Fault Detection in Rule-Based Software Systems

Size: px
Start display at page:

Download "Fault Detection in Rule-Based Software Systems"

Transcription

1 Fault Detecton n Rule-Based Software Systems Dong Wang, Rubng Hao and Davd Lee Bell Labs Research Chna Bejng, Chna, {wangd, rbhao, leedavd}@lucent.com Abstract Motvated by packet flterng of frewall systems n Internet applcatons, we study the fault detecton problem n the general rule-based software systems. We dscuss algorthms for the detecton of conflcts n a gven set of rules. We frst study a constraned verson of the fault detecton problem and propose a two-phase algorthm. The frst phase s to do the rule normalzaton. The second phase s to detect conflctng rules. For ths constraned verson of the fault detecton problem, the algorthm takes polynomal tme. For the general problem, t s NP-hard. We apply the algorthms to the rule table gettng from one of the frewalls n Bell Labs and report the experment result. Keywords Rule-Based Software system, fault detecton, Packet Flter 1 Introducton Wth the complexty and dynamc nature of communcaton systems, fault detecton s the center of focus n communcaton network management and yet has proved to be a formdable task. Fault detecton problem has been nvestgated heavly by many researchers from varous aspects n the past. Exstng fault detecton approaches can be classfed nto the followng categores accordng to the technques they use: expert systems, fnte state machnes, advanced database technques, and probablstc approaches [1]. The followng papers offer a glmpse of the arena [2][3][4]. Fault detecton s also a more complex problem when compared wth the general conformance testng, n that the latter just needs to check f an mplementaton s dfferent from ts specfcaton, whle the former needs to locate the dfference found [5]. In ths paper, we nvestgate the fault detecton problem from a dfferent perspectve, or say the fault detecton problem n a rule-based communcaton software system, whch has not been formally nvestgated before. In modern communcaton software systems, Rule-Based Software systems (RBS) are commonly used where program actons are determned by a group of pre-defned rules. Its desred functonng largely depends on the correctness and coherence of all the rules. However, because the rules n an RBS are confgured manually, conflcts among these rules may lead to unexpected program actons from the RBS. For example, a typcal scenaro of conflct s that for some specfc nputs of the RBS, multple rules are elgble and can be appled. Whle the rule selected by the RBS s not what the desgner or admnstrator has expected. So t s necessary to detect and remove conflcts among rules of an RBS to prevent the above scenaro from happenng. We call ths problem the fault detecton problem n RBS. When the rule set s small, for example four to fve rules, t s easy to detect all the conflct manually. But t s extremely hard to fnd out the conflcts manually when the number of rules n the RBS grows very large. So we need to nvestgate how to do fault detecton for an RBS

2 automatcally. Ths paper presents a method to solve ths problem for the packet flterng software n the frewall system, whch s a typcal type of RBS. We frst nvestgate a constraned verson of ths fault detecton problem and then relax the constrants to fnd more general solutons. We propose a two-phase algorthm to solve ths constraned verson of fault detecton problem. The frst phase s to do the rule normalzaton. The second phase s to detect conflctng rules. For ths constraned verson of the fault detecton problem, the algorthm takes polynomal tme. We also dscuss solutons for the more general fault detecton problem, n whch the above two assumptons do not hold. For RBS that has multple actons n the acton part of each rule, there s a polynomal algorthm to check f the actons of two rules conflct. If the assumpton about the condtonal part does not hold, we need to solve a more general problem: to decde whether or not the ntersecton of two condtonal expressons s satsfable. We beleve t s an NP-complete problem by reducng the well-known SAT problem to ths problem. Ths paper s an extended verson of [10], t s organzed as follows: The fault detecton problem of RBS s defned n Secton 2 by usng the packet flters n frewall systems as an example. In secton 3, we present our soluton to a constraned verson of the fault detecton problem. In secton 4 we extend our soluton to deal wth composte-actons. In secton 5 we present that n general the fault detecton problem s an NP-complete problem. In secton 6, we do a case study on the data collected from a real frewall system n Bell Labs and report the experment result. Secton 7 concludes ths paper wth future works. 2 Fault Detecton Problem for Packet Flters a Case Study Network securty s one of the most mportant concerns of enterprse networks connected to the Internet. To prevent malcous denal-of-servce attack and unauthorzed access to or from a prvate network, frewall systems have been wdely deployed n enterprse networks to enhance network securty by separatng the prvate Intranet from the publc Internet. All messages enterng or leavng the ntranet pass through the frewall, whch examnes each message and blocks those that do not meet the specfed securty crtera. There are several types of frewall technques: packet flter, applcaton gateway, crcut-level gateway, and proxy server [6]. Packet flter s one of the most effectve frewall technques. A packet flter looks at each packet enterng or leavng the network and accepts or rejects t based on user-defned rules. Packet flterng s farly effectve and transparent to users, but t s dffcult to confgure. 2.1 Rules n a Packet Flter Packet flter s a typcal type of RBS. Tradtonally a packet flter examnes packets at IP layer, or TCP/UDP layer, or both. Usually t checks the values of the fve felds n the TCP/IP header, ncludng destnaton address, source address, destnaton port, source port and transport layer protocol type, aganst a set of flterng rules. A rule n the packet flter usually conssts of two parts: the condton part and the acton parts. It descrbes the actons the packet flter wll take when the packet satsfes or fals the logcal expresson n the condton part. For example, If ( packet s destnaton port equals 21 ) then ( dscard t ) else (forward t) (1)

