battery management technique that involves coordination among the cells of the array and drains current from the cells according to their state of charge. Because of the availability of smart battery packages it is possible to track the discharged capacity of the cells. The goal is to monitor the cell’s status and make them recover as much as they need to obtain the maximum available capacity from the discharge process [3].
  • 3. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.2, No.3, September 2010 80 In [4], a framework has been developed to compute the optimal dicharge policy that maximizes the battery lifetime. But this strategy requires significant time and memory for computation. Hence, a strategy known as Maximum Charge scheduling policy which aims to efficiently choose the cell to be discharged, so as to approximate the optimal is proposed in [4]. Here, the total energy delivered is computed using the theory of stochastic Dynamic programming. In [5], a number of suboptimal policies are proposed and the performance using them is evaluated through simulation and the results are compared. The performance ratio of various policies for different values of cell , nominal and theoretical capacities are plotted as a function of average packet size. The size of the packet is specified in terms of number of charge units to be discharged from a battery[4]. In [4], the size of the packets corresponding to each traffic burst is assumed to be poisson distributed. The poisson process is the oldest process that has been used to model interarrival times of traffic streams. With poisson traffic, clustering occur in short term but smoothes out over the long term. A queue may build up in the short run but over a long period, the buffers are cleared out. Hence, only modest sized buffers are needed. This model can describe short length dependence traffic accurately. But it is not adequate to describe the phenomenon of real traffic because of long range dependence in network traffic [6]. In view of this, alternate traffic models such as self similar model has been proposed in the literature[6]. In this paper, the burst size is assumed to be uniformly distributed in the interval (0,N] where N is a variable. Using dynamic programming (DP), the battery recovery capacity is optimized and lifetimes obtained are compared with two scheduling policies both using Round Robin scheme one using delay free approach with high internal resistance of the cell and another using no delay approach with low internal resistance . 4. PROPOSED SCHEME With the advent of Smart Battery Packages (such as Linuxsbs), it is possible to find the state of each cell (i.e) the nominal and theoritical capacities of each cell. In round robin delay free approach, for scheduling the state information is ignored. In round robin no delay free approach the state of the battery package is compared against a threshold for scheduling. as. In any case the search for optimality must also be balanced against the need to accurately model the batteries and to keep the overall system as simple as possible. Every discharge policy tries to take advantage of recovery capacity effect which can be stated as the ability of a cell to recover probabilistically one charge unit in one time slot when it is idle. Our scheduling policy tries to take advantage of the inherent mathematical pattern that is present in cells that are recovering a unit of charge i.e, the recovery of one charge unit in that time slot by each cell is mutually independent of charge recovery by any other cell. Assume there are L cells each numbered from 0.....L-1, the probability of recovery of cell i whose state is defined by the two tuple set (Ni,Ti) is given by [7] P(ri) = exp(-gc * (N-Ni)-φ(Ti)) if 0< Ni < N && 0< Ti < T P(ri) = 0 otherwise (1) Where gc – device dependent parameter which gives the internal resistance or conductance of the cell. N – the rated nominal capacity of the cell under fully charged condition. Ni - the available nominal capacity of the cell T – the maximum capacity of the cell (a direct function of the amount of active materials initially present) Ti – the available maximum capacity (a direct function of the amount of active materials present at that instant) The sum of the probability of recoveries is given by
  • 4. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.2, No.3, September 2010 81 P(R) = ∑ − = 1 0 )( L i irP (2) Assuming each cell has a pulsed discharged profile and a generalized pulsed discharge model for the battery, we propose that each request can be optimally satisfied if P(R) is maximized. Expressing the result mathematically, we assume a request of size K arrives(i.e the next burst to be transmitted has K packets). For a cell i, its state is given by the 2-tuple set (Ni , Ti), Let ai be the amount of charge units supplied by the ith cell. P(R) must be maximized subject to the constraint Ka L i i =∑ − = 1 0 (3) and P(ri) = exp(-gc*(N-(Ni-ai)-φ(Ti-ai)) for all i=0,1,…..L-1 Since we assume a pulse discharge profile, each cell discharges the required amount of charge units for a fraction of the time slot. 5. IMPLEMENTATION USING DYNAMIC PROGRAMMING There are O(2L ) ways by which a request of size K can be satisfied. Hence implementing the above mentioned idea in an efficient and optimized manner presents a big challenge. Fortunately the problem of satisfying optimally the request of size K contains an optimal substructure and hence is solvable by the strategy of dynamic programming(DP) as proposed in [4] and [5]. Dynamic Programming is typically applied to optimization problems. In such problems there can be many possible solutions. Each solution has a value and we wish to find a solution with the optimum value [8] and [9]. The development of a DP algorithm can be broken into a sequence of 4 steps 1. Characterize the structure of the optimal solution 2. Recursively define the value of an optimal solution 3. Compute the value of the optimal solution in a bottom-up fashion. 