An Optimization Algorithm for Minimum Connected Dominating Set Problem in Wireless Sensor Network

Size: px
Start display at page:

Download "An Optimization Algorithm for Minimum Connected Dominating Set Problem in Wireless Sensor Network"

Transcription

1 IEMS Vol. 10, No. 3, pp , September An Optmzaton Algorthm for Mnmum Connected Domnatng Set Problem n Wreless Sensor Network Namsu Ahn Defense Agency for Technology and Qualty , Boksu-dong, Seo-gu, Daejeon, Tel: , E-mal: namsu.ahn@gmal.com Sungsoo Park Department of Industral and Systems Engneerng KAIST, 373-1, Gusong-dong, Yusong-gu, Daejeon, , Tel: , Fax: , E-mal: sspark@kast.ac.kr Receved, March 12, 2011; Revsed, May 18, 2011; Accepted, May 24, 2011 Abstract. One of the crtcal ssues n wreless sensor network s the desgn of a proper routng protocol. One possble approach s utlzng a vrtual nfrastructure, whch s a subset of sensors to connect all the sensors n the network. Among the many vrtual nfrastructures, the connected domnatng set s wdely used. Snce a small connected domnatng set can help to decrease the protocol overhead and energy consumpton, t s preferable to fnd a small szed connected domnatng set. Although many algorthms have been suggested to construct a mnmum connected domnatng set, there have been few exact approaches. In ths paper, we suggest an mproved optmal algorthm for the mnmum connected domnatng set problem, and extensve computatonal results showed that our algorthm outperformed the prevous exact algorthms. Also, we suggest a new heurstc algorthm to fnd the connected domnatng set and computatonal results show that our algorthm s capable of fndng good qualty solutons qute fast. Keywords: Connected Domnatng Set, Cuttng Plane, Integer Programmng, Wreless Sensor Networks 1. INTRODUCTION Due to the recent rapd advances n dgtal technologes and the mass producton, developments of multfunctonal, low-cost and low-power sensors become possble. Generally, sensor s composed of four major unts: power unt, sensng unt, processng unt and transcever unt, and each unt performs a unque functon. The power unt provdes power to all the other unts, and the sensng unt takes charge of the montorng task and data convertng task. Thus, f a certan phenomenon happens, the sensng unt detects the phenomenon changes, such as temperature, lght, sound and humdty, and then converts the sensed analog data to dgtal data. The processng unt can manpulate the collected data and store the collected data n the storage devce for transmttng. The transcever unt can transmt/receve nformaton over a wreless network. Typcally, a large number of sensors collaborate usng wreless communcaton, and the sensors gather, process and transmt nformaton over a wreless network to a remote runnng applcaton that makes decsons based on ths nformaton. Snce the deployed sensors are clustered and communcate n wreless channels, we call t wreless sensor network (WSN). Nowadays, WSN has many applcatons, such as habtat montorng, forestfre detecton, patent status montorng, home applance, nventory trackng and battlefeld montorng. WSN s featured by no fxed nfrastructure, multhop communcaton and lmted resources (battery capacty and bandwdth). These characterstcs pose new dffcultes n desgnng a routng protocol. Some exstng routng protocols for ad hoc networks (Ng and Lu, 1999; Pe et al., 2000) are based on floodng mechansm (.e., upon recevng a packet, transmt the packet to all of ts neghbors). Therefore f we use these protocols, t : Correspondng Author

2 222 Namsu Ahn Sungsoo Park not only devastates the resources of the sensors, but gves negatve effect on the throughput of the whole network. Furthermore, t probably causes broadcastng storm problem as ndcated n N et al. (2002), whch results n excessve data redundancy, contenton and collson. In Snha et al. (2001), a new routng protocol based on an overlayng vrtual nfrastructure, so called vrtual backbone, s proposed and the authors showed that, usng the backbone can reduce the routng overhead dramatcally. Smply, a vrtual backbone s defned as a subset of sensors, whch can connect all the sensors n the network. Ths concept s frequently used to smplfy the network and mproves the effcency of the routng. In many exstng vrtual backbone schemes whch can be found n Alzoub et al. (2002), Chen et al. (2002), Da and Wu (2004), Stojmenovc et al. (2002) and Wu and Da 2004, a connected domnatng set (CDS) s suggested to use as a backbone. To smplfy our dscusson, we use a connected graph G = (V, E) to represent the network, where V and E represent the set of vertces and the set of edges, respectvely. Each vertex v V ndcates a sensor, and there s an edge e(= uv) E whch denotes that sensor u s wthn sensor v's communcaton range and vce versa. A set of sensors s called a domnatng set f each of the sensors n the network s ether n ths set or has a neghbor (sensor u s neghbor of sensor v f there exsts an edge between the two vertces) n the set. Typcally, the sensors n the domnatng set are called domnators, and the other sensors are called domnatees. A domnatng set s called a CDS f the subgraph nduced by the domnatng set s connected, and the connectvty among the domnators s requred for proper routng of sgnals. Therefore f any domnatee want to send a message to domnator(or domnatee), t frst send a message to connected neghbor domnator. If CDS s used as a backbone, we can obtan the followng good characterstcs of the network. Routng overhead can be reduced as shown n Wu and L (1999) because only the sensors n CDS need to mantan the routng nformaton. Thus, f a domnatee wants to send a packet to another domnatee, t sends the packet to ts domnator. Then the domnator wll delver the packet to the destnaton domnatee. Energy effcent area coverage s possble as ndcated n Carle and Smplot (2004) and Chen et al. (2002). Snce CDS s a good approxmaton of an area, domnators n CDS can take over the domnatees sensng task. Thus, f the domnators are actvely performng the sensng task, all of ts domnatees probably enter nto a low-battery sleep state to save energy for future use. Usefulness of the CDS n WSN has been demonstrated n many communcaton protocols such as meda access coordnaton, uncast, multcast/broadcast, locaton-based routng, energy conservaton, resource dscovery and topology control (More comprehensve revew can be found n Blum et al. (2004)). Snce the number of sensors formng the vrtual backbone needs to be as small as possble to decrease the protocol overhead and energy consumpton, t s desrable to form a mnmum szed CDS. Fndng a mnmum szed CDS problem s referred to as the mnmum connected domnatng set (MCDS) problem. For example, vertex set {a, b, c} n Fgure 1 forms a CDS, thus the domnators are {a, b, c} and the domnatees are {d, e, f}. Fgure 1. Example of the CDS. Fndng an MCDS s an NP-Hard problem Garey and Johnson (1979), and many researches have been performed on the MCDS problem and a comprehensve revew on the algorthms can be found n Blum et al. (2004). In ths paper, we revew the centralzed CDS constructon algorthms only (Although CDS can be constructed n a dstrbuted manner (Chen et al., 2009; Wang et al., 2009), t s beyond the scope of ths paper). We revew the performance guaranteed approxmaton algorthms frst. In Guha and Khuller (1998), two algorthms are suggested. One forms a CDS of sze at most 2(1 + H( Δ)) MCDS and the other one constructs a CDS of sze (3 + ln( Δ)) MCDS, where H, MCDS and Δ represent the harmonc functon, sze of the MCDS and the maxmum degree of the gven graph, respectvely. The authors n L et al. (2005), Mn et al. (2006) and Ruan et al. (2004) reported (4.8 + ln5) MCDS, 6.8 MCDS and (3 + ln( Δ)) MCDS approxmaton algorthms, respectvely. There exst many heurstc algorthms for the MCDS problem. Relatvely latest ones can be found n Chen et al. (2010) and Morgan and Grout (2008). However, these algorthms cannot guarantee the qualty of the obtaned solutons because no nformaton on the lower bound can be obtaned. Although solvng the MCDS problem exactly s an mportant research goal, there have been few exact approaches. One smple scheme s enumeratng all subset of the vertces, and the algorthm shown n Fomn et al. (2008) breaks the 2 V barrer by suggestng O (1.9407) V algorthm. However, no mplementaton and performance test of the algorthm can be found. Other two optmal approaches used mathematcal formulatons to obtan MCDS (Morgan and Grout, 2008;