3 Rule (1) specfes a pass-acton dscard t and a fal-acton forward t for condtonal expresson destnaton port equals 21. When the Boolean value of the condtonal expresson s true, the packet flter wll take the pass-acton; otherwse the fal-acton. The fal-acton part s optonal. A packet flter usually has more than one rules, all the rules n a packet flter form a so-called Rule Table (RT). Rules n a rule table can be chaned together by a specal acton goto. Table 1 shows an example rule table. For each receved packet, the packet flter works as follows. It wll test the packet aganst the rules accordng to the order that rules are lsted n the rule table. The frst rule n the rule table wll be checked frst. If the packet satsfes the condtonal expresson of the rule, the pass-acton of ths rule wll be taken; otherwse the fal-acton wll be taken. If the packet fals the current condtonal expresson and the fal-acton part s not presented n the rule, the next rule n the rule table wll be checked. If the acton taken by the packet flter s a goto acton, then the next rule ponted by goto wll be checked. If the checkng falls off the table then the packet s dscarded. No. Content of rule R1 If (packet s destnaton port equals 21) then (dscard t) R2 If (packet s destnaton port small than 255) then (goto3) else (dscard t) R3 If (packet s source s subnet /16) then (forward t) 2.2 Fault Detecton Problem Table 1. Example Rule Table The desred functonng of a packet flter largely depends on the correctness and coherence of all the rules. But because the rules n a packet flter are confgured manually, conflcts among these rules may lead to unexpected actons from the packet flter. For example, n Table 1 the goal of R1 s to dscard all the packets wth destnaton port 21. R2 s not a complete rule for ts pass-acton s goto 3. Ths means that R2 must be used n combnaton wth R3. R3 s to forward all the packets from subnet /16, so the combned result of R2 and R3 s to forward all the packets comng from subnet /16 and wth destnaton port small than 255. There s a hdden conflct n ths rule table. Assume a packet arrves wth destnaton port 21, whch s obvously small than 255, and source address Certanly f the packet flter starts the checkng process from rule R1, the packet wll be dscarded. But ths may not be the result the rule desgner or the admnstrator has expected. There are many reasons why ths knd of hdden conflcts exsts. The most reasonable one s that the rule desgner does not have a clear and complete understandng of the former confgured rules when addng new rules to the rule table. Ths stuaton actually happens qute often when the number of rules n the rule table s very large. So t s necessary to detect these hdden conflcts among rules. If conflcts among rules exst, rule desgner can refne the conflctng rules n case an undesred acton s taken. We call the problem of detectng conflcts among rules n an RBS as the fault detecton problem of RBS. When the rule set s small, for example four to fve rules, t s easy to detect all the conflcts manually. But t s extremely hard to do t manually when the number of rules n the RBS grows very large. So we need to nvestgate how to do fault detecton for an RBS automatcally.

4 3 Soluton to a Constraned Verson of Fault Detecton Problem In ths secton, we frst gve the defnton of rules and conflct rules, and then nvestgate the soluton to a constraned verson of the fault detecton problem. We propose a two-phase algorthm to solve ths constraned verson of fault detecton problem. The frst phase s to do the rule normalzaton. The second phase s to detect conflct rules. For ths constraned verson of the fault detecton problem, the algorthm takes polynomal tme. 3.1 Conflct Rules Suppose all rules n the rule table of a packet flter can be converted nto the followng format, f (C) then (A), (2) C s a condtonal expresson and A s pass-acton part of the rule. We wll show how to do the rule converson n next secton. Conflct rules can be defned as: Defnton 1. Conflct rules Gven a rule table of a packet flter, whch has N peces of rules, R : f (C ) then ( A ) 1 N We say that two peces of rules R and R j conflct f and only f A conflcts wth A j and C C j s satsfable. So the fault detecton problem n an RBS such as packet flter s to fnd all possble conflcts n ts rule table. 3.2 Rule normalzaton As we can see from Table 1, there exst many rules that do not match the general f-then format as n (2). Usually these rules can be expressed as followng, If ( C ) then ( A y ) else (A n ) (3) So we need to do rule normalzaton to convert rules wth the f-then-else format as n (3) to the requred f-then format as n (2). As we ponted out n Secton 2, rule desgners often use a specal acton goto to chan rules together, whch makes the confguraton of packet flter easer and more flexble. But for a rule wth the specal acton goto, we cannot decde ts fnal acton drectly. We need to further check the rule lnked by the goto acton. Ths wll lead to trouble when dong fault detecton. So another task of rule normalzaton s to get rd of all the goto acton. The basc dea of rule normalzaton s to represent the rule table by a drected graph, whch s called as the Rule Relaton Graph (RRG). Then every path from the source node to the snk node n the RRG forms a new rule, whch s free of goto and else.

