An Alternative Approach for Solving Bi-Level Programming Problems

Size: px
Start display at page:

Download "An Alternative Approach for Solving Bi-Level Programming Problems"

Transcription

1 American Journa of Operations Research, 07, 7, ISSN Onine: ISSN rint: An Aternative Approach for Soving Bi-Leve rogramming robems Rashmi Bira, Viay K. Agarwa, Idrees A. Khan, Vishnu Narayan Mishra * Department of Mathematics, Sir adampat Singhania University, Bhatewar, India Department of Mathematics, Mody University of Science and Techonoogy Lakshmangarh, India Department of Mathematics, Integra University, Lucknow, India Appied Mathematics & Humanities Department, Sardar Vaabhbhai Nationa Institute of Technoogy, Surat, India How to cite this paper: Bira, R., Agarwa, V.K., Khan, I.A. and Mishra, V.N. (07) An Aternative Approach for Soving Bi- Leve rogramming robems. American Journa of Operations Research, 7, Received: October, 06 Accepted: May, 07 ubished: May 7, 07 Copyright 07 by authors and Scientific Research ubishing Inc. This work is icensed under the Creative Commons Attribution Internationa License (CC BY.0). Open Access DOI: 0.6/aor May 7, 07 Abstract An agorithm is proposed in this paper for soving two-dimensiona bi-eve inear programming probems without making a graph. Based on the cassification of constraints, agorithm removes a redundant constraints, which eiminate the possibiity of cycing and the soution of the probem is reached in a finite number of steps. Exampe to iustrate the method is aso incuded in the paper. Keywords Linear rogramming robem, Bi-Leve rogramming robem, Graph, Agorithm. Introduction Mutieve programming is deveoped to sove the decentraized panning probem in which decision makers are often arranged within a hierarchica administrative structure. The bi-eve programming probem is a hierarchica optimization probem in which a subset of the variabes are constrained to be soution of a given optimization probem parameterized by the remaining variabes. The inear bi-eve programming probem, which is a specific case of the Mutieve programming probem with a two eves structure is a set of nested inear optimization over a singe poyhedra region. Two decision makers are ocated at different hierarchica eves, each independenty controing ony one set of decision variabes, and with different and perhaps conficting obectives. The hierarchica optimization structure appears normay in penty of appication when ower eve moves are controed by upper eve decisions. Transpor- *Corresponding author, L. 67 Awadh uri Coony Benigan, hase-iii, Opposite-I.T.I., Faizabad, U.., India.

2 tation, management, panning and optima design are the few appication fieds of bi-eve programming probems. In mathematica terms, in bi-eve programming probems it is required to find a soution to the upper eve probem such that g( xy, ) 0, ( ) min, F xy xy, where y for each vaue of x, is the soution of the ower eve probem: such that hxy (, ) 0. min f ( xy y, ) The ower eve probem is aso referred as the foower s probem. In a simiar way, the upper eve probem is aso caed the eader s probem. The origina formuation for bi-eve programming probem appeared in 97, in a paper authored by J. Bracken and J. McGi [], athough it was W. Cander and R. Norton [] that first used the designation bi-eve or mutieve programming. However, it was not unti the eary eighties that these probems started receiving the attention they deserve [] [] [5] [6]. Motivated by the game theory of H. Stackeberg [7], severa authors studied bi-eve programming probems intensivey and contributed to its proiferation in the mathematica programming community. Since 980, a significant efforts have been devoted to understanding the fundamenta concepts associated with bi-eve programming. Various versions of the inear bi-eve programming probem are presented by [8] [9] [0] []. At the same time, various agorithms have been proposed for soving these probems. One cass of techniques inherent of extreme point agorithms and has been argey appied to the inear bi-eve programming probems because for this probem, if there is a soution, then there is at east one goba minimizer that is an extreme point []. Two other casses of agorithms are branch and bound agorithm and compementariy pivot agorithms [] []. A survey on the inear bi-eve programming probems has been written by O. Ben-Ayed [5]. The compexity of the probem has been addressed by a number of authors [6] [7] [8]. It has been proved that even the inear bi-eve programming probem where a the invoved functions are affine, is a strongy N-hard probem [9] [0]. In this paper, an attempt has been made to deveop a method in which constraints are anayzed, and used for soving two-dimensiona inear bi-eve programming probems. Constraints have been cassified broady in two categories; we have named them as concave constraints and convex constraints.. Fundamenta rincipes We define two types of constraint casses for the proposed method, which ay the foundation of this agorithm. Considering the norma to be towards the haf pane region not satisfied by constraints, we define the foowing: Concave Constraints: -constraints whose norma make anges with the x-axis 0

