Reliability Analysis of Aircraft Condition Monitoring Network Using an Enhanced BDD Algorithm

Size: px
Start display at page:

Download "Reliability Analysis of Aircraft Condition Monitoring Network Using an Enhanced BDD Algorithm"

Transcription

1 Chnese Journal of Aeronautcs 25 (2012) Contents lsts avalable at ScenceDrect Chnese Journal of Aeronautcs journal homepage: Relablty Analyss of Arcraft Condton Montorng Network Usng an Enhanced BDD Algorthm ZHAO Changxao, CHEN Yao, WANG Halang, XIONG Huagang * School of Electroncs and Informaton Engneerng, Behang Unversty, Bejng , Chna Receved 29 August 2011; revsed 23 November 2011; accepted 13 February 2012 Abstract The arcraft condton montorng network s responsble for collectng the status of each component n arcraft. The relablty of ths network has a sgnfcant effect on safety of the arcraft. The arcraft condton montorng network works n a real-tme manner that all the data should be transmtted wthn the deadlne to ensure that the control center makes proper decson n tme. Only the connectedness between the source node and destnaton cannot guarantee the data to be transmtted n tme. In ths paper, we take the tme deadlne nto account and buld the task-based relablty model. The bnary decson dagram (BDD), whch has the mert of effcency n computng and storage space, s ntroduced when calculatng the relablty of the network and addressng the essental varable. A case s analyzed usng the algorthm proposed n ths paper. The expermental results show that our method s effcent and proper for the relablty analyss of the real-tme network. Keywords: relablty; bnary decson dagram; arcraft condton montorng network; real-tme; network calculus 1. Introducton 1 Modern physcal systems used n arcraft are becomng more and more complex. Ths ncreased complexty n system has led to an ncreased desre for automated prognostc and health montorng system [1]. In order to reduce the lfe cycle cost of the arcraft and enhance the safety of flght, many programs have been proposed. The predctve falures and advanced dagnostcs (PFAD) program and the passve arcraft status system (PASS) program are targetng arcraft avoncs n general [2]. The jont strke fghter (JSF) program has ncorporated prognostcs health management (PHM) nto ts desgn, usng sensors, advanced processng and a fully ntegrated system of nformaton and supples management [3]. The ntegrated vehcle health management (IVHM) project s to develop valdated tools, *Correspondng author. Tel.: E-mal address: hgxong@ee.buaa. edn.cn Foundaton tem: Natonal Natural Scence Foundaton of Chna ( ) Elsever Ltd. Open access under CC BY-NC-ND lcense. do: /S (11) technologes and technques for automated detecton, dagnoss and prognoss that enable mtgaton of adverse events durng flght [4]. All the programs mentoned above am to enable the rapd detecton and dagnoss of adverse events to ensure the safety of the arcraft. The startng pont for any dagnostcs or prognostcs capablty, however, s accurate and approprate data that detals the performance, status and envronment of the components of the arcraft [5]. So a well-desgned arcraft condton montorng network s the essental system for these works and the relablty of the network becomes crucal. The condton montorng network s a hybrd network composed of wred and wreless components, and the network should work n a real-tme manner to ensure that the data of arcraft s condton collected by sensors could be processed n tme. The relablty of network s defned as the probablty that the network performs ts ntended functon under specfed condtons [6]. Many algorthms ncludng exact and approxmate algorthms have been presented to solve network relablty problems. Tradtonal algorthms nclude the mnmal paths/cuts [7], factorng