4. Construct an optimal solution from computed information. Basically the DP protocol works as follows. It computes in a bottom up manner, the optimal power requirements for each burst size up to the maximum burst. So in that sense the protocol is burst size independent. We know that for any random access MAC protocol, for transmitting any burst, the transmitter has to wait for a duration of time equal to at least the minimum contention window (the wait could be longer as the size of the contention window increases due to collisions). So if we could pipeline the execution of the DP protocol with the contention window period of the previous burst, we could effectively absorb the overhead in executing the algorithm. So we neglect the delay caused by it in our simulation. This is a valid assumption because the size of the contention window is similar to the running time of the DP algorithm. Following step 1, the sub problems are nothing but the optimal ways to satisfy the request of size j (0≤ j< K). Now the recurrence relation connecting the various sub problems can be given as follows P[i] = max{P[i-k] – exp(-gc*(N-Ni +set[i-k][j])- φ(Ti – set[i-k][j])) + exp(-gc*(N-Ni +set[i-k][j]+ k)- φ(Ti – set[i-k][j] - k) } if i>0 (4) For j=0….L-1
  • 5. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.2, No.3, September 2010 82 k=1….min(Nj,Tj) set[i-k][j] defines the amount of charge units taken from the cell j for satisfying the request of size (i-k). 6.SIMULATION RESULTS First we assume a device which has very high internal resistance (high value of gc parameter) and then we show that DP protocol gives a much better performance measured in terms of battery lifetime than the existing ROUND ROBIN protocol by way of extensive simulations through ‘C’ language in Windows XP environment and present our results through tabulations and graphs. Next we assume that the device has very low internal resistance and so we have assumed the existing protocol to be NO-DELAY FREE protocol. Since the round-robin protocol is no-delay free our performance metric also includes the average packet delay, apart from the usual lifetime of the battery, again we present our extensive simulation results through tabulations and graphs. Assumptions made during the simulation: N=10 (nominal capacity is assumed to be10 charge units) T=15 (theoritical capacity is assumed to be 15 charge units) gc=2 (device dependent parameter which gives the internal resistance of the cell) . Traffic bursts assumed: 1)variable traffic burst(with maximum burst size fixed). 2)constant traffic burst size,assuming that in each time slot the burst of constant size is transmitted. the results of these two simulations are presented in a tabular form. Table 1.Probabilistic distribution of traffic bursts with maximum burst size fixed. Maximum size of the burst Lifetime Lifetime (DP) (round-robin) 8 30 17 6 34 23 5 38 30 4 51 32 2 93 64 Table 2. constant size burst mode traffic Burst size Lifetime Lifetime (DP) (round-robin) 8 13 10 6 18 10 5 22 19 4 29 20 2 69 52 Since gc = 2, the device has very high internal resistance. Hence the recovery capacity effect is considered to be negligible. So we assume the lifetime of the battery to be defined as the
  • 6. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.2, No.3, September 2010 83 number of requests successfully satisfied (number of traffic bursts transmitted successfully). With this assumption we calculate and tabulate the lifetimes of the battery assuming various bursts as in tables 1 and 2. Thus we find that our DP protocol performs significantly better under highly constrained circumstances (such as devices with very high internal resistance) as indicated by tables 1 and 2. Now the second case involves the device with very low resistance, that is low gc . Hence the recovery capacity of the device is very high. In such cases the existing protocols use a NO- DELAY FREE approach. That is traffic shaping techniques are employed wherein a burst is not transmitted immediately if the cell does not have sufficient power to transmit it. Rather it is forced to wait till the cell recovers sufficient charge to transmit it. Thus a new concept of packet delay is introduced . Assumptions made during the simulation: N=10 (nominal capacity is assumed to be 10 charge units) T=50 (theoritical capacity is assumed to be 15 charge units) gc=0.5 (device dependent parameter which gives the internal resistance of the cell) FRAME SIZE = 10 ms. Here variable traffic burst(with maximum burst size fixed) is assumed. Now we present a table 3 comparing the lifetimes of our DP protocol with no-delay free round- robin protocol for probabilistic distribution of traffic bursts with maximum burst size fixed.. Let Ti be the fraction time for which the cell supplies charge. Since in our DP protocol , the probability that the cell supplies charge or not for the current request depends on the state of the cell which in turn depends on the distribution of the traffic burst, it is fair to assume that on an average L/2 cells are used to satisfy a request. Thus the time taken in case of our DP protocol is (L/2 )* Ti. Typical values of Ti are 500 microseconds[2] . So in this case, the average packet delay is 2.5 ms. Now we present a table 4 showing the average packet delay for the various traffic bursts Table 3. lifetimes with low internal resistances Maximum size Lifetime Lifetime of the burst (DP) (round robin with no-delay free) 7 128 45 6 141 58 5 178 81 4 202 144 Table 4. average packet delay for the various traffic burst Maximum size Average packet delay(s) of the burst 7 0.131556 6 0.126379 5 0.038395 4 0.117153 Thus we find that our protocol offers a significantly better performance as compared to round robin with no-delay free in case of a device with very low internal resistance.