3 in the range [0, π]. Convex Constraints: -constraints whose norma make anges with the x-axis in the range [π,π]. Concave and Convex constraints defined here are other than non-negativity constraints.various types of constraints on the basis of the above definition are given in the tabe beow: constrained type a i x + b i y c i S. No. sign of a i b i c i Cass of constraint concave concave concave concave concave concave convex convex convex convex convex 0 convex The form of bi-eve inear programming probem considered here is of the foowing type: ( ) max or min f xy, where y soves () x x ( ) max or min f xy, () y y ax i + by i ci () xy, 0 () It can be observed easiy that inducibe region, for the finite soution is one among foowing two cases: ) a part of the ine of concave constraints; ) a part of the ine of convex constraints or part of the x-axis. Reason behind this observation is the fact that in (), the contro is ony on the y variabe, therefore for a given x, if () is to be maximized in the positive direction of the y-axis, then the extreme point wi be a point on a ine of concave constraint as shown in Figure, and if () is to be minimized in the positive direction of the y-axis, then the extreme point wi be a point on the ine of convex constraint or on the x-axis as shown in Figure. Whie deaing with this method of soving probems we come across two types of redundant concave constraint and one type of redundant convex constraint. A concave constraint which is redundant when no convex constraints are considered is one type of redundant concave constraints, is a ine of such type of

4 Figure. Location of extreme point in case of maximization or minimization probems. redundant constraint as shown in Figure, hereafter represented as RCC. A concave constraints which is redundant when convex constraints are aso considered with concave constraints is another type of redundant concave constraints, is a ine of such type of redundant concave constraint as shown in Figure, hereafter represented as RCC. One type of redundant convex constraints used for the proposed method is redundant when no concave constraint are considered, hereafter represented as RCX. RCC are removed in two steps, at the first step those RCC are removed which can be identified ust by inspection, it can be easiy seen that a concave constraint having ine i y= mx i + c i is RCC with respect to concave constraint having ine y= mx + c if mi > m and ci > c. After remova of such RCC et the concave constraints sustained are those whose ines are represented by y= mx+ c, y= mx+ c,,, y= mx + c, p y = mp x+ cp, where m > m > > m > > mp and c < c < < c < < cp. From Figure we can observe that, and are three ines of constraint such that their sopes m, m and m respectivey and their intercepts with y- axis c, c and c respectivey foow reation m > m > m and c < c < c and none of the three are RCC but under the same condition constraint with the ine is RCC with respect to constraint having ines and. Such RCC can be removed by finding out the x-coordinates for point of intersection of the ine of concave constraints. x coordinate x for point of intersection of and c c is given by x =, simiary the x coordinate x of point of m m intersection of and is given by c c x =, for constraint having the m m ine not to be RCC with respect to constraint having ines and we

5 Figure. Redundant constraint. must have x < x. In case constraint having the ine is redundant with respect to constraint having ines and, repace constraint having the ine by constraint having the ine and constraint having the ine by c c c c constraint having the ine and find out x = and x =, m m m m thus one by one a the redundant concave constraints can be removed. Here it is assumed that x and corresponding y coordinate y are non-negative otherwise constraint having the ine become RCC and we repace constraint having the ine by constraint having the ine and so on. Whie finding x i to check redundancy for concave constraints we aso find corresponding y coordinates y i. In this process after is obtained if we come across yi 0 for a positive x i, the concave constraint having ( xi, y i ) as termina point is considered to be the ast non-redundant concave constraint. It is to be noted that a ine segment parae to y-axis cannot be a part of inducibe region, therefore whie removing RCC, if a concave constraint parae to the y-axis having ine p is encountered then point of intersection of the ine of concave constraint ust before p and p is considered to be the termina point of the ast nonredundant concave constraint making the reaction set. RCX can be removed in the simiar way as RCC, for this et i y= mx i + c i and y= mx + c be two ines of convex constraint, such that m i < m and c i < c then constraint having ine i is RCX with respect to convex constraint having ine. After remova of such RCX et the convex constraint eft are those having ines y= mx + c, y= mx + c,, y= mx + c,, p y = m px+ c p, where m < m < < m < < m p and c > c > > c > > c p. Such RCX can be removed by finding out the x-coordinates of the point of intersection of ines of convex constraint, x-coordinate x for point of intersection of and is given by c c x =, simiary x coordinate m m

6 x of point of intersection of and is given by c c x = m m, for con- straint having the ine not to be RCX with respect to constraint having the ine and constraint having ine we must have x < x. In case constraint having the ine is redundant with respect to constraint having the ine and constraint having the ine, repace constraint having the ine by constraint having the ine and constraint having the ine by constraint having the ine and find out c c c c x = and x m m =, thus one by m m one a the redundant convex constraints can be removed. Non-redundant concave constraints obtained after remova of RCC as dis- cussed above are such that constraint having ine k is nearer to y-axis than constraint having ine if m k < m. Aso during this process we have obtained, coordinates of corners made by a non-redundant concave constraint ines, after remova of RCC, except the starting point of first non-redundant concave con- straint ine and the termina point of ast non-redundant concave constraint ine in genera. To obtain the starting point of first non-redundant concave constraint ine, find its intersection first with the y-axis if the coordinate so obtained is ( 0, y 0) then this is the required point, otherwise we find its intersection with x-axis. To obtain the termina point of ast non-redundant concave constraint ine we find its intersection with the x-axis, if the coordinate so obtained is ( x 0,0) then this is the required point, otherwise termina point is unbounded.. Agorithm Method and agorithm in case inducibe region is a part of concave constraints ine is given beow. A simiar method and agorithm can be given in case inducibe region is a part of convex constraints ine. Step : Remove RCC from a concave constraints and find y i for a x i obtained during the process of remova. Find RCX from a convex constraints. Step : Find starting point of first non-redundant concave constraint ine, and the termina point of ast non-redundant concave constraint ine which may be part of inducibe region. Step : Check if end points of first non-redundant concave constraint ine satisfy a non-redundant convex constraint ines or not, if they do so go for of and so on, to check the same, otherwise there may be one of the foowing three cases: ) There is at east one non-redundant convex constraint not satisfied by both in this case constraint having ine become RCC otherwise become part of boundary of the feasibe region, and we move to constraint having ines,,. ) There is at east one non-redundant convex constraint not satisfied by but satisfied by. Let be one such ine of convex constraint, then find the