2 926 ZHAO Changxao et al. / Chnese Journal of Aeronautcs 25(2012) No.6 theorem [8] and the ncdent edge substtuton. Recent lteratures [9-10] show that the bnary decson dagram (BDD) method s an effcent approach for relablty evaluaton. The algorthms mentoned above concentrate on the relablty of lnk connectve, whle the condton montorng network requres the real-tme character. In ths paper, we consder the delay constrant of tasks n condton montorng networks and propose a task-based algorthm to compute the relablty of the network. delvered to the central processor through bus. The central processor would estmate the current status of the arcraft. Fgure 1 s an example of the arcraft condton montorng network. 2. Prelmnares 2.1. BDD method The BDD method [11] s based on a dsjont decomposton of a Boolean functon called the Shannon expanson. Gven a Boolean functon f (x 1, x 2,, x n ), then for any {1, 2,, n}, f = xf + xf (1) x = 1 x = 0 Defnton 1 (apply operaton of BDD) If f 1 and f 2 are two Boolean functons wth the same varable order and Δ s a logc operaton such as AND or OR, then [ f1δ f2]( x1, x2,, xn ) = f1( x1, x2,, xn) Δ f2( x1, x2,, x n) (2) The functon can be recursvely defned as [ f1δ f2]( x1, x2,, xn ) = x( f1 x = 1Δ f2 = 1) + ( 1 = 0Δ 2 = 0) x x f x f x (3) The fact that all the paths from the root to the leaves are mutually dsjont s a useful property of BDD. If f represents the Boolean expresson of the system relablty, then, based on the property of the dsjont decomposton of BDD, the relablty of a system can be recursvely evaluated by Pr{ f} = Pr{ x}pr{ f } + Pr{ x}pr{ f } (4) x = 1 x = 0 Fg. 1 An example of arcraft condton montorng network Model of the network The data of arcraft condton should be transferred wthn the tme deadlne. Data that exceeds the tme deadlne s useless even f t s correctly receved by central processor. A task denotes a data flow transfers from a node to another node. We use an array t(s, T, D) to descrbe the task of arcraft condton network. S s the source of the task, T the destnaton of the task, and D the tme deadlne. If the task s correctly fnshed wthn the tme D, we say the task s successful, otherwse the task fals. The network s modeled by a probablstc graph. A probablstc graph G (V, E) conssts of a set V of nodes representng network elements such as sensors and processors, and a set E of lnks representng communcaton paths whch would be wred or wreless. Fgure 2 s an example of probablstc graph. In ths paper, we assume that the nodes are perfect and only lnk falures are consdered Arcraft condton montorng network The montorng of arcraft condton s acheved by several sensors and avonc devces that contnuously detect envronmental condton, flght operatons and arcraft system health state n dfferent approaches [12]. Tradtonally, the cable-based montor for arcraft condton usually nvolves large numbers of wres employed for communcaton among sensors and centralzed data acquston systems. These wres, whch brng hgh nstallaton costs and neffcent mantenance, can be cumbersome. In order to avod complex wrng for power supply and data communcaton, a hybrd network s the most promsng soluton. Sensors are equpped to gather varous parameters of the components. The front-end processng unts collect the data and do some pretreatment, and then the data would be Fg. 2 An example of probablstc graph. As the network calculus theory [13] ndcates, each component of the network can be modeled as a specfc network element whch represents the tme consumed at ths component. Each element of the network s valued wth a real number ω(p), p V E. ω(p) represents the lnk delay f p E, and t represents the delay caused by transmsson, recepton and queung when p V. We defne ω(p) as the cost of lnk or node. We use the adjacent matrx to store the cost. Then the adjacent matrx of Fg. 2 can be expressed as