  • 7. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.2, No.3, September 2010 84 In most of the communication protocols the maximum burst size is known apriori and so we fix the maximum value of ‘k’ and since ‘L’ is a device parameter it is a constant and so is N. This algorithm need not deal with variablevariable sized objects and so the need for recompiling and relinking doesn’t exist. So for faster execution we may use an on-chip programming cache containing the binaries of this algorithm along with the on-chip data cache containing the states of the various cells (which is maintained by the smart battery package). So this algorithm is further optimized and its execution takes typically negligible overhead. If an ARM core is used this algorithm can be used as a fast interrupt. 7.HARDWARE SUPPORT The dynamic programming algorithm splits the request to be distributed among ‘L’ cells (some cells may satisfy trivial requests for 0 charge units meaning that they are in recovery state).So any efficient mechanism is requires the pulses drawn from each of the ‘L’ cells into a single cell so that it may be used to power the burst to be transmitted. Also this dynamic programming algorithm and hardware mechanism is typically an overkill for non-burst mode transmission, i.e., those transmissions which require acknowledgements for every packet, so we have a mechanism to bypass this hardware unit for burstmode transmission (typically a two way switch) Two way Switch: The CPU is able to detect that what follows is a burst mode or non-burst mode traffic and it sends a signal S2 to the switch depending on S2 ; level switch is positioned If S2 = 1 (means real time traffic) the switch connects C to B Else (means non real time traffic) the switch connects C to A Current summing circuit: This is used in case of real time traffic; since the pulse comes out discrete instants of time, we need a mechanism to sum the pulses up with as little overhead as possible. So we use the hardware block of current summing circuit. Typical implementations use a capacitor (with very large time constant) for charging up on occurrence of the pulse.In order to protect against its discharge between successivecharging instants we use a capacitor with very large time constant. At the end of the Lth charging instant a signal is sent which switches on the transistor through which the capacitor discharges. Figure.1Two way Switch
  • 8. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.2, No.3, September 2010 85 8.CONCLUSIONS A new battery power scheduling policy based on dynamic programming is proposed for mobile devices. Through extensive simulations, it is shown that the proposed DP protocol increases the lifetime of nodes compared to two of the existing protocols using round robin scheme. The average packet delay obtained using the proposed DP approach is found to be smaller than that obtained using round robin protocol with no delay free approach.In addition to the simulation,on chip programming cache is proposed for faster execution so as to have a negligible overhead. A hardware mechanism with two way switch is proposed for bursty and non bursty transmission. REFERENCES [1] K.Lahiri , A. Raghunathan, S.Dey and D. panigrahi, “Battery driven system design: A new frontier in low power design”, Proceedings of IEEE ASP-DAC/VLSI DESIGN 2002, pp. 261-267 January 2002. [2] C.F. Chiasserini and R.R. Rao, “Pulsed Battery Discharge in communication devices”, Proceedings of ACM MOBICOM 1999, pp. 88-95 November 1995. [3] C.F. Chiasserini and R.R. Rao, “Energy efficient battery management”, Proceedings of IEEE INFOCOM 2000, Volume 2, pp. 396-403, March 2000 [4]Saswati Sarkar and Maria Adamou,”A framework for Optimal Battery management For Wireless Nodes,”IEEE Journal on selected Areas in Communications,Vol.21,NO.2,February 2003 [5]Maria Adamou and Saswati Sarkar,’Computationally Simple Battery Management Techniques for Wireless Nodes,”in Proc.European Wireless,Florence,Italy,2002,pp.218-223. [6] Michela Becchi,”From Poisson process to Self similar: A survey of Network traffic models”,www.cse.wustl.edu/cse 567-06. [7] S. Jayashree, B.S.Manoj, and C.Siva Ram Murthy, “A novel battery aware MAC protocol for ad hoc wireless networks”, HiPC 2004, LNCS 3296, pp. 19-29, 2004. [8] http://en.wikipedia.org/wiki/Dynamic_programming [9]Richard Ernest Bellman, ”Dynamic Programming,”Courier Dover Publications 2003. Authors: B. Malarkodi joined as lecturer in the department of Electronics and Communication Engineering ,National Institute of Technology, Tiruchirappalli in the year 1990. Now she is working as an Associate Professor in the same department. She is having twenty years of teaching experience and her research interests are in the field of mobile ad hoc networks and wireless communication. Dr.B.Venkataramani is working as a Professor in the department of Electronics and Communication Engineering , National Institute of Technology, Tiruchirappalli and he is having twenty three years of teaching experience and his research interests are in the field of VLSI design, DSP application in Communication and Networking.