3 An Optmzaton Algorthm for Mnmum Connected Domnatng Set Problem n Wreless Sensor Network 223 Yuan, 2005). However, the performances of the algorthms reported by the authors were not mpressve. In ths paper, we propose an mproved optmal algorthm usng the mathematcal formulaton n Yuan (2005) and compare the performances wth the prevous two approaches. The computatonal results showed that, our algorthm outperforms the prevous optmal approaches n terms of the runnng tme to obtan an optmal soluton. Also, we propose a new heurstc whch use the formulaton and the dea of our mproved optmal algorthm. Ths paper s organzed n the followng way. In Secton 2, we revew notaton and defnton. In Secton 3, the exstng mathematcal formulatons and algorthms for the MCDS problem wll be dscussed, and an mproved optmal approach wll be ntroduced n the same secton. Secton 4.1 shows the performance of the mproved optmal approach suggested n ths research. Secton 4.2 ncludes descrpton of the heurstc whch s suggested n ths research for computng the connected domnatng set effcently, and shows the performance of the heurstc. Fnally, n Secton 5, we conclude ths paper. 2. PRELIMINARIES Ths secton provdes some background nformaton to understand the rest part of the paper. As noted before, WSN can be represented by a smple graph G = (V, E) and the followng defnton and notaton from graph theory wll be used throughout the paper. Open neghbor set, = { } N( u) v ( uv) E, s the set of vertces adjacent to vertex u. Closed neghbor set, N[ u] = N() u { u }, s the set of vertces adjacent to vertex u and u tself. Independent set s a subset of V such that no two vertces are adjacent n G. For example, {d}, {d, e} and {d, e, f} are ndependent sets n Fgure 1. Maxmal ndependent set s an ndependent set such that addng any vertex not n the set breaks the property of the ndependent set. For example, n Fgure 1, the ndependent set {d, e, f} s a maxmal ndependent set snce addton of any other vertces (a or b or c) makes some vertces n the set are connected. Domnatng set s a subset of V such that each vertex s ether n the set or has a neghbor n the set. Note that every maxmal ndependent set s a domnatng set, but the converse s not true. Connected domnatg set s a domnatng set whose nduced subgraph s connected. For example, {a, b, c} s a CDS n Fgure 1. Stener tree s a tree whch, for a gven subset T of V, connects the vertces of T possbly usng the vertces n V\T. For example, n Fgure 1, f T s gven as {d, e, f}, a Stener tree can be constructed by addng the remanng vertces {a, b, c} and the edges ab, ac, ad, be and cf. Vertex cut s a subset of V whose removal dsconnects the graph. If we use maxmal ndependent set and Stener tree, the followng smple procedure can construct a CDS. We frst form a maxmal ndependent set to dentfy a domnatng set, and let the generated domnatng set from the frst step be the vertex set T n Stener tree. Then CDS can be constructed by fndng a Stener tree. Many heurstc algorthms and approxmaton algorthms have been developed usng ths dea, and the latest one can be found n Mn et al. (2006). 3. MATHEMATICAL FORMULATIONS AND OPTIMAL ALGORITHMS To the best of our knowledge, two dfferent mathematcal formulatons exst for the MCDS problem, frst one s shown n Morgan and Grout (2008) and the second one s suggested n Yuan (2005). Two formulatons used dfferent modelng technques. The frst one used a 2V + 2 E number of varables wth 3V + 2 E number of constrants, approxmately. The second one used a V number of varables, but t requred an exponental number of constrants to represent the connectvty of the nduced subgraph. At frst sght, the frst formulaton seems to be better. However, after performng extensve computatonal experments, we concluded that, f an mproved optmal algorthm developed n ths paper s used, the second formulaton may be used to fnd an optmal soluton much faster than the frst formulaton. Generally, representng the connectvty requrement for the graph problems asks for an exponental number of nequaltes. To avod ths, the frst formulaton used the flow varables n the formulaton. The man dea of the formulaton s, when the vertces are selected to form a CDS, any vertex ncluded n the CDS can send a flow to each of the other vertces n the CDS (usng only the selected vertces). Each vertex ncluded n the CDS requres at least one unt of flow, and the root vertex (vertex 1) contans enough flows to supply the requred flows n each vertex n the CDS. Thus, f the root vertex s not ncluded n the CDS, t transfers all of ts flows to one of ts neghborng vertces whch s selected to be ncluded n the CDS. We frst construct a drected graph G = (V, A) by replacng each edge e(= j) E by two arcs j and j, and defne the decson varables as the followng. 1, f vertex s ncluded n the MCDS, x = 0, otherwse fj = amount of flow from vertex to j. 1, f flow s permtted from root vertex to vertex x = 0, otherwse

