A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

Size: px
Start display at page:

Download "A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory"

Transcription

1 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory Rie Kohta, Makoto Yamakawa, Naoki Katoh 3, Yoshikazu Araki and Makoto Ohsaki 5 Kyoto University, Kyoto, Japan, se.kohta@archi.kyoto-u.ac.jp Tokyo Denki University, Tokyo, Japan, myamakawa@mai.dendai.ac.jp 3 Kyoto University, Kyoto, Japan, naoki@archi.kyoto-u.ac.jp Kyoto University, Kyoto, Japan, araki@archi.kyoto-u.ac.jp Hiroshima University, Hiroshima, Japan, ohsaki@hiroshima-u.ac.jp Abstract The Truss Topoogy Design (TTD) probem deas with the seection of optima configuration for pin-jointed trusses, in particuar, the optimization of the connectivity of the nodes by the members, in which voume and/or compiance are minimized. In genera, it is known that such truss structures are staticay determinate and not redundanty rigid, that is, if just one member is damaged or ost, the entire structure cannot support oads. Therefore, it is important to take redundancy of structures into consideration in the TTD. We present a new practica design method for finding a redundant TTD based on combinatoria rigidity theory. In this paper, we define, as redundancy, the margin of the number of members unti the coapse of the entire structure when some components are damaged or ost. A truss structure is said to be a -edge-rigid truss if we need to remove at east two members from the truss structure so that the structure becomes non-rigid. We can find a -edge-rigid TTD by using a method based on combinatoria rigidity theory. The present method enabes to find an approximatey optima TTD with ow computationa cost. In numerica exampes, we compute redundanty rigid truss structures, in which objective vaue of the soution is about one percent greater than that of the ower bound. Therefore, we can concude that the method is effective to design an optima redundant truss structure. Keywords: Truss Topoogy Optimization, Redundancy, Combinatoria Rigidity Theory. Introduction It is very important to take redundancy into consideration in structura design, because it heps us to design against the force beyond our estimation. Generay it is difficut to ensure the safety against such unknown future forces. In particuar, there is a concern over progressive coapse, which is the coapse of the whoe structure triggered by the partia damage. In order to overcome these dangers, we must consider redundancy of structura design. This paper deas with the Truss Topoogy Design (TTD) probem with redundancy. There is not many researches on redundancy in the TTD athough truss structures designed by the TTD are generay staticay determinate and do not have redundancy. In the foowing subsections, we provide some backgrounds for this study...truss Topoogy Design (TTD) probem The TTD probem deas with the seection of optima configuration for pin-jointed trusses, in particuar, the optimization of the connectivity of the nodes by the members, in which voume and/or compiance are minimized. Ground structure method is known as the most popuar method of TTD. In this method, a ground structure with a sufficienty arge number of members is given as the initia configuration (as shown in Figure ). Then, the optima topoogy is obtained by soving the optimization probem in which design variabes are the cross section areas of the members, and the members with no cross section area are removed. It is known that the optima truss structure by the method is staticay determinate [3]. Staticay determinate truss structures are not redundanty rigid, that is, if just one member is damaged or ost, the entire structure cannot support oads. Figure : Ground structure Figure : Optima truss structure

2 .. Previous studies on redundancy of bar-and-joint framework A truss structure is a kind of bar-and-joint framework, which is a structure composed of rigid rods (bars) connected at their ends (joints). These frameworks are denoted by graphs such as Figure 3. A graph is said to be rigid if it has no nontrivia deformations preserving the edge engths. The rigidity of a graph has been studied in combinatoria rigidity theory, a fied of discrete mathematics. (a) (b) (c) Figure 3: (a) A rigid graph. (b) A non-rigid graph. (c) A redundanty rigid graph A. Garcia et a.(0) provide an O(n ) agorithm to augment a non-redundant rigid graph to a redundanty rigid graph by adding a minimum number of edges [], where a graph is redundanty rigid when the graph remains rigid even if any arbitrary edge is removed. C. Yu et a. (008) propose the concept of k-edge-rigid graphs[7]. The k-edge-rigid graph is sti rigid after deetion of any (k - ) edge(s), whie redundanty rigid graph is sti rigid after deetion of any one of edges. The redundanty rigid truss corresponds to a -edge-rigid graph by this definition. The method to generate a k-edge-rigid graph is proposed by N. Katoh et a. (0)[5]..3. Purpose of this paper We propose a new practica design method for finding a redundant TTD based on combinatoria rigidity theory in this paper. Since a truss structure can be abstracted to a graph, the rigidity of truss structures can be studied by combinatoria rigidity theory. Some important concepts about combinatoria rigidity theory and the agorithm find a minima covering proposed by Garcia [] are presented in section. The formuation of our probem for finding a redundant TTD and its approximate method are given in section 3. Finay, some numerica exampes are shown in section.. Combinatoria rigidity theory In this section, we expain the outine of this theory and the key concept of this paper, redundant range L(i,j)... Outine of combinatoria rigidity theory Combinatoria rigidity theory studies the rigidity of bar-joint frameworks from the viewpoint of graph theory. In fact, a bar-joint framework can be viewed as a graph G=(V,E) embedded on the pane where V and E denote the set of vertices which correspond to joints and that of edges which correspond to members, respectivey. Besides, V(G) and E(G) denote vertices and edges incuded in graph G, respectivey. The graph is caed rigid in R, if the corresponding framework aows ony trivia deformation, i.e., transation and rotation. In addition, a rigid graph with minima number of edges is caed a Laman graph, and the necessary and sufficient condition for a graph G=(V,E) to be a Laman graph is given as foows: E = V 3, (.a) E(X) X 3 for every X V with X V, (.b) where E(X) E denotes the set of edges in the subgraph induced by vertices X V, and E, V are the number of edges and vertices, respectivey. In addition, the notation E(X) is often used to stand for a graph G =(X,E(X)). For exampe, the graph iustrated in Figure (a) is a Laman graph: the equation (.a) is satisfied with E =5 and V =, and the subgraph E(X) in Figure (b) satisfies the equation (.b) with E(X) =3 and X =3. In the foowing, L denotes the set of Laman graphs.

