Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.
|
|
- Elvin Haynes
- 5 years ago
- Views:
Transcription
1 Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck Abtract The combinatorial optimization problem conidered in thi paper i a pecial two dimenional cutting tock problem ariing in the wood, metal and gla indutry Given a demand of non oriented mall rectangle and a theoretically innite et of large tock rectangle of given length and width, the aim i to generate layout with minimal wate, pecifying how to cut the demand out of the tock rectangle Special retriction are choen with repect to the production condition of the at gla indutry An iterative algorithm for olving thi problem heuritically i developed By a maximum weight matching uitable rectangle are matched in every iteration tep and the matched pair are conidered a new, o called meta rectangle Thee meta rectangle can be treated in the ame way a ordinary rectangle Furthermore, by the ue of hape function the orientation of the demand rectangle are not xed until the layout ha been computed The algorithm, programmed in C, ha been teted with everal intance, containing between 52 and 11 rectangle, taken from real demand of a gla factory The reulting layout, calculated within a few minute (on a PC-48), have an average wate of le than percent 1 Introduction Becaue of the increaing cot of raw material and the need to avoid indutrial wate, olving cutting tock problem became of great interet in the area of operation reearch Cutting tock problem belong to the cla of combinatorial optimization problem, o a olution among all poible olution ha to be found, which optimize a criterion function ubject to a et of contraint Unfortunately the ize of the olution pace containing all feaible olution in general i enormou A a conequence an exhautive earch within the whole olution pace i impractical 1
2 and ophiticated heuritic which enure the calculation of reaonable olution within limited time are required The combinatorial optimization problem conidered in thi paper i a pecial two dimenional cutting tock problem ariing in the wood, metal and gla indutry Given a demand of mall rectangle and a et of large tock rectangle, layout have to be found which pecify how to cut the demand out of the tock rectangle with minimal wate Gilmore and Gomory ued linear programming to olve uch kind of a problem exactly [Gil 191] [Gil 195] Their uggetion were improved by Herz [Her 1972] Branch&Bound and tree earch algorithm were developed by Cani [Can 1979] and Whitlock & Chritode [Whi 1977] Thee algorithm fail if more than 20 rectangle have to be packed Mot of the heuritic algorithm for generating layout are baed on a greedy trategy After orting the demand rectangle they are placed in the tock rectangle and none of them can be repoitioned Level oriented packing algorithm were developed by Coman, Garey, Johnon and Trajan [Cof 1980] Thee algorithm are fat, but the performance bound are not good enough to tand the requirement of the indutry [Cof 1990] [Gar 1981] A weakne of the mot known algorithm i that at the beginning of the algorithm the alignment of all rectangle that have to be packed are xed In many domain, epecially in the at gla indutry, a xing of the alignment i unneceary and it only lead to the fact, that ome layout with probably minimal wate are not conidered Furthermore, the mot algorithm are unable to pack a high number of demand rectangle a dene a it i neceary for the at gla indutry Therefore, an algorithm i needed which i able to handle a et of many rectangle (up to 200) and which take every poible and uitable layout in conideration In the econd ection of thi paper a detailed decription of the conidered problem i given and the olution trategy i preented Since hape function are ued for olving the problem, an introduction to thi theme i given in ection three The fourth ection deal with licing tree In the fth ection the maximum weight matching problem i decribed The developed algorithm conit of four tage which are decribed in ection ix Computational reult are given in ection even 2 The Two Dimenional Cutting Stock Problem The problem conidered in thi paper can be formulated a follow: Given a nite number n of demand rectangle of length l i and width w i and a theoretically innite et of tock rectangle fr1; R2; : : :g of a given length and width Find layout for cutting all demand out of the tock rectangle o that the minimum number of tock rectangle i required Only guillotine cut are permitted A rotation of the demand rectangle of 90 i allowed The above contraint are choen with repect to the production condition in the at gla indutry A 90 rotation of the rectangle i poible becaue gla i an iotropic material that mean that it ha the ame tructure in every dimenion Only guillotine cut are permitted mean that the cut mut go from one edge of a rectangle to the oppoite edge in a traight line Thi 2
3 contraint i crucial, becaue mot factorie in the gla indutry ue a cutting machine which can only carry out thee cut It i aumed that the tock rectangle i large enough, o that every demand rectangle t in the tock rectangle in at leat one orientation Without lo of generality it i aumed that the length and width of all rectangle are integer There are two more retriction concerning the practicability of cutting in the gla indutry: the contruction of travere and the obervance of cut ditance For cutting the demand rectangle out of the tock rectangle the latter are placed on a cutting table There a carriage with a diamond placed at the bottom of it lice the gla heet in x- and y-dimenion Since the big gla heet are even wore to handle (the typical extenion are up to ix meter in length and three meter in width) the rt cut that have to be made are in y-direction and go directly from one point of the longer ide of the heet to the oppoite ide They divide the tock rectangle into ome ection We call