4 224 Namsu Ahn Sungsoo Park Then the formulaton can be gven as the followng. Mnmze x (1) V Subjectto x + x 1, = 1,, { jj A} j V (2) f { } 1 1 { 1 } 1 = 1 j f j j A j j A j V (3) f, 2,, { } j f = j j A { j j A} j x V (4) 1j 1 j { } j { } j { } 1+ { 1 } j 1 { 0, 1 }, = 1,, j { 0, 1 }, { 1 } f V ( x + x ), j 1j A (5) f V x, j A 1and j 2 (6) f1 V y, j 1j A (7) j j A y x V (8) x V (9) y j j A (10) Constrants (1) mnmze the number of vertces whch are selected to be ncluded n the CDS. Constrants (2) guarantee that, f the vertex s not ncluded n the CDS, t has at least one neghborng vertces whch are selected to be ncluded n the CDS to satsfy the domnance requrement. Constrants (3) assure that the root vertex n the CDS may produce suffcent flows to provde at least one unt flow to the other vertces whch are chosen to be ncluded n the CDS. Constrants (4) state that, f any vertex s chosen to be ncluded n the CDS, t consumes at least one unt flow. Constrants (5) and (6) set upper bounds for the flows. Constrants (7) guarantee that flows from the root vertex to the other vertex j can be sent only f y j s one. Whle constrant (8) forces that, f the root vertex s not ncluded n the CDS, at most one of ts neghbor vertces can be selected n the CDS to send the flows. Constrants (9) and (10) state the bnary nteger requrements on the varables. The authors n Morgan Grout (2008) reported that, when ILOG CPLEX (2008) was used as an optmzaton software to solve the formulaton, they could obtan the optmal solutons for the graphs of up to 100 vertces n 1000 seconds. Fgure 2. Example of the mnmal vertex cut. Now we revew the formulaton and the optmal algorthm shown n Yuan (2005). Before gvng a detaled explanaton, we ntroduce notaton whch wll be used n the formulaton. Let C be a mnmal vertex cut (=whose removal dsconnects the graph and removng any vertex n the cut fals to form the vertex cut), and be a collecton of C. For example, n Fgure 2, vertex cut {a, c, d} s not a mnmal vertex cut, but c or d s a mnmal vertex cut. The author n Yuan (2005) proved that, f at least one vertex s selected from C, C, the set of selected vertces form a CDS. Usng ths characterstc, the authors suggested the followng formulaton for the MCDS problem (The decson varable x ndcates that whether the vertex s ncluded n the CDS or not). Mnmze x (11) V Subjectto 1, C j (12) x 0, 1, V. (13) { } Snce the number of constrants (12) can be huge, representng the formulaton n full s mpractcal. Therefore the author n Yuan (2005) suggested the followng constrant generaton scheme to dentfy the volated constrant of (12) only when needed. Optmal approach n Yuan (2005): Step 1: Construct the ntal formulaton usng constrants (11) and (13) only. Step 2: For each vertex v V, form a subset S of V by settng S = [v]. For each S, construct a mnmal vertex cut by fndng the vertces whch has one or several neghbor vertces n V\S. Then add the correspondng nequaltes of (12) to the formulaton. Step 3: Solve the formulaton optmally and let the set of vertces whch are selected as D. If D forms a CDS, stop the procedure and output the obtaned MCDS. Otherwse, goto Step 4. Step 4: For each vertex v V, construct a subset S of V usng the vertces that v can reach va vertces n D, ncludng v tself. For each S, f we can construct a mnmal vertex cut by fndng the vertces whch has one or several neghbor vertces n V\S, store the correspondng nequalty of (12). Step 5: Perform a par-wse check for the stored nequaltes n Step 4 to dentfy the nequaltes whch are not domnated by the other nequaltes (.e., for gven two vertex cuts C 1 and C 2, f C 1 s a subset of C, 2 C 2 s domnated by C 1 ). Only those nequaltes are added to the formulaton, and goto Step 3. The authors n Yuan (2005) reported that, when the tme lmt was set to 1 hour and ILOG CPLEX 7.0 was used as the optmzaton software, they could obtan the optmal solutons for the graph of up to 80 vertces. Up to ths part of the secton, we revewed two dfferent mathematcal formulatons and the optmal approaches to solve the formulatons, but the performances