5 Defnton 2. Rule Relaton Graph A Rule Relaton Graph (RRG) s a graph G = (V, E) n whch, V = { C1, C2,..., CN, A1, A2,..., AN, S} s the node set of graph G, n whch S s a pseudo source node; C represents a condton node; A represents an acton node. Every acton node A s also a snk node. E s the edge set of graph G. Every edge n E, except the edges startng from the pseudo source node S, has a label, ether YES or NO. The algorthm n Fgure 1 shows how to form the RRG from a rule table, whose tme complexty s O (N ), the value of N ranges from tens to hundreds n practce. Algorthm 1: Input: Output: Formng RRG Rule table wth N rules RRG G 1 V = {S}; E = Φ; set each rule as unvsted ; 2 For each R =(C, A y, A n ), = 1 to N 3 f rule R s unvsted 4 set rule R as vsted ; 5 V = V {node C }; 6 E = E {edge from S to node C }; 7 f ( A y s goto j ) 8 f rule R j s unvsted 9 V = V {node C j }; 10 E = E {edge from node C to node C j } wth label YES; 11 else 12 V = V {node A y }; 13 E = E {edge from node C to node A y } wth label YES; 14 f ( A n s goto k ) 15 f rule R k s unvsted 16 V = V {node C k }; 17 E = E {edge from node C to node C k } wth label NO; 18 else 19 V = V {node A n }; 20 E = E {edge from node C to node A n } wth label NO; Fgure 1. Algorthm for formng RRG For example, the RRG n Fgure 2 corresponds to rule table n Table 1.

6 Fgure 2. RRG for the rule table n Table 1 Then every source to snk path n RRG represents a new rule. Every path can be rewrtten nto a new rule satsfyng the standard f-then format by followng the procedure below: The snk node of the path forms the acton part of the new rule; The conjuncton of all the ntermedate nodes forms the condton part of the new rule, the conjuncton s generated as follows: f the edge comng out of node M s labeled wth YES, we use node M tself n the condton part, otherwse we use negaton of M ( M ) nstead. From Fgure 2, three paths can be found. YES 1) S ( DP = 21) ( Dscard ) NO 2) S ( DP < 255) ( Dscard) YES YES 3) S ( DP < 255) ( SD = 166*) ( Forward) So three new rules can be generated from Fgure 2, as shown n Table 2. No. Content of rule 1 If (packet wth destnaton port equals 21) then (dscard t) 2 If (packet wth destnaton port large than or equals 255) then (dscard t) 3 If (packet wth destnaton port small than 255 and from subnet /16) then (forward t) 3.3 Fault Detecton Table 2. Normalzed Rule Table The second phase of our soluton s to detect conflctng rules n the normalzed rule table. We frst check f the acton part of every par of rules conflct. If they do, we then check f the ntersecton of the two condtonal expressons s satsfable. If yes, a conflct s found. To make ths problem easer to solve, we frst make two assumptons. Later we wll relax these two assumptons and dscuss general solutons. The frst assumpton s that there s only one acton n every pece of rule, for example, n packet flter, ether forward or dscard, and these two conflct. So n the rule table, dfferent actons means conflct.

7 The second assumpton s about the condtonal expressons of rules. We assume that we have lmted number (K) of varables n the condtonal expressons, X, 1 K. Each varable corresponds to a dmenson n a K-dmenson space. And the possble values n each dmenson are lmted n a fnte, contnuous and ordered nteger nterval represented by S. We call the general fault detecton problem wth these two assumptons as a constraned verson of the fault detecton problem. For packet flter, fve felds n the TCP/IP header (see secton 2.1) have been used n the condtonal expressons. Suppose we use fve dmensons, da, sa, dp, sp and tp, to represent these fve felds. The values of each feld form an nterval met the above condton n the correspondng dmenson. And an arbtrary sub-nterval of each of the fve dmensons can be denoted by S, S, S, S and S respectvely. da sa dp sp tp Gven an arbtrary condtonal expresson C, we can transform t nto a dsjunctve normal form [7]: X F = 1 ( S da 1 sa 1 dp 1 sp 1 tp ) ( S 2 da 2 sa 2 dp 2 sp 2 tp ) (4) ( S n1 da n1 sa n1 dp n1 sp n1 tp ) Because F s a condtonal expresson n dsjunctve normal form, we can make sure every nterval S, x { da, sa, dp, sp, tp} n expresson 4 s a sngle nterval n the correspondng dmenson. l x Sngle nterval means that for every possble value e n dmenson x, f MIN ( S ) < e <MAX ( S ), then l e S x. Fgure 3 contans an algorthm to check the satsfablty of the ntersecton of two condtonal expressons C 1 and C 2 n dsjunctve normal form. For two ntervals S and S n dfferent dmensons, there s no need to check for ntersecton. So we only need to consder ntervals belongng to the same dmenson. In the algorthm, we call every conjunctve form a clause, e.g. ( S ) s a clause. da sa dp sp tp m x l x k xj l x