7 intersection point of and and shift to this point of intersection, with this new if is again ine of such constraint do the same, and so on, ti a such constraints are exhausted, then move to constraint having ine,,. ) There is at east one non-redundant convex constraint not satisfied by but satisfied by. Let constraint having ine then find the intersection point of p and and shift p be one such convex constraint, to this point of intersection, with this new if constraint having ine q is again such constraint do the same, and so on, ti a such constraints are exhausted, in this case become the ast point to be considered for soution. Step : The points,, satisfying a non-redundant convex constraints, obtained from step are used to find optima soution by putting its vaue in the obective function (). If there are some feasibe points than in either of the foowing two cases we may have unbounded soution ) No concave constraint exist ) No constraint of the type, 5 and 7 as given in the tabe is present in the probem. If there is at east one of the convex constraints not satisfied by any of the point,, then there is a case of no feasibe soution.. Exampe where y soves max z = x+ y x max z = x+ y y 5x+ 5y 5 (5) y.5 (6) x+ y (7) x y (8) 8x y (9) x (0) xy, 0 Soution: As per the cassification (5), (6), (7) and (0) are concave constraints and (8) and (9) are convex constraints, inducibe region is a part of concave constraints. Step : art of ration reaction set are y = x+, y = 0x+ 9 and y = x+ 8. None of the concave constraint is RCC and none of the convex constraint is RCX. ( x, y ) = (,9 ) ( x, y ) = ( 8,9 ). Step : = ( 0,) = (, ). Step :,, satisfy both (8) and (9). Step : z for a the,, are z ( 0,) = 6, z ( ),9 = 7, 8,9 5 8 z, = 7. z ( ) = and ( ) 5

8 z, = 7. Therefore soution is ( ) max z = x+ y x where y soves max z = x+ y y 5x+ 5y 5 () y.5 () x+ y () x y () 8x y (5) x (6) xy, 0 Soution: As per the cassification (5), (6), (7) and (0) are concave constraints and (8) and (9) are convex constraints, inducibe region is a part of concave constraints. Step : art of ration reaction set are y = x+, y = 0x+ 9 and y = x+ 8. None of the concave constraint is RCC and none of the convex constraint is RCX. ( x, y ) = (,9 ) and (, ) ( 8,9 ) Step : = ( ) = ( ). x y =. 0,, Step :,, satisfy both (8) and (9). Step : z for a the,, are ( 0,) 6, 8,9 5 8 z, = 7. z ( ) = and ( ) Therefore soution is z (, ) = Concusion z,9 = 7, z = ( ) The proposed method is based on the anaysis of constraints. Unike the tra- ditionay used method of finding optimum such as interior point method or simpex method in which search is made by moving aong the boundary of the feasibe region, an attempt made in this paper conveys that by propery expoiting the properties of constraints there is a possibiity of deveoping a method which soves the probem in finite number of steps efficienty. Acknowedgements We thank the Editor and the referee for their comments. This support is greaty appreciated. References [] Bracken, J. and McGi, J. (97) Mathematica rograms with Optimization robems in the Constraints. Operation Research,, [] Cander, W. and Norton, R. (977) Mutieve rogramming and Deveopment o- 6