5 An Optmzaton Algorthm for Mnmum Connected Domnatng Set Problem n Wreless Sensor Network 225 of the algorthms reported by the authors seem to be not mpressve and the approaches have rooms for more mprovements. However, snce the prmary purposes of ther researches were developng good heurstc algorthms, no more efforts n optmal approaches could be found. Comparsons of the algorthm n Morgan Grout (2008), orgnal algorthm n Yuan (2005), and our mproved algorthm wll be gven n Secton 4.1. Note that f t s guaranteed that the number of vertces selected n an MCDS s greater than or equal to two, the followng addtonal nequaltes can be added to the formulaton. j N() j x 1, C V (14) Constrants (14) ndcate that any selected vertex has at least one or more neghborng vertces to establsh the connectvty. Actually, constrants (14) are not requred n a correct formulaton of the MCDS problem, but addng the constrants to the formulaton strengthens the formulaton and t reduces the computaton tme to solve the problem. Now we dscuss our optmal algorthm for the MCDS problem based on the formulaton from Yuan (2005). To solve the MCDS problem for a gven graph, we used a dfferent constrant generaton scheme and ths dfference results n mprovements n the computaton tmes to obtan the optmal solutons. As noted before, snce the number of constrants (12) can be exponental, the constrants (12) need to be dealt mplctly rather than explctly. We frst solve the formulaton optmally wthout constrants (12) and construct the graph usng the vertces whch are selected. When the current soluton s not a CDS, the optmal approach n Yuan (2005) dentfes one vertex cut whch s volated by the current soluton. On the other hand, when there exst several vertex cuts whch are volated by the current soluton, ths approach does not guarantee to dentfy the smallest szed vertex cut. Snce usng a mnmum vertex cut among the volated vertex cuts may tghten the formulaton the most, t probably reduces the computaton tme to solve the problem. In ths paper, when the constructed subgraph from the current soluton conssts of several dsconnected components, we suggest a procedure to fnd a mnmum vertex cut whch separates one component from the other components. We frst explan how to fnd a vertex cut usng an example, and then, a procedure whch dentfes the mnmum vertex cut wll be dscussed. Assume that, when we solved the formulaton wthout constrants (12) usng the example gven n Fgure 3, two vertces a and c are selected (for ths example, suppose that we replaced constrants (14) by x v N[ u] v 1, u V, otherwse a and c cannot be chosen). However, snce the resultng subgraph s not a CDS, we want to dentfy a vertex cut whch s volated by the current soluton a and c. Fgure 3. Example of the MCDS problem. Clearly, snce we want to fnd a vertex cut whch separates the two vertces a and c, vertces b and d form a vertex cut whch s volated by the current soluton. Now we add the correspondng nequalty xb + x d 1 to the formulaton. When we solve the enlarged formulaton, we can obtan the CDS as {a, b} and the procedure stops. However, dentfyng the vertex cut probably be a complcatng step when the sze of the graph s large. Furthermore, t may be harder to fnd the mnmum vertex cut among the vertex cuts. Therefore, n ths paper, we propose an dea whch dentfes the vertex cut usng the modfed graph of G, then a procedure whch can be used to fnd the mnmum vertex cut wll be llustrated (We used the procedure suggested n Thulasramanand Swamy (1992) wth some modfcatons). To dentfy a vertex cut for a gven graph G = (V, E), we frst replace each edge by two antparallel arcs, and then, splt a vertex v nto two vertces v and v, and create an arc drected from v to v. Then, replace an arc that s drected from vertex u to other vertex v by an arc drected from u to v. Lastly, assgn unt capactes to the generated arcs whch are drected from v to v, and allocate very large postve (= M) capactes to the generated arcs drected from u to v. The result of applyng the procedure to the example n Fgure 3 s shown n Fgure 4. Fgure 4. Transformed graph. Therefore, when we send flows from a source vertex to a snk vertex as much as possble, only the arcs whch are drected from v to v lmt the amount of flows. Note that n ths example, we have two source ver-

6 226 Namsu Ahn Sungsoo Park tces a and a (from vertex a) and two snk vertces c and c (from vertex c) nstead of a sngle source vertex and a sngle snk vertex. Generally, when we want to fnd a vertex cut usng the modfed graph, we need to solve the multple sources and multple snks maxmum flow problem nstead of the ordnary maxmum flow problem. However, ths problem can be easly reduced to the ordnary sngle source sngle snk maxmum flow problem. We frst add a vertex (= super-source vertex) and create arcs to the source vertces wth capactes M. Smlarly, we add a vertex (= super-snk vertex) and create arcs from the snk vertces wth capactes M. Then, any flow from the super-source vertex to the super-snk vertex corresponds to a flow n the multple source vertces and multple snk vertces problem as shown n Cormen et al. (1989). If we dentfed the maxmum flow, we also can fnd the mnmum arc cut such that the value of the flow s equal to one (arcs are drected from v to v ). Then we can obtan a vertex cut of the orgnal graph by restorng the vertces correspondng to the cut arcs. Suppose that the soluton from the formulaton wthout constrants (12) s not a CDS, then the selected vertces form several connected components. Now, for each component, we want to dentfy the mnmum szed vertex cut whch separates the current component and the other components, and the correspondng nequaltes (12) are added to the formulaton. Then, the followng procedure can be used to fnd the mnmum szed volated vertex cut. Procedure to fnd the mnmum szed volated vertex cut: Step 1: For a gven undrected graph G = (V, E), construct a drected graph G = (V, A) by replacng each edge e(= j) E by two arcs j and j. Step 2: Replace every vertex v V by two vertces v and v and create an arc drected from v to v. Step 3: Assgn unt capactes to the generated arcs n Step 2. Step 4: Replace an arc that s drected from vertex u V to the another vertex v V by an arc drected from u to v. Step 5: Assgn capactes M to the generated arcs n Step 4. Step 6: Set k as 1. for all k th component do Step 6.1: Create a super-source vertex and create arcs jonng the super-source vertex to the vertces of k th component wth capactes M. Step 6.2: Create a super-snk vertex and create arcs jonng the vertces of the other components to the super-snk vertex wth capactes M. Step 6.3: Fnd a maxmum flow from the super-source vertex to the super-snk vertex. Step 6.4: Identfy a mnmum arc cut, and obtan a vertex cut of the orgnal graph by restorng the vertces correspondng to the arc cut. Step 6.5: Drop the generated vertces and arcs n Step 6.1 and Step 6.2, and ncrease k by one. end for Step 7: Choose the mnmum vertex cut among the vertex cuts dentfed n Step DESCRIPTION OF THE HEURISTIC We suggested an optmal approach and tested the performance of the algorthm n Secton 5.1. However, when the sze of the problem becomes large, solvng the MCDS usng the formulaton faled to provde an optmal soluton wthn an hour. Therefore, we propose a heurstc whch can be used to fnd the CDS. Major characterstcs of the heurstc are lnear programmng relaxaton of the mathematcal formulaton and mnmum vertex cut dentfcaton procedure explaned n Secton 3. The detaled procedure of the heurstc can be gven as follows. Heurstc to compute connected domnatng set: Step 1: Prepare an empty set, and construct the formulaton whch conssts of (11), (13) and (14). Step 2: Drop the ntegralty condtons and let the lower bound for the objectve value as z Step 3: Solve the lnear programmng relaxaton. Step 4: Identfy the most fractonal varable x varable whch s close to one, and assgn the correspondng vertex to the set. Step 5: If the set satsfy the domnance requrement and sze of the set s greater than or equal to z, go to Step 7. Step 6: Fx the dentfed x varables n Step 5 to one n the formulaton and return to Step 3. Step 7: Check the connectvty among the vertces whch are ncluded n the set. If the set s connected, stop the algorthm and output the vertces n the set. Otherwse, go to Step 8. Step 8: Snce the vertces n the set conssts of several dsconnected components, dentfy the mnmum vertex cut whch separates one component from the other components usng the procedure descrbed n Secton 3. Step 9: Add the correspondng nequalty whch s volated by the current soluton, and let z := Set + 1 and return to Step 3. In Step 4, f the several varables are assgned the same values, we choose the varable whose sum of dstances to other vertces ncluded n the set s the mnmum. Note that the number of teratons s fnte, and snce solvng the lnear programmng relaxaton, separatng the mnmum vertex cut and fndng the dstances can be done n polynomal tmes, our heurstc runs n polynomal tme.