3 X (a) (b) Figure : (a) A Laman graph. (b) A subgraph E(X) Based on this theory, Garcia et a. provide an O(n ) agorithm to augment a Laman graph G to a -edge-rigid graph (a redundanty rigid graph), by adding a minimum number of edges []. (a) (b) Figure 5: (a) A -edge-rigid graph. (b) A rigid graph An edge e of a rigid graph G is redundant if G e is sti rigid. A graph G is a -edge-rigid if G e is rigid for any edge e E(G) (see Figure 5(b)). In particuar, a generic circuit is a graph G such that G e is a Laman graph for any edge e E(G). Namey, G is a generic circuit if and ony if G e L, e G. () Generic circuits can be said to be minima -edge-rigid graphs. Since a truss structure can be abstracted to a graph, we can study its rigidity by combinatoria rigidity theory. In our study, we require that a truss is -edge-rigid. Then, we name this constraint as -edge-rigid constraint in this study... Redundant range L(i,j) In the foowing, an edge connecting vertices i and j is denoted by e = (i,j). When a new edge e = (i,j) is added to a Laman graph L, the graph L (i,j) contains a unique generic circuit, which is denoted by C(i,j) or C(e). Since this generic circuit contains the edge e = (i,j), the subgraph C(i,j) (i,j) is a Laman graph, which is caed a Laman subgraph. Garcia et a. denote this Laman subgraph by L(i,j) or L(e) []. Figures 6(a), 6(b) and 6(c) iustrate the concept of L(i,j). Each number in these figures represents the number of each vertex. In the Figure 6(b), the edges of the Laman subgraph L(,) are iustrated in bod straight ines. If we add to this Laman graph an edge connecting the vertex "" and the vertex "", then the edges of L(,) become redundant. In the same way, the edges of L(,5) iustrated in Figure 6(c) become redundant if we add the edge (,5) (a) (b) (c) Figure 6: (a) A Laman graph L. (b) L(,). (c) L(,5) Garcia et a. prove in their paper [] that, when the edges e, e,, e k are added to a Laman graph L, a subset of edges of L wi become redundant, which is denoted by L(e, e,,e k ). Then this set coincides with L(e ) L(e ) L(e k ): Lemma [] If L is a Laman graph, then L(e, e,,e k ) = L(e ) L(e ) L(e k ). 3

4 As iustrated in Figures 6(b) and 6(c), if we add both edges (,) and (,5), a edges of the Laman graph L become redundant. In other words, we can say that L(,) L(,5) = L((,), (,5)) is covering the whoe of L. In this way, every Laman graph can become a -edge-rigid graph by adding appropriate edges to the graph..3. Agorithm for finding a minima covering Garcia proposed the agorithm caed Find a minima covering to cacuate a set of edges, E = {e, e,,e k }, with minimum cardinaity, such that L(e, e,,e k ) = L(e ) L(e ) L(e k ) covers a the edges of a given Laman graph L. By using this agorithm, we can find a minimum number of edges we need to add. Degree of a vertex denotes the numbers of edges incident to the vertex. The agorithm Find a minima covering first chooses a vertex i of degree two or three which aways exists, and activates the agorithm Find a covering rooted in i, which finds h vertices j, j 3,, j h such that (i, j k ) covers a the edges of L, where a set of these vertices is denoted as k= L Extr(L). In the agorithm, if L has no vertices with degree two, we take a vertex k of degree three as i, find Extr(L) using the agorithm Find a covering rooted in i. After this, we rerun the agorithm by taking j Extr(L) as new i. At this point, the number of edges added is h. The agorithm then further reduces h edges to [h/] edges by repeatedy repacing consecutive three edges (i, j ), (i, j + ), (i, j + ) with two edges based on the combinatoria observation in the procedure Reduce a covering. In this procedure, we cacuate L(i, j ) and L(j +, j + ). Garcia showed that if L(i, j ) L(j +, j + ), then L(i, j ) L(j +, j + ) = L(i, j ) L(j, j + ) L(j, j + ), and otherwise L(i, j + ) L(j, j + ) = L(i, j ) L(j, j + ) L(j, j + ). For exampe, et us consider a Laman graph L iustrated in Figure 7(a) and the edges (,), (,3), (,). As iustrated in Figure 7(b), (c) and (d), L(,) L(,3) L(,) equas L. The procedure Reduce a covering first cacuates L(,) and L(3,) as iustrated in Figure 7(b) and (e). In this case, as L(,) L(3,) is not an empty set, L(,) L(3,) equas L(,) L(,3) L(,), i.e. the edges (,), (,3), (,) can be repaced by (,) and (3,). The fowchart of the agorithm Find a minima covering is iustrated in Figure 8. 3 (a) Graph L (b) L(,) in bod ine (c) L(,3) (d) L(,) 3 (e) L(3,) 3 (f) L(,) Figure 7: Graph L and some L(i,j)