9 icy. Technica Report 58, Word Bank Staff, Washington DC. [] Wen, U. and Hsu, S. (99) Efficient Soution for the Linear Bieve rogramming robems. European Journa of Operation Research, 6, 5-6. [] Jan, R. and Chern, M. (99) Noninear Integer Bieve rogramming. European Journa of Operation Research, 7, [5] Liu, Y. and hart, S. (99) Characterizing an Optima Soution to the Linear Bieve rogramming robem. European Journa of Operation Research, 7, [6] Liu, Y. and Spencert, T. (995) Soving a Bieve Linear rogram When the Inner Decision Maker Contros Few Variabes. European Journa of Operation Research, 8, [7] Stackeberg, H. (95) The Theory of Market Economy. Oxford University ress, Oxford. [8] Biaas, W.F. and Karwan, M.H. (98) On Tow-Leve Linear Optimization. IEEE Transactions on Automatic Contro, AC-7, -. [9] Bard, J.F. and Fak, J.E. (98) An Expicit Soution to the Muti-Leve rogramming robem. Computers and Operations Research, 9, [0] Biaas, W.F. and Karwan, M.H. (98) Two-Leve Linear rogramming. Management Science, 0, [] Bard, J. (985) Geometric and Agorithm Deveopment for Hierarchica anning robem. European Journa of Operation Research, 9, 7-8. [] Mishra, V.N. (007) Some robems on Approximations of Functions in Banach Spaces. hd Thesis, Indian Institute of Technoogy, Roorkee, [] Hansen,., Jaumard, B. and Sarvard, G. (99) New Branch-and-Bound Rues for Linear Bieve rogramming. SIAM Journa of Scientific and Statistica Computing,, [] Judice, J. and Faustino, A. (99) The Linear Quadratic Bi-Leve rogramming robem. INFOR,, [5] Ben-Ayed, O. (99) Bieve Linear rogramming. Computers and Operation Research, 0, [6] Haurie, A., Savard, G. and White, J.C. (990) A Note on an Efficient oint Agorithm for a Linear Two-Stage Optimization robem. Operation Research, 8, [7] Ona, H. (99) A Modified Simpex Approach for Soving Bieve Linear rogramming robems. European Journa of Operation Research, 67, 6-5. [8] Husain, S., Gupta, S. and Mishra, V.N. (0) An Existence Theorem of Soutions for the System of Generaized Vector Quasi-Variationa Inequaities. American Journa of Operations Research,, [9] Gupta, S., Daa, U.D. and Mishra, V.N. (0) Nove Anaytica Approach of Non Conventiona Mapping Scheme with Discrete Hartey Transform in OFDM System. American Journa of Operations Research,, [0] Ahmad, I., Mishra, V.N., Ahmad, R. and Rahaman, M. (06) An Iterative Agorithm for a System of Generaized Impicit Variationa Incusions. Springer us, 5,

10 Submit or recommend next manuscript to SCIR and we wi provide best service for you: Accepting pre-submission inquiries through Emai, Facebook, LinkedIn, Twitter, etc. A wide seection of ournas (incusive of 9 subects, more than 00 ournas) roviding -hour high-quaity service User-friendy onine submission system Fair and swift peer-review system Efficient typesetting and proofreading procedure Dispay of the resut of downoads and visits, as we as the number of cited artices Maximum dissemination of your research work Submit your manuscript at: Or contact aor@scirp.org

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) botton@poms.uc.ac.be Bernard

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study

More information

Bilevel Optimization based on Iterative Approximation of Multiple Mappings

Bilevel Optimization based on Iterative Approximation of Multiple Mappings Bieve Optimization based on Iterative Approximation of Mutipe Mappings arxiv:1702.03394v2 [math.oc] 5 May 2017 Ankur Sinha 1, Zhichao Lu 2, Kayanmoy Deb 2 and Pekka Mao 3 1 Production and Quantitative

More information

Design of IP Networks with End-to. to- End Performance Guarantees

Design of IP Networks with End-to. to- End Performance Guarantees Design of IP Networks with End-to to- End Performance Guarantees Irena Atov and Richard J. Harris* ( Swinburne University of Technoogy & *Massey University) Presentation Outine Introduction Mutiservice

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program? Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of

More information

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models On Upper Bounds for Assortment Optimization under the Mixture of Mutinomia Logit Modes Sumit Kunnumka September 30, 2014 Abstract The assortment optimization probem under the mixture of mutinomia ogit

More information

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints *

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG

More information

Research on the overall optimization method of well pattern in water drive reservoirs

Research on the overall optimization method of well pattern in water drive reservoirs J Petro Expor Prod Techno (27) 7:465 47 DOI.7/s322-6-265-3 ORIGINAL PAPER - EXPLORATION ENGINEERING Research on the overa optimization method of we pattern in water drive reservoirs Zhibin Zhou Jiexiang

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

Automatic Hidden Web Database Classification

Automatic Hidden Web Database Classification Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,

More information

An improved distributed version of Han s method for distributed MPC of canal systems

An improved distributed version of Han s method for distributed MPC of canal systems Deft University of Technoogy Deft Center for Systems and Contro Technica report 10-013 An improved distributed version of Han s method for distributed MPC of cana systems M.D. Doan, T. Keviczky, and B.

More information

Chapter Multidimensional Direct Search Method

Chapter Multidimensional Direct Search Method Chapter 09.03 Mutidimensiona Direct Search Method After reading this chapter, you shoud be abe to:. Understand the fundamentas of the mutidimensiona direct search methods. Understand how the coordinate

More information

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions 2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters Optimization and Appication of Support Vector Machine Based on SVM Agorithm Parameters YAN Hui-feng 1, WANG Wei-feng 1, LIU Jie 2 1 ChongQing University of Posts and Teecom 400065, China 2 Schoo Of Civi

More information

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction

More information

Alternative Decompositions for Distributed Maximization of Network Utility: Framework and Applications