7 An Optmzaton Algorthm for Mnmum Connected Domnatng Set Problem n Wreless Sensor Network COMPUTATIONAL RESULTS 5.1 Performance of the optmal algorthms We tested the performances of the optmal approaches for the MCDS problem suggested n Morgan Grout (2008), Yuan (2005) and n ths paper. We mplemented the three approaches and tested them on randomly generated graphs. For each of the approaches, the algorthm run tmes are reported. For the approaches gven n Yuan (2005) and ths research, the number of generated nequaltes (12) to obtan the MCDS are also reported. The purpose of the experment s, to observe the dfferences n the run tmes for the three exact approaches. We used the code obtaned from donparker.net/graph_gen.php to generate the connected random graphs. The code can generate three types of connected graphs: sparse, medum and dense graphs for a gven number of vertces V. The graph classfcaton crteron s the number of edges. The number of edges of the sparse graph s less than V ( V 1)/4, the number of edges of the medum graph s approxmately V ( V 1)/4, and the number of edges of the dense graph s greater than V ( V 1)/4. For each type of the graphs, we generated 10 random graphs wth the number of vertces rangng from 100 to 1000 wth an ncrement of 100. The three approaches were mplemented n C++ and ILOG CPLEX 11.0 was used as optmzaton software. All experments were run on an AMD Athlon TM 64 X2 Dual Core (2.70 GHz) wth 2GB RAM, and runnng tme s gven n seconds. Computatonal results are gven n Table 1, 2 and 3 for each type of the graphs. Note that MCDS denotes the sze of the mnmum connected domnatng set and * ndcates the problem on whch the algorthm faled to obtan the soluton wthn an hour. Also, comparson of the run tme s llustrated n Fgure 5, 6 and 7. V Table 1. Comparson of the optmal approaches for sparse graph problems. Approach n Morgan Grout (2008) Approach n Yuan (2005) Ahn and Park s approach Run tme (sec) Inequaltes Run tme (sec) Inequaltes Run tme (sec) MCDS * * * * * * * * * * * * * * * * * * * V Table 2. Comparson of the optmal approaches for medum graph problems. Approach n Morgan Grout (2008) Approach n Yuan (2005) Ahn and Park s approach Run tme (sec) Inequaltes Run tme (sec) Inequaltes Run tme (sec) MCDS * * * * * * * * * * 700 * * * * * * 800 * * * * * * 900 * * * * * * 1000 * * * * * *

8 228 Namsu Ahn Sungsoo Park When we compared the optmal approaches n terms of the algorthm run tme, each approach showed dfferent performance dependng on the types of the graphs. For sparse graphs, our approach obtaned MCDS n the shortest run tme, then the approach gven n Morgan Grout (2008) follows the next, and lastly, the approach proposed n Yuan (2005) showed the longest run tme. On the other hand, for medum and dense graphs, the approach proposed n Morgan Grout (2008) showed the longest run tme to obtan the MCDS, and the other two approaches showed equvalent performances. Also, for the gven medum and dense graphs, our approach and the approach shown n Yuan (2005) requred no addtonal constrants (12) to obtan the optmal soluton. Ths probably due to the densty of the gven graphs. 5.2 Performance of heurstc In Table 4, we use the same problems from Table 1, Table 2 and Table 3 and test the performance of our heurstc. Run tme column denotes the runnng tme of the heurstc, CDS ndcates the sze of the connected domnatng set obtaned from the heurstc and MCDS means the sze of the mnmum connected domnatng set. We can observe that, our heurstc algorthm showed good performance n medum and dense graph problems, but showed relatvely poor performance n sparse graph problems. Run tme(sec) Fgure 5. Comparson of run tme n medum graph. Table 3. Comparson of the optmal approaches for dense graph problems. V Approach n Morgan Grout (2008) Approach n Yuan (2005) Ahn and Park s approach MCDS Run tme (sec) Inequaltes Run tme (sec) Inequaltes Run tme (sec) * * * * * * * * * * 800 * * * * * * 900 * * * * * * 1000 * * * * * *

9 An Optmzaton Algorthm for Mnmum Connected Domnatng Set Problem n Wreless Sensor Network 229 Run tme(sec) Run tme(sec) Fgure 6. Comparson of run tme n medum graph. Fgure 7. Comparson of run tme n dense graph. 6. CONCLUSIONS Desgnng a routng protocol s one of the mportant ssues n wreless sensor network. Many vrtual nfrastructure based protocols have been suggested, and one of them s utlzng the CDS. Snce formng a small szed CDS s preferable, many researches have been devoted on ths ssue. In ths paper, we proposed an mproved optmal algorthm for the MCDS problem, and extensve computatonal experments showed that our algorthm outperforms the prevous approaches n terms of the runnng tme to obtan an optmal soluton. Also, we proposed the heurstc n ths research whch uses the mathematcal formulaton for the MCDS problem, and the computatonal experments show that our algorthm obtans an qute good soluton n a reasonable amount of tme.snce constructng an MCDS s an mportant ssue n wreless sensor networks, further approach such as branch-and-cut or meta-heurstc methods (genetc algo-