5 start input: Laman graph L initiaize E = 0 Step: search for a vertex k with degree two or three with degree two is found take i = k with degree two is not found take i = k ( k is a vertex with degree three ) Step: activate Find a covering rooted in i take a new i the first vertex of Extr(L) Step3: activate Find a covering rooted in i add i to Extr(L) Step: Reduce a covering: reduce h edges to [h/] edges Step5: cacuate E output: E end Figure 8: Agorithm Find a minima covering start input: Laman graph L and a vertex i Initiaize Extr(L) = 0. A vertices except for i are unmarked. Expore a the verteces j of L Is j unmarked? yes no cacuate L(i, j) Mark a unmarked vertices in L(i, j). For each vertex j of Extr(L) in L(i, j), deete j from Extr(L). add j to Extr(L) oop output: Extr(L) = { j,, jh} end Figure 9: Agorithm Find a covering rooted in i 5

6 3. Formuation of the probem 3.. Formuation of the origina probem In this subsection, the origina probem and its formuation wi be shown. First, we consider the ground structure ike Figure : the tota number of nodes is n and that of members is m= n C. The objective function to minimize is compiance, i.e., the work of the externa force. We consider four constraints: the equiibrium of force, upper bound of the tota voume, ower bound of the cross section area of each member and -edge-rigid constraint. This probem can be formuated as foows: Minimize P T U, (3.a) subject to K i U = P, (3.b) i I i I L i V U, (3.c) A L i (i I), (3.d) I e L, e I, (3.e) where P and U denote the vectors of externa force and dispacement of nodes,, K i, L i and A L i are respectivey the cross section area, the stiffness matrix, the ength and the ower bound of the cross section area of the member i, V U denotes the upper bound of the tota voume and I is a set of members in a topoogy. I can be referred to as the topoogy. Design variabes are both the topoogy I and the set of cross section areas in the topoogy { A L i (i I) }. In genera, it is difficut to find a -edge-rigid optima truss structure for the probem (3). The -edge-rigid constraint is a combinatoria constraint. For finding the exact optima soution, we may have to enumerate a possibe topoogies based on exact method. Because of its arge cacuation cost, it is difficut to sove arge-scae probems by the method. 3.. Approximation method for -edge-rigid TTD probem As mentioned above, the TTD probem with -edge-rigid constraint is difficut to sove. From a practica point of view, however, we may not need to find an exact optima soution of this probem. Thus, we find a -edge-rigid approximatey optima truss structure by using the method based on combinatoria rigidity theory. The proposed method consists of three steps: () as a reaxation probem, we sove the TTD probem without -edge-rigid constraint (step), after that, () we then find a -edge-rigid truss topoogy by adding a minimum number of members to the soution of step (step), and finay, (3) under the truss topoogy of step, we determine the optima cross section areas of the members of the truss structure (step3). The soution of step corresponds to the ower bound of the objective vaue of the goba optima soution, and that of step3 corresponds to the upper bound of the objective vaue. Hence, we can aso estimate the accuracy of the soution from the difference of objective vaues between the two soutions. In the foowing, each step is described in detai Step (ower bound of the origina probem) In this step, we sove probem (3) as a reaxation probem: we wi not consider -edge-rigid constraint and repace ower bound constraints of the cross section areas of the members by non-negative constraints. Therefore the soution of this probem () is the ower bound of the origina probem (3). Minimize P T U, (.a) subject to K i U = P, (.b) i I g i I g L i V U, (.c) 0 (i I g ), (.d) where I g denotes a set of members in a ground structure. Note that the number of eements of I g may be extremey arge depending on the size of the probem. Probem () is a convex programming probem and the goba optima soution can be found by the appropriate way (see Appendix). In genera, it is known that the optima soution of () is a staticay determinate truss structure under singe oading cases [3]. 6

7 3... Step (augmenting the rigidity) The optima truss structure in step is a staticay determinate truss and not redundanty rigid. Then in this step, we make a -edge-rigid truss topoogy by adding minimum number of edges to the topoogy of the optima truss of step. We use the agorithm Find a minima covering iustrated in Subsection 3.3 with a sight modification. Since the origina agorithm does not take the engths of edges into consideration, there is a possibiity that ong edges are added in the origina agorithm. This is undesirabe in terms of the increase of the tota voume by adding new edges. In the agorithm Find a covering rooted in i, the order of exporing a the vertices j of L is not be specified. Therefore, if there are two edges (i, j s ) and (i, j t ) such that L(i, j s )=L(i, j t ) as iustrated in Figure 0(b) and 0(c), depending on the order of exporation, either j s or j t wi be seected as Extr(L). When the vertex j s is expored before j t, j s wi be incuded in Extr(L), and vice versa. Then, we modify this order of exporation: the shorter the ength of an edge (i, j) is, the higher priority is given to the vertex to be expored than other vertices. By this modification, the shorter edge is seected as E, especiay in the case of E =, the shortest edge wi be picked. In the case E, however, it is not sure that the sum of the engths of edges is minimum. Here we just indicate that getting a set of shortest edges E is possibe by appying the agorithm with "tight vertex set" presented by N. Katoh [5]. For more detais, readers can refer to [5]. js js js jt jt jt i i (a) (b) (c) i Figure 0: (a) A Laman graph L. (b) L(i, j s ). (c) L(i, j t ) Step3 (upper bound of the origina probem) In this step, we determine the optima cross section areas of the members of the truss structure under the truss topoogy of step. This probem is formuated as foows: Minimize P T U, (5.a) subject to K i U = P, (5.b) i I i I L i V U, (5.c) A L i = A L (i I ), (5.d) where I denotes the set of members in the truss topoogy of step and a ower bounds of the cross section areas of the members equa A L for brevity. The optima vaue of Probem (5) is the upper bound of the one of Probem (3), because the optima soution of (5) satisfies a of the four constraints: the equiibrium of force, upper bound of the tota voume, ower bound of the cross section area of each member and -edge-rigid constraint.. Numerica Exampe The agorithm described in the previous section has been thoroughy examined in some numerica tests. We wi show the resuts beow... case In this exampe, we consider a cantiever beam iustrated in Figure. The eft side is pin-jointed to the wa and the vertica force of 0 [kn] is oaded at the ower right point. We give 0 0 vertices and 9,900 members that connect a pairs of vertices as the ground structure shown in Figure. The upper bound of the tota voume V U is.0 m 3, and in Step3, the ower bounds of the cross section areas of a members, A L i (i I ) are 5 cm. 7