Alternative Decompositions for Distributed Maximization of Network Utility: Framework and Applications Aternative Decompositions for Distributed Maximization of Network Utiity: Framework and Appications Danie P. Paomar and Mung Chiang Eectrica Engineering Department, Princeton University, NJ 08544, USA

More information

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations Formuation of Loss minimization Probem Using Genetic Agorithm and Line-Fow-based Equations Sharanya Jaganathan, Student Member, IEEE, Arun Sekar, Senior Member, IEEE, and Wenzhong Gao, Senior member, IEEE

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

M. Badent 1, E. Di Giacomo 2, G. Liotta 2

M. Badent 1, E. Di Giacomo 2, G. Liotta 2 DIEI Dipartimento di Ingegneria Eettronica e de informazione RT 005-06 Drawing Coored Graphs on Coored Points M. Badent 1, E. Di Giacomo 2, G. Liotta 2 1 University of Konstanz 2 Università di Perugia

More information

Comparative Analysis of Relevance for SVM-Based Interactive Document Retrieval

Comparative Analysis of Relevance for SVM-Based Interactive Document Retrieval Comparative Anaysis for SVM-Based Interactive Document Retrieva Paper: Comparative Anaysis of Reevance for SVM-Based Interactive Document Retrieva Hiroshi Murata, Takashi Onoda, and Seiji Yamada Centra

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line American J. of Engineering and Appied Sciences 3 (): 5-24, 200 ISSN 94-7020 200 Science Pubications Appication of Inteigence Based Genetic Agorithm for Job Sequencing Probem on Parae Mixed-Mode Assemby

More information

Response Surface Model Updating for Nonlinear Structures

Response Surface Model Updating for Nonlinear Structures Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,

More information

A Novel Linear-Polynomial Kernel to Construct Support Vector Machines for Speech Recognition

A Novel Linear-Polynomial Kernel to Construct Support Vector Machines for Speech Recognition Journa of Computer Science 7 (7): 99-996, 20 ISSN 549-3636 20 Science Pubications A Nove Linear-Poynomia Kerne to Construct Support Vector Machines for Speech Recognition Bawant A. Sonkambe and 2 D.D.

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism Backing-up Fuzzy Contro of a Truck-traier Equipped with a Kingpin Siding Mechanism G. Siamantas and S. Manesis Eectrica & Computer Engineering Dept., University of Patras, Patras, Greece gsiama@upatras.gr;stam.manesis@ece.upatras.gr

More information

Parallel Flow-Sensitive Pointer Analysis by Graph-Rewriting

Parallel Flow-Sensitive Pointer Analysis by Graph-Rewriting Parae Fow-Sensitive Pointer Anaysis by Grah-Rewriting Vaivaswatha Nagaraj R. Govindarajan Indian Institute of Science, Bangaore PACT 2013 2 Outine Introduction Background Fow-sensitive grah-rewriting formuation

More information

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae

More information

FACE RECOGNITION WITH HARMONIC DE-LIGHTING. s: {lyqing, sgshan, wgao}jdl.ac.cn

FACE RECOGNITION WITH HARMONIC DE-LIGHTING.  s: {lyqing, sgshan, wgao}jdl.ac.cn FACE RECOGNITION WITH HARMONIC DE-LIGHTING Laiyun Qing 1,, Shiguang Shan, Wen Gao 1, 1 Graduate Schoo, CAS, Beijing, China, 100080 ICT-ISVISION Joint R&D Laboratory for Face Recognition, CAS, Beijing,

More information

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,

More information

Fastest-Path Computation

Fastest-Path Computation Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

On-Chip CNN Accelerator for Image Super-Resolution

On-Chip CNN Accelerator for Image Super-Resolution On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method 297 Rea-Time Feature escriptor Matching via a Muti-Resoution Ehaustive Search Method Chi-Yi Tsai, An-Hung Tsao, and Chuan-Wei Wang epartment of Eectrica Engineering, Tamang University, New Taipei City,

More information

Automatic Grouping for Social Networks CS229 Project Report

Automatic Grouping for Social Networks CS229 Project Report Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters

Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters Crossing Minimiation Probems o Drawing Bipartite Graphs in Two Custers Lanbo Zheng, Le Song, and Peter Eades Nationa ICT Austraia, and Schoo o Inormation Technoogies, University o Sydney,Austraia Emai:

More information

A Petrel Plugin for Surface Modeling

A Petrel Plugin for Surface Modeling A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica

More information

TechTest2017. Solutions Key. Final Edit Copy. Merit Scholarship Examination in the Sciences and Mathematics given on 1 April 2017, and.

TechTest2017. Solutions Key. Final Edit Copy. Merit Scholarship Examination in the Sciences and Mathematics given on 1 April 2017, and. TechTest07 Merit Schoarship Examination in the Sciences and Mathematics given on Apri 07, and sponsored by The Sierra Economics and Science Foundation Soutions Key V9feb7 TechTest07 Soutions Key / 9 07

More information

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:

More information

Space-Time Trade-offs.