thee cut travere cut and the reulting ection of the tock rectangle are called travere Notice that the travere cut are alo guillotine cut The x-dimenion of the travere hould not exceed a given value For example, a typical bound of the travere length i 2300 mm if a tock heet of 000 mm length i ued Since the maximal travere length depend on the dimenion of the ued tock and that of the ued cutting table, thi value hould be given together with the other parameter of an intance like the dimenion of tock and demand rectangle A nice property of the licing of gla i that no awdut arie a it doe by the cutting of wood But it i crucial to take care of the ditance between the cut The cutting of gla i done by licing the tu and then breaking it along the lice If two lice are too cloe, the gla can not be broken The minimal ditance between two cut i the double heet thickne, but for a gla heet of 4 mm thickne the typical value of 20 mm i choen Alo thi value hould be given in the intance Figure 1 how how a tock rectangle can be liced into the demand rectangle The number give information about a poible equence of the cut The rt two cut are travere cut which divide the gla heet into three travere Figure 1: Poible guillotine cut in a layout For olving the given two dimenional cutting tock problem of the at gla indutry an iterative algorithm i developed baed on the following idea: In every iteration tep ome rectangle are paired by a maximum weight matching and the matched pair are conidered a new, larger 3
4 rectangle, o called meta rectangle In the following iteration tep thee meta rectangle are treated in the ame way a ordinary rectangle The iterative matching automatically take care of the guillotine tructure The iteration top if the contructed meta rectangle are travere Thee travere will be aigned to the tock heet by a rt t decreaing algorithm In every iteration tep all poible alignment of demand and meta rectangle are conidered by making ue of hape function 3 Shape Function A meta rectangle ha everal layout according to the orientation of the horizontal or vertical cut which i ued to plit the meta rectangle into the two buddie it reulted from The layout alo depend on the alignment of the demand rectangle the meta rectangle contain The alignment of the demand rectangle are not xed at any time the algorithm proceed For example, if we match two demand rectangle A and B the reulting meta rectangle AB ha eight eentially dierent layout: A lie above or left from B and both rectangle can be rotated Figure 2 how the eight eentially dierent layout for a meta rectangle coniting of two demand rectangle Figure 2: Layout for a meta rectangle with two demand rectangle A ingle layout of a meta rectangle i repreented by a licing intruction Thi i a four dimenional vector (x; y; o; p), where x and y are the length and width of the meta rectangle in it conidered layout, o 2 fh; vg i the orientation of the horizontal or vertical cut ued to plit it and p i the point (according to o) where the cut tart To decribe all poible layout of a meta rectangle, a hape function i ued Such function are known from oorplanning problem [Sto 1983], [Ott 1983] A hape function R for a rectangle R can be conidered a a decreaing, piecewie linear function The interpretation i that R (w) i an upper bound on the length of a (meta) rectangle that ha the width w So, if a meta rectangle ha been computed which contain a et of demand rectangle and if the dimenion of the tock 4
5 rectangle are known, the maximal needed x-dimenion for a layout of the meta rectangle can be found ubject to the given width of the tock rectangle w l (l,w,h,0)? (w,l,h,0)? f l w - Figure 3: Shape function of a demand rectangle A hape function i conidered a a lit of licing intruction The hape function of a demand rectangle of length l and width w > l conit of two licing intruction ((l; w; h; 0); (w; l; h; 0)) The cut orientation and it tarting point i of no ue here, but later we will need thi information for the cutting of meta rectangle unequal to demand rectangle In Figure 3 an example of a hape function for a demand rectangle i given The hape function of a meta rectangle i calculated by the hape function of the two demand or meta rectangle it conit of, with the help of the compoition procedure: Let f1 and f2 be two hape function and i = (x i ; y i ; o i ; p i ) a licing intruction of f i (i = 1; 2) The compoed licing intruction for a horizontal rep vertical cut i: horizontal cut: comp(hor; 1 ; 2 ) := (max(x 1 ; x 2 ); y 1 + y 2 ; h; min(y 1 ; y 2 )) vertical cut: comp(ver; 1 ; 2 ) := (x 1 + x 2 ; max(y 1 ; y 2 ); v; min(x 1 ; x 2 )) By compoing all licing intruction of f1 with thoe of f2, two hape function f hor and f ver are computed which contain all poible horizontal rep vertical licing intruction Figure 4 how a horizontal and vertical hape function, reulting from the compoition of the hape function of two demand rectangle Three licing intruction per cut orientation are found Thi lead to the fact that a layout of the reulting meta rectangle i not included in the lit of licing intruction, if another layout of the ame width but a maller length or the ame length but a maller width exit Hence, only feaible licing intruction are tored in the hape function For example, layout three and four in the upper row and layout one and two in the lower row of Figure 2 are treated in thi way 5
