Determining the minimal cut sets and Fussell-Vesely importance measures in binary network systems by simulation

Size: px
Start display at page:

Download "Determining the minimal cut sets and Fussell-Vesely importance measures in binary network systems by simulation"

Transcription

1 Safety and Reliability for Managing Risk Guedes Soares & Zio (eds) 2006 Taylor & Francis Group, London, ISBN Determining the minimal cut sets and Fussell-Vesely importance measures in binary network systems by simulation E. Zio, M. Librizzi & G. Sansavini Department of Nuclear Engineering, Polytechnic of Milan, Milan, Italy ABSTRACT: In the present work, Cellular Automata are combined with Monte Carlo sampling to solve two critical problems related to the unreliability assessment of complex networks composed of nodes interconnected by binary arcs: the identification of the minimal cut sets of the network and the computation of the Fussell- Vesely importance measures assessing the criticality of each arc with respect to the network unreliability. The effectiveness of the method is tested on two literature case studies. 1 INTRODUCTION The modern technological society is increasingly based on critical distributed systems and infrastructures made up of many elements physically and logically interconnected in a very complex way. Typical examples of such distributed technological systems are those employed in transportation, telecommunication, gas and oil distribution, water supply, electric power and heat transfer. These systems perform essential services for the everyday s life of the world population, so that it becomes of primary importance to accurately identify the associated criticalities and vulnerabilities in order to be able to design the adequate protections against their failure. These needs are increasingly perceived in a World where deregulation of the services is favored and a worrying increase in terrorism and sabotage threat is righteously manifested. The former point, i.e. the deregulation of the service market, aims at a more effective usage of the network systems through the introduction of a competitive framework, with the result of operating at limit conditions and thus increasing the associated risk. This situation calls for greater dependability of the systems and a higher adaptability to cope with the dynamism of the demands. The latter point, regarding sabotage actions, implies widening the scope of risk assessment in order to take into due account such scenarios in a systematic way. In spite of the potentially more critical vulnerabilities of network systems, due to the intrinsic distributed character, the methods for analyzing the safety, reliability and availability of network systems have received far less attention than the ones for process, production and storage systems. The main reasons are that the latter ones generally involve greater capital expenditure and the associated accidental events might have more severe consequences, causing a localized damage to the neighboring community, the environment and the plant. On the other hand, distributed systems are relatively cheaper and they can suffer failures and accidents with lower associated consequences, generally shared among users distributed both geographically and socially. In the present work, a methodology, based on a combination of Cellular Automata (CA) and Monte Carlo sampling (MC), is proposed to identify the minimal cut sets (mcs) of a binary network, i.e. a network where arcs can only be in fully working or fully failed states, while computing its two-terminal unreliability. A ranking of arcs according to their criticality in contributing to network unreliability is also performed by comparing their Fussell-Vesely importance measure values (Fussell 1975). The determination of the minimal cut sets and network unreliability is fundamental for the identification of system criticality and vulnerability. In principle, the mcs identification may be accomplished by depth-first procedures (Billington & Allan 1992, Reingold et al. 1982, Fishman 1986). Yet, these approaches lead to NP-hard problems, requiring cumbersome and mathematically intensive methods of solution. Furthermore, in many real cases it happens that the modification of an existing network is required for expansion or reinforcement planning or occurs inadvertently due to link failures. In such cases, the standard algorithms entail recomputing the network connection and reliability from scratch. Cellular Automata have been recently proposed to directly verify network connectedness (Rocco & 723

2 Moreno 2002). They form a general class of mathematical models, which are appealingly simple and yet capture a rich complexity of behavior of dynamical systems (Wolfram 1985a). As such, CA have been used to study and model the dynamics of many real complex systems, including fluids, neural networks, molecular systems, ecological systems, economical systems, and network systems. CA offer a significant computational potential due to their spatially and temporally discrete nature, characterized by local interaction and an inherently parallel form of evolution. In the context of network reliability analysis, CA operate in a way to basically mimic traditional graph methods, such as Depth First or Breadth-First Search (Billington & Allan 1992, Reingold et al. 1982, Fishman 1986). Combined with MC sampling and simulation they have been shown capable of (Rocco & Moreno 2002, Rocco & Zio 2005, Zio et al. 2006, Lin & Donaghey 1993): (i) verifying the existence of the connection between source and terminal targets in a network of nodes; (ii) solving the problem of (i) after a connectivity change, without the need of recomputing the whole network from scratch; and (iii) evaluating the network reliability and availability. In the present work, the combination of Cellular Automata and Monte Carlo sampling is further exploited to identify the network mcs with respect to two-terminal reliability and to rank the network arcs according to their Fussell-Vesely importance. Several system configurations are sampled with Monte Carlo and for each one, the CA verifies the connection between source and target node. A further advantage of the approach is that it can efficiently be used in a changing environment where the connectivity of the links is modified. This computing efficiency is of utmost importance in Monte Carlo reliability evaluations, where a large number of connectivity evaluations are typically needed.yet, the full computational potential offered by the proposed approach will be exploited if the analysis is carried out on parallel machines. The proposed approach is tested on two cases of literature (Ramirez-Marquez & Coit 2005) of increasing complexity. The paper is organized as follows: in Section 2 some basic concepts on Cellular Automata are presented. Section 3 summarizes their application in the procedure for testing the existence of source-target connectedness. In Section 4, CA and Monte Carlo are combined for a direct assessment of the unreliability of a network system. Section 5 describes the novel procedure for identify the minimal cut sets of a network system and computing the Fussell-Vesely importance measure of its constituents. The results obtained on two literature case studies are also presented (Ramirez-Marquez & Coit 2005). Finally, in Section 0 some conclusions are drawn. 2 BASICS OF CELLULAR AUTOMATA COMPUTING CA are a class of spatially and temporally discrete mathematical systems characterized by local interaction and an inherently parallel form of evolution which unfolds on a discrete lattice of cells L. Each cell is a finite automaton which can assume one of a finite number of discrete values in a local value space S {0, 1, 2,..., k 1}. With reference to a threedimensional lattice, the state at the discrete time t of the cell ijl, of coordinates x i, y j, z l, with i, j, l Z, is described by the state variable s ijl (t). In the basic version, all cells are assumed to bear the same properties (homogeneous CA). The generic cell ijl interacts only with a fixed number n of cells that belong to its predefined local neighborhood N ijl.at the next discrete time t + 1, the cell ijl updates its state s ijl (t + 1) according to a transition rule φ : S n S which is a function of the state variables at time t of the n cells in N ijl, viz. In principle, there is no restriction on the size of the neighborhood, except that it is the same for all cells. However, often in practice it is made only of adjacent cells because if it is too large, the complexity of the rule may be unacceptable (complexity usually grows exponentially fast with the number of cells in the neighborhood). Notice that the functional form of the rule is assumed to be the same everywhere in the lattice, i.e. there is no space index attached to φ: differences between what is happening at different locations are due only to differences in the values of the state variables of the local neighborhood, not to the update rule. The rule is also homogeneous in time. One iteration step of the dynamical evolution of the CA is achieved after the simultaneous application of the rule φ to each cell in the lattice L. Since the number of cells in a lattice has to be finite for practical purposes, one must assign the boundary conditions for the definition of the neighborhoods of the cells at the lattice borders. Clearly, a cell belonging to the lattice boundary does not have the same neighborhood as the internal cells. In order to define the behavior of these cells, a different evolution rule can be considered which defines the appropriate neighborhood. In this case, the information of the cell being, or not, at the boundary must be coded in the cell itself and depending on this information a different rule is selected. This approach allows to define several types of boundaries with different behaviors. An alternative to having different rules at the boundaries of the system is to extend the neighborhood of the cells at the boundary. For instance, a commonly used type of boundary conditions, termed periodic, consists 724