Space-Time Trade-offs. Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe

More information

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing 100039, China shentao@casm.ac.cn Xu Dehe Institute of resources and environment, North

More information

Improvement of Nearest-Neighbor Classifiers via Support Vector Machines

Improvement of Nearest-Neighbor Classifiers via Support Vector Machines From: FLAIRS-01 Proceedings. Copyright 2001, AAAI (www.aaai.org). A rights reserved. Improvement of Nearest-Neighbor Cassifiers via Support Vector Machines Marc Sebban and Richard Nock TRIVIA-Department

More information

Image Segmentation Using Semi-Supervised k-means

Image Segmentation Using Semi-Supervised k-means I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging

More information

Alpha labelings of straight simple polyominal caterpillars

Alpha labelings of straight simple polyominal caterpillars Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.

More information

Further Concepts in Geometry

Further Concepts in Geometry ppendix F Further oncepts in Geometry F. Exporing ongruence and Simiarity Identifying ongruent Figures Identifying Simiar Figures Reading and Using Definitions ongruent Trianges assifying Trianges Identifying

More information

Endoscopic Motion Compensation of High Speed Videoendoscopy

Endoscopic Motion Compensation of High Speed Videoendoscopy Endoscopic Motion Compensation of High Speed Videoendoscopy Bharath avuri Department of Computer Science and Engineering, University of South Caroina, Coumbia, SC - 901. ravuri@cse.sc.edu Abstract. High

More information

Research of Classification based on Deep Neural Network

Research of  Classification based on Deep Neural Network 2018 Internationa Conference on Sensor Network and Computer Engineering (ICSNCE 2018) Research of Emai Cassification based on Deep Neura Network Wang Yawen Schoo of Computer Science and Engineering Xi

More information

Discrete elastica model for shape design of grid shells

Discrete elastica model for shape design of grid shells Abstracts for IASS Annua Symposium 017 5 8th September, 017, Hamburg, Germany Annette Böge, Manfred Grohmann (eds.) Discrete eastica mode for shape design of grid shes Yusuke SAKAI* and Makoto OHSAKI a

More information

Topics 1. Manipulators and robots

Topics 1. Manipulators and robots Proceedings of the Internationa Symposium of Mechanism and Machine Science, 017 AzCIFToMM Azerbaijan Technica University 11-14 September 017, Baku, Azerbaijan Topics 1. Manipuators and robots Anaysis and

More information

An inexact optimization approach for river water-quality management

An inexact optimization approach for river water-quality management Journa of Environmenta Management 81 (2006) 233 248 www.esevier.com/ocate/jenvman An inexact optimization approach for river water-quaity management Subhankar Karmakar, P.P. Mujumdar Department of Civi

More information

Layer-Specific Adaptive Learning Rates for Deep Networks

Layer-Specific Adaptive Learning Rates for Deep Networks Layer-Specific Adaptive Learning Rates for Deep Networks arxiv:1510.04609v1 [cs.cv] 15 Oct 2015 Bharat Singh, Soham De, Yangmuzi Zhang, Thomas Godstein, and Gavin Tayor Department of Computer Science Department

More information

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM JOINT IMAGE REGISTRATION AND AMPLE-BASED SUPER-RESOLUTION ALGORITHM Hyo-Song Kim, Jeyong Shin, and Rae-Hong Park Department of Eectronic Engineering, Schoo of Engineering, Sogang University 35 Baekbeom-ro,

More information

THE MOLDFLOW ANALYSE OF THE INJECTION PARTS, AND THE IMPROVEMENT OF THE INJECTION PROCESS.

THE MOLDFLOW ANALYSE OF THE INJECTION PARTS, AND THE IMPROVEMENT OF THE INJECTION PROCESS. THE MOLDFLOW ANALYSE OF THE INJECTION PARTS, AND THE IMPROVEMENT OF THE INJECTION PROCESS. Togan V.C. 1,2, Ioniţă Gh. 1 1 Vaahia University, Facuty of Materia Engineering, Mechatronics and Robotics, 18-24,

More information

DETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM

DETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM DETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM Le Minh 1, Thanh Hai Nguyen 2, Tran Nghia Khanh 2, Vo Văn Toi 2, Ngo Van Thuyen 1 1 University of Technica

More information

MACHINE learning techniques can, automatically,

MACHINE learning techniques can, automatically, Proceedings of Internationa Joint Conference on Neura Networks, Daas, Texas, USA, August 4-9, 203 High Leve Data Cassification Based on Network Entropy Fiipe Aves Neto and Liang Zhao Abstract Traditiona

More information

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Register Aocation Consider the foowing assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Assume that two registers are avaiabe. Starting from the eft a compier woud generate

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components Illustrated

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components Illustrated Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Fa 2017 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program instructions

More information

A HYBRID FEATURE SELECTION METHOD BASED ON FISHER SCORE AND GENETIC ALGORITHM

A HYBRID FEATURE SELECTION METHOD BASED ON FISHER SCORE AND GENETIC ALGORITHM Journa of Mathematica Sciences: Advances and Appications Voume 37, 2016, Pages 51-78 Avaiabe at http://scientificadvances.co.in DOI: http://dx.doi.org/10.18642/jmsaa_7100121627 A HYBRID FEATURE SELECTION