6 f1 f2 f ver f hor f2 f1 - - a) horizontal Figure 4: Shape function with given cut orientation b) vertical To calculate a ingle hape function f for a meta rectangle, we take the minimum about f hor and f ver by merging thi two function and deleting the dominated licing intruction For example, a licing intruction of f ver i dominated by one of f hor, if f hor (w) < f ver (w) for a given width w If two licing intruction of f hor and f ver have the ame width and the ame length then we will determine here, that the horizontal cut i choen The maximal number of licing intruction that have to be tored in a hape function f which i calculated by compoing two other hape function f1 and f2 i 2(jf1j+jf2j?1), where jf i j denote the number of licing intruction in function f i (ee [Mue 1991]) f hor f ver f Figure 5: Minimum hape function Figure 5 how the minimum hape function of the function f hor and f ver hown in Figure 4 In thi example of calculating the minimum function, no dominated licing intruction have to be deleted - 4 Slicing Tree To tore the actual pair in every iteration tep we ue binary licing tree Every leaf of a tree repreent a demand rectangle, an interior node of a tree repreent a meta rectangle Two node have the ame father if the rectangle repreented by thee node are paired In every node the hape function of the correponding meta rectangle i tored
7 A licing tree i built bottom up At the beginning of the algorithm all licing tree conit of only one node (the root) repreenting the demand rectangle In every iteration tep, ome of the tree are combined by a common father, which i the root of a new licing tree repreenting the new meta rectangle The iteration top, if no more uitable pair can be matched A detailed decription of thi top criteria i given in ection ix Since all node contain a hape function and every hape function decribe all poible layout of a meta rectangle, the licing tree contain an exponential number of poible layout for the tock rectangle When the algorithm ha ended, we can detect how the demand rectangle hould be cut out of the tock rectangle Therefore, a tree i travered in top down order Since every node tore a hape function we can detect how the rt cut in the tock rectangle ha to be made by conidering the hape function in the root of a tree and earching for the rt licing intruction whoe y-value i maller or equal to the width of the tock rectangle Due to the property of the hape function mentioned above, we automatically get the licing intruction which decribe the layout with the minimal length according to the made pairing If the rt cut ha been carried out, the tock rectangle i plit into two part The hape function in the on of the root decribe how thee two part eciently have to be plit further Thi proceeding i hown in Figure by an example By the traveral of all licing tree (one licing tree for every layout) the demand rectangle can be produced (,(000,3200,v,1400),) (,(1400,3200,h,1050),) Figure : Layout and correponding licing tree 5 Maximum Weight Matching To nd out in every iteration tep, which of the available rectangle have to be paired, a maximum weight matching in a complete undirected weighted graph i ued The node of the graph repreent the available (meta) rectangle, the edge repreent the poible pair and the weight give information about the benet of a pair The higher the weight, the better the pair The weight are found by a o called benet function, which evaluate the poible pairing of two rectangle by conidering the correponding hape function For example, a poible benet function for the pairing of two rectangle i to calculate the average wate of all poible layout of the 7
8 reulting meta rectangle and to ubtract thi value from 100 Thi encourage the formation of meta rectangle having many denely packed layout If all weight of the edge are calculated, the maximum weight matching nd the et of edge, which maximize the um of all weight under the contraint that no two edge are adjacent Thi problem can be formulated a a LP-problem a follow: Maximize ubject to nx nx i;j=1 c i;j x i;j x i;j 1 for i = 1; : : : ; n j=1 x i;i = 0 for i = 1; : : : ; n x i;j = x j;i for i; j = 1; : : : ; n x i;j 2 f0; 1g for 1 i j n Here, n i the number of available meta rectangle and c i the cot matrix The value of x i;j i 1 if the rectangle i and j are matched and x i;j = 0 if not Edmond howed, that the maximum weight matching problem can be olved in time O(n 3 ) The algorithm ued in thi application wa uggeted by Gabow [Gab 1973] Figure 7 how the matching algorithm for even rectangle in three iteration tep The edge with zero benet are not hown {1,2} 90 {3,4} {5,7} Iteration {1,2,5,7} {3,4,} Iteration 1 Iteration 3 Figure 7: Maximum weight matching in three iteration 8
9 Iterated Matching Up to now, it ha not been mentioned at which time the iteration top and what a uitable pair of rectangle i The top criteria i choen a follow: One retriction when cutting gla heet i, that the tock rectangle mut be plit into travere at the beginning of the cutting; the rt cut mut be parallel to the horter ide of the tock rectangle, o that the tock rectangle i divided into ection with the ame width a and a maller length than the original heet So the iterated matching top if meta rectangle have been generated with at leat one layout in which they repreent a travere By computing uch meta rectangle the problem of nding the layout for the tock rectangle i reduced to a one dimenional bin packing problem: the travere, all of nearly the ame width a that of the tock rectangle, have to be aigned to the latter in uch a way, that the tock heet are lled nearly complete in length To nd only uitable meta rectangle the algorithm ha to take care of the further retriction a it i the bound of the travere length, the cut ditance and the obervance of the guillotine tructure The lat i preerved ince the iterated matching automatically take care of the guillotine tructure a een above To prevent cut with ditance of le than the given minimum, licing intruction which do not fulll thi ubjection are not tored during the computation of hape function To reduce the number of the licing intruction of a hape function alo thoe intruction are not tored which have a x- or y-value bigger than the larger ide of the tock rectangle The benet function etimate a potential pair with zero value if the reulting meta rectangle doe not have a layout in which it t into