3 in gluing together the corresponding cells on opposite borders. For example, in a one-dimensional lattice of M cells, the M + 1-th state variable s M+1 is identified with s 1 so that the lattice space wraps around itself into a circle. Other types of boundary conditions can be obtained by extending the lattice beyond its boundaries, adding a set of virtual cells. Cellular Automata offer a promising modern horizon for physical computations. For further details on the theory and applications behind this approach, the interested reader is invited to consult the specialized literature, e.g. (Wolfram 1985a, b, Ilachinski 2001, Wolfram 1986). 3 VERIFYING THE EXISTENCE OF SOURCE-TARGET CONNECTEDNESS BY CELLULAR AUTOMATA Consider a network of n n interconnected binary nodes whose function is to deliver a given throughput from a source S to a target node T. Ascertaining the connectivity of the network from source to target would require knowledge of the system cut or path sets or a depth-first procedure (Billington & Allan 1992, Reingold et al. 1982, Fishman 1986). Those approaches may be cumbersome and mathematically intensive. Let us map each node i into a spatial cell whose neighborhood N i is the set of cells (i.e., network nodes) which provide their input to it. The state variable s i of cell i is binary, assuming the value of 1 when node i is operating (active) and of 0 when not operating (passive). The transition rule governing the evolution of cell i consists of the application of the logic operator OR ( ) to the states of the nodes in its neighborhood where t is the iteration step. According to this rule, a cell is activated if there is at least one active cell in its neighborhood, i.e. if it receives input from at least one of its connected nodes. At the beginning of the evolution, the source S is the only active cell. The successive application of the transition rule to each node of the network generates the paths of transmission through the network. The computation ends either when the target node is activated or the process stagnates. Since the longest possible path from the active source S to T activates all the remaining n n 1 nodes, the S T connection can be computed in O(n n ) iterations, i.e. the computation ends after n n 1 steps or the process stagnates. The basic algorithm proceeds as follows (Rocco & Moreno 2002): 1. t = 0 2. Set all the cells state values to 0 (passive) 3. Set s s (0) = 1 (source activated) 4. t = t Update all cells states by means of rule (2) 6. If s T (t) = 1, stop (target activated), else 7. If t < m 1, go to 4. Else 8. s T (m 1) = 0 (target passive): there is no connection path from S to T 4 DIRECT RELIABILITY ASSESSMENT OF A NETWORK SYSTEM BY A COMBINATION OF CA AND MC Let G = (n n, n a ) represent a stochastic binary network connecting a source node S to a sink node T, with n n being the number of nodes and n a the number of arcs. For simplicity, but with no loss of generality, the former are considered infallible, i.e. always in their design state, whereas the generic arc ji connecting node j to i can be in one of two states, success or failure. The arc ji state variable, w ji, defines the operational state of the arc: w ji = 1 for success and w ji = 0 for failure. The corresponding occupancy probabilities are is p ji and q ji = 1 p ji. The transition rule governing the evolution of the generic cell i consists of the application of the logic operator OR ( ) on the results of the logic operator AND ( ) applied to the states of the nodes in its neighbourhood and to the states of their connecting arcs with i: The network reliability p ST, i.e. the probability of a successful connection from S to T, can then be computed by i) Monte Carlo (MC) sampling a large number N of random realizations (MC trials) of the states of the connecting arcs; ii) by CA computing, for each realization, if a path from S to T exists: the ratio of the numbers of successful S T paths over the total number of realizations computed gives the network reliability. The basic algorithm proceeds as follows: 1. n = 0 2. n = n + 1(n-th MC trial) 3. Sample by MC a realization of the states of the connecting arcs w 4. Apply the previously illustrated CA algorithm for S T connectedness, to evaluate if there is a path from S to T 5. If a path exists, then update the counter of successful system states 6. If MC iteration n < N, go to 2. Else 7. Network reliability: p ST = (number of S T successful paths)/n 725

4 5 IDENTIFYING THE MCS OF A NETWORK SYSTEM BY CA AND MC The approach here proposed to identify the minimal cut sets combines the flexibility offered by Monte Carlo sampling for generating various system realizations with the efficiency of Cellular Automata for verifying the source-target connectedness in correspondence of the different system configurations. Analogously to what is done in the procedure for estimating the network reliability (Section 4), at each trial the states of the network arcs are sampled by the Monte Carlo algorithm from the cumulative distribution functions constructed from the known discrete occupancy probability distributions p ji, q ji. In correspondence to each sampled system configuration, the Source-Target connectedness is verified by running the CA. If a failed configuration occurs, the following procedure is performed to identify the minimal cut sets and compute their frequencies: i) the sampled, failed configuration is compared to the minimal cut sets of lower order (the order of a cut set is the number of elements which compose it) already stored in a properly devised archive: if one of these minimal cut sets is also verified, i.e. it is included in the sampled one, the counter associated to this cut set is incremented by one; otherwise, ii) the sampled configuration is compared to the cut sets of same order in the archive to check if it is already present, in which case the associated counter is incremented by one; otherwise, iii) the sampled cut set is recorded in the archive and it is compared with higher order cut sets in the archive to verify if it is included in any of them (i.e., if they are also verified), in which case they are deleted and their associated counters are assigned to the counter of the newly found. Of course, in principle the algorithm may not be exhaustive, depending on the finite size of the sample of network configurations. Indeed, the number of trials necessary for the procedure to find the entire ensemble of minimal cut sets depends on the complexity of the network. Yet, even a relatively low number of trials would allow identifying the most probable minimal cut sets and, thus, the most critical vulnerabilities of the network system. At the end of the procedure, the criticality of each minimal cut set can be computed as the frequency of its occurrence, i.e. by dividing its corresponding counter by the number of Monte Carlo trials performed. Further, the criticality of each arc i, in terms of the Fussell-Vesely importance measure with respect to network unreliability (Fussell 1975), can be computed as the ratio between the number of occurred cut sets containing i and the number of Monte Carlo trials performed. This information can be of great practical aid to network designers and managers for tracing system bottlenecks and providing guidelines for effective actions of system improvement. 5.1 A case study of literature: the ARPA network (Ramirez-Marquez & Coit 2005) The proposed computational procedure has been applied to a literature case study regarding a simple network named ARPA (Ramirez-Marquez & Coit 2005). All calculations have been performed by the Fortran code NUMA (Network Unreliability Monte Carlo Analysis), developed at the Laboratorio di Analisi di Segnale ed Analisi di Rischio (LASAR, of the Department of Nuclear Engineering of the Politecnico di Milano. The network is depicted in Figure 1 where the arcs have been labeled sequentially for ease of reference and notation. The state occupancy probabilities are assumed equal for all arcs: p ji = 0.75 for the functioning state and q ji = 0.25 for the failed state. Table 1 reports the minimal cut sets identified by computation and subsequently verified by manual enumeration. Since the failure probabilities are equal for all arcs, the frequencies of occurrence of minimal cut sets of same order are equal, within the Monte Carlo estimation error. Figure 1. ARPA network (Ramirez-Marquez & Coit 2005). Table 1. ARPA network Minimal Cut Sets. arc states mcs order frequency