More information

QoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization

QoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization QoS-Aware Data Transmission and Wireess Energy Transfer: Performance Modeing and Optimization Dusit Niyato, Ping Wang, Yeow Wai Leong, and Tan Hwee Pink Schoo of Computer Engineering, Nanyang Technoogica

More information

A study of comparative evaluation of methods for image processing using color features

A study of comparative evaluation of methods for image processing using color features A study of comparative evauation of methods for image processing using coor features FLORENTINA MAGDA ENESCU,CAZACU DUMITRU Department Eectronics, Computers and Eectrica Engineering University Pitești

More information

Substitute Model of Deep-groove Ball Bearings in Numeric Analysis of Complex Constructions Like Manipulators

Substitute Model of Deep-groove Ball Bearings in Numeric Analysis of Complex Constructions Like Manipulators Mechanics and Mechanica Engineering Vo. 12, No. 4 (2008) 349 356 c Technica University of Lodz Substitute Mode of Deep-groove Ba Bearings in Numeric Anaysis of Compex Constructions Like Manipuators Leszek

More information

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages Fuzzy Equivaence Reation Based Custering and Its Use to Restructuring Websites Hyperinks and Web Pages Dimitris K. Kardaras,*, Xenia J. Mamakou, and Bi Karakostas 2 Business Informatics Laboratory, Dept.

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

Fuzzy Estimations of Process Incapability Index

Fuzzy Estimations of Process Incapability Index Fuzzy Estimations of Process Incaabiity Index engiz Kahraman Ihsan Kaya Abstract Process caabiity indices (PIs) rovide numerica measures on whether a rocess confirms to the defined manufacturing caabiity

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Y.LI AND B.BHANU CAMERA ASSIGNMENT: A GAME-THEORETIC

More information

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES Eya En Gad, Akshay Gadde, A. Saman Avestimehr and Antonio Ortega Department of Eectrica Engineering University of Southern

More information

Transformation Invariance in Pattern Recognition: Tangent Distance and Propagation

Transformation Invariance in Pattern Recognition: Tangent Distance and Propagation Transformation Invariance in Pattern Recognition: Tangent Distance and Propagation Patrice Y. Simard, 1 Yann A. Le Cun, 2 John S. Denker, 2 Bernard Victorri 3 1 Microsoft Research, 1 Microsoft Way, Redmond,

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

Efficient Convex Optimization for Minimal Partition Problems with Volume Constraints

Efficient Convex Optimization for Minimal Partition Problems with Volume Constraints Efficient Convex Optimization for Minima Partition Probems with Voume Constraints Thomas Möenhoff, Caudia Nieuwenhuis, Eno Töppe, and Danie Cremers Department of Computer Science, Technica University of

More information

Multi-level Shape Recognition based on Wavelet-Transform. Modulus Maxima

Multi-level Shape Recognition based on Wavelet-Transform. Modulus Maxima uti-eve Shape Recognition based on Waveet-Transform oduus axima Faouzi Aaya Cheikh, Azhar Quddus and oncef Gabbouj Tampere University of Technoogy (TUT), Signa Processing aboratory, P.O. Box 553, FIN-33101

More information

Binarized support vector machines

Binarized support vector machines Universidad Caros III de Madrid Repositorio instituciona e-archivo Departamento de Estadística http://e-archivo.uc3m.es DES - Working Papers. Statistics and Econometrics. WS 2007-11 Binarized support vector

More information

Complex Human Activity Searching in a Video Employing Negative Space Analysis

Complex Human Activity Searching in a Video Employing Negative Space Analysis Compex Human Activity Searching in a Video Empoying Negative Space Anaysis Shah Atiqur Rahman, Siu-Yeung Cho, M.K.H. Leung 3, Schoo of Computer Engineering, Nanyang Technoogica University, Singapore 639798

More information

CERIAS Tech Report Replicated Parallel I/O without Additional Scheduling Costs by Mikhail J. Atallah Center for Education and Research

CERIAS Tech Report Replicated Parallel I/O without Additional Scheduling Costs by Mikhail J. Atallah Center for Education and Research CERIAS Tech Report 2003-50 Repicated Parae I/O without Additiona Scheduing Costs by Mikhai J. Ataah Center for Education and Research Information Assurance and Security Purdue University, West Lafayette,

More information

An Exponential Time 2-Approximation Algorithm for Bandwidth

An Exponential Time 2-Approximation Algorithm for Bandwidth An Exponentia Time 2-Approximation Agorithm for Bandwidth Martin Fürer 1, Serge Gaspers 2, Shiva Prasad Kasiviswanathan 3 1 Computer Science and Engineering, Pennsyvania State University, furer@cse.psu.edu

More information

Service Scheduling for General Packet Radio Service Classes

Service Scheduling for General Packet Radio Service Classes Service Scheduing for Genera Packet Radio Service Casses Qixiang Pang, Amir Bigoo, Victor C. M. Leung, Chris Schoefied Department of Eectrica and Computer Engineering, University of British Coumbia, Vancouver,