the given travere hape All thee obervation are made in any iteration tep The developed algorithm conit of four tage The rt two tage are ued to contruct travere In the third tage the travere will be improved The fourth tage i needed to align the travere to the tock rectangle In the rt tage univeral rectangle are calculated by an iterative ue of the maximum weight matching To call a meta rectangle univeral, it mut comply with two requirement: 1 The average wate of all layout of the meta rectangle mut be maller than ve percent and 2 There mut exit another meta rectangle, o that the meta rectangle reulting from the pairing of thee two i a travere A travere hould have a wate area of le than 4 percent In every iteration tep of tage one a matching graph i formed which node repreent the available non univeral rectangle The benet function in tage one deliver a high value for a poible pair if the average percentage wate of all layout of the potentially reulting meta rectangle i maller than ve percent The benet i zero if all layout of the reulting meta rectangle violate the retriction like travere length and cut ditance After the calculation of all weight in the matching graph the maximum weight matching chooe the bet marriage Stage one end if no more univeral rectangle can be contructed without violating the retriction The econd tage conit of only one iteration tep Here the n contructed univeral rectangle are matched to n=2 travere For thi alo the maximum weight matching i ued A an indicator for the deciion whether a meta rectangle (reulted from the pairing of two univeral rectangle) i a travere or not, the percentage of the ued area of it \relevant" layout i computed To nd the relevant layout, the rt licing intruction of the hape function i choen with a y-value maller than or equal to the width of the tock rectangle By multiplying the x- and the y-value 9
10 of thi licing intruction the area which i claimed by the correponding layout i calculated To compute the percentage of the ued area, only the area of all contained demand rectangle have to be added, multiplied with 100 and divided by the claimed area The higher the percentage of the ued area, the better the travere Thi ha to be repected by the benet function of tage two, alo enuring that none of the other retriction i violated Since the iterated matching i a greedy trategy, the third tage i needed to improve thoe travere with a lot of wate area The trategy of improvement i to chooe the wore travere, for example thoe with le than 9 percent ued area, and improve them by interchanging ubtree of the correponding licing tree To nd out whether an interchangement hould be made or not, the um of all x-dimenion of the travere i calculated before and after the interchangement The idea i that the travere are improved, if the um of all travere length after interchanging i maller than before it, becaue then all demand rectangle have been packed on a maller domain Hence le wate will be produced Figure 8 how thi proceeding by an example R 3 R 4 R 5 R 4 R 1 R 2 R 5 R 1 R 2 R 3 R 1 R 2 R 3 R 4 R 5 R 1 R 2 R 5 R 3 R 4 Figure 8: Improvement of travere by interchanging ubtree Since the travere all have nearly the ame width a the tock rectangle, the problem of packing the rectangle into the tock heet i reduced to a one dimenional bin packing problem Therefore, in the fourth tage the travere are aigned to the tock rectangle Thi could be done by a rt t decreaing algorithm: lit the travere ordered by decreaing x-dimenion and let the tock heet be indexed by increaing number Aign the rt travere of the lit to the tock rectangle with the lowet index it t in Then aign the econd travere by the ame rule If a travere t in none of the already ued tock heet, a new tock rectangle ha to be ued The rt t decreaing nd olution for thi one dimenional bin packing which are at mot 22 percent wore than the optimal olution, and it can unfortunately be thi bad [Gar 1979] Therefore a modied rt t decreaing algorithm i ued The modication i, that after the normal rt t decreaing i completed, a ytematic interchange of travere between the ued tock rectangle i made with the aim to ll the tock rectangle a full a poible After the aignment ha been computed, all travere of one tock heet are paired and the correponding licing tree and hape function are computed So, at the end of tage four for every ued tock rectangle a licing tree i computed 10
11 which give information about how to cut the gla heet The good reult of the tock cutting by iterated matching are hown in the table of the following ection 7 Computational Reult The algorithm, programmed in C, ha been teted with everal intance taken from real demand of a gla factory, containing between 52 and 11 rectangle A PC-48 (33 MHz) wa ued to meaure the time requirement of the algorithm The time give information about the real computation time, ie requirement for input and output are not conidered The tock rectangle are of dimenion about 000 mm x 3200 mm for all intance The maximal travere length i 2300 mm and the minimal cut ditance i 20 mm for all intance except intance three Here the minimal cut ditance i 40 mm ince the thickne of the required tock heet i mm and not 4 mm a it i for the other intance Reult of the Iterated Matching Algorithm intance n area time in ec average wate in % LNS RNS in mm 2 tage 1+2 tage 3 match travere tock :58 4:9 5:4 7:313 7: :11 5:18 5:34 :98 : :05 8:35 9:73 3:39 3: :33 4:59 4:0 5:559 5: :4 4:80 4:84 4:277 4: :73 3:87 3:97 8:75 8: :03 4:82 :40 :137 :241 Table 1: Reult of the four tage algorithm Table 1 how the data of the intance and the computational reult of the four tage algorithm dicued in ection ix The number n of the demand rectangle of the intance i given in the econd column and the um of all demand rectangle area i lited in the third column The time column give information about the time requirement in econd of tage one, two and three Stage one and two are conidered together, becaue they both how how fat the iterated matching work The time needed to run the modied rt t decreaing i not lited, becaue it only take le than one econd The match wate i the average wate in percent of all travere after tage two, the travere wate i the wate after tage three and the tock wate i the average wate of all computed layout at the end of the algorithm The number of the at leat needed tock rectangle (LNS) and of the real needed tock rectangle (RNS) give information about how good the modied rt t decreaing aign the travere to the tock rectangle LNS i a lower bound for the number of required tock rectangle, RNS i the fractional number of really needed tock rectangle LNS and RNS are calculated a follow: Let k be the number of travere after tage three, t i the length of travere i according to the 11