5 Obviously the most critical minimal cut sets are those of lowest order, with only two arcs failed, which are the most probable. This would not be true, in general, if lower order cut sets were made up of more reliable components, to cope with their higher importance and criticality with respect to the vulnerabilities of the network. For the same previous argument on the equality of the arc failure probability, the importance of the arcs is dependent only on their position in the network system, an arc near to the target or source node being more critical than those in the middle of the network, since a failure of the former is more likely to cause a network failure. This is, indeed, the finding of the computational procedure, as reported in Table 2. Based on the identified minimal cut sets, the application of the MC sampling procedure, with 10 3 MC trials, gives an estimated network reliability of (2.096 ± 0.055) 10 2 which has been verified by the CA-MC computational procedure of Section 4. a rather anomalous design since the entire network relies only on one component for its final connection to the target. Obviously, in any design, the presence of a minimal cut set of order 1 should be avoided resorting to redundancy of connections; alternatively, its probability could be reduced closer to the values of higher-order cut sets by placing a very reliable component in such critical position, so as to have a more balanced design (Podofillini et al. 2006). Continuing with the analysis of the results, the use of more reliable components in low order cut sets accounts for the fact that some order-3 minimal cut sets are less probable than order-4, -5 or even -6 minimal cut sets. For example, arcs 14, 16 and 20 in mcs 5.2 A case study of literature (Ramirez-Marquez & Coit 2005). The mcs identification procedure has been applied to the more complex network of Figure 2 (Ramirez- Marquez & Coit 2005). Again, the arcs have been labeled sequentially for ease of reference and notation. The state occupancy probabilities of each arc are reported in Table 3. Based on the identified minimal cut sets, the application of the MC sampling procedure, with 10 7 MC trials, gives an estimated network unreliability of (6.546 ± 0.007) 10 2 which has been verified by the CA-MC computational procedure of Section 4. The procedure, run with 10 7 MC trials, finds all 111 minimal cut sets (Ramirez-Marquez & Coit 2005). The most probable minimal cut sets are presented in Table 4, in order of decreasing frequency. The first order minimal cut set is due to the structure of the network: the target node is connected to the remaining part of the network only through arc 17. This is Table 2. Fussell-Vesely importance of the ARPA network arcs. arc Fussell-Vesely importance measure Figure 2. The network (Ramirez-Marquez & Coit 2005). Table 3. State occupancy probabilities of the network arcs (Ramirez-Marquez & Coit 2005). State probability arc p (success) q (failure)

6 Table 4. Main mcs of the network of Figure 2. mcs order involved arcs frequency ; 3; 4; ; 14; ; 4; 7; ; 2; 3; ; 3; 4; ; 3; 5; 11; 12; ; 13; 14; ; 9; 13; 15; ; 7; 9; 10; ; 14; ; 14; Table 5. Fussell-Vesely importance measures of the arcs in the network of Figure 2. arc Fussell-Vesely importance measure Figure 3. mcs 20. Figure 4. mcs (see Figure 3), which are gates to arc 17 and, thus, to the target node, are chosen very reliable; on the contrary, arcs 2, 3, 5, 11, 12 and 13 in mcs 7 (see Figure 4), which are coupled with redundant components, are less reliable. Finally, in Table 5 the Fussell-Vesely importance measures of the arcs are given in decreasing order. Arcs near to the target and source nodes, like 2, 3, 4, 14, 16, are more present in the mcs; yet the position with respect to the target and source nodes is not the unique factor influencing the importance of an arc, the number of downstream arcs being another quite relevant factor. For example, arcs 1 and 4 are in the same position with respect to the source but while arc 4 is present in 7 of the main mcs of Table 4, arc 1 is present only in 1. This is due to the fact that when arc 4 fails, arcs 11, 12 and 13 are surely disconnected from the source, whereas when arc 1 fails at most arc 5 may be disconnected, depending on the states of arcs 2 and 6. Arcs in the central part of the network are less important with respect to their contribution to unreliability because of the presence of redundant connections. For example, arc 19 has very little importance, albeit being the less reliable in the network, and in fact it is not present in the main mcs. Besides the role of the arc in the system logic, failure probability is, obviously, the other relevant factor for arc importance. Hence, arcs 13 and 5, although in an internal position of the network, are ranked more important than arc 14, which is closer to the target, because they are among the less reliable of the whole network. Further, when arcs are connected in a series logic, e.g. arcs 16 and 18, it is obvious that the main contribution to unreliability is given by the less reliable one and, correspondingly, the importance measure ranks higher arc 16 than arc

7 6 CONCLUSIONS A challenging difficulty in the assessment of the safety, vulnerability, reliability, availability characteristic of complex network systems resides in the identification of the minimal cut sets. Classical approaches lead to NP-hard problems with cumbersome and mathematically intensive methods of solution. In this work, an efficient computational procedure, based on Cellular Automata and Monte Carlo sampling, has been proposed for identifying the minimal cut sets of complex interconnected networks. The procedure also allows the ranking of the arcs in terms of their Fussell-Vesely importance. This information on the criticality of the arcs constituting the network may be exploited by the designers and managers of the system to effectively deal with operation bottlenecks and to establish proper actions of system improvement. The results on two literature case studies of increasing complexity have demonstrated the success of the proposed approach. Yet, the computational power of the proposed approach will be exploited in full if the analysis is carried out on parallel machines. Future investigations are planned in order to verify the opportunity of using biased Monte Carlo sampling techniques for improving the computational efficiency when analyzing the vulnerabilities of highly reliable networks which would otherwise require a very large sample of system configurations. REFERENCES Billinton, R. & Allan, R.N Reliability evaluation of engineering system concepts and techniques. 2nd ed.new York: Plenum Press. Fishman, G A comparison of four Monte Carlo methods for estimating the probability of s-t connectedness. IEEE Transactions on Reliability 35. Fussell, J.B How to calculate system reliability and safety characteristics. IEEE Transactions on Reliability 24(3): Ilachinski,A CellularAutomata A Discrete Universe. World Scientific. Lin, J. & Donaghey, C A Monte Carlo Simulation to determine Minimal Cut Sets and System Reliability. Annual Reliability and Mainteinability Simposium; Proc. symp., January New York: IEEE. Podofillini, L., Zio, E. & Vatn J Risk-informed optimization of railway tracks inspection and maintenance procedures. Reliability Engineering and System Safety 98(1): Ramirez-Marquez, J.E. & Coit, D.W A Monte Carlo simulation approach for approximating multi-state two terminal reliability. Reliability Engineering and System Safety 87: Reingold, E., Nievergelt, J. & Deo, N Combinatorial algorithm: theory and practice. New Jersey: Prentice Hall. Rocco, S.C.M. & Moreno, J.A Network reliability assessment using a cellular automata approach. Reliability Engineering and System Safety 78: Rocco, S.C.M. & Zio, E Solving advanced network reliability problems by means of cellular automata and Monte Carlo sampling. Reliability Engineering and System Safety 89: Wolfram, S. 1985a. Origins of randomness in physical systems. Physical Reviews Letters 55: Wolfram, S. 1985b. Undecidability and intractability in theoretical physics. Physical Reviews Letters 55: Wolfram, S Theory and application of Cellular Automata. World Scientific. Zio, E., Podofillini, L. & Zille V A combination of Monte Carlo simulation and cellular automata for computing the availability of complex network systems. Reliability Engineering and System Safety 91(2):