10 230 Namsu Ahn Sungsoo Park Table 4. Performance of the heurstc n graph problems V Sparse Graph Medum Graph Dense Graph Run tme CDS MCDS Run tme CDS MCDS Run tme CDS MCDS * * * * * * * * * rthm, smulated annealng, tabu search, ant colony optmzaton) can be appled to solve the MCDS problem. REFERENCES Alzoub, K. M., Wan, P. J., and Freder, O. (2002), Dstrbuted Heurstcs for Connected Domnatng Sets n Wreless Ad hoc Networks, Journal of Communcaton Networks, 4(1), Blum, J., Dng, M., Thaeler, A., and Cheng, X. (2004), Handbook of combnatoral optmzaton, Kluwer Academc Publshers, Netherlands. Carle, J. and Smplot-Ryl, D. (2004), Energy-effcent Area Montorng for Sensor Networks, IEEE Computer Socety, 37(2), Chen, B., Jameson, K., Balakrshnan, H., and Morrs, R. (2002) Span: An Energy Effcent Coordnaton Algorthm for Topology Mantenance n Ad hoc Wreless Networks, ACM Wreless Networks, 8(5), Chen, S., Ljubc, I., and Raghavan, S. (2010), The Regenerator Locaton Problem, Networks, 55, Chen, Q., Fan, W. T., and Zhang, M. (2009), Dstrbuted heurstc approxmaton algorthm for mnmum connected domnatng set, Computer Engneerng, 35(10), Cormen, T. H., Leserson, C. E., and Rvest, R. L. (1989), Introducton to Algorthms, The MIT Press, New York. Da, F. and Wu, J. (2004), An Extended Localzed Algorthm for Connected Domnatng Set Formaton n Ad hoc Wreless Networks, IEEE Transaxton on Paralel. Dstrbutng, 15(10), Fomn, F. V., Grandon, F., and Kratsch, D. (2008), Solvng Connected Domnatng Set Faster Than n 2, Algorthmca, 52, Garey, M. R. and Johnson, D. S. (1979), Computers and Intractablty: A Gude to the Theory of NP-Completeness, W. H. Freeman and Company, San Francsco. Guha, S. and Khuller, S. (1998), Approxmaton algorthms for connected domnatng sets, Algorthmca, 20, L, Y., Tha M. T., Wang, F., Y, C. W., Wan, P. J., and Du, D. Z. (2005), On Greedy Constructon of Connected Domnatng Sets n Wreless Networks, Wreless Communcaton Moble Computng, 5, Mn, M., Du, H., Ja, X., Huang, C. X., Huang, S. C. H., and Wu, W. (2006), Improvng Constructon for Connected Domnatng Set wth Stener Tree n Wreless Sensor Networks, Journalof Global Optmzaton, 35, Morgan, M. and Grout, V. (2008), Fndng Optmal Solutons to Backbone Mnmsaton Problems usng Mxed Integer Programmng, 7 th Internatonal Network Conference, Plymouth, Unted Kngdom, Ng, M. J. and Lu, I. T. (1999), A Peer-to-Peer Zonebased Two-level Lnk State Routng for Moble Ad Hoc Networks, IEEE Journal on Selected Area Communcaton, 17(8), N, S. Y., Tseng, Y. C., Chen, Y. S., and Sheu, J. P. (2002), The broadcast Storm Problem n a Moble Ad hoc Network, Wreless Networks, 8, Pe, G., Gerla, M., and Chen, T. W. (2000), Fsheye State Routng: A Routng Scheme for Ad hoc Wreless Networks, IEEE Internatonal Conference on Communcaton, New Orleans, LA, Ruan, L., Du, H., Ja, X., Wu, W., L, Y., and Ko, K. I. (2004), A Greedy Approxmaton for Mnmum Connected Domnatng Set, Theory of Computer

11 An Optmzaton Algorthm for Mnmum Connected Domnatng Set Problem n Wreless Sensor Network 231 Scence, 329, Snha, P., Svakumar, R., and Bharghavan, V. (2001), Enhancng Ad hoc Routng wth Dynamc Vrtual Infrastructures, 20 th Annual Jont Conference of the IEEE Computer and Communcatons Socetes, Anchorage, Alaska, Stojmenovc, I., Seddgh, M., Zunc, J. (2002), Domnatng Sets and Neghbor Elmnaton Based Broadcastng Algorthms n Wreless Networks, IEEE Transacton on Parallel Dstrbutng, 13, Thulasraman, K. and Swamy, M. N. S. (1992), Graphs: Theory And Algorthms, Wley, New York. Wang, L. Y., Zhang, Q., and Lu, A. M. (2009), Dstrbuted MCDS constructng algorthm n Ad hoc networks, AppledComputng, 26, Wu, J., L, H. (1999), On Calculatng Connected Domnatng Set for Effcent Routng n Adhoc Wreless Networks, 3 rd ACM Internatonal Workshop on Dscrete Algorthms and Methods for MOBILE Computng and Communcatons, Dallas, Texas, Wu, J., Da, F. (2004), A Generc Dstrbuted Broadcast Scheme n Ad hoc Wreless Networks, IEEE Transacton on Computng, 53, Yuan, D. (2005), Energy-Effcent Broadcastng n Wreless Ad Hoc Networks: Performance Benchmarkng and Dstrbuted Algorthms Based on Network Connectvty Characterzato, 8 th ACM Internatonal Symposum on Modelng, Analyss and Smulaton of Wreless and Moble Systems. Montreal, Canada,

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

GSLM Operations Research II Fall 13/14

GSLM Operations Research II Fall 13/14 GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

Ant Colony Optimization Applied to Minimum Weight Dominating Set Problem

Ant Colony Optimization Applied to Minimum Weight Dominating Set Problem Ant Colony Optmzaton Appled to Mnmum Weght Domnatng Set Problem Raa JOVANOVIC Mlan TUBA Dana SIMIAN Texas AM Unversty Faculty of Computer Scence Department of Computer Scence at Qatar Megatrend Unversty

More information

Greedy Technique - Definition

Greedy Technique - Definition Greedy Technque Greedy Technque - Defnton The greedy method s a general algorthm desgn paradgm, bult on the follong elements: confguratons: dfferent choces, collectons, or values to fnd objectve functon:

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

F Geometric Mean Graphs

F Geometric Mean Graphs Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 2 (December 2015), pp. 937-952 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) F Geometrc Mean Graphs A.