12 given width W and length L of the tock heet Then kx LNS = 1 L i=1 i a lower bound for the number of needed tock heet Notice, that it i not guaranteed that thi bound can really be reached To calculate RNS, let 2 NI be the number of ued tock rectangle R i,i = 1; : : : ; Aume that R i the tock heet which i lled at leat in length and let l denote the ued x-dimenion of R Then RNS = (? 1) + l L i the fractional number of really needed tock rectangle The iterated matching produce travere with little average wate (about 8 percent) in a very hort time Exception are the intance two and three Here the greedy behaviour of the matching trategy ha to be adjuted Thi i done in tage three The improvement of the travere in tage three take in mot cae only a few econd (no more than 95 econd), except for intance two If the third tage for olving intance two i conidered in detail it can be een that mot of the improvement i done in the rt thirty econd Hence, a time retriction for tage three would be ueful Notice, that it i not the number of demand rectangle, that make the algorithm impracticable for intance two Intance ix involve nearly the ame number of demand rectangle but it ha the mallet wate of all computed intance and it take only two minute and 42 econd to compute thi olution The modied rt t decreaing nd good olution for the aignment of the travere to the tock rectangle Thi can be een in the very mall dierence between LNS and RNS Analyzing Table 1, it can be een that the average wate of all computed layout i le than ix percent and that the time requirement, with exception of intance two, i le than three minute Four of the even intance really take le than 112 econd for computation Hence, we can conclude that the iterated matching i a new ecient method for olving the two dimenional cutting tock problem ubject to the retriction of the indutry which i applicable for intance with a large number of rectangle t i Reference [Can 1979] [Cof 1980] [Cof 1990] [Gab 1973] P de Cani, \Packing problem in theory and practice", Department of Engineering Production, Univerity of Birmingham, March 1979 E G Coman, M R Garey, D S Johnon and R E Tarjan, \Performance Bound for Level-Oriented Two-Dimenional Packing Algorithm", SIAM Journal on Computing 9, 4 (1980), pp 808{82 E G Coman and P W Shor, \Average-Cae Analyi of Cutting and Packing in Two Dimenion", European Journal of Operational Reearch 44, 2 (1990), pp 134{ 145 H Gabow, "Implementation of Algorithm for Maximum Matching on Nonbipartite Graph", PhD Thei, Stanford Univerity,
13 [Gar 1979] [Gar 1981] [Gil 191] [Gil 195] [Her 1972] [Mue 1991] [Ott 1983] [Sto 1983] [Whi 1977] MR Garey und DS Johnon, \Computer and Intractability", Freeman, San Francico, 1979, pp 12{127 M R Garey and D S Johnon, \Approximation Algorithm for Bin Packing Problem: A Survey", in Analyi and Deign of Algorithm in Combinatorial Optimization, Vol 2, G Auiello and N Lucertini, ed, Springer Verlag, Berlin, 1981, pp 147{172 P C Gilmore and R E Gomory, \A Linear Programming Approach to the Cutting- Stock Problem", Operation Reearch, Vol 9 (191), pp 849{859 P C Gilmore and R E Gomory, \Multitage cutting tock problem of two and more dimenion", Operation Reearch, Vol 13 (195), pp 94{120 J C Herz, \Recurive Computational Procedure for Two-Dimenional Stock Cutting", IBM Journal of Reearch and Development 1 (1972), pp 42{49 R Muller, \Hierarchiche Floorplanning mit integrierter globaler Verdrahtung", Report No 81, Fachbereich Mathematik{Informatik Univeritat{GH{Paderborn, February 1991, pp 3{4 RHJM Otten, \Ecient Floorplan Optimization", In Proceeding of the International Conference on Computer Deign: VLSI in Computer, IEEE, 1983, pp 499{ 502 L Stockmeyer, \Optimal Orientation of Cell in Slicing Floorplan Deign", Information and Control, No 57 (1983), pp 91{101 C Whitlock and N Chritode, \An Algorithm for Two-Dimenional Cutting Problem", Operation Reearch, Vol 25, Nr 1, January-February 1977, pp 30{44 13
Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,
COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)
More informationLecture 14: Minimum Spanning Tree I
COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce
More informationUniversität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.
Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut
More informationRouting Definition 4.1
4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing
More informationMAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc
MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic
More informationDelaunay Triangulation: Incremental Construction
Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )
More informationSee chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM
Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive
More informationOperational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz
Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two
More information1 The secretary problem
Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.