8 Algorthm 2: Checkng satsfablty Input: Two condton expressons C 1 and C 2 n dsjunctve normal form Output: Boolean value to show f there s ntersecton between C 1 and C 2 1 For each clause n C 1 2 For each clause n C 2 3 For each dmenson n set {da, sa, dp, sp, tp} do 4 If both clauses have sngle ntervals n current dmenson 5 Check f these two sngle ntervals have ntersecton 6 If yes, return TRUE; 7 Return FALSE Fgure 3. Algorthm for checkng satsfablty It s easy to prove that the algorthm n Fgure 3 takes polynomal tme. Suppose the average number of clauses n each condtonal expresson s N c, then the tme complexty of Algorthm 2 s O(KN c 2 ), K s the number of varables n the condtonal parts, whch s 5 for packet flter example. In the worst case, N c can be equal to the length of a varable s value dmenson. 4 General Case of Actons: Composte-actons In the packet flter example we have dscussed above, an mportant constrant s that there s only one acton n the acton part of every rule. But ths s not always held for some other RBSs. For example, IP Securty Archtecture (IPsec) s another typcal RBS. In the rule table of IPsec, besdes forward and dscard, there are many other knds of actons, e.g., encryptng wth Authentcaton Header (AH), encryptng wth encapsulatng Securty Payload (ESP) and etc. Besde the ncrease of the acton types, another change les n that there can be multple actons n the acton part of each rule. We call an acton part that has multple actons as a composte-acton. The conflct between the sngle actons of any two composte-actons may result n the conflct between these two composte-actons. So we need an effcent algorthm to check whether two composte-actons conflct. In the rest of ths paper, unless we ndcate explctly, the term acton means sngle acton. 4.1 Conflct Between Composte-actons We need to formally defne the meanng of conflct between two composte-actons. Frst we defne a relaton R on the set of all possble actons. conflct Defnton 3. Conflct Relaton The conflct relaton R on acton set S = A, A,..., A } s defned as conflct conflct j A { 1 2 M j, A, Aj S A R = {( A, A ) : A conflcts wth A }. As mentoned above, a composte-acton has multple actons. Two composte-actons are conflctng f there s at least one par of actons, each of whch comes from a dfferent composte-acton and whch are conflctng. Defnton 4 gves a formal descrpton.

9 Defnton 4. Conflct Composte-actons For two rules R and R j : R f ( C ) then( A ; A ; ; A ) and : 1 2 m j : f ( C j ) then( Aj1; Aj 2; ; Ajn R ), ther acton parts conflct f and only f there s at least one par of actons ( 1 p m, 1 q M ). ( A, A p jq ) R conflct 4.2 Checkng Conflct Between Composte-actons Fgure 4 shows the algorthm to check conflct between two composte-actons. In ths algorthm, we use a graph to represent the conflct relaton R. We call ths graph the conflct acton graph. Every node n ths graph stands for an acton and there s an edge between two nodes f and 2 only f the correspondng two actons conflct. The tme complexty of ths algorthm s O ( M ). M s the maxmal number of actons. conflct Algorthm 3: Input: Output: Checkng conflct composte-actons Two composed-actons A and A j, conflct acton graph Boolean value to show f they are conflct 1 Intalze all entres n array color[m] to whte; 2 For every node a k n the conflct acton graph of R conflct do 3 f a k A - A j, then color[k]=blue; 4 f a k A j - A, then color[k]=red; 5 f a k A A j, then color[k]=green; 6 For every node a p A do 7 For every node a q A j do 8 f (color[p] color[q]) or (color[p] == color[q] == green) 9 return true; 10 Return false; Fgure 4. Algorthm for checkng conflct composte-actons In ths algorthm, we use a color array to keep a record for the appearance of each node n the two composte-actons. If a node s n A, we set ts color to blue; f a node s n A j, we set ts color to red; and f a node s n both A and A j, we set ts color to green. After that, every edge related to the two composte actons s checked. If the colors of one edge s two end ponts are ether both green or dfferent, we say these two composte-actons conflct wth each other. In Algorthm 3, we treat composte-actons as sets of actons, so set operators can apply [8]. 5 General Case of Condtonal Expressons In ths secton, we dscuss the general case of condtonal expressons. In Secton 3, we assumed that the values of each of the varables used n the condtonal expressons of rules are a fnte set of ntegers. For most RBSs, beng dscrete s stll a general attrbute of varables, but the other two