8

A Monte-Carlo Simulation Approach for Approximating Multi-state Two-Terminal Reliability

A Monte-Carlo Simulation Approach for Approximating Multi-state Two-Terminal Reliability A Monte-Carlo Simulation Approach for Approximating Multi-state Two-Terminal Reliability Jose E. Ramirez-Marquez and David W. Coit Department of Industrial and Systems Engineering, Rutgers University Abstract

More information

Reliability Evaluation Using Monte Carlo Simulation and Support Vector Machine

Reliability Evaluation Using Monte Carlo Simulation and Support Vector Machine Reliability Evaluation Using Monte Carlo Simulation and Support Vector Machine C.M. Rocco C. M. Sanseverino Rocco S., J. and A. J.A. Moreno Moreno Universidad Central, Facultad de Ingeniería, Apartado

More information

COMPUTER SIMULATION OF COMPLEX SYSTEMS USING AUTOMATA NETWORKS K. Ming Leung

COMPUTER SIMULATION OF COMPLEX SYSTEMS USING AUTOMATA NETWORKS K. Ming Leung POLYTECHNIC UNIVERSITY Department of Computer and Information Science COMPUTER SIMULATION OF COMPLEX SYSTEMS USING AUTOMATA NETWORKS K. Ming Leung Abstract: Computer simulation of the dynamics of complex

More information

Cellular Learning Automata-Based Color Image Segmentation using Adaptive Chains

Cellular Learning Automata-Based Color Image Segmentation using Adaptive Chains Cellular Learning Automata-Based Color Image Segmentation using Adaptive Chains Ahmad Ali Abin, Mehran Fotouhi, Shohreh Kasaei, Senior Member, IEEE Sharif University of Technology, Tehran, Iran abin@ce.sharif.edu,

More information

Net_CA: A Tool for Simulation and Modeling of Wired/Wireless Computer Networks based on Cellular Automata

Net_CA: A Tool for Simulation and Modeling of Wired/Wireless Computer Networks based on Cellular Automata Net_CA: A Tool for Simulation and Modeling of Wired/Wireless Computer Networks based on Cellular Automata Vasilios Mardiris 1, Georgios Ch. Sirakoulis 1, Charilaos Mizas 1, Ioannis Karafyllidis 1, and

More information

Normal Algorithmetic Implementation of Cellular Automata

Normal Algorithmetic Implementation of Cellular Automata Normal Algorithmetic Implementation of Cellular Automata G. Ramesh Chandra, V. Dhana Lakshmi Dept. of Computer Science and Engineering VNR Vignana Jyothi Institute of Engineering & Technology Hyderabad,

More information

Robots & Cellular Automata

Robots & Cellular Automata Integrated Seminar: Intelligent Robotics Robots & Cellular Automata Julius Mayer Table of Contents Cellular Automata Introduction Update Rule 3 4 Neighborhood 5 Examples. 6 Robots Cellular Neural Network

More information

Discrete Event Simulation and Petri net Modeling for Reliability Analysis

Discrete Event Simulation and Petri net Modeling for Reliability Analysis Discrete Event Simulation and Petri net Modeling for Reliability Analysis * Behrouz Safarinejadian Shiraz University of Technology, safarinejad@sutech.ac.ir Abstract. Analytical methods in reliability

More information

Stochastic Petri Nets Supporting Dynamic Reliability Evaluation

Stochastic Petri Nets Supporting Dynamic Reliability Evaluation International Journal of Materials & Structural Reliability Vol.4, No.1, March 2006, 65-77 International Journal of Materials & Structural Reliability Stochastic Petri Nets Supporting Dynamic Reliability

More information

Conway s Game of Life Wang An Aloysius & Koh Shang Hui

Conway s Game of Life Wang An Aloysius & Koh Shang Hui Wang An Aloysius & Koh Shang Hui Winner of Foo Kean Pew Memorial Prize and Gold Award Singapore Mathematics Project Festival 2014 Abstract Conway s Game of Life is a cellular automaton devised by the British

More information

Simulation of the Dynamic Behavior of One-Dimensional Cellular Automata Using Reconfigurable Computing

Simulation of the Dynamic Behavior of One-Dimensional Cellular Automata Using Reconfigurable Computing Simulation of the Dynamic Behavior of One-Dimensional Cellular Automata Using Reconfigurable Computing Wagner R. Weinert, César Benitez, Heitor S. Lopes,andCarlosR.ErigLima Bioinformatics Laboratory, Federal

More information

COMPUTER EXERCISE: POPULATION DYNAMICS IN SPACE September 3, 2013

COMPUTER EXERCISE: POPULATION DYNAMICS IN SPACE September 3, 2013 COMPUTER EXERCISE: POPULATION DYNAMICS IN SPACE September 3, 2013 Objectives: Introduction to coupled maps lattice as a basis for spatial modeling Solve a spatial Ricker model to investigate how wave speed

More information

A Genetic Algorithm for Graph Matching using Graph Node Characteristics 1 2

A Genetic Algorithm for Graph Matching using Graph Node Characteristics 1 2 Chapter 5 A Genetic Algorithm for Graph Matching using Graph Node Characteristics 1 2 Graph Matching has attracted the exploration of applying new computing paradigms because of the large number of applications

More information

The Cross-Entropy Method

The Cross-Entropy Method The Cross-Entropy Method Guy Weichenberg 7 September 2003 Introduction This report is a summary of the theory underlying the Cross-Entropy (CE) method, as discussed in the tutorial by de Boer, Kroese,

More information

Context based optimal shape coding

Context based optimal shape coding IEEE Signal Processing Society 1999 Workshop on Multimedia Signal Processing September 13-15, 1999, Copenhagen, Denmark Electronic Proceedings 1999 IEEE Context based optimal shape coding Gerry Melnikov,

More information

CHAPTER 5 MAINTENANCE OPTIMIZATION OF WATER DISTRIBUTION SYSTEM: SIMULATED ANNEALING APPROACH

CHAPTER 5 MAINTENANCE OPTIMIZATION OF WATER DISTRIBUTION SYSTEM: SIMULATED ANNEALING APPROACH 79 CHAPTER 5 MAINTENANCE OPTIMIZATION OF WATER DISTRIBUTION SYSTEM: SIMULATED ANNEALING APPROACH 5.1 INTRODUCTION Water distribution systems are complex interconnected networks that require extensive planning

More information

Formal Model. Figure 1: The target concept T is a subset of the concept S = [0, 1]. The search agent needs to search S for a point in T.