More informationxy-monotone path existence queries in a rectilinear environment
CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of
More informationDAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications
DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu
More informationShortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights
Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two
More informationQuadrilaterals. Learning Objectives. Pre-Activity
Section 3.4 Pre-Activity Preparation Quadrilateral Intereting geometric hape and pattern are all around u when we tart looking for them. Examine a row of fencing or the tiling deign at the wimming pool.
More informationEdits in Xylia Validity Preserving Editing of XML Documents
dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,
More informationContents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course:
Content Shortet path Algorithm and Network 21/211 The hortet path problem: Statement Verion Application Algorithm (for ingle ource p problem) Reminder: relaxation, Dijktra, Variant of Dijktra, Bellman-Ford,
More informationPlanning of scooping position and approach path for loading operation by wheel loader
22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader
More informationelse end while End References
621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized
More informationToday s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is
Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -
More informationMinimum congestion spanning trees in bipartite and random graphs
Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu
More informationA Practical Model for Minimizing Waiting Time in a Transit Network
A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,
More informationA Multi-objective Genetic Algorithm for Reliability Optimization Problem
International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR
More informationTopics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X
Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term
More informationChapter S:II (continued)
Chapter S:II (continued) II. Baic Search Algorithm Sytematic Search Graph Theory Baic State Space Search Depth-Firt Search Backtracking Breadth-Firt Search Uniform-Cot Search AND-OR Graph Baic Depth-Firt
More informationNew Structural Decomposition Techniques for Constraint Satisfaction Problems
New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.
More information3D SMAP Algorithm. April 11, 2012
3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative
More informationModeling of underwater vehicle s dynamics
Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented
More informationShortest Path Routing in Arbitrary Networks
Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,
More informationThe underigned hereby recommend to the Faculty of Graduate Studie and Reearch aceeptance of the thei, Two Topic in Applied Algorithmic ubmitted by Pat
Two Topic in Applied Algorithmic By Patrick R. Morin A thei ubmitted to the Faculty of Graduate Studie and Reearch in partial fullment of the requirement for the degree of Mater of Computer Science Ottawa-Carleton
More informationPerformance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks
Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity
More informationManeuverable Relays to Improve Energy Efficiency in Sensor Networks
Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov
More informationA Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *
Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm
More informationSIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial
SIMIT 7 Component Type Editor (CTE) Uer manual Siemen Indutrial Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult
More informationGeneric Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline
Generic Travere CS 62, Lecture 9 Jared Saia Univerity of New Mexico Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v) from the bag if (v i unmarked) mark v; parent(v) = p;
More informationAn Intro to LP and the Simplex Algorithm. Primal Simplex
An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n
More informationEvolution of Non-Deterministic Incremental Algorithms. Hugues Juille. Volen Center for Complex Systems. Brandeis University. Waltham, MA
Evolution of Non-Determinitic Incremental Algorithm a a New Approach for Search in State Space Hugue Juille Computer Science Department Volen Center for Complex Sytem Brandei Univerity Waltham, MA 02254-9110
More informationPerformance Evaluation of an Advanced Local Search Evolutionary Algorithm
Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation
More informationCERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu
CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,
More informationKey Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.
Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in
More informationAdvanced Encryption Standard and Modes of Operation
Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES
More informationLocalized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks
Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de
More informationA Boyer-Moore Approach for. Two-Dimensional Matching. Jorma Tarhio. University of California. Berkeley, CA Abstract
A Boyer-Moore Approach for Two-Dimenional Matching Jorma Tarhio Computer Science Diviion Univerity of California Berkeley, CA 94720 Abtract An imple ublinear algorithm i preented for two-dimenional tring
More information3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES
MAKARA, TEKNOLOGI, VOL. 9, NO., APRIL 5: 3-35 3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES Mochammad Zulianyah Informatic Engineering, Faculty of Engineering, ARS International Univerity,
More informationStochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang
Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,
More informationAUTOMATIC TEST CASE GENERATION USING UML MODELS
Volume-2, Iue-6, June-2014 AUTOMATIC TEST CASE GENERATION USING UML MODELS 1 SAGARKUMAR P. JAIN, 2 KHUSHBOO S. LALWANI, 3 NIKITA K. MAHAJAN, 4 BHAGYASHREE J. GADEKAR 1,2,3,4 Department of Computer Engineering,
More informationISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Iue 4, April 2015 International Journal Advance Reearch in Computer Science and Management Studie Reearch Article / Survey Paper / Cae Study Available online at: www.ijarcm.com
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier a a The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each b c circuit will be decribed in Verilog
More informationAN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM
RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt
More informationCSE 250B Assignment 4 Report
CSE 250B Aignment 4 Report March 24, 2012 Yuncong Chen yuncong@c.ucd.edu Pengfei Chen pec008@ucd.edu Yang Liu yal060@c.ucd.edu Abtract In thi project, we implemented the recurive autoencoder (RAE) a decribed
More informationarxiv: v1 [cs.ds] 27 Feb 2018
Incremental Strong Connectivity and 2-Connectivity in Directed Graph Louka Georgiadi 1, Giueppe F. Italiano 2, and Niko Parotidi 2 arxiv:1802.10189v1 [c.ds] 27 Feb 2018 1 Univerity of Ioannina, Greece.