More information

FIRST BEZIER POINT (SS) R LE LE. φ LE FIRST BEZIER POINT (PS)

FIRST BEZIER POINT (SS) R LE LE. φ LE FIRST BEZIER POINT (PS) Singe- and Muti-Objective Airfoi Design Using Genetic Agorithms and Articia Inteigence A.P. Giotis K.C. Giannakogou y Nationa Technica University of Athens, Greece Abstract Transonic airfoi design probems

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network Service Chain (SC) Mapping with Mutipe SC Instances in a Wide Area Network This is a preprint eectronic version of the artice submitted to IEEE GobeCom 2017 Abhishek Gupta, Brigitte Jaumard, Massimo Tornatore,

More information

GPU Implementation of Parallel SVM as Applied to Intrusion Detection System

GPU Implementation of Parallel SVM as Applied to Intrusion Detection System GPU Impementation of Parae SVM as Appied to Intrusion Detection System Sudarshan Hiray Research Schoar, Department of Computer Engineering, Vishwakarma Institute of Technoogy, Pune, India sdhiray7@gmai.com

More information

Reference trajectory tracking for a multi-dof robot arm

Reference trajectory tracking for a multi-dof robot arm Archives of Contro Sciences Voume 5LXI, 5 No. 4, pages 53 57 Reference trajectory tracking for a muti-dof robot arm RÓBERT KRASŇANSKÝ, PETER VALACH, DÁVID SOÓS, JAVAD ZARBAKHSH This paper presents the

More information

FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES

FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES Tien Sy Nguyen, Stéphane Begot, Forent Ducuty, Manue Avia To cite this version: Tien Sy Nguyen, Stéphane Begot, Forent

More information

A Novel Method for Early Software Quality Prediction Based on Support Vector Machine

A Novel Method for Early Software Quality Prediction Based on Support Vector Machine A Nove Method for Eary Software Quaity Prediction Based on Support Vector Machine Fei Xing 1,PingGuo 1;2, and Michae R. Lyu 2 1 Department of Computer Science Beijing Norma University, Beijing, 1875, China

More information

Path-Based Protection for Surviving Double-Link Failures in Mesh-Restorable Optical Networks

Path-Based Protection for Surviving Double-Link Failures in Mesh-Restorable Optical Networks Path-Based Protection for Surviving Doube-Link Faiures in Mesh-Restorabe Optica Networks Wensheng He and Arun K. Somani Dependabe Computing and Networking Laboratory Department of Eectrica and Computer

More information

Efficient method to design RF pulses for parallel excitation MRI using gridding and conjugate gradient

Efficient method to design RF pulses for parallel excitation MRI using gridding and conjugate gradient Origina rtice Efficient method to design RF puses for parae excitation MRI using gridding and conjugate gradient Shuo Feng, Jim Ji Department of Eectrica & Computer Engineering, Texas & M University, Texas,

More information

Timing-Driven Hierarchical Global Routing with Wire-Sizing and Buffer-Insertion for VLSI with Multi-Routing-Layer

Timing-Driven Hierarchical Global Routing with Wire-Sizing and Buffer-Insertion for VLSI with Multi-Routing-Layer Timing-Driven Hierarchica Goba Routing with Wire-Sizing and Buffer-Insertion for VLSI with Muti-Routing-Layer Takahiro DEGUCHI y Tetsushi KOIDE z Shin ichi WAKABAYASHI y yfacuty of Engineering, Hiroshima

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

The Big Picture WELCOME TO ESIGNAL

The Big Picture WELCOME TO ESIGNAL 2 The Big Picture HERE S SOME GOOD NEWS. You don t have to be a rocket scientist to harness the power of esigna. That s exciting because we re certain that most of you view your PC and esigna as toos for

More information

Application of Image Fusion Techniques on Medical Images

Application of Image Fusion Techniques on Medical Images Internationa Journa of Current Engineering and Technoogy E-ISS 77 406, P-ISS 347 56 07 IPRESSCO, A Rights Reserved Avaiabe at http://inpressco.com/category/icet Research Artice Appication of Image usion

More information

On Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture

On Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture On inding the est Partia Muticast Protection Tree under ua-homing rchitecture Mei Yang, Jianping Wang, Xiangtong Qi, Yingtao Jiang epartment of ectrica and omputer ngineering, University of Nevada Las

More information

Genetic Algorithms for Parallel Code Optimization

Genetic Algorithms for Parallel Code Optimization Genetic Agorithms for Parae Code Optimization Ender Özcan Dept. of Computer Engineering Yeditepe University Kayışdağı, İstanbu, Turkey Emai: eozcan@cse.yeditepe.edu.tr Abstract- Determining the optimum

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Attention The materias beow are

More information

Development of a hybrid K-means-expectation maximization clustering algorithm

Development of a hybrid K-means-expectation maximization clustering algorithm Journa of Computations & Modeing, vo., no.4, 0, -3 ISSN: 79-765 (print, 79-8850 (onine Scienpress Ltd, 0 Deveopment of a hybrid K-means-expectation maximization custering agorithm Adigun Abimboa Adebisi,

More information