3 No.6 ZHAO Changxao et al. / Chnese Journal of Aeronautcs 25(2012) S v v T 1 2 S ω( S) ω( e1) ω( e2) 0 1 ω( 1) ω( 1) ω( 3) ω( 4) v e v e e v 2 ω( e2) ω( e3) ω( e2) ω( e5) T 0 ω( e4) ω( e5) ω( T) 3. Task-based Edge Expanson Dagram Algorthm (5) In ths secton, we propose a task-based approach that analyzes the relablty of the network usng BDD algorthm. Each component s represented by a set of Boolean varables that ndcate the falure states when usng the task-based edge expanson dagram (TEED) algorthm. In Fg. 2, we use a Boolean varable to represent each edge x e (=1, 2,,5). The algorthm ncludes two steps, constructng BDD for orgnal network and computng the relablty along BDD of orgnal network. The man dea, whch makes the TEED algorthm more effcent than other algorthms, s that the BDD representng the Boolean relablty expresson of a network can be constructed by avodng the redundant computaton of the somorphc sub-problems durng the mergng process. Snce the arcraft condton montor network s a delay constrant network, the tme deadlnes of tasks are consdered when the algorthm s appled. Our algorthm borrows the concept of edge expanson dagram [14] (EED). We extend the EED algorthm to meet the real-tme demand of the arcraft condton montorng network. return as the BDD expresson of the graph. If the graph has been evaluated and found n the Hash table, then return the result of ts BDD from the Hash table. Otherwse, expand the graph accordng to the edge e connected to the source and get some new subgraph. The BDD expresson of the orgnal graph s constructed through ntegratng the BDD expresson of subgraph usng apply operaton. Fgure 3 s the BDD constructng algorthm. In order to descrbe the algorthm ntutvely, we apply the algorthm to the graph mentoned n Fg. 2. Fgure 4 s the decomposton process of the graph Varable orderng The sze of a BDD and the effcency of the whole methodology depend strongly on the varable orderng. Unfortunately, the problem n determnng the optmal orderng s NP-complete [15]. However, approxmate solutons are relatvely easy to fnd. The orderng obtaned by a breadth-frst (BFS) traversal of the network startng from ts source always performs well [16]. Therefore, we choose the orderng obtaned by BFS, and consequently the varable orderng for Fg. 2 s x 1 <x 2 <x 3 <x 4 <x BDD expresson constructon The procedure of the EED s to expand, recursvely, successful edges of the source. The algorthm expands the gven network G nto k new sub-networks accordng to k edges (e 1, e 2,, e k ) connected to the source. For term, t performs the contractng operaton to obtan a new network G * e, wheren the vertces orgnally connected to e are merged nto a vertex as a new node, and all edges orgnally connected to the source are deleted. The sum of all cost along the lnk s set as the cost of the new node. If the cost of the component exceeds the tme deadlne D of the task, the decomposton of the graph termnates. And BDD_Zero wll Fg. 3 BDD constructng algorthm Calculatng relablty from BDD The BDD s based on Shannon expanson (the set of dsjont decomposed functons). Thus, the BDD can be recognzed as a graph-based set of dsjont products. Gven the probablty of each varable, the relablty of a BDD-based functon f can be recursvely evaluated. Each node of the BDD corresponds to a subgraph and the relablty of the graph s equvalent to the successful probablty of the node. If the node has been calculated and found n the hash-table, then drectly return the value of probablty. Otherwse, recursvely call the procedure wth negatve cofactor and postve cofactor. The algorthm s shown n Fg. 5. The probablty calculatng process of the graph mentoned n Fg. 2 s shown n Fg. 6.

4 928 ZHAO Changxao et al. / Chnese Journal of Aeronautcs 25(2012) No.6 crucal component [17]. RG ( ) = mn( RG ( )) x, x V E (6) x = 0 x = 0 j j Fg. 6 Probablty calculatng process. Fg. 4 Decomposton process of the graph mentoned n Fg.2. In other words, an essental varable of a network s a component whose falure has a domnatng effect on network relablty. Tradtonal method to fnd the essental varable s recalculatng the relablty of the network after removng each component. However, makng full use of the potental of the BDD composton operaton may be a better way. Frst, the relablty expresson of the orgnal ordnary network graph s encoded n the BDD. Then each component n the network s substtuted by a varable. So we only need to set each varable as 0 and recalculate the relablty. The BDD composton operaton s very effcent, whch makes ths approach hghly effcent. Usng ths method, we try to fnd the essental varable of the graph mentoned n Fg. 2, and the result s shown n Table 1. The relablty probablty of the component e s set as p and q =1 p. Table 1 Relablty of the network after the component s nvald Name of component Relablty of the network Fg. 5 Probablty calculatng algorthm Essental varable In the desgn of a network, t s mportant to dentfy the most crucal component of a network so that efforts can be made to keep t functonal. The essental varable s defned wth Eq. (6) to help dentfy the most e 1 p 2 p 3 p 4 +p 2 p 3 q 4 p 5 +p 2 q 3 p 5 e 2 p 1 q 4 e 3 p 1 p 2 p 4 +p 1 p 2 q 4 p 5 +p 1 q 2 p 4 + q 1 p 2 p 5 e 4 p 1 p 2 q 5 +q 1 p 2 q 3 p 5 e 5 p 1 p 4 +q 1 p 2 q 3 p 5 4. Experments Arcraft s a complex system that contans thousands