More informationA METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS
Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh
More informationKaren L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract
Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial
More informationA New Approach to Pipeline FFT Processor
A ew Approach to Pipeline FFT Proceor Shouheng He and Mat Torkelon Department of Applied Electronic, Lund Univerity S- Lund, SWEDE email: he@tde.lth.e; torkel@tde.lth.e Abtract A new VLSI architecture
More informationThe Association of System Performance Professionals
The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and
More informationHow to Select Measurement Points in Access Point Localization
Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,
More informationShortest Paths with Single-Point Visibility Constraint
Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet
More informationCS201: Data Structures and Algorithms. Assignment 2. Version 1d
CS201: Data Structure and Algorithm Aignment 2 Introduction Verion 1d You will compare the performance of green binary earch tree veru red-black tree by reading in a corpu of text, toring the word and
More informationOn successive packing approach to multidimensional (M-D) interleaving
On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a
More informationDrawing Lines in 2 Dimensions
Drawing Line in 2 Dimenion Drawing a traight line (or an arc) between two end point when one i limited to dicrete pixel require a bit of thought. Conider the following line uperimpoed on a 2 dimenional
More informationAnnouncements. CSE332: Data Abstractions Lecture 19: Parallel Prefix and Sorting. The prefix-sum problem. Outline. Parallel prefix-sum
Announcement Homework 6 due Friday Feb 25 th at the BEGINNING o lecture CSE332: Data Abtraction Lecture 19: Parallel Preix and Sorting Project 3 the lat programming project! Verion 1 & 2 - Tue March 1,
More informationA SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS
A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt
More informationMarkov Random Fields in Image Segmentation
Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image
More informationOptimal Multi-Robot Path Planning on Graphs: Complete Algorithms and Effective Heuristics
Optimal Multi-Robot Path Planning on Graph: Complete Algorithm and Effective Heuritic Jingjin Yu Steven M. LaValle Abtract arxiv:507.0390v [c.ro] Jul 05 We tudy the problem of optimal multi-robot path
More informationmapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee
Reolving Deadlock for Pipelined Stream Application on Network-on-Chip Xiaohang Wang 1,2, Peng Liu 1 1 Department of Information Science and Electronic Engineering, Zheiang Univerity Hangzhou, Zheiang,
More informationAnalysis of slope stability
Engineering manual No. 8 Updated: 02/2016 Analyi of lope tability Program: Slope tability File: Demo_manual_08.gt In thi engineering manual, we are going to how you how to verify the lope tability for
More informationOptimizing Synchronous Systems for Multi-Dimensional. Notre Dame, IN Ames, Iowa computation is an optimization problem (b) circuit
Optimizing Synchronou Sytem for ulti-imenional pplication Nelon L. Pao and Edwin H.-. Sha Liang-Fang hao ept. of omputer Science & Eng. ept. of Electrical & omputer Eng. Univerity of Notre ame Iowa State
More informationA PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED
A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED Jutin Domke and Yianni Aloimono Computational Viion Laboratory, Center for Automation Reearch Univerity of Maryland College Park,
More informationDistributed Fractional Packing and Maximum Weighted b-matching via Tail-Recursive Duality
Ditributed Fractional Packing and Maximum Weighted b-matching via Tail-Recurive Duality Chrito Koufogiannaki, Neal E. Young Department of Computer Science, Univerity of California, Riveride {ckou, neal}@c.ucr.edu
More informationCENTER-POINT MODEL OF DEFORMABLE SURFACE
CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D
More informationComputer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder
Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal
More informationThe Data Locality of Work Stealing
The Data Locality of Work Stealing Umut A. Acar School of Computer Science Carnegie Mellon Univerity umut@c.cmu.edu Guy E. Blelloch School of Computer Science Carnegie Mellon Univerity guyb@c.cmu.edu Robert
More informationResearch Article Longest Path Reroute to Optimize the Optical Multicast Routing in Sparse Splitting WDM Networks
International Optic Volume 0, Article ID 9, page http://dxdoiorg/0/0/9 Reearch Article Longet Path Reroute to Optimize the Optical Multicat Routing in Spare Splitting WDM Network Huanlin Liu, Hongyue Dai,
More informationVariable Resolution Discretization in the Joint Space
Variable Reolution Dicretization in the Joint Space Chritopher K. Monon, David Wingate, and Kevin D. Seppi {c,wingated,keppi}@c.byu.edu Computer Science, Brigham Young Univerity Todd S. Peteron peterto@uvc.edu
More informationChapter 13 Non Sampling Errors
Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption
More informationLemma 1. A 3-connected maximal generalized outerplanar graph is a wheel.