Formal Model. Figure 1: The target concept T is a subset of the concept S = [0, 1]. The search agent needs to search S for a point in T. Although this paper analyzes shaping with respect to its benefits on search problems, the reader should recognize that shaping is often intimately related to reinforcement learning. The objective in reinforcement

More information

IP LOOK-UP WITH TIME OR MEMORY GUARANTEE AND LOW UPDATE TIME 1

IP LOOK-UP WITH TIME OR MEMORY GUARANTEE AND LOW UPDATE TIME 1 2005 IEEE International Symposium on Signal Processing and Information Technology IP LOOK-UP WITH TIME OR MEMORY GUARANTEE AND LOW UPDATE TIME 1 G.T. Kousiouris and D.N. Serpanos Dept. of Electrical and

More information

The packing problem: A divide and conquer algorithm on cellular automata

The packing problem: A divide and conquer algorithm on cellular automata The packing problem: A divide and conquer algorithm on cellular automata Nicolas Bacquey Groupe de Recherche en Informatique, Image, Automatique et Instrumentation de Caen Université de Caen Basse-Normandie,

More information

Continued Investigation of Small-Scale Air-Sea Coupled Dynamics Using CBLAST Data

Continued Investigation of Small-Scale Air-Sea Coupled Dynamics Using CBLAST Data Continued Investigation of Small-Scale Air-Sea Coupled Dynamics Using CBLAST Data Dick K.P. Yue Center for Ocean Engineering Department of Mechanical Engineering Massachusetts Institute of Technology Cambridge,

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

Cellular Automata + Parallel Computing = Computational Simulation

Cellular Automata + Parallel Computing = Computational Simulation Cellular Automata + Parallel Computing = Computational Simulation Domenico Talia ISI-CNR c/o DEIS, Università della Calabria, 87036 Rende, Italy e-mail: talia@si.deis.unical.it Keywords: cellular automata,

More information

Cellular Automata. Nicholas Geis. January 22, 2015

Cellular Automata. Nicholas Geis. January 22, 2015 Cellular Automata Nicholas Geis January 22, 2015 In Stephen Wolfram s book, A New Kind of Science, he postulates that the world as we know it and all its complexities is just a simple Sequential Dynamical

More information

The graph theory approach to analyze critical infrastructures of transportation systems

The graph theory approach to analyze critical infrastructures of transportation systems Gdynia Maritime University, Poland Journal of Polish Safety and Reliability Association Summer Safety and Reliability Seminars, Volume 5, Number 2, 2014 The graph theory approach to analyze critical infrastructures

More information

Multi-Domain Pattern. I. Problem. II. Driving Forces. III. Solution

Multi-Domain Pattern. I. Problem. II. Driving Forces. III. Solution Multi-Domain Pattern I. Problem The problem represents computations characterized by an underlying system of mathematical equations, often simulating behaviors of physical objects through discrete time

More information

Conceptual Model for a Software Maintenance Environment

Conceptual Model for a Software Maintenance Environment Conceptual Model for a Software Environment Miriam. A. M. Capretz Software Engineering Lab School of Computer Science & Engineering University of Aizu Aizu-Wakamatsu City Fukushima, 965-80 Japan phone:

More information

A GENETIC ALGORITHM APPROACH TO OPTIMAL TOPOLOGICAL DESIGN OF ALL TERMINAL NETWORKS

A GENETIC ALGORITHM APPROACH TO OPTIMAL TOPOLOGICAL DESIGN OF ALL TERMINAL NETWORKS A GENETIC ALGORITHM APPROACH TO OPTIMAL TOPOLOGICAL DESIGN OF ALL TERMINAL NETWORKS BERNA DENGIZ AND FULYA ALTIPARMAK Department of Industrial Engineering Gazi University, Ankara, TURKEY 06570 ALICE E.

More information

Methods of Technical Risk Assessment in a Regional Context

Methods of Technical Risk Assessment in a Regional Context Methods of Technical Risk Assessment in a Regional Context Wolfgang Kröger, Professor and Head of former Laboratory for Safety Analysis (www.lsa.ethz.ch) Founding Rector of International Risk Governance

More information

Critical Infrastructure

Critical Infrastructure Critical Infrastructure 1 Critical Infrastructure Can be defined as any facility, system, or function which provides the foundation for national security, governance, economic vitality, reputation, and

More information

A Project Network Protocol Based on Reliability Theory

A Project Network Protocol Based on Reliability Theory A Project Network Protocol Based on Reliability Theory William J. Cosgrove 1) 1) California Polytechnic University Pomona, Professor of Technology and Operations Management (wcosgrove@csupomona.edu) Abstract

More information

A Virtual Laboratory for Study of Algorithms

A Virtual Laboratory for Study of Algorithms A Virtual Laboratory for Study of Algorithms Thomas E. O'Neil and Scott Kerlin Computer Science Department University of North Dakota Grand Forks, ND 58202-9015 oneil@cs.und.edu Abstract Empirical studies

More information

Automatic synthesis of switching controllers for linear hybrid systems: Reachability control

Automatic synthesis of switching controllers for linear hybrid systems: Reachability control Automatic synthesis of switching controllers for linear hybrid systems: Reachability control Massimo Benerecetti and Marco Faella Università di Napoli Federico II, Italy Abstract. We consider the problem

More information

Application of Two-dimensional Periodic Cellular Automata in Image Processing

Application of Two-dimensional Periodic Cellular Automata in Image Processing International Journal of Computer, Mathematical Sciences and Applications Serials Publications Vol. 5, No. 1-2, January-June 2011, pp. 49 55 ISSN: 0973-6786 Application of Two-dimensional Periodic Cellular

More information

MULTIMEDIA TECHNOLOGIES FOR THE USE OF INTERPRETERS AND TRANSLATORS. By Angela Carabelli SSLMIT, Trieste

MULTIMEDIA TECHNOLOGIES FOR THE USE OF INTERPRETERS AND TRANSLATORS. By Angela Carabelli SSLMIT, Trieste MULTIMEDIA TECHNOLOGIES FOR THE USE OF INTERPRETERS AND TRANSLATORS By SSLMIT, Trieste The availability of teaching materials for training interpreters and translators has always been an issue of unquestionable

More information

Low-Power FIR Digital Filters Using Residue Arithmetic

Low-Power FIR Digital Filters Using Residue Arithmetic Low-Power FIR Digital Filters Using Residue Arithmetic William L. Freking and Keshab K. Parhi Department of Electrical and Computer Engineering University of Minnesota 200 Union St. S.E. Minneapolis, MN

More information

CELLULAR AUTOMATA IN MATHEMATICAL MODELING JOSH KANTOR. 1. History

CELLULAR AUTOMATA IN MATHEMATICAL MODELING JOSH KANTOR. 1. History CELLULAR AUTOMATA IN MATHEMATICAL MODELING JOSH KANTOR 1. History Cellular automata were initially conceived of in 1948 by John von Neumann who was searching for ways of modeling evolution. He was trying

More information

UNIT 9C Randomness in Computation: Cellular Automata Principles of Computing, Carnegie Mellon University

UNIT 9C Randomness in Computation: Cellular Automata Principles of Computing, Carnegie Mellon University UNIT 9C Randomness in Computation: Cellular Automata 1 Exam locations: Announcements 2:30 Exam: Sections A, B, C, D, E go to Rashid (GHC 4401) Sections F, G go to PH 125C. 3:30 Exam: All sections go to