5 No.6 ZHAO Changxao et al. / Chnese Journal of Aeronautcs 25(2012) of components, so the number of nodes n the arcraft condton montorng network s large. In ths secton we ntroduced a larger network to valdate the algorthm proposed n ths paper. The probablstc graph s shown n Fg. 7. Table 2 ndcates the task nformaton, and Table 3 shows other parameters used n the experments. The probablty of nvaldaton of each component s set to 0.1. Table 2 Informaton of tasks Task name Source Destnaton Tme deadlne/ms t 1 n 1 n 16 1 t 2 n 1 n 16 6 t 3 n 3 n 5 3 t 4 n 3 n 14 3 Table 3 Delay parameters of each component Type of component Delay parameters/μs Lnk 50 Sensor 50 Processng unt 150 Task t 1 and t 2 have the same source and destnaton n the same network, whle the relablty of network for task t 2 s hgher than that for task t 1 because task t 1 has a more rgorous tme constrant than task t 2. Some paths are connectve for task t 2, whle they are dsconnected for task t 1 because the total delay exceeds the tme deadlne of task t 1. Task t 3 and t 4 have the same delay constant, whle the relablty of network for task t 3 s hgher than that for task t 4. The reason s that the number of hops of task t 4 s larger than that of task t 3. The total delay of some long path may exceed the tme deadlne, whch reduces the relablty. Table 5 shows the essental component for each task. Task t 1 and t 2 have the same source and destnaton n the same network, whle the essental component for each task s dfferent. The number of connectve paths for the task that has a more rgorous tme constrant s smaller, so the component belongng to the shortest path has serous effect on the relablty. 5. Conclusons Ths paper proposes a relablty methodology for the arcraft condton montorng network. Frstly, ths task-based algorthm uses the BDD wth the consderaton of the tme-constran. It keeps the merts of the BDD and meanwhle s sutable for the real-tme requrement networks. Secondly, the way to dentfy the most crucal component s more effcent than the tradtonal way for t makes full use of the potental of the BDD composton operaton. Thrdly, the experment results show that our algorthm s helpful n determnng the relablty of the network and addressng the essental varable for each task. References Fg. 7 Example graph of the experment. Table 4 s the relablty of the example network for each task. The essental component for each task s shown n Table 5. Table 4 Relablty of the network for each task Task name Relablty t t t t Table 5 Essental component for each task Task name Essental component t 1 e 1, e 10 t 2 e 9 t 3 e 12 t 4 e 9 [1] Ba H, Atquzzaman M, Llja D. Wreless sensor network for arcraft health montorng. Proceedngs of the Frst Internatonal Conference on Broadband Networks, 2004: [2] Faas P, Schroeder J B, Smth G. Vehcle health management research for legacy and future operatonal envronments. IEEE AESS System Magazne 2002; 25(4): [3] Belcastro C M. Avaton safety program:ntegrated vehcle health management techncal plan summary. NASA Technology Report, 2006: [4] Srvastava A N, Mah R W, Meyer C. Integrated vehcle health management. Natonal Aeronautcs and Space Admnstraton Aeronautcs Research Msson Drectorate Avaton Safety Program, [5] Yan C L, Lu K. Theory of economc lfe predcton and relablty assessment of arcraft structures. Chnese Journal of Aeronautcs 2011; 24 (2): [6] Broln A. Relablty engneerng: theory and practce. 5th ed. Berln: Sprnger, [7] Soh S, Ra S. Expermental results on preprocessng of path/cut terms n sum of dsjont products technque. IEEE Transactons on Relablty 1993; 42(1): [8] Theologou O R, Carler J G. Factorng & reductons for