10 attrbutes, fnte and ordered, may not hold any more. In ths secton we relax our requrement for the varables and gve the defnton of condtonal expressons n general case usng Boolean Logc. In Boolean Logc we use Boolean varables x 1, x 2, for the ndvdual statement such as destnaton port lower than 255. That s, each Boolean varable denotes a statement that can n prncple be true or false ndependently of the truth-value of the others [8]. Let X = {x 1, x 2, x n } be a fnte set of Boolean varables, and let X = x, x,..., x }, where the { 1 2 n x 1, x2,..., x n are new symbols standng for the negatons of x 1, x 2, x n. We call the elements of X X lterals; varables are postve lterals, whereas negatons of varables are negatve lterals. A clause L s a nonempty set of lterals: L X X. Fnally a Boolean formula n conjunctve normal form s a set of clauses defned on X. For example, f we have X = {x 1, x 2, x 3 }, and therefore X = { x1, x2, x3}. L = { x1, x2, x3} s a clause. If we use parentheses nstead of the usual set brackets and also separate the lterals by the delmter or nstead of coma, clause L can be rewrtten as a dsjunctve only Boolean expresson L = ( x ) 1 x2 x3. So a Boolean formula can be rewrtten as a Boolean expresson n conjunctve normal form, nterested readers can refer to [8][9] for algorthms and examples. Because any condtonal expresson can be transformed nto a conjunctve normal form, we defne the condtonal expresson n general case as: Defnton 5. Condton expresson n general case The condtonal expresson of a rule s a Boolean formula n conjunctve normal form. Because every condtonal expresson can be represented by a Boolean formula n conjunctve normal form, the ntersecton of two condtonal expressons s the conjuncton of the two correspondng Boolean formulas, whch s stll a Boolean formula n conjunctve normal form. So the problem of checkng whether two generalzed condton expressons are ntersected equals to check the satsfablty of a Boolean formula n conjunctve normal form. It takes lnear tme to check the satsfablty of a Boolean formula n a normal form. 6 Case study We mplement our algorthms under LINUX and apply t on a set of rules collected from one of the frewall systems n Bell Labs. Because of securty reason, we do not nclude the source data n ths paper but only report our expermental results. The rule table we have checked ncludes a total of 48 rules. They do flterng on varous types of IP traffc, for example, TCP packet of mal servce wth destnaton port 25, vrus alert on specfc IP address, and even popular ICQ traffc (UDP traffc send to destnaton port 4000), etc. The felds n the IP header beng checked nclude source address, destnaton address, protocol type, source port and destnaton port. The dfference between ths real table and the one mentoned n the prevous sectons s that the real rule s attached wth another attrbute, drecton. The drecton may be IN, OUT and BOTH, wth

11 the meanng that ths rule should be appled on a packet when the packet s receved, forwarded or both respectvely. Because the IN rules and OUT rules are appled at dfferent tme and cannot conflct wth each other, we rewrte the orgnal table to two separate tables n accordance wth the dfferent drectons. There s a default rule n every table, whch s the last rule be appled when all other rules are faled. It s always wth the followng format, f (( src = *) and( dst = *) and( ptl = *) and( srcport = *) and( dstport = *)) then( dscard) Here the star (*) means all possble values. For example, (src = *) means the source IP address can be anyone between and Accordng to our defnton of conflct, the last rule wll conflct wth every rule wth the acton forward. To smplfy our analyss, we gnore ths default last rule when applyng our algorthms. In the remanng 47 rules, we have found 43 potental conflcts. We say a par of rules conflcts when the traffc descrbed by the two rules has overlap (or there s traffc that can satsfy both rules) but the actons taken by the two rules are dfferent. Ths s consstent wth our defnton of conflct n Defnton 1. Followng we analyze two of potental conflcts we found. 1) Rule 4 and 7, No. Content of rule 4 If (packets wth src address drect_mal and servce mal) then (forward t) 7 If (packets wth dst address russtroj) then (dscard t) Here the term mal stands for the mal servce that has protocol type TCP and destnaton port 25. So f a mal packet from the host drect_mal to host russtroj comes, rule 4 tells the packet should be forwarded, whle rule 7 states t should be dscarded. Because rule 4 s appled before rule 7, the acton taken by the frewall wll be forward t. But s ths the desred acton by the system admnstrator? 2) Rule 9 and 14, No. Content of rule 9 If (packets wth src address mh and servce sunrpc) then (dscard t) 14 If (packets wth src address bandt2 and servce bandt2_out) then (forward t) The IP addresses group bandt2 s part of mh, sunrpc s the UDP servce wth destnaton port 111, and bandt2_out means the servce wth protocol UDP and source port So f a packet from bandt2 to somewhere wth servce udp/7331/111 comes, rule 9 tells the packet should be dscarded, whle rule 14 says t should be forwarded. Because rule 9 s appled before rule 14, the acton taken by the frewall wll be dscard t. But s ths the desred acton by the system admnstrator? As we clamed, our fndngs are just potental conflcts. Only the system admnstrator who wrote these rules can decde f they are real conflcts. If the acton taken by the frewall system s not what the system admnstrator has desred, then t s a real conflct. Otherwse, t s only the real ntenton of the system admnstrator.