8 = 00 mm Figure : Design area (case ) Figure : Ground structure (case ) The foowings are the soutions of each step. Figure 3: Soution of Step (case ) Figure : Soution of Step (case ) Figure 5: Soution of Step3 (case ) In Figure, the dotted ine is the member added in Step. By adding this new member, the truss structure becomes -edge-rigid truss, in other words, it is sti rigid even if any one of the members is damaged or ost. The width of ines shown in Figure 5 represents the cross section area of each member. The maximum cross section area is about 8 times as arge as the minimum. The objective vaues of Step and Step3, denoted by f and f 3, are the ower and upper bounds of the objective vaue of the origina probem (3), respectivey. We achieve the resut that f 3 /f equas.008, that is, the upper bound is about just one percent greater than the ower bound. As a resut, it can be said that the optima truss structure of Step3 is an approximate soution cose to the optimum. In the above exampe, the difference between the ower and upper bounds is about one percent. However, the eve of approximation depends on the ower bound vaue of cross section areas, A L in (5.d). Figure 6 shows the reation between f 3 /f and A L. It is obvious that f 3 /f is a monotonicay increasing function of A L. Athough it is natura to determine the vaue of A L by the eve of approximation so that the stress of a members does not exceed an appropriate vaue, it is our future issue to determine the vaue of A L by considering the stress constraints. f3 / f the ower bound of section areas A L [cm ] Figure 6: Reation between and A L 8

9 .. cases and 3 (mutipe oads) We aso consider the TTD probems under mutipe oads, such as the figures iustrated in Figures 7 and 8. The eft side is pin-jointed to the wa and the vertica forces of 0 [kn] are oaded at the points indicated as downward arrows. The ower bounds of the cross section areas of a members, A L i (i I ) are 5 cm, and the upper bound of the tota voume V U is m 3. = 500 mm = 500 mm Figure 7: Ground structure (case ) Figure 8: Ground structure (case 3) The foowings are the soutions of each case. (a) (b) (c) Figure 9: Soutions in case of (a) Step, (b) Step, (c) Step3 (a) (b) (c) Figure 0: Soutions in case 3 of (a) Step, (b) Step, (c) Step3 As iustrated in Figures 9(b) and 0(b), we can achieve the -edge-rigid topoogies in Step by adding two members in case and three members in case 3, respectivey. In each case, the maximum cross section areas of the Step3 are cm and.9 0 cm, and they are about 6 times and 0 times as arge as the minimum cross section areas, respectivey. Regarding the objective vaues, we achieve the resut that f 3 /f equas.005 in case and.0088 in case 3, respectivey. 5. Concusion In this study, we achieve the foowing concusions.. We present a new practica design method based on combinatoria rigidity theory for finding an optima truss structure with redundancy, in which the truss structure is sti rigid even if any one of members is damaged or ost.. By this method, we can achieve upper and ower bound soutions for goba optima soution. In addition, its cacuation cost is O(n ), whie that of the method based on enumeration is O( n ). 3. In the numerica exampe of the ground structure with 00 vertices and 9,900 members, it is shown that the upper bound is about one percent greater than the ower bound, though the eve of reaxation depends on the vaue of the ower bound, A L. 9

10 Appendix Probem (3) is a convex programming probem and its decision variabes are cross section areas (i I g ) and dispacements U. This probem can be reformuated to a inear programming probem as foows [3,6]: Minimize P T U, (6.a) subject to V U T E b i U (i I g ), (6.b) L i where b i denotes the unit orientation vector of the member i and U is the scaed vaue of U as U =( f * / ) U; ( f * is the objective vaue at the optima soution of (6)). Acknowedgment We woud ike to acknowedge the support of The Kyoto University Foundation. References [] Y.Kanno and Y.Ben-Haim, Redundancy and Robustness, or When Is Redundancy Redundant?, Journa of Structura Engineering, 37, , 0. [] M.Ohsaki, N.Katoh, T.Kinoshita, S.Tanigawa, D.Avis and I.Streinu, Enumeration of optima pin-jointed bistabe compiant mechanisms with non-crossing members, Structura and Mutidiscipinary Optimization, 37, 65-65, 009 [3] M.Ohsaki, Optimization of Finite Dimensiona Structures, CRC Press, 00. [] A.Garcia and J.Teje, Augmenting the Rigidity of a Graph in R, Agorithmica, 59, 5-68, 0. [5] Y.Yoshinaka, N.Katoh and N.Kamiyama, Generating Redundanty Rigid Frameworks in -dimension, Asian Association for Agorithms and Computation, 0 [6] Aharon Ben-Ta, Arkadi Nemirovski, Lectures on Modern Convex Optimization, Society for Industria and Appied Mathematics, 987 [7] C.Yu and B.D.O.Anderson, Agent and Link Redundancy for Autonomous Formations, 7th IFAC Word Congress, , 008 0

Discrete elastica model for shape design of grid shells

Discrete elastica model for shape design of grid shells Abstracts for IASS Annua Symposium 017 5 8th September, 017, Hamburg, Germany Annette Böge, Manfred Grohmann (eds.) Discrete eastica mode for shape design of grid shes Yusuke SAKAI* and Makoto OHSAKI a

More information

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) botton@poms.uc.ac.be Bernard

More information

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

Alpha labelings of straight simple polyominal caterpillars

Alpha labelings of straight simple polyominal caterpillars Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

A Petrel Plugin for Surface Modeling

A Petrel Plugin for Surface Modeling A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica

More information

Chapter Multidimensional Direct Search Method

Chapter Multidimensional Direct Search Method Chapter 09.03 Mutidimensiona Direct Search Method After reading this chapter, you shoud be abe to:. Understand the fundamentas of the mutidimensiona direct search methods. Understand how the coordinate

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

Space-Time Trade-offs.