More information

Radio Network Planning with Combinatorial Optimisation Algorithms

Radio Network Planning with Combinatorial Optimisation Algorithms Author manuscript, published in "ACTS Mobile Telecommunications Summit 96, Granada : Spain (1996)" Radio Network Planning with Combinatorial Optimisation Algorithms P. Calégari, F. Guidec, P. Kuonen, EPFL,

More information

Network optimization: An overview

Network optimization: An overview Network optimization: An overview Mathias Johanson Alkit Communications 1 Introduction Various kinds of network optimization problems appear in many fields of work, including telecommunication systems,

More information

Line Segment Based Watershed Segmentation

Line Segment Based Watershed Segmentation Line Segment Based Watershed Segmentation Johan De Bock 1 and Wilfried Philips Dep. TELIN/TW07, Ghent University Sint-Pietersnieuwstraat 41, B-9000 Ghent, Belgium jdebock@telin.ugent.be Abstract. In this

More information

Project and Production Management Prof. Arun Kanda Department of Mechanical Engineering Indian Institute of Technology, Delhi

Project and Production Management Prof. Arun Kanda Department of Mechanical Engineering Indian Institute of Technology, Delhi Project and Production Management Prof. Arun Kanda Department of Mechanical Engineering Indian Institute of Technology, Delhi Lecture - 8 Consistency and Redundancy in Project networks In today s lecture

More information

Version 11

Version 11 The Big Challenges Networked and Electronic Media European Technology Platform The birth of a new sector www.nem-initiative.org Version 11 1. NEM IN THE WORLD The main objective of the Networked and Electronic

More information

Arc Consistency for Dynamic CSPs

Arc Consistency for Dynamic CSPs Arc Consistency for Dynamic CSPs Malek Mouhoub mouhoubm@cs.uregina.ca Department of Computer Science, University of Regina 3737 Waskana Parkway, Regina SK, Canada, S4S 0A2 ABSTRACT Constraint Satisfaction

More information

Two-dimensional Totalistic Code 52

Two-dimensional Totalistic Code 52 Two-dimensional Totalistic Code 52 Todd Rowland Senior Research Associate, Wolfram Research, Inc. 100 Trade Center Drive, Champaign, IL The totalistic two-dimensional cellular automaton code 52 is capable

More information

6.001 Notes: Section 4.1

6.001 Notes: Section 4.1 6.001 Notes: Section 4.1 Slide 4.1.1 In this lecture, we are going to take a careful look at the kinds of procedures we can build. We will first go back to look very carefully at the substitution model,

More information

Variations on Genetic Cellular Automata

Variations on Genetic Cellular Automata Variations on Genetic Cellular Automata Alice Durand David Olson Physics Department amdurand@ucdavis.edu daolson@ucdavis.edu Abstract: We investigated the properties of cellular automata with three or

More information

FUTURE communication networks are expected to support

FUTURE communication networks are expected to support 1146 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 13, NO 5, OCTOBER 2005 A Scalable Approach to the Partition of QoS Requirements in Unicast and Multicast Ariel Orda, Senior Member, IEEE, and Alexander Sprintson,

More information

You ve already read basics of simulation now I will be taking up method of simulation, that is Random Number Generation

You ve already read basics of simulation now I will be taking up method of simulation, that is Random Number Generation Unit 5 SIMULATION THEORY Lesson 39 Learning objective: To learn random number generation. Methods of simulation. Monte Carlo method of simulation You ve already read basics of simulation now I will be

More information

Modeling with Uncertainty Interval Computations Using Fuzzy Sets

Modeling with Uncertainty Interval Computations Using Fuzzy Sets Modeling with Uncertainty Interval Computations Using Fuzzy Sets J. Honda, R. Tankelevich Department of Mathematical and Computer Sciences, Colorado School of Mines, Golden, CO, U.S.A. Abstract A new method

More information

Seismic regionalization based on an artificial neural network

Seismic regionalization based on an artificial neural network Seismic regionalization based on an artificial neural network *Jaime García-Pérez 1) and René Riaño 2) 1), 2) Instituto de Ingeniería, UNAM, CU, Coyoacán, México D.F., 014510, Mexico 1) jgap@pumas.ii.unam.mx

More information

Distributed simulation of situated multi-agent systems

Distributed simulation of situated multi-agent systems Distributed simulation of situated multi-agent systems Franco Cicirelli, Andrea Giordano, Libero Nigro Laboratorio di Ingegneria del Software http://www.lis.deis.unical.it Dipartimento di Elettronica Informatica

More information

VIRTUAL PATH LAYOUT DESIGN VIA NETWORK CLUSTERING

VIRTUAL PATH LAYOUT DESIGN VIA NETWORK CLUSTERING VIRTUAL PATH LAYOUT DESIGN VIA NETWORK CLUSTERING MASSIMO ANCONA 1 WALTER CAZZOLA 2 PAOLO RAFFO 3 IOAN BOGDAN VASIAN 4 Area of interest: Telecommunication Networks Management Abstract In this paper two

More information

L Modeling and Simulating Social Systems with MATLAB

L Modeling and Simulating Social Systems with MATLAB 851-0585-04L Modeling and Simulating Social Systems with MATLAB Lecture 4 Cellular Automata Karsten Donnay and Stefano Balietti Chair of Sociology, in particular of Modeling and Simulation ETH Zürich 2011-03-14

More information

Homeland Security and Geographic Information Systems

Homeland Security and Geographic Information Systems Page 1 of 5 Homeland Security and Geographic Information Systems How GIS and mapping technology can save lives and protect property in post-september 11th America Introduction Timely, accurate information,

More information

arxiv: v3 [cs.fl] 5 Mar 2017

arxiv: v3 [cs.fl] 5 Mar 2017 A novel type of Automata for dynamic, heterogeneous and random architectures arxiv:1702.02240v3 [cs.fl] 5 Mar 2017 Weijun ZHU School of Information Engineering, Zhengzhou University, Zhengzhou, 450001,

More information

Complex Dynamics in Life-like Rules Described with de Bruijn Diagrams: Complex and Chaotic Cellular Automata

Complex Dynamics in Life-like Rules Described with de Bruijn Diagrams: Complex and Chaotic Cellular Automata Complex Dynamics in Life-like Rules Described with de Bruijn Diagrams: Complex and Chaotic Cellular Automata Paulina A. León Centro de Investigación y de Estudios Avanzados Instituto Politécnico Nacional

More information

Using Fuzzy Arithmetic in Containment Event Trees

Using Fuzzy Arithmetic in Containment Event Trees Volver Using Fuzzy Arithmetic in Containment Event Trees Rivera, S.S. and Baron, J.H. Presentado en: nternational Conference on Probabilistic Safety Assessment- PSA 99, Washington, USA, 22-25 agosto 999

More information

DISCRETE-event dynamic systems (DEDS) are dynamic

DISCRETE-event dynamic systems (DEDS) are dynamic IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, VOL. 7, NO. 2, MARCH 1999 175 The Supervised Control of Discrete-Event Dynamic Systems François Charbonnier, Hassane Alla, and René David Abstract The supervisory

More information

of optimization problems. In this chapter, it is explained that what network design

of optimization problems. In this chapter, it is explained that what network design CHAPTER 2 Network Design Network design is one of the most important and most frequently encountered classes of optimization problems. In this chapter, it is explained that what network design is? The

More information

A Closed Asynchronous Dynamic Model of Cellular Learning Automata and its Application to Peer-to-Peer Networks