12 7 Concluson In ths paper, we proposed a soluton for the fault detecton problem for packet flter n frewall systems, whch s a typcal type of RBS. We also extended our soluton to deal wth composte-actons. For RBS wth generalzed condtonal expressons, the fault detecton problem s NP-hard. We also appled our algorthms on a set of real data and reported the result. Our future work wll nclude two aspects. One s to explore other applcatons than the packet flter n frewall systems; the other s to search for heurstc algorthms for the general RBS. Acknowledgements: We would lke to thank Erc Grosse for provdng us the real data collected from frewalls n Bell Labs and commentng on our expermental results. References 1. E. Ayanoglu and D. Lee, Readng Notes on Network Management: Part I Fault Detecton, Bell Labs, Lucent Technologes, June 4, C. S. Hood and C. J, Proactve Network-Fault Detecton, IEEE Trans. on Relablty, Vol. 46, No. 3, Sept A. Lazar, W. Wang and R. H. Deng, Models and Algorthms for Network Fault Detecton and Identfcaton: A Revew, Proc. ICCS/ISITA, Sngapore, R. Hao, D. Lee and R.K. Snha, SOCRATES on IP Router Fault Detecton, IEEE Globecom D. Lee and M. Yannakaks, Prncples and Methods of Testng Fnte State Machnes: A survey, Proceedngs of the IEEE, Vol.84, No.8, August S. Tanenbaum, Computer Networks, thrd edton, Prentce-Hall, M. M. Mano, Computer Logc Desgn, Prentce-Hall, H. R. Lews and C. H. Papadmtro, Elements of the theory of computaton, second edton, Prentce-Hall, M. R. Garey and D. S. Johnson, Computers and Intractablty: A Gude to the Theory of NP-Completeness, Freeman, D. Wang, R. Hao and D. Lee, Fault Detecton n Rule-Based Software Systems, Concorda Prestgous Workshop on Communcaton Software Engneerng 2001, September

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Data Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach

Data Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach Data Representaton n Dgtal Desgn, a Sngle Converson Equaton and a Formal Languages Approach Hassan Farhat Unversty of Nebraska at Omaha Abstract- In the study of data representaton n dgtal desgn and computer

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0 The stream cpher MICKEY-128 (verson 1 Algorthm specfcaton ssue 1. Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

GSLM Operations Research II Fall 13/14

GSLM Operations Research II Fall 13/14 GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

kccvoip.com basic voip training NAT/PAT extract 2008

kccvoip.com basic voip training NAT/PAT extract 2008 kccvop.com basc vop tranng NAT/PAT extract 28 As we have seen n the prevous sldes, SIP and H2 both use addressng nsde ther packets to rely nformaton. Thnk of an envelope where we place the addresses of

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

NAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics

NAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics Introducton G10 NAG Fortran Lbrary Chapter Introducton G10 Smoothng n Statstcs Contents 1 Scope of the Chapter... 2 2 Background to the Problems... 2 2.1 Smoothng Methods... 2 2.2 Smoothng Splnes and Regresson

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Harvard University CS 101 Fall 2005, Shimon Schocken. Assembler. Elements of Computing Systems 1 Assembler (Ch. 6)

Harvard University CS 101 Fall 2005, Shimon Schocken. Assembler. Elements of Computing Systems 1 Assembler (Ch. 6) Harvard Unversty CS 101 Fall 2005, Shmon Schocken Assembler Elements of Computng Systems 1 Assembler (Ch. 6) Why care about assemblers? Because Assemblers employ some nfty trcks Assemblers are the frst

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Assembler. Shimon Schocken. Spring Elements of Computing Systems 1 Assembler (Ch. 6) Compiler. abstract interface.

Assembler. Shimon Schocken. Spring Elements of Computing Systems 1 Assembler (Ch. 6) Compiler. abstract interface. IDC Herzlya Shmon Schocken Assembler Shmon Schocken Sprng 2005 Elements of Computng Systems 1 Assembler (Ch. 6) Where we are at: Human Thought Abstract desgn Chapters 9, 12 abstract nterface H.L. Language

More information

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL)

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL) Crcut Analyss I (ENG 405) Chapter Method of Analyss Nodal(KCL) and Mesh(KVL) Nodal Analyss If nstead of focusng on the oltages of the crcut elements, one looks at the oltages at the nodes of the crcut,

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

On Some Entertaining Applications of the Concept of Set in Computer Science Course

On Some Entertaining Applications of the Concept of Set in Computer Science Course On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Assembler. Building a Modern Computer From First Principles.

Assembler. Building a Modern Computer From First Principles. Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES

More information

Brave New World Pseudocode Reference

Brave New World Pseudocode Reference Brave New World Pseudocode Reference Pseudocode s a way to descrbe how to accomplsh tasks usng basc steps lke those a computer mght perform. In ths week s lab, you'll see how a form of pseudocode can be

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT 3. - 5. 5., Brno, Czech Republc, EU APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT Abstract Josef TOŠENOVSKÝ ) Lenka MONSPORTOVÁ ) Flp TOŠENOVSKÝ

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

Ontology Generator from Relational Database Based on Jena

Ontology Generator from Relational Database Based on Jena Computer and Informaton Scence Vol. 3, No. 2; May 2010 Ontology Generator from Relatonal Database Based on Jena Shufeng Zhou (Correspondng author) College of Mathematcs Scence, Laocheng Unversty No.34

More information

ELEC 377 Operating Systems. Week 6 Class 3

ELEC 377 Operating Systems. Week 6 Class 3 ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems

More information

Solutions to Programming Assignment Five Interpolation and Numerical Differentiation

Solutions to Programming Assignment Five Interpolation and Numerical Differentiation College of Engneerng and Coputer Scence Mechancal Engneerng Departent Mechancal Engneerng 309 Nuercal Analyss of Engneerng Systes Sprng 04 Nuber: 537 Instructor: Larry Caretto Solutons to Prograng Assgnent

More information

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated.