Space-Time Trade-offs. Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe

More information

Substitute Model of Deep-groove Ball Bearings in Numeric Analysis of Complex Constructions Like Manipulators

Substitute Model of Deep-groove Ball Bearings in Numeric Analysis of Complex Constructions Like Manipulators Mechanics and Mechanica Engineering Vo. 12, No. 4 (2008) 349 356 c Technica University of Lodz Substitute Mode of Deep-groove Ba Bearings in Numeric Anaysis of Compex Constructions Like Manipuators Leszek

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction

More information

An Exponential Time 2-Approximation Algorithm for Bandwidth

An Exponential Time 2-Approximation Algorithm for Bandwidth An Exponentia Time 2-Approximation Agorithm for Bandwidth Martin Fürer 1, Serge Gaspers 2, Shiva Prasad Kasiviswanathan 3 1 Computer Science and Engineering, Pennsyvania State University, furer@cse.psu.edu

More information

Optimized Base-Station Cache Allocation for Cloud Radio Access Network with Multicast Backhaul

Optimized Base-Station Cache Allocation for Cloud Radio Access Network with Multicast Backhaul Optimized Base-Station Cache Aocation for Coud Radio Access Network with Muticast Backhau Binbin Dai, Student Member, IEEE, Ya-Feng Liu, Member, IEEE, and Wei Yu, Feow, IEEE arxiv:804.0730v [cs.it] 28

More information

Response Surface Model Updating for Nonlinear Structures

Response Surface Model Updating for Nonlinear Structures Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,

More information

Genetic Algorithms for Parallel Code Optimization

Genetic Algorithms for Parallel Code Optimization Genetic Agorithms for Parae Code Optimization Ender Özcan Dept. of Computer Engineering Yeditepe University Kayışdağı, İstanbu, Turkey Emai: eozcan@cse.yeditepe.edu.tr Abstract- Determining the optimum

More information

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line American J. of Engineering and Appied Sciences 3 (): 5-24, 200 ISSN 94-7020 200 Science Pubications Appication of Inteigence Based Genetic Agorithm for Job Sequencing Probem on Parae Mixed-Mode Assemby

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

Topology Synthesis of Compliant Mechanisms for Nonlinear Force-Deflection and Curved Path Specifications

Topology Synthesis of Compliant Mechanisms for Nonlinear Force-Deflection and Curved Path Specifications A. Saxena G. K. Ananthasuresh Department of Mechanica Engineering and Appied Mechanics, University of Pennsyvania, Phiadephia, PA 19104-6315 Topoogy Synthesis of Compiant Mechanisms for Noninear Force-Defection

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

Further Concepts in Geometry

Further Concepts in Geometry ppendix F Further oncepts in Geometry F. Exporing ongruence and Simiarity Identifying ongruent Figures Identifying Simiar Figures Reading and Using Definitions ongruent Trianges assifying Trianges Identifying

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program? Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of

More information

Timing-Driven Hierarchical Global Routing with Wire-Sizing and Buffer-Insertion for VLSI with Multi-Routing-Layer

Timing-Driven Hierarchical Global Routing with Wire-Sizing and Buffer-Insertion for VLSI with Multi-Routing-Layer Timing-Driven Hierarchica Goba Routing with Wire-Sizing and Buffer-Insertion for VLSI with Muti-Routing-Layer Takahiro DEGUCHI y Tetsushi KOIDE z Shin ichi WAKABAYASHI y yfacuty of Engineering, Hiroshima

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study

More information

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations Formuation of Loss minimization Probem Using Genetic Agorithm and Line-Fow-based Equations Sharanya Jaganathan, Student Member, IEEE, Arun Sekar, Senior Member, IEEE, and Wenzhong Gao, Senior member, IEEE

More information

Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering

Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering Kin-Hon Ho, Michae Howarth, Ning Wang, George Pavou and Styianos Georgouas Centre for Communication Systems Research, University

More information

M. Badent 1, E. Di Giacomo 2, G. Liotta 2

M. Badent 1, E. Di Giacomo 2, G. Liotta 2 DIEI Dipartimento di Ingegneria Eettronica e de informazione RT 005-06 Drawing Coored Graphs on Coored Points M. Badent 1, E. Di Giacomo 2, G. Liotta 2 1 University of Konstanz 2 Università di Perugia

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs Repication of Virtua Network Functions: Optimizing Link Utiization and Resource Costs Francisco Carpio, Wogang Bziuk and Admea Jukan Technische Universität Braunschweig, Germany Emai:{f.carpio, w.bziuk,

More information

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components Illustrated

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components Illustrated Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Fa 2017 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program instructions

More information

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162 oward Efficient Spatia Variation Decomposition via Sparse Regression Wangyang Zhang, Karthik Baakrishnan, Xin Li, Duane Boning and Rob Rutenbar 3 Carnegie Meon University, Pittsburgh, PA 53, wangyan@ece.cmu.edu,