A Closed Asynchronous Dynamic Model of Cellular Learning Automata and its Application to Peer-to-Peer Networks A Closed Asynchronous Dynamic Model of Cellular Learning Automata and its Application to Peer-to-Peer Networks Ali Mohammad Saghiri *, Mohammad Reza Meybodi Soft Computing Laboratory, Computer Engineering

More information

Failure in Complex Social Networks

Failure in Complex Social Networks Journal of Mathematical Sociology, 33:64 68, 2009 Copyright # Taylor & Francis Group, LLC ISSN: 0022-250X print/1545-5874 online DOI: 10.1080/00222500802536988 Failure in Complex Social Networks Damon

More information

HYBRID PETRI NET MODEL BASED DECISION SUPPORT SYSTEM. Janetta Culita, Simona Caramihai, Calin Munteanu

HYBRID PETRI NET MODEL BASED DECISION SUPPORT SYSTEM. Janetta Culita, Simona Caramihai, Calin Munteanu HYBRID PETRI NET MODEL BASED DECISION SUPPORT SYSTEM Janetta Culita, Simona Caramihai, Calin Munteanu Politehnica University of Bucharest Dept. of Automatic Control and Computer Science E-mail: jculita@yahoo.com,

More information

Towards more robust internetworks:

Towards more robust internetworks: Towards more robust internetworks: an application of graph theory Authors Jamie Greenwood, MSc (Royal Holloway, 2016) Stephen Wolthusen, ISG, Royal Holloway Abstract As networks become increasingly connected

More information

CHAPTER 6 PERCEPTUAL ORGANIZATION BASED ON TEMPORAL DYNAMICS

CHAPTER 6 PERCEPTUAL ORGANIZATION BASED ON TEMPORAL DYNAMICS CHAPTER 6 PERCEPTUAL ORGANIZATION BASED ON TEMPORAL DYNAMICS This chapter presents a computational model for perceptual organization. A figure-ground segregation network is proposed based on a novel boundary

More information

Chapter 2 Overview of the Design Methodology

Chapter 2 Overview of the Design Methodology Chapter 2 Overview of the Design Methodology This chapter presents an overview of the design methodology which is developed in this thesis, by identifying global abstraction levels at which a distributed

More information

1 Introduction. Russia

1 Introduction. Russia Modeling of open network reliability including the Internet based on the theory of percolation in two - dimensional and three-dimensional regular and random network structures D. Zhukov 1, S. Lesko 1,

More information

ADAPTIVE TILE CODING METHODS FOR THE GENERALIZATION OF VALUE FUNCTIONS IN THE RL STATE SPACE A THESIS SUBMITTED TO THE FACULTY OF THE GRADUATE SCHOOL

ADAPTIVE TILE CODING METHODS FOR THE GENERALIZATION OF VALUE FUNCTIONS IN THE RL STATE SPACE A THESIS SUBMITTED TO THE FACULTY OF THE GRADUATE SCHOOL ADAPTIVE TILE CODING METHODS FOR THE GENERALIZATION OF VALUE FUNCTIONS IN THE RL STATE SPACE A THESIS SUBMITTED TO THE FACULTY OF THE GRADUATE SCHOOL OF THE UNIVERSITY OF MINNESOTA BY BHARAT SIGINAM IN

More information

Composability Test of BOM based models using Petri Nets

Composability Test of BOM based models using Petri Nets I. Mahmood, R. Ayani, V. Vlassov and F. Moradi 7 Composability Test of BOM based models using Petri Nets Imran Mahmood 1, Rassul Ayani 1, Vladimir Vlassov 1, and Farshad Moradi 2 1 Royal Institute of Technology

More information

Future Grid Initiative Technology Challenges in Designing the Future Grid to Enable Sustainable Energy Systems

Future Grid Initiative Technology Challenges in Designing the Future Grid to Enable Sustainable Energy Systems Future Grid Initiative Technology Challenges in Designing the Future Grid to Enable Sustainable Energy Systems Vijay Vittal Director, Power Systems Engineering Research Center Ira A. Fulton Chair Professor,

More information

Applying Catastrophe Theory to Image Segmentation

Applying Catastrophe Theory to Image Segmentation Applying Catastrophe Theory to Image Segmentation Mohamad Raad, Majd Ghareeb, Ali Bazzi Department of computer and communications engineering Lebanese International University Beirut, Lebanon Abstract

More information

Method for security monitoring and special filtering traffic mode in info communication systems

Method for security monitoring and special filtering traffic mode in info communication systems Method for security monitoring and special filtering traffic mode in info communication systems Sherzod Rajaboyevich Gulomov Provide Information Security department Tashkent University of Information Technologies

More information

Computer-aided design and visualization of regular algorithm dependence graphs and processor array architectures

Computer-aided design and visualization of regular algorithm dependence graphs and processor array architectures Computer-aided design and visualization of regular algorithm dependence graphs and processor array architectures Oleg Maslennikow, Natalia Maslennikowa, Przemysław Sołtan Department of Electronics Technical

More information

Graph Theory for Modelling a Survey Questionnaire Pierpaolo Massoli, ISTAT via Adolfo Ravà 150, Roma, Italy

Graph Theory for Modelling a Survey Questionnaire Pierpaolo Massoli, ISTAT via Adolfo Ravà 150, Roma, Italy Graph Theory for Modelling a Survey Questionnaire Pierpaolo Massoli, ISTAT via Adolfo Ravà 150, 00142 Roma, Italy e-mail: pimassol@istat.it 1. Introduction Questions can be usually asked following specific

More information

Manifolds. Chapter X. 44. Locally Euclidean Spaces

Manifolds. Chapter X. 44. Locally Euclidean Spaces Chapter X Manifolds 44. Locally Euclidean Spaces 44 1. Definition of Locally Euclidean Space Let n be a non-negative integer. A topological space X is called a locally Euclidean space of dimension n if

More information

Self-formation, Development and Reproduction of the Artificial System

Self-formation, Development and Reproduction of the Artificial System Solid State Phenomena Vols. 97-98 (4) pp 77-84 (4) Trans Tech Publications, Switzerland Journal doi:.48/www.scientific.net/ssp.97-98.77 Citation (to be inserted by the publisher) Copyright by Trans Tech

More information

DETERMINATION OF THE OPTIMUM PATH ON THE EARTH S SURFACE. (extended abstract) Abstract

DETERMINATION OF THE OPTIMUM PATH ON THE EARTH S SURFACE. (extended abstract) Abstract Proceedings of the 17th International Cartographic Association Conference, Barcelona, Spain, September 1995. DETERMINATION OF THE OPTIMUM PATH ON THE EARTH S SURFACE (extended abstract) Marinos Kavouras

More information

Complementary Graph Coloring

Complementary Graph Coloring International Journal of Computer (IJC) ISSN 2307-4523 (Print & Online) Global Society of Scientific Research and Researchers http://ijcjournal.org/ Complementary Graph Coloring Mohamed Al-Ibrahim a*,

More information

Requirements Engineering for Enterprise Systems

Requirements Engineering for Enterprise Systems Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2001 Proceedings Americas Conference on Information Systems (AMCIS) December 2001 Requirements Engineering for Enterprise Systems