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated. Some Advanced SP Tools 1. umulatve Sum ontrol (usum) hart For the data shown n Table 9-1, the x chart can be generated. However, the shft taken place at sample #21 s not apparent. 92 For ths set samples,

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications 14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of

More information

UB at GeoCLEF Department of Geography Abstract

UB at GeoCLEF Department of Geography   Abstract UB at GeoCLEF 2006 Mguel E. Ruz (1), Stuart Shapro (2), June Abbas (1), Slva B. Southwck (1) and Davd Mark (3) State Unversty of New York at Buffalo (1) Department of Lbrary and Informaton Studes (2) Department

More information

Chapter 6 Programmng the fnte element method Inow turn to the man subject of ths book: The mplementaton of the fnte element algorthm n computer programs. In order to make my dscusson as straghtforward

More information

Optimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming

Optimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming Optzaton Methods: Integer Prograng Integer Lnear Prograng Module Lecture Notes Integer Lnear Prograng Introducton In all the prevous lectures n lnear prograng dscussed so far, the desgn varables consdered

More information

Esc101 Lecture 1 st April, 2008 Generating Permutation

Esc101 Lecture 1 st April, 2008 Generating Permutation Esc101 Lecture 1 Aprl, 2008 Generatng Permutaton In ths class we wll look at a problem to wrte a program that takes as nput 1,2,...,N and prnts out all possble permutatons of the numbers 1,2,...,N. For

More information

(1) The control processes are too complex to analyze by conventional quantitative techniques.

(1) The control processes are too complex to analyze by conventional quantitative techniques. Chapter 0 Fuzzy Control and Fuzzy Expert Systems The fuzzy logc controller (FLC) s ntroduced n ths chapter. After ntroducng the archtecture of the FLC, we study ts components step by step and suggest a

More information

Explicit Formulas and Efficient Algorithm for Moment Computation of Coupled RC Trees with Lumped and Distributed Elements

Explicit Formulas and Efficient Algorithm for Moment Computation of Coupled RC Trees with Lumped and Distributed Elements Explct Formulas and Effcent Algorthm for Moment Computaton of Coupled RC Trees wth Lumped and Dstrbuted Elements Qngan Yu and Ernest S.Kuh Electroncs Research Lab. Unv. of Calforna at Berkeley Berkeley

More information

TPL-Aware Displacement-driven Detailed Placement Refinement with Coloring Constraints

TPL-Aware Displacement-driven Detailed Placement Refinement with Coloring Constraints TPL-ware Dsplacement-drven Detaled Placement Refnement wth Colorng Constrants Tao Ln Iowa State Unversty tln@astate.edu Chrs Chu Iowa State Unversty cnchu@astate.edu BSTRCT To mnmze the effect of process

More information

A Heuristic for Mining Association Rules In Polynomial Time*

A Heuristic for Mining Association Rules In Polynomial Time* Complete reference nformaton: Ylmaz, E., E. Trantaphyllou, J. Chen, and T.W. Lao, (3), A Heurstc for Mnng Assocaton Rules In Polynomal Tme, Computer and Mathematcal Modellng, No. 37, pp. 9-33. A Heurstc

More information

Review of approximation techniques

Review of approximation techniques CHAPTER 2 Revew of appromaton technques 2. Introducton Optmzaton problems n engneerng desgn are characterzed by the followng assocated features: the objectve functon and constrants are mplct functons evaluated

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

F Geometric Mean Graphs

F Geometric Mean Graphs Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 2 (December 2015), pp. 937-952 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) F Geometrc Mean Graphs A.

More information

Conditional Speculative Decimal Addition*

Conditional Speculative Decimal Addition* Condtonal Speculatve Decmal Addton Alvaro Vazquez and Elsardo Antelo Dep. of Electronc and Computer Engneerng Unv. of Santago de Compostela, Span Ths work was supported n part by Xunta de Galca under grant

More information

Intro. Iterators. 1. Access

Intro. Iterators. 1. Access Intro Ths mornng I d lke to talk a lttle bt about s and s. We wll start out wth smlartes and dfferences, then we wll see how to draw them n envronment dagrams, and we wll fnsh wth some examples. Happy

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vidyanagar

CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vidyanagar CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vdyanagar Faculty Name: Am D. Trved Class: SYBCA Subject: US03CBCA03 (Advanced Data & Fle Structure) *UNIT 1 (ARRAYS AND TREES) **INTRODUCTION TO ARRAYS If we want