6 930 ZHAO Changxao et al. / Chnese Journal of Aeronautcs 25(2012) No.6 networks wth mperfect vertces. IEEE Transactons on Relablty 1991; 40(2): [9] Chang Y R, Amar S V, Kuo S Y. OBDD-based evaluaton of relablty and mportance measures for multstate systems subject to mperfect fault coverage. IEEE Transactons on Dependable and Secure Computng 2005; 2 (4): [10] Xng L. An effcent bnary-decson-dagram-based approach for network relablty and senstvty analyss. IEEE Transactons on Systems, Man and Cybernetcs. Part A: Systems and Humans 2008; 38(1): [11] Ln M S, Chang M S, Chen D J. Effcent algorthms for relablty analyss of dstrbuted computng systems. Informaton Scences 1999; 117(1): [12] Wu J, Yuan S F. Desgn and evaluaton of a wreless sensor network based arcraft strength testng system. Sensors 2009; 9(6): [13] Cruz R. A calculus for network delay, part I: network elements n solaton. IEEE Transactons on Informaton Theory 1991;37 (1): [14] Kuo S Y, Lu S K, Yeh F M. Determnng termnal par relablty based on edge expanson dagrams usng OBDD. IEEE Transactons on Relablty 1999; 48(3): [15] Bollgand B, Wegener I. Improvng the varable orderng of OBDDs s NP-complete. IEEE Transactons on Relablty 1996; 45(9): [16] Hardy G, Lucet C, Lmnos N. K-termnal network relablty measures wth bnary decson dagrams. IEEE Transactons on Relablty 2007; 56(3): [17] Kuo S, Yeh F, Ln H. Effcent and exact relablty evaluaton for networks wth mperfect vertces. IEEE Transactons on Relablty 2007; 56(2): Bographes: ZHAO Changxao receved B.S. degree from Behang Unversty n 2004, and he s currently workng towards hs Ph.D. degree n the same unversty. Hs man research nterest s performance evaluaton of avoncs. E-mal: zhaochangxao@yeah.net CHEN Yao receved B.S. degree from Behang Unversty n 2005, and he s currently workng towards hs Ph.D. degree n the same unversty. Hs man research nterest s swtchng fabrc and real-tme network. E-mal: chenyao_kevn@163.com WANG Halang receved B.S. degree from Behang Unversty n 2002, and he s currently workng towards hs Ph.D. degree n the same unversty. Hs man research nterest s UWB and real-tme network. E-mal: gabbar@163.com XIONG Huagang s a professor n School of Electroncs and Informaton Engneerng at Behang Unversty, Bejng, Chna. Hs major research felds are avoncs and dgtal communcaton. E-mal: hgxong@ee.buaa.edu.cn

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Analysis of Non-coherent Fault Trees Using Ternary Decision Diagrams

Analysis of Non-coherent Fault Trees Using Ternary Decision Diagrams Analyss of Non-coherent Fault Trees Usng Ternary Decson Dagrams Rasa Remenyte-Prescott Dep. of Aeronautcal and Automotve Engneerng Loughborough Unversty, Loughborough, LE11 3TU, England R.Remenyte-Prescott@lboro.ac.uk

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Construction of ROBDDs. area. that such graphs, under some conditions, can be easily manipulated.

Construction of ROBDDs. area. that such graphs, under some conditions, can be easily manipulated. A Study of Composton Schemes for Mxed Apply/Compose Based Constructon of s A Narayan 1 S P Khatr 1 J Jan 2 M Fujta 2 R K Brayton 1 A Sangovann-Vncentell 1 Abstract Reduced Ordered Bnary Decson Dagrams

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

A Saturation Binary Neural Network for Crossbar Switching Problem

A Saturation Binary Neural Network for Crossbar Switching Problem A Saturaton Bnary Neural Network for Crossbar Swtchng Problem Cu Zhang 1, L-Qng Zhao 2, and Rong-Long Wang 2 1 Department of Autocontrol, Laonng Insttute of Scence and Technology, Benx, Chna bxlkyzhangcu@163.com

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems Real-tme Fault-tolerant Schedulng Algorthm for Dstrbuted Computng Systems Yun Lng, Y Ouyang College of Computer Scence and Informaton Engneerng Zheang Gongshang Unversty Postal code: 310018 P.R.CHINA {ylng,