122 (1997) MATHEMATICA BOHEMICA No. 3, 225{230 A LINEAR ALGORITHM TO RECOGNIZE MAXIMAL GENERALIZED OUTERPLANAR GRAPHS Jo C cere, Almer a, Alberto M rquez, Sevilla (Received November 16, 1994, revied May
More informationAlgorithmic Discrete Mathematics 4. Exercise Sheet
Algorithmic Dicrete Mathematic. Exercie Sheet Department of Mathematic SS 0 PD Dr. Ulf Lorenz 0. and. May 0 Dipl.-Math. David Meffert Verion of May, 0 Groupwork Exercie G (Shortet path I) (a) Calculate
More informationA note on degenerate and spectrally degenerate graphs
A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove
More informationNew Structural Decomposition Techniques for Constraint Satisfaction Problems
113 New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory, Univerity of Nebraka-Lincoln {yzheng,choueiry}@ce.unl.edu Abtract.
More information( ) subject to m. e (2) L are 2L+1. = s SEG SEG Las Vegas 2012 Annual Meeting Page 1
A new imultaneou ource eparation algorithm uing frequency-divere filtering Ying Ji*, Ed Kragh, and Phil Chritie, Schlumberger Cambridge Reearch Summary We decribe a new imultaneou ource eparation algorithm
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in VHL and implemented
More information/06/$ IEEE 364
006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;
More informationThe norm Package. November 15, Title Analysis of multivariate normal datasets with missing values
The norm Package November 15, 2003 Verion 1.0-9 Date 2002/05/06 Title Analyi of multivariate normal dataet with miing value Author Ported to R by Alvaro A. Novo . Original by Joeph
More informationAn Approach to a Test Oracle for XML Query Testing
An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,
More informationDistributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router
Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To
More informationRefining SIRAP with a Dedicated Resource Ceiling for Self-Blocking
Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT
More informationRepresentations and Transformations. Objectives
Repreentation and Tranformation Objective Derive homogeneou coordinate tranformation matrice Introduce tandard tranformation - Rotation - Tranlation - Scaling - Shear Scalar, Point, Vector Three baic element
More informationIncreasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment
Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in
More informationSLA Adaptation for Service Overlay Networks
SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada
More informationShortest-Path Routing in Arbitrary Networks
Ž. Journal of Algorithm 31, 105131 1999 Article ID jagm.1998.0980, available online at http:www.idealibrary.com on Shortet-Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vocking
More informationCS 467/567: Divide and Conquer on the PRAM
CS 467/567: Divide and Conquer on the PRAM Stefan D. Bruda Winter 2017 BINARY SEARCH Problem: Given a equence S 1..n orted in nondecreaing order and a value x, find the ubcript k uch that S i x If n proceor
More informationThe Set Constraint/CFL Reachability Connection in Practice
The Set Contraint/CFL Reachability Connection in Practice John Kodumal EECS Department Univerity of California, Berkeley jkodumal@c.berkeley.edu Alex Aiken Computer Science Department Stanford Univerity
More informationMob íaparallel Heuristic for Graph-Embedding y z. Phone: è401è , Fax: è401è Phone è602è , Fax: è602è
Mob íaparallel Heuritic for Graph-Embedding y z John E. Savage Marku G. Wloka Brown Univerity Motorola, Inc., SSDT Department of Computer Science, Box 1910 MD EL 510, 2100 E. Elliot Road Providence, Rhode
More informationAnalysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer
International Reearch Journal of Applied and Baic Science 218 Available online at www.irjab.com ISSN 2251-838X / Vol, 12 (1): 49-53 Science Explorer Publication Analyi of the reult of analytical and imulation
More informationnp vp cost = 0 cost = c np vp cost = c I replacing term cost = c+c n cost = c * Error detection Error correction pron det pron det n gi
Spoken Language Paring with Robutne and ncrementality Yohihide Kato, Shigeki Matubara, Katuhiko Toyama and Yauyohi nagaki y Graduate School of Engineering, Nagoya Univerity y Faculty of Language and Culture,
More informationBuilding a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique
202 International Conference on Frontier in Handwriting Recognition Building a Compact On-line MRF Recognizer for Large Character Set uing Structured Dictionary Repreentation and Vector Quantization Technique
More informationA Sparse Shared-Memory Multifrontal Solver in SCAD Software
Proceeding of the International Multiconference on ISBN 978-83-6080--9 Computer Science and Information echnology, pp. 77 83 ISSN 896-709 A Spare Shared-Memory Multifrontal Solver in SCAD Software Sergiy
More informationDistributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II
IEEE INFOCO 2002 1 Ditributed Partial Information anagement (DPI) Scheme for Survivable Network - Part II Dahai Xu Chunming Qiao Department of Computer Science and Engineering State Univerity of New York
More informationComparison of Methods for Horizon Line Detection in Sea Images
Comparion of Method for Horizon Line Detection in Sea Image Tzvika Libe Evgeny Gerhikov and Samuel Koolapov Department of Electrical Engineering Braude Academic College of Engineering Karmiel 2982 Irael
More informationModeling and Analysis of Slow CW Decrease for IEEE WLAN
Modeling and Analyi of Slow CW Decreae for IEEE 82. WLAN Qiang Ni, Imad Aad 2, Chadi Barakat, and Thierry Turletti Planete Group 2 Planete Group INRIA Sophia Antipoli INRIA Rhône-Alpe Sophia Antipoli,
More information