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Decson surface s a hyperplane (lne n 2D) n feature space (smlar to the Perceptron) Arguably, the most mportant recent dscovery n machne learnng In a nutshell: map the data to a predetermned

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

Kent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming

Kent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming CS 4/560 Desgn and Analyss of Algorthms Kent State Unversty Dept. of Math & Computer Scence LECT-6 Dynamc Programmng 2 Dynamc Programmng Dynamc Programmng, lke the dvde-and-conquer method, solves problems

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

5 The Primal-Dual Method

5 The Primal-Dual Method 5 The Prmal-Dual Method Orgnally desgned as a method for solvng lnear programs, where t reduces weghted optmzaton problems to smpler combnatoral ones, the prmal-dual method (PDM) has receved much attenton

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble

More information

All-Pairs Shortest Paths. Approximate All-Pairs shortest paths Approximate distance oracles Spanners and Emulators. Uri Zwick Tel Aviv University

All-Pairs Shortest Paths. Approximate All-Pairs shortest paths Approximate distance oracles Spanners and Emulators. Uri Zwick Tel Aviv University Approxmate All-Pars shortest paths Approxmate dstance oracles Spanners and Emulators Ur Zwck Tel Avv Unversty Summer School on Shortest Paths (PATH05 DIKU, Unversty of Copenhagen All-Pars Shortest Paths

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Design of Structure Optimization with APDL

Design of Structure Optimization with APDL Desgn of Structure Optmzaton wth APDL Yanyun School of Cvl Engneerng and Archtecture, East Chna Jaotong Unversty Nanchang 330013 Chna Abstract In ths paper, the desgn process of structure optmzaton wth

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

A Facet Generation Procedure. for solving 0/1 integer programs

A Facet Generation Procedure. for solving 0/1 integer programs A Facet Generaton Procedure for solvng 0/ nteger programs by Gyana R. Parja IBM Corporaton, Poughkeepse, NY 260 Radu Gaddov Emery Worldwde Arlnes, Vandala, Oho 45377 and Wlbert E. Wlhelm Teas A&M Unversty,

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 5 Luca Trevisan September 7, 2017

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 5 Luca Trevisan September 7, 2017 U.C. Bereley CS294: Beyond Worst-Case Analyss Handout 5 Luca Trevsan September 7, 207 Scrbed by Haars Khan Last modfed 0/3/207 Lecture 5 In whch we study the SDP relaxaton of Max Cut n random graphs. Quc

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Chapter 6 Programmng the fnte element method Inow turn to the man subject of ths book: The mplementaton of the fnte element algorthm n computer programs. In order to make my dscusson as straghtforward

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

Research Article. ISSN (Print) s k and. d k rate of k -th flow, source node and

Research Article. ISSN (Print) s k and. d k rate of k -th flow, source node and Scholars Journal of Engneerng and Technology (SJET) Sch. J. Eng. Tech., 2015; 3(4A):343-350 Scholars Academc and Scentfc Publsher (An Internatonal Publsher for Academc and Scentfc Resources) www.saspublsher.com

More information

An efficient iterative source routing algorithm

An efficient iterative source routing algorithm An effcent teratve source routng algorthm Gang Cheng Ye Tan Nrwan Ansar Advanced Networng Lab Department of Electrcal Computer Engneerng New Jersey Insttute of Technology Newar NJ 7 {gc yt Ansar}@ntedu

More information

1 Introducton Gven a graph G = (V; E), a non-negatve cost on each edge n E, and a set of vertces Z V, the mnmum Stener problem s to nd a mnmum cost su

1 Introducton Gven a graph G = (V; E), a non-negatve cost on each edge n E, and a set of vertces Z V, the mnmum Stener problem s to nd a mnmum cost su Stener Problems on Drected Acyclc Graphs Tsan-sheng Hsu y, Kuo-Hu Tsa yz, Da-We Wang yz and D. T. Lee? September 1, 1995 Abstract In ths paper, we consder two varatons of the mnmum-cost Stener problem

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

A Decentralized Lifetime Maximization Algorithm for Distributed Applications in Wireless Sensor Networks

A Decentralized Lifetime Maximization Algorithm for Distributed Applications in Wireless Sensor Networks A Decentralzed Lfetme Maxmzaton Algorthm for Dstrbuted Applcatons n Wreless Sensor Networks Vrgna Pllon, Mauro Franceschell, Lug Atzor, Alessandro Gua Dept. of Electrcal and Electronc Engneerng, Unversty

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks A Load-balancng and Energy-aware Clusterng Algorthm n Wreless Ad-hoc Networks Wang Jn, Shu Le, Jnsung Cho, Young-Koo Lee, Sungyoung Lee, Yonl Zhong Department of Computer Engneerng Kyung Hee Unversty,

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

A Saturation Binary Neural Network for Crossbar Switching Problem

A Saturation Binary Neural Network for Crossbar Switching Problem A Saturaton Bnary Neural Network for Crossbar Swtchng Problem Cu Zhang 1, L-Qng Zhao 2, and Rong-Long Wang 2 1 Department of Autocontrol, Laonng Insttute of Scence and Technology, Benx, Chna bxlkyzhangcu@163.com

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

An Efficient Algorithm for Minimum Vertex Cover Problem

An Efficient Algorithm for Minimum Vertex Cover Problem An Effcent Algorthm for Mnmum Vertex Cover Problem Rong Long Wang Zheng Tang Xn Shun Xu Member Non-member Non-member Paper An effcent parallel algorthm for solvng the mnmum vertex cover problem usng bnary

More information

11. APPROXIMATION ALGORITHMS

11. APPROXIMATION ALGORITHMS Copng wth NP-completeness 11. APPROXIMATION ALGORITHMS load balancng center selecton prcng method: vertex cover LP roundng: vertex cover generalzed load balancng knapsack problem Q. Suppose I need to solve

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Optimal Scheduling of Capture Times in a Multiple Capture Imaging System

Optimal Scheduling of Capture Times in a Multiple Capture Imaging System Optmal Schedulng of Capture Tmes n a Multple Capture Imagng System Tng Chen and Abbas El Gamal Informaton Systems Laboratory Department of Electrcal Engneerng Stanford Unversty Stanford, Calforna 9435,

More information

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding Tarno et al. EURASIP Journal on Wreless Communcatons and Networkng 214, 214:81 http://wcn.euraspournals.com/content/214/1/81 RESEARCH Open Access QoS-aware routng for heterogeneous layered uncast transmssons