More information

A fault tree analysis strategy using binary decision diagrams

A fault tree analysis strategy using binary decision diagrams Loughborough Unversty Insttutonal Repostory A fault tree analyss strategy usng bnary decson dagrams Ths tem was submtted to Loughborough Unversty's Insttutonal Repostory by the/an author. Addtonal Informaton:

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Maintaining temporal validity of real-time data on non-continuously executing resources

Maintaining temporal validity of real-time data on non-continuously executing resources Mantanng temporal valdty of real-tme data on non-contnuously executng resources Tan Ba, Hong Lu and Juan Yang Hunan Insttute of Scence and Technology, College of Computer Scence, 44, Yueyang, Chna Wuhan

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

On Some Entertaining Applications of the Concept of Set in Computer Science Course

On Some Entertaining Applications of the Concept of Set in Computer Science Course On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

Needed Information to do Allocation

Needed Information to do Allocation Complexty n the Database Allocaton Desgn Must tae relatonshp between fragments nto account Cost of ntegrty enforcements Constrants on response-tme, storage, and processng capablty Needed Informaton to

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

An IPv6-Oriented IDS Framework and Solutions of Two Problems

An IPv6-Oriented IDS Framework and Solutions of Two Problems An IPv6-Orented IDS Framework and Solutons of Two Problems We LI, Zhy FANG, Peng XU and ayang SI,2 School of Computer Scence and Technology, Jln Unversty Changchun, 3002, P.R.Chna 2 Graduate Unversty of

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,

More information

Reliability and Performance Models for Grid Computing

Reliability and Performance Models for Grid Computing Relablty and Performance Models for Grd Computng Yuan-Shun Da,2, Jack Dongarra,3,4 Department of Electrcal Engneerng and Computer Scence, Unversty of Tennessee, Knoxvlle 2 Department of Industral and Informaton

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

A HEURISTIC METHOD FOR RELIABILITY REDUNDANCY OPTIMIZATION OF FLOW NETWORKS

A HEURISTIC METHOD FOR RELIABILITY REDUNDANCY OPTIMIZATION OF FLOW NETWORKS Kumar Pardeep and Chaturved D.K., Pahua G.L. - A HEURISTIC METHOD FOR RELIABILITY REDUNDANCY OPTIMIZATION OF FLOW NETWORKS A HEURISTIC METHOD FOR RELIABILITY REDUNDANCY OPTIMIZATION OF FLOW NETWORKS Kumar

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications 14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

A Robust Webpage Information Hiding Method Based on the Slash of Tag

A Robust Webpage Information Hiding Method Based on the Slash of Tag Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based

More information

Vectorization of Image Outlines Using Rational Spline and Genetic Algorithm

Vectorization of Image Outlines Using Rational Spline and Genetic Algorithm 01 Internatonal Conference on Image, Vson and Computng (ICIVC 01) IPCSIT vol. 50 (01) (01) IACSIT Press, Sngapore DOI: 10.776/IPCSIT.01.V50.4 Vectorzaton of Image Outlnes Usng Ratonal Splne and Genetc

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract

More information

Clock Skew Compensator for Wireless Wearable. Computer Systems

Clock Skew Compensator for Wireless Wearable. Computer Systems Contemporary Engneerng Scences, Vol. 7, 2014, no. 15, 767 772 HIKRI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.4688 Clock Skew Compensator for Wreless Wearable Computer Systems Kyeong Hur Dept.

More information

Petri Net Based Software Dependability Engineering

Petri Net Based Software Dependability Engineering Proc. RELECTRONIC 95, Budapest, pp. 181-186; October 1995 Petr Net Based Software Dependablty Engneerng Monka Hener Brandenburg Unversty of Technology Cottbus Computer Scence Insttute Postbox 101344 D-03013

More information

CHAPTER 2 DECOMPOSITION OF GRAPHS

CHAPTER 2 DECOMPOSITION OF GRAPHS CHAPTER DECOMPOSITION OF GRAPHS. INTRODUCTION A graph H s called a Supersubdvson of a graph G f H s obtaned from G by replacng every edge uv of G by a bpartte graph,m (m may vary for each edge by dentfyng