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints *

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG

More information

Research on the overall optimization method of well pattern in water drive reservoirs

Research on the overall optimization method of well pattern in water drive reservoirs J Petro Expor Prod Techno (27) 7:465 47 DOI.7/s322-6-265-3 ORIGINAL PAPER - EXPLORATION ENGINEERING Research on the overa optimization method of we pattern in water drive reservoirs Zhibin Zhou Jiexiang

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

Fastest-Path Computation

Fastest-Path Computation Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods

More information

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y. FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four

More information

A Local Optimal Method on DSA Guiding Template Assignment with Redundant/Dummy Via Insertion

A Local Optimal Method on DSA Guiding Template Assignment with Redundant/Dummy Via Insertion A Loca Optima Method on DSA Guiding Tempate Assignment with Redundant/Dummy Via Insertion Xingquan Li 1, Bei Yu 2, Jiani Chen 1, Wenxing Zhu 1, 24th Asia and South Pacific Design T h e p i c Automation

More information

Image Segmentation Using Semi-Supervised k-means

Image Segmentation Using Semi-Supervised k-means I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging

More information

Design of IP Networks with End-to. to- End Performance Guarantees

Design of IP Networks with End-to. to- End Performance Guarantees Design of IP Networks with End-to to- End Performance Guarantees Irena Atov and Richard J. Harris* ( Swinburne University of Technoogy & *Massey University) Presentation Outine Introduction Mutiservice

More information

1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation

1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation 1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER 2014 Bacward Fuzzy Rue Interpoation Shangzhu Jin, Ren Diao, Chai Que, Senior Member, IEEE, and Qiang Shen Abstract Fuzzy rue interpoation

More information

Lines and Angles. introduction

Lines and Angles. introduction 9 Lines and nges intrductin In cass VI, you have earnt soe basic concepts and ters of geoetry point, ine, pane, ine segent, ray, ange and types of anges. In this chapter, we sha earn about soe pairs of

More information

CHAPTER 13 FINITE ELEMENTS: STIFFNESS MATRICES

CHAPTER 13 FINITE ELEMENTS: STIFFNESS MATRICES 4 5 CHAPTER FINITE ELEMENTS: STIFFNESS MATRICES. Introduction The purpose of this chapter is to use two simpe exampes to expain the asics of how finite eement stiffness matrices are formuated and how static

More information

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing 100039, China shentao@casm.ac.cn Xu Dehe Institute of resources and environment, North

More information

FIRST BEZIER POINT (SS) R LE LE. φ LE FIRST BEZIER POINT (PS)

FIRST BEZIER POINT (SS) R LE LE. φ LE FIRST BEZIER POINT (PS) Singe- and Muti-Objective Airfoi Design Using Genetic Agorithms and Articia Inteigence A.P. Giotis K.C. Giannakogou y Nationa Technica University of Athens, Greece Abstract Transonic airfoi design probems

More information

Modeling the Time Varying Behavior of Mobile Ad-Hoc Networks

Modeling the Time Varying Behavior of Mobile Ad-Hoc Networks Modeing the Time Varying Behavior of Mobie Ad-Hoc Networks David Tipper University of Pittsburgh 5 N. Beefied Avenue Pittsburgh, PA UA 560 (4) 64-94 tipper@tee.pitt.edu Yi Qian University of Puerto Rico

More information

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network Service Chain (SC) Mapping with Mutipe SC Instances in a Wide Area Network This is a preprint eectronic version of the artice submitted to IEEE GobeCom 2017 Abhishek Gupta, Brigitte Jaumard, Massimo Tornatore,

More information

DISTANCE TRANSFORMATION FOR NETWORK DESIGN PROBLEMS

DISTANCE TRANSFORMATION FOR NETWORK DESIGN PROBLEMS DISTANCE TRANSFORMATION FOR NETWORK DESIGN PROBLEMS A Ridha Mahjoub, Michae Poss, Luidi Simonetti, Eduardo Uchoa To cite this version: A Ridha Mahjoub, Michae Poss, Luidi Simonetti, Eduardo Uchoa. DISTANCE

More information

Navigating and searching theweb

Navigating and searching theweb Navigating and searching theweb Contents Introduction 3 1 The Word Wide Web 3 2 Navigating the web 4 3 Hyperinks 5 4 Searching the web 7 5 Improving your searches 8 6 Activities 9 6.1 Navigating the web

More information

On-Chip CNN Accelerator for Image Super-Resolution

On-Chip CNN Accelerator for Image Super-Resolution On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement

More information

Interference Spins Popovski, Petar; Simeone, Osvaldo; Nielsen, Jimmy Jessen; Stefanovic, Cedomir

Interference Spins Popovski, Petar; Simeone, Osvaldo; Nielsen, Jimmy Jessen; Stefanovic, Cedomir Aaborg Universitet Interference Spins Popovski, Petar; Simeone, Osvado; Niesen, Jimmy Jessen; Stefanovic, Cedomir Pubished in: I E E E Communications Letters DOI (ink to pubication from Pubisher): 10.1109/LCOMM.2014.2387166

More information

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University Arithmetic Coding Prof. Ja-Ling Wu Department of Computer Science and Information Engineering Nationa Taiwan University F(X) Shannon-Fano-Eias Coding W..o.g. we can take X={,,,m}. Assume p()>0 for a. The

More information

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Y.LI AND B.BHANU CAMERA ASSIGNMENT: A GAME-THEORETIC

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

Solutions to the Final Exam

Solutions to the Final Exam CS/Math 24: Intro to Discrete Math 5//2 Instructor: Dieter van Mekebeek Soutions to the Fina Exam Probem Let D be the set of a peope. From the definition of R we see that (x, y) R if and ony if x is a