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Capacitated Domination and Covering: A Parameterized Perspective

Capacitated Domination and Covering: A Parameterized Perspective Capactated Domnaton and Coverng: A Parameterzed Perspectve Mchael Dom Danel Lokshtanov Saket Saurabh Yngve Vllanger Abstract Capactated versons of Domnatng Set and Vertex Cover have been studed ntensvely

More information

Learning to Project in Multi-Objective Binary Linear Programming

Learning to Project in Multi-Objective Binary Linear Programming Learnng to Project n Mult-Objectve Bnary Lnear Programmng Alvaro Serra-Altamranda Department of Industral and Management System Engneerng, Unversty of South Florda, Tampa, FL, 33620 USA, amserra@mal.usf.edu,

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087

More information

Smoothing Spline ANOVA for variable screening

Smoothing Spline ANOVA for variable screening Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory

More information

Review of approximation techniques

Review of approximation techniques CHAPTER 2 Revew of appromaton technques 2. Introducton Optmzaton problems n engneerng desgn are characterzed by the followng assocated features: the objectve functon and constrants are mplct functons evaluated

More information

Optimizing Energy-Latency Trade-off in Sensor Networks with Controlled Mobility

Optimizing Energy-Latency Trade-off in Sensor Networks with Controlled Mobility Optmzng Energy-Latency Trade-off n Sensor Networks wth Controlled Moblty Ryo Sughara Rajesh K. Gupta Computer Scence and Engneerng Department Unversty of Calforna, San Dego La Jolla, Calforna 9293 Emal:

More information

the nber of vertces n the graph. spannng tree T beng part of a par of maxmally dstant trees s called extremal. Extremal trees are useful n the mxed an

the nber of vertces n the graph. spannng tree T beng part of a par of maxmally dstant trees s called extremal. Extremal trees are useful n the mxed an On Central Spannng Trees of a Graph S. Bezrukov Unverstat-GH Paderborn FB Mathematk/Informatk Furstenallee 11 D{33102 Paderborn F. Kaderal, W. Poguntke FernUnverstat Hagen LG Kommunkatonssysteme Bergscher

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

LECTURE NOTES Duality Theory, Sensitivity Analysis, and Parametric Programming

LECTURE NOTES Duality Theory, Sensitivity Analysis, and Parametric Programming CEE 60 Davd Rosenberg p. LECTURE NOTES Dualty Theory, Senstvty Analyss, and Parametrc Programmng Learnng Objectves. Revew the prmal LP model formulaton 2. Formulate the Dual Problem of an LP problem (TUES)

More information

An Application of Network Simplex Method for Minimum Cost Flow Problems

An Application of Network Simplex Method for Minimum Cost Flow Problems BALKANJM 0 (0) -0 Contents lsts avalable at BALKANJM BALKAN JOURNAL OF MATHEMATICS journal homepage: www.balkanjm.com An Applcaton of Network Smplex Method for Mnmum Cost Flow Problems Ergun EROGLU *a

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

Analysis of Non-coherent Fault Trees Using Ternary Decision Diagrams

Analysis of Non-coherent Fault Trees Using Ternary Decision Diagrams Analyss of Non-coherent Fault Trees Usng Ternary Decson Dagrams Rasa Remenyte-Prescott Dep. of Aeronautcal and Automotve Engneerng Loughborough Unversty, Loughborough, LE11 3TU, England R.Remenyte-Prescott@lboro.ac.uk

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,

More information

Secure Distributed Cluster Formation in Wireless Sensor Networks

Secure Distributed Cluster Formation in Wireless Sensor Networks Secure Dstrbuted Cluster Formaton n Wreless Sensor Networks Kun Sun Intellgent Automaton, Inc. ksun@-a-.com Pa Peng Opsware Inc. ppeng@opsware.com Clff Wang Army Research Offce clff.wang@us.army.ml Peng

More information

Programming in Fortran 90 : 2017/2018

Programming in Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

TPL-Aware Displacement-driven Detailed Placement Refinement with Coloring Constraints

TPL-Aware Displacement-driven Detailed Placement Refinement with Coloring Constraints TPL-ware Dsplacement-drven Detaled Placement Refnement wth Colorng Constrants Tao Ln Iowa State Unversty tln@astate.edu Chrs Chu Iowa State Unversty cnchu@astate.edu BSTRCT To mnmze the effect of process

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Task Scheduling for Directed Cyclic Graph. Using Matching Technique

Task Scheduling for Directed Cyclic Graph. Using Matching Technique Contemporary Engneerng Scences, Vol. 8, 2015, no. 17, 773-788 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2015.56193 Task Schedulng for Drected Cyclc Graph Usng Matchng Technque W.N.M. Arffn

More information

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks 12 IEEE Wreless Communcatons and Networkng Conference: Moble and Wreless Networks Onlne Polces for Opportunstc Vrtual MISO Routng n Wreless Ad Hoc Networks Crstano Tapparello, Stefano Tomasn and Mchele

More information

CHAPTER 2 DECOMPOSITION OF GRAPHS

CHAPTER 2 DECOMPOSITION OF GRAPHS CHAPTER DECOMPOSITION OF GRAPHS. INTRODUCTION A graph H s called a Supersubdvson of a graph G f H s obtaned from G by replacng every edge uv of G by a bpartte graph,m (m may vary for each edge by dentfyng

More information

Minimum Cost Optimization of Multicast Wireless Networks with Network Coding

Minimum Cost Optimization of Multicast Wireless Networks with Network Coding Mnmum Cost Optmzaton of Multcast Wreless Networks wth Network Codng Chengyu Xong and Xaohua L Department of ECE, State Unversty of New York at Bnghamton, Bnghamton, NY 13902 Emal: {cxong1, xl}@bnghamton.edu

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

Random Kernel Perceptron on ATTiny2313 Microcontroller

Random Kernel Perceptron on ATTiny2313 Microcontroller Random Kernel Perceptron on ATTny233 Mcrocontroller Nemanja Djurc Department of Computer and Informaton Scences, Temple Unversty Phladelpha, PA 922, USA nemanja.djurc@temple.edu Slobodan Vucetc Department

More information