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

Journal of Process Control

Journal of Process Control Journal of Process Control (0) 738 750 Contents lsts avalable at ScVerse ScenceDrect Journal of Process Control j ourna l ho me pag e: wwwelsevercom/locate/jprocont Decentralzed fault detecton and dagnoss

More information

Explicit Formulas and Efficient Algorithm for Moment Computation of Coupled RC Trees with Lumped and Distributed Elements

Explicit Formulas and Efficient Algorithm for Moment Computation of Coupled RC Trees with Lumped and Distributed Elements Explct Formulas and Effcent Algorthm for Moment Computaton of Coupled RC Trees wth Lumped and Dstrbuted Elements Qngan Yu and Ernest S.Kuh Electroncs Research Lab. Unv. of Calforna at Berkeley Berkeley

More information

Performance Assessment and Fault Diagnosis for Hydraulic Pump Based on WPT and SOM

Performance Assessment and Fault Diagnosis for Hydraulic Pump Based on WPT and SOM Performance Assessment and Fault Dagnoss for Hydraulc Pump Based on WPT and SOM Be Jkun, Lu Chen and Wang Zl PERFORMANCE ASSESSMENT AND FAULT DIAGNOSIS FOR HYDRAULIC PUMP BASED ON WPT AND SOM. Be Jkun,

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

Complex System Reliability Evaluation using Support Vector Machine for Incomplete Data-set

Complex System Reliability Evaluation using Support Vector Machine for Incomplete Data-set Internatonal Journal of Performablty Engneerng, Vol. 7, No. 1, January 2010, pp.32-42. RAMS Consultants Prnted n Inda Complex System Relablty Evaluaton usng Support Vector Machne for Incomplete Data-set

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

Kent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming

Kent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming CS 4/560 Desgn and Analyss of Algorthms Kent State Unversty Dept. of Math & Computer Scence LECT-6 Dynamc Programmng 2 Dynamc Programmng Dynamc Programmng, lke the dvde-and-conquer method, solves problems

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Learning-Based Top-N Selection Query Evaluation over Relational Databases

Learning-Based Top-N Selection Query Evaluation over Relational Databases Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **

More information

All-Pairs Shortest Paths. Approximate All-Pairs shortest paths Approximate distance oracles Spanners and Emulators. Uri Zwick Tel Aviv University

All-Pairs Shortest Paths. Approximate All-Pairs shortest paths Approximate distance oracles Spanners and Emulators. Uri Zwick Tel Aviv University Approxmate All-Pars shortest paths Approxmate dstance oracles Spanners and Emulators Ur Zwck Tel Avv Unversty Summer School on Shortest Paths (PATH05 DIKU, Unversty of Copenhagen All-Pars Shortest Paths

More information

Two-Stage Data Distribution for Distributed Surveillance Video Processing with Hybrid Storage Architecture

Two-Stage Data Distribution for Distributed Surveillance Video Processing with Hybrid Storage Architecture Two-Stage Data Dstrbuton for Dstrbuted Survellance Vdeo Processng wth Hybrd Storage Archtecture Yangyang Gao, Hatao Zhang, Bngchang Tang, Yanpe Zhu, Huadong Ma Bejng Key Lab of Intellgent Telecomm. Software

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Software Reliability Assessment Using High-Order Markov Chains

Software Reliability Assessment Using High-Order Markov Chains Internatonal Journal of Engneerng Scence Inventon ISSN (Onlne): 2319 6734, ISSN (Prnt): 2319 6726 www.jes.org Volume 3 Issue 7ǁ July 2014 ǁ PP.01-06 Software Relablty Assessment Usng Hgh-Order Markov Chans

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Discrete and Continuous Time High-Order Markov Models for Software Reliability Assessment

Discrete and Continuous Time High-Order Markov Models for Software Reliability Assessment Dscrete and Contnuous Tme Hgh-Order Markov Models for Software Relablty Assessment Vtaly Yakovyna and Oksana Nytrebych Software Department, Lvv Polytechnc Natonal Unversty, Lvv, Ukrane vtaly.s.yakovyna@lpnu.ua,

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented

More information

Available online at ScienceDirect. Procedia Environmental Sciences 26 (2015 )