More information

Reference trajectory tracking for a multi-dof robot arm

Reference trajectory tracking for a multi-dof robot arm Archives of Contro Sciences Voume 5LXI, 5 No. 4, pages 53 57 Reference trajectory tracking for a muti-dof robot arm RÓBERT KRASŇANSKÝ, PETER VALACH, DÁVID SOÓS, JAVAD ZARBAKHSH This paper presents the

More information

Split Restoration with Wavelength Conversion in WDM Networks*

Split Restoration with Wavelength Conversion in WDM Networks* Spit Reoration with aveength Conversion in DM Networks* Yuanqiu Luo and Nirwan Ansari Advanced Networking Laborator Department of Eectrica and Computer Engineering New Jerse Initute of Technoog Universit

More information

Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters

Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters Crossing Minimiation Probems o Drawing Bipartite Graphs in Two Custers Lanbo Zheng, Le Song, and Peter Eades Nationa ICT Austraia, and Schoo o Inormation Technoogies, University o Sydney,Austraia Emai:

More information

Quality of Service Evaluations of Multicast Streaming Protocols *

Quality of Service Evaluations of Multicast Streaming Protocols * Quaity of Service Evauations of Muticast Streaming Protocos Haonan Tan Derek L. Eager Mary. Vernon Hongfei Guo omputer Sciences Department University of Wisconsin-Madison, USA {haonan, vernon, guo}@cs.wisc.edu

More information

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models On Upper Bounds for Assortment Optimization under the Mixture of Mutinomia Logit Modes Sumit Kunnumka September 30, 2014 Abstract The assortment optimization probem under the mixture of mutinomia ogit

More information

Alternative Decompositions for Distributed Maximization of Network Utility: Framework and Applications

Alternative Decompositions for Distributed Maximization of Network Utility: Framework and Applications Aternative Decompositions for Distributed Maximization of Network Utiity: Framework and Appications Danie P. Paomar and Mung Chiang Eectrica Engineering Department, Princeton University, NJ 08544, USA

More information

Binarized support vector machines

Binarized support vector machines Universidad Caros III de Madrid Repositorio instituciona e-archivo Departamento de Estadística http://e-archivo.uc3m.es DES - Working Papers. Statistics and Econometrics. WS 2007-11 Binarized support vector

More information

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Register Aocation Consider the foowing assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Assume that two registers are avaiabe. Starting from the eft a compier woud generate

More information

Efficient Convex Optimization for Minimal Partition Problems with Volume Constraints

Efficient Convex Optimization for Minimal Partition Problems with Volume Constraints Efficient Convex Optimization for Minima Partition Probems with Voume Constraints Thomas Möenhoff, Caudia Nieuwenhuis, Eno Töppe, and Danie Cremers Department of Computer Science, Technica University of

More information

Delay Budget Partitioning to Maximize Network Resource Usage Efficiency

Delay Budget Partitioning to Maximize Network Resource Usage Efficiency Deay Budget Partitioning to Maximize Network Resource Usage Efficiency Kartik Gopaan Tzi-cker Chiueh Yow-Jian Lin Forida State University Stony Brook University Tecordia Technoogies kartik@cs.fsu.edu chiueh@cs.sunysb.edu

More information

17.3 Surface Area of Pyramids and Cones

17.3 Surface Area of Pyramids and Cones Name Cass Date 17.3 Surface Area of Pyramids and Cones Essentia Question: How is the formua for the atera area of a reguar pyramid simiar to the formua for the atera area of a right cone? Expore G.11.C

More information

arxiv: v1 [math.qa] 31 Aug 2018

arxiv: v1 [math.qa] 31 Aug 2018 arxiv:808.0575v [math.qa] 3 Aug 208 A new approach to the SL n spider Stephen Bigeow September 3, 208 Abstract The SL n spider gives adiagrammatic way toencode therepresentation category of the quantum

More information

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-7435 Voume 10 Issue 16 BioTechnoogy 014 An Indian Journa FULL PAPER BTAIJ, 10(16), 014 [999-9307] Study on prediction of type- fuzzy ogic power system based

More information

Priority Queueing for Packets with Two Characteristics

Priority Queueing for Packets with Two Characteristics 1 Priority Queueing for Packets with Two Characteristics Pave Chuprikov, Sergey I. Nikoenko, Aex Davydow, Kiri Kogan Abstract Modern network eements are increasingy required to dea with heterogeneous traffic.

More information

Approximate Closest Community Search in Networks

Approximate Closest Community Search in Networks Approximate Cosest Community Search in Networks Xin Huang, Laks V.S. Lakshmanan, Jeffrey Xu Yu, Hong Cheng University of British Coumbia, The Chinese University of Hong Kong {xin,aks}@cs.ubc.ca, {yu, hcheng}@se.cuhk.edu.hk

More information

Multiple Plane Phase Retrieval Based On Inverse Regularized Imaging and Discrete Diffraction Transform

Multiple Plane Phase Retrieval Based On Inverse Regularized Imaging and Discrete Diffraction Transform Mutipe Pane Phase Retrieva Based On Inverse Reguaried Imaging and Discrete Diffraction Transform Artem Migukin, Vadimir Katkovnik, and Jaakko Astoa Department of Signa Processing, Tampere University of

More information

Sample of a training manual for a software tool

Sample of a training manual for a software tool Sampe of a training manua for a software too We use FogBugz for tracking bugs discovered in RAPPID. I wrote this manua as a training too for instructing the programmers and engineers in the use of FogBugz.