More information

Array transposition in CUDA shared memory

Array transposition in CUDA shared memory Array transposton n CUDA shared memory Mke Gles February 19, 2014 Abstract Ths short note s nspred by some code wrtten by Jeremy Appleyard for the transposton of data through shared memory. I had some

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

UNIT 2 : INEQUALITIES AND CONVEX SETS

UNIT 2 : INEQUALITIES AND CONVEX SETS UNT 2 : NEQUALTES AND CONVEX SETS ' Structure 2. ntroducton Objectves, nequaltes and ther Graphs Convex Sets and ther Geometry Noton of Convex Sets Extreme Ponts of Convex Set Hyper Planes and Half Spaces

More information

Synthesizer 1.0. User s Guide. A Varying Coefficient Meta. nalytic Tool. Z. Krizan Employing Microsoft Excel 2007

Synthesizer 1.0. User s Guide. A Varying Coefficient Meta. nalytic Tool. Z. Krizan Employing Microsoft Excel 2007 Syntheszer 1.0 A Varyng Coeffcent Meta Meta-Analytc nalytc Tool Employng Mcrosoft Excel 007.38.17.5 User s Gude Z. Krzan 009 Table of Contents 1. Introducton and Acknowledgments 3. Operatonal Functons

More information

Intra-Parametric Analysis of a Fuzzy MOLP

Intra-Parametric Analysis of a Fuzzy MOLP Intra-Parametrc Analyss of a Fuzzy MOLP a MIAO-LING WANG a Department of Industral Engneerng and Management a Mnghsn Insttute of Technology and Hsnchu Tawan, ROC b HSIAO-FAN WANG b Insttute of Industral

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Oracle Database: SQL and PL/SQL Fundamentals Certification Course

Oracle Database: SQL and PL/SQL Fundamentals Certification Course Oracle Database: SQL and PL/SQL Fundamentals Certfcaton Course 1 Duraton: 5 Days (30 hours) What you wll learn: Ths Oracle Database: SQL and PL/SQL Fundamentals tranng delvers the fundamentals of SQL and

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

USING GRAPHING SKILLS

USING GRAPHING SKILLS Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp

More information

Connection-information-based connection rerouting for connection-oriented mobile communication networks

Connection-information-based connection rerouting for connection-oriented mobile communication networks Dstrb. Syst. Engng 5 (1998) 47 65. Prnted n the UK PII: S0967-1846(98)90513-7 Connecton-nformaton-based connecton reroutng for connecton-orented moble communcaton networks Mnho Song, Yanghee Cho and Chongsang

More information

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your

More information

Memory Modeling in ESL-RTL Equivalence Checking

Memory Modeling in ESL-RTL Equivalence Checking 11.4 Memory Modelng n ESL-RTL Equvalence Checkng Alfred Koelbl 2025 NW Cornelus Pass Rd. Hllsboro, OR 97124 koelbl@synopsys.com Jerry R. Burch 2025 NW Cornelus Pass Rd. Hllsboro, OR 97124 burch@synopsys.com

More information

A New Exact Algorithm for Traveling Salesman Problem with Time Complexity Interval (O(n^4), O(n^3 2^n))

A New Exact Algorithm for Traveling Salesman Problem with Time Complexity Interval (O(n^4), O(n^3 2^n)) A New Exact Algorthm for Travelng Salesman roblem wth Tme Complexty Interval (O(n^4), O(n^3 2^n)) 39 YUNENG LI, Southeast Unversty Travelng salesman problem s a N-hard problem. Untl now, researchers have

More information

Agenda & Reading. Simple If. Decision-Making Statements. COMPSCI 280 S1C Applications Programming. Programming Fundamentals

Agenda & Reading. Simple If. Decision-Making Statements. COMPSCI 280 S1C Applications Programming. Programming Fundamentals Agenda & Readng COMPSCI 8 SC Applcatons Programmng Programmng Fundamentals Control Flow Agenda: Decsonmakng statements: Smple If, Ifelse, nested felse, Select Case s Whle, DoWhle/Untl, For, For Each, Nested

More information

A Heuristic for Mining Association Rules In Polynomial Time

A Heuristic for Mining Association Rules In Polynomial Time A Heurstc for Mnng Assocaton Rules In Polynomal Tme E. YILMAZ General Electrc Card Servces, Inc. A unt of General Electrc Captal Corporaton 6 Summer Street, MS -39C, Stamford, CT, 697, U.S.A. egemen.ylmaz@gecaptal.com

More information

A NOTE ON FUZZY CLOSURE OF A FUZZY SET

A NOTE ON FUZZY CLOSURE OF A FUZZY SET (JPMNT) Journal of Process Management New Technologes, Internatonal A NOTE ON FUZZY CLOSURE OF A FUZZY SET Bhmraj Basumatary Department of Mathematcal Scences, Bodoland Unversty, Kokrajhar, Assam, Inda,

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES

VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES UbCC 2011, Volume 6, 5002981-x manuscrpts OPEN ACCES UbCC Journal ISSN 1992-8424 www.ubcc.org VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES

More information