Available online at   ScienceDirect. Procedia Environmental Sciences 26 (2015 ) Avalable onlne at www.scencedrect.com ScenceDrect Proceda Envronmental Scences 26 (2015 ) 109 114 Spatal Statstcs 2015: Emergng Patterns Calbratng a Geographcally Weghted Regresson Model wth Parameter-Specfc

More information

An inverse problem solution for post-processing of PIV data

An inverse problem solution for post-processing of PIV data An nverse problem soluton for post-processng of PIV data Wt Strycznewcz 1,* 1 Appled Aerodynamcs Laboratory, Insttute of Avaton, Warsaw, Poland *correspondng author: wt.strycznewcz@lot.edu.pl Abstract

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Bridges and cut-vertices of Intuitionistic Fuzzy Graph Structure

Bridges and cut-vertices of Intuitionistic Fuzzy Graph Structure Internatonal Journal of Engneerng, Scence and Mathematcs (UGC Approved) Journal Homepage: http://www.jesm.co.n, Emal: jesmj@gmal.com Double-Blnd Peer Revewed Refereed Open Access Internatonal Journal -

More information

TWO DIAGNOSTIC MODELS FOR PLC CONTROLLED FLEXIBLE MANUFACTURING SYSTEMS. W. HU*, A. G. STARR* and A. Y. T. LEUNG*

TWO DIAGNOSTIC MODELS FOR PLC CONTROLLED FLEXIBLE MANUFACTURING SYSTEMS. W. HU*, A. G. STARR* and A. Y. T. LEUNG* TWO DIAGNOSTIC MODELS FOR PLC CONTROLLED FLEXIBLE MANUFACTURING SYSTEMS W. HU*, A. G. STARR* and A. Y. T. LEUNG* * Manchester School of Engneerng, The Unversty of Manchester, Manchester M13 9PL, UK To

More information

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm , pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,

More information

SURFACE PROFILE EVALUATION BY FRACTAL DIMENSION AND STATISTIC TOOLS USING MATLAB

SURFACE PROFILE EVALUATION BY FRACTAL DIMENSION AND STATISTIC TOOLS USING MATLAB SURFACE PROFILE EVALUATION BY FRACTAL DIMENSION AND STATISTIC TOOLS USING MATLAB V. Hotař, A. Hotař Techncal Unversty of Lberec, Department of Glass Producng Machnes and Robotcs, Department of Materal

More information

An Improved Image Segmentation Algorithm Based on the Otsu Method

An Improved Image Segmentation Algorithm Based on the Otsu Method 3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,

More information

APPLICATION OF A COMPUTATIONALLY EFFICIENT GEOSTATISTICAL APPROACH TO CHARACTERIZING VARIABLY SPACED WATER-TABLE DATA

APPLICATION OF A COMPUTATIONALLY EFFICIENT GEOSTATISTICAL APPROACH TO CHARACTERIZING VARIABLY SPACED WATER-TABLE DATA RFr"W/FZD JAN 2 4 1995 OST control # 1385 John J Q U ~ M Argonne Natonal Laboratory Argonne, L 60439 Tel: 708-252-5357, Fax: 708-252-3 611 APPLCATON OF A COMPUTATONALLY EFFCENT GEOSTATSTCAL APPROACH TO

More information

A XML-Based Composition Event Approach as an Integration and Cooperation Middleware

A XML-Based Composition Event Approach as an Integration and Cooperation Middleware A XML-Based Composton Event Approach as an Integraton and Cooperaton Mddleware Gang Xu, JanGang Ma, and Tao Huang Technology Center of Software Engneerng, Insttute of Software, Chnese Academy of Scences,

More information

The Erdős Pósa property for vertex- and edge-disjoint odd cycles in graphs on orientable surfaces

The Erdős Pósa property for vertex- and edge-disjoint odd cycles in graphs on orientable surfaces Dscrete Mathematcs 307 (2007) 764 768 www.elsever.com/locate/dsc Note The Erdős Pósa property for vertex- and edge-dsjont odd cycles n graphs on orentable surfaces Ken-Ich Kawarabayash a, Atsuhro Nakamoto

More information