More information

ADAPTIVE SORTING WITH AVL TREES

ADAPTIVE SORTING WITH AVL TREES ADAPTIVE SORTING WITH AVL TREES Amr Elmasry Computer Science Department Alexandria University Alexandria, Egypt elmasry@alexeng.edu.eg Abstract A new adaptive sorting algorithm is introduced. The new implementation

More information

GiRaF: a toolbox for Gibbs Random Fields analysis

GiRaF: a toolbox for Gibbs Random Fields analysis GiRaF: a toolbox for Gibbs Random Fields analysis Julien Stoehr *1, Pierre Pudlo 2, and Nial Friel 1 1 University College Dublin 2 Aix-Marseille Université February 24, 2016 Abstract GiRaF package offers

More information

Pattern Mining in Frequent Dynamic Subgraphs

Pattern Mining in Frequent Dynamic Subgraphs Pattern Mining in Frequent Dynamic Subgraphs Karsten M. Borgwardt, Hans-Peter Kriegel, Peter Wackersreuther Institute of Computer Science Ludwig-Maximilians-Universität Munich, Germany kb kriegel wackersr@dbs.ifi.lmu.de

More information

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List

More information

PAPER Constructing the Suffix Tree of a Tree with a Large Alphabet

PAPER Constructing the Suffix Tree of a Tree with a Large Alphabet IEICE TRANS. FUNDAMENTALS, VOL.E8??, NO. JANUARY 999 PAPER Constructing the Suffix Tree of a Tree with a Large Alphabet Tetsuo SHIBUYA, SUMMARY The problem of constructing the suffix tree of a tree is

More information

Graph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California

Graph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California Graph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California Abstract We define a graph adjacency matrix automaton (GAMA)

More information

Implementation Techniques

Implementation Techniques V Implementation Techniques 34 Efficient Evaluation of the Valid-Time Natural Join 35 Efficient Differential Timeslice Computation 36 R-Tree Based Indexing of Now-Relative Bitemporal Data 37 Light-Weight

More information

REINFORCEMENT LEARNING: MDP APPLIED TO AUTONOMOUS NAVIGATION

REINFORCEMENT LEARNING: MDP APPLIED TO AUTONOMOUS NAVIGATION REINFORCEMENT LEARNING: MDP APPLIED TO AUTONOMOUS NAVIGATION ABSTRACT Mark A. Mueller Georgia Institute of Technology, Computer Science, Atlanta, GA USA The problem of autonomous vehicle navigation between

More information

Building UAE s cyber security resilience through effective use of technology, processes and the local people.

Building UAE s cyber security resilience through effective use of technology, processes and the local people. WHITEPAPER Security Requirement WE HAVE THE IN-HOUSE DEPTH AND BREATH OF INFORMATION AND CYBER SECURIT About Us CyberGate Defense (CGD) is a solution provider for the full spectrum of Cyber Security Defenses

More information

Efficient Self-Reconfigurable Implementations Using On-Chip Memory

Efficient Self-Reconfigurable Implementations Using On-Chip Memory 10th International Conference on Field Programmable Logic and Applications, August 2000. Efficient Self-Reconfigurable Implementations Using On-Chip Memory Sameer Wadhwa and Andreas Dandalis University

More information

New Removal Operators for Surface Skeletonization

New Removal Operators for Surface Skeletonization New Removal Operators for Surface Skeletonization Carlo Arcelli, Gabriella Sanniti di Baja, and Luca Serino Institute of Cybernetics "E.Caianiello", CNR, Pozzuoli (Naples), Italy (c.arcelli, g.sannitidibaja,

More information

Software interoperability in consequence assessment: results of a feasibility study

Software interoperability in consequence assessment: results of a feasibility study Software interoperability in consequence assessment: results of a feasibility study Sergio Contini 1, Luciano Fabbri 1, Massimo Binda 2 1 European Commission, Joint Research Centre, 21027 Ispra (VA), Italy

More information

Chapter 1. Introduction

Chapter 1. Introduction Introduction 1 Chapter 1. Introduction We live in a three-dimensional world. Inevitably, any application that analyzes or visualizes this world relies on three-dimensional data. Inherent characteristics

More information

Vectorized Search for Single Clusters

Vectorized Search for Single Clusters Journal of Statistical Physics, Vol. 70, Nos. 3/4, 1993 Vectorized Search for Single Clusters Hans Gerd Evertz ~ Received August 5, 1992 Breadth-first search for a single cluster on a regular lattice is

More information

Risk Informed Cyber Security for Nuclear Power Plants

Risk Informed Cyber Security for Nuclear Power Plants Risk Informed Cyber Security for Nuclear Power Plants Phillip L. Turner, Timothy A. Wheeler, Matt Gibson Sandia National Laboratories Electric Power Research Institute Albuquerque, NM USA Charlotte, NC

More information

Łabiak G., Miczulski P. (IIE, UZ, Zielona Góra, Poland)

Łabiak G., Miczulski P. (IIE, UZ, Zielona Góra, Poland) UML STATECHARTS AND PETRI NETS MODEL COMPARIS FOR SYSTEM LEVEL MODELLING Łabiak G., Miczulski P. (IIE, UZ, Zielona Góra, Poland) The system level modelling can be carried out with using some miscellaneous

More information

Application of Totalistic Cellular Automata for Noise Filtering in Image Processing

Application of Totalistic Cellular Automata for Noise Filtering in Image Processing Journal of Cellular Automata, Vol. 7, pp. 207 221 Reprints available directly from the publisher Photocopying permitted by license only 2012 Old City Publishing, Inc. Published by license under the OCP

More information

AMF Configurations: Checking for Service Protection Using Heuristics

AMF Configurations: Checking for Service Protection Using Heuristics AMF Configurations: Checking for Service Protection Using Heuristics P. Salehi, F. Khendek, A. Hamou-Lhadj Electrical and Computer Engineering Department Concordia University Montréal, Canada {pe_saleh,

More information

Multiple Constraint Satisfaction by Belief Propagation: An Example Using Sudoku

Multiple Constraint Satisfaction by Belief Propagation: An Example Using Sudoku Multiple Constraint Satisfaction by Belief Propagation: An Example Using Sudoku Todd K. Moon and Jacob H. Gunther Utah State University Abstract The popular Sudoku puzzle bears structural resemblance to

More information

What are Cellular Automata?

What are Cellular Automata? What are Cellular Automata? It is a model that can be used to show how the elements of a system interact with each other. Each element of the system is assigned a cell. The cells can be 2-dimensional squares,

More information

A PROPOSAL FOR MODELING THE CONTROL SYSTEM FOR THE SPANISH LIGHT SOURCE IN UML

A PROPOSAL FOR MODELING THE CONTROL SYSTEM FOR THE SPANISH LIGHT SOURCE IN UML A PROPOSAL FOR MODELING THE CONTROL SYSTEM FOR THE SPANISH LIGHT SOURCE IN UML D. Beltran*, LLS, Barcelona, Spain M. Gonzalez, CERN, Geneva, Switzerlan Abstract CELLS (Consorcio para la construcción, equipamiento

More information

Measuring the resilience of transport infrastructure

Measuring the resilience of transport infrastructure Measuring the resilience of transport infrastructure Resilient cities are safer, more attractive to investors and new residents, and more able to recover quickly and with less loss of life and assets in

More information