More information

and its spectrum 1. Notation and preliminaries ~~~(AI-A(G)) of A(G) by G{\), and refer to

and its spectrum 1. Notation and preliminaries ~~~(AI-A(G)) of A(G) by G{\), and refer to BULL. AUSTRAL. MATH. SOC. VOL. 18 (1978), 21-28. A new graph product and its spectrum C.D. Godsi and B.D. McKay A new graph product is introduced, and the characteristic poynomia of a graph so-formed is

More information

Revisions for VISRAD

Revisions for VISRAD Revisions for VISRAD 16.0.0 Support has been added for the SLAC MEC target chamber: 4 beams have been added to the Laser System: X-ray beam (fixed in Port P 90-180), 2 movabe Nd:Gass (ong-puse) beams,

More information

Systematic Design Method and Experimental Validation of a 2-DOF Compliant Parallel Mechanism with Excellent Input and Output Decoupling Performances

Systematic Design Method and Experimental Validation of a 2-DOF Compliant Parallel Mechanism with Excellent Input and Output Decoupling Performances appied sciences Artice Systematic Design Method Experimenta Vaidation a -DOF Compiant Parae Mechanism with Exceent Input Output Decouping Performances Yao Jiang 1,, Tiemin Li,3, *, Liping Wang,3 Feifan

More information

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Nattawut Thepayasuwan, Member, IEEE and Aex Doboi, Member, IEEE Abstract

More information

Application of the pseudoinverse computation in reconstruction of blurred images

Application of the pseudoinverse computation in reconstruction of blurred images Fiomat 26:3 (22), 453 465 DOI 2298/FIL23453M Pubished by Facuty of Sciences and Mathematics, University of Niš, Serbia Avaiabe at: http://wwwpmfniacrs/fiomat Appication of the pseudoinverse computation

More information

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal Abstract Authorization of a QoS Path based on Generic Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taa Advanced Internet Research Group, Department of Computer Science, University of Amsterdam.

More information

On Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture

On Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture On inding the est Partia Muticast Protection Tree under ua-homing rchitecture Mei Yang, Jianping Wang, Xiangtong Qi, Yingtao Jiang epartment of ectrica and omputer ngineering, University of Nevada Las

More information

Versatile Size-l Object Summaries for Relational Keyword Search

Versatile Size-l Object Summaries for Relational Keyword Search IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. X, NO. Y, XXXX, YYYY Versatie Size- Object Summaries for Reationa Keyword Search Georgios J. Fakas, Zhi Cai and Nikos Mamouis Abstract The Object

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

A Scalable Approach for Service Chain (SC) Mapping with Multiple SC Instances in a Wide-Area Network

A Scalable Approach for Service Chain (SC) Mapping with Multiple SC Instances in a Wide-Area Network JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 A Scaabe Approach for Service Chain (SC) Mapping with Mutipe SC Instances in a Wide-Area Network This is a preprint eectronic version of the

More information

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing Rea-Time Image Generation with Simutaneous Video Memory Read/rite Access and Fast Physica Addressing Mountassar Maamoun 1, Bouaem Laichi 2, Abdehaim Benbekacem 3, Daoud Berkani 4 1 Department of Eectronic,

More information

MACHINE learning techniques can, automatically,

MACHINE learning techniques can, automatically, Proceedings of Internationa Joint Conference on Neura Networks, Daas, Texas, USA, August 4-9, 203 High Leve Data Cassification Based on Network Entropy Fiipe Aves Neto and Liang Zhao Abstract Traditiona

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

MCSE Training Guide: Windows Architecture and Memory

MCSE Training Guide: Windows Architecture and Memory MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

Multiscale Representation of Surfaces by Tight Wavelet Frames with Applications to Denoising

Multiscale Representation of Surfaces by Tight Wavelet Frames with Applications to Denoising Mutiscae Representation of Surfaces by Tight Waveet Frames with Appications to Denoising Bin Dong a, Qingtang Jiang b, Chaoqiang Liu c, and Zuowei Shen c a Department of Mathematics, University of Arizona,

More information

Massively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks.

Massively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks. assivey Parae Part of Speech Tagging Using in-ax oduar Neura Networks Bao-Liang Lu y, Qing a z, ichinori Ichikawa y, & Hitoshi Isahara z y Lab. for Brain-Operative Device, Brain Science Institute, RIEN

More information

Semi-Supervised Learning with Sparse Distributed Representations

Semi-Supervised Learning with Sparse Distributed Representations Semi-Supervised Learning with Sparse Distributed Representations David Zieger dzieger@stanford.edu CS 229 Fina Project 1 Introduction For many machine earning appications, abeed data may be very difficut

More information

Tutorial 3 Concepts for A1

Tutorial 3 Concepts for A1 CPSC 231 Introduction to Computer Science for Computer Science Majors I Tutoria 3 Concepts for A1 DANNY FISHER dgfisher@ucagary.ca September 23, 2014 Agenda script command more detais Submitting using

More information

The Big Picture WELCOME TO ESIGNAL

The Big Picture WELCOME TO ESIGNAL 2 The Big Picture HERE S SOME GOOD NEWS. You don t have to be a rocket scientist to harness the power of esigna. That s exciting because we re certain that most of you view your PC and esigna as toos for

More information

Path-Based Protection for Surviving Double-Link Failures in Mesh-Restorable Optical Networks

Path-Based Protection for Surviving Double-Link Failures in Mesh-Restorable Optical Networks Path-Based Protection for Surviving Doube-Link Faiures in Mesh-Restorabe Optica Networks Wensheng He and Arun K. Somani Dependabe Computing and Networking Laboratory Department of Eectrica and Computer

More information