Distributed Threshold Selection for Aggregate Threshold Monitoring in Sensor Networks

Size: px
Start display at page:

Download "Distributed Threshold Selection for Aggregate Threshold Monitoring in Sensor Networks"

Transcription

1 Dstrbuted Threshold Selecton for Aggregate Threshold Montorng n Sensor Networks Mohammad S. Taleb School of Computer Scence, IPM, Iran mstaleb@pm.r Ahmad Khonsar School of Computer Scence, IPM, Iran ECE Department, Unversty of Tehran ak@pm.r Al Abbas ECE Department, Unversty of Tehran a.abbas@ece.ut.ac.r Abstract Motvated by applcatons lke sensor, peer to peer, ad hoc networks there has been growng nterest n montorng large scale dstrbuted systems. In these applcatons typcally we wsh to montor a global system condton whch s defned as a functon of local network elements parameters. In ths paper, we study Aggregate Threshold Queres n sensor networks, whch are used to detect when an aggregate value of all sensor measurements crosses a predetermned threshold. The major constrant n desgnng montorng applcatons s reducng the amount of communcaton burden whch s the domnant factor of energy dran n wreless sensor networks. In ths study, we address the aggregate threshold montorng problem by proposng a dstrbuted algorthm to set local thresholds on each sensor node so that only those sensors whose measurements crosses ther local thresholds commence communcaton. We adopt the FPTAS optmzaton formulaton of the problem [1] and propose a dstrbuted algorthm as the soluton to the problem. Smulaton results demonstrate the valdty of the proposed dstrbuted algorthm n attanng very close performance as the centralzed scheme. Index Terms Aggregate Threshold Montorng, Sensor Networks, Optmzaton, Iteratve Methods. I. INTRODUCTION In recent years, wth the abundance of emergng large scale dstrbuted systems such as sensor networks, and peer to peer networks, montorng scenaros s progressvely more consdered vtal to track these systems. In montorng ether we are nterested n supervsng the network tself (e.g. traffc engneerng, routng optmzaton, anomaly detecton n data networks, or envronment that network deployed n t (e.g. wldlfe behavor, movng objects n sensor networks. Network montorng ncludes measurng system parameters to react to dfferent network condtons. There are two ways of gettng knowledge from the network; the frst s to send requests nto the network to poll all relevant nformaton. Another opton s that all network elements push all possbly mportant readngs to the management staton. The nature of network montorng applcatons mposes specfc requrements on desgn of montorng algorthm: 1- The algorthm should provde real-tme detecton of noteworthy events. 2- The algorthm must be scalable to large number of nodes. 3- The detecton process should ncur mnmum communcaton n the network. Thereby, a challenge n montorng applcatons s to devse plans to reduce communcaton whle fulfllng applcaton requrements. A common method s to nstall local constrants or flters at remote sources to flter out unnecessary updates. Local constrants should have the property such that preservng all of them ensures that there was not any anomalous event. Each new measurement s compared to the flter and n case t volates (exts the correspondng range of the flter an update s sent to the base staton. Apparently effcent decomposton of global system constrant nto local constrant has a great mpact on reducng communcaton. Flter settng s dependent on a number of parameters ncludng the assocated cost wth sendng an update from each node to the management staton and the changng patterns of measurements. Often the montorng task s the need to detect when a functon of ndvdual network element readngs crosses a gven threshold. Typcally, montored functons are aggregate functons lke SUM, or AVG whch gves global nsghts concernng the state of the network. Consder the followng queres: Report when the number of enemy troops detected n a regon of the network crosses 20. Report when varance of temperature n a buldng crosses 3. Aggregate functons lke SUM, AVG are lnear functons of ndvdual sensor readngs, thus the global property of A T T can be decomposed to a set of x T constrants whch checked locally at each node. In ths work, we concentrate on the problem of determnng optmal values for T s. Prevous work [1] assumed that the montorng staton computes the optmal thresholds based on ndvdual nodes probablty dstrbuton functons and assgns thresholds for nodes. Thus, each node should update ts hstogram constructed over recent measurements ether perodcally or based on a change detecton algorthm to the base staton. But there s lmtaton on the applcablty of such an approach for sensor networks. The structure of such networks has necesstated the desgn of asynchronous, dstrbuted and faulttolerant computaton and nformaton exchange algorthms [4]. In ths work, we propose a dstrbuted algorthm for optmal threshold assgnment so as to mnmze the probablty of global system pollng. The remander of the paper s organzed as follows: Secton II revews related works. Secton III defnes the system model

2 and problem defnton. Secton IV provdes the optmal soluton to the threshold assgnment problem. Secton V presents a dstrbuted threshold assgnment algorthm based on the problem s optmal soluton. Secton VI valdates expermental evaluaton of the proposed method. Fnally, Secton VII concludes the study. II. RELATED WORKS In recent years, contnuous query processng for montorng dstrbuted data streams has attracted much research. Montorng aggregate threshold queres n networks ntally mentoned by the poneerng work of Raz et al [8]. They ntroduced nstallng local mathematcal constrants at remote stes and present a smple approach for threshold assgnment assumng unform data dstrbutons of system varables. Keralpera et al [12] presented several algorthms for statc and adaptve threshold settng for montorng thresholded counts queres and analyzed the communcaton complexty of each algorthm. Sharfman et al [16] ntroduced a geometrc approach for montorng arbtrary threshold functons. Recent work of Kashyap et al [10] consdered the problem of nonzero slack threshold assgnment whch adaptvely dedcates the fracton of total threshold to montorng node to absorb small local threshold crossng that elmnates the need for global system pollng. III. SYSTEM MODEL AND PROBLEM FORMULATION We model the topology of the sensor network by an undrected graph G =(V, E. The vertex set V = {1, 2,...,n} and edge set E V Vdenotes the set of nodes and lnks, respectvely. For the edge set, we have (, j E f and only f there s a connecton between node and j. Wealsorefer to the neghbors of node as N = {j V (, j E}. We assume that there s a base staton beng responsble for montorng the network. The base staton dssemnates queres to sensors and responds to user queres. Each sensor node contnuously measures (reads the requested local phenomenon x (for example, humdty, lght whch s n the range [0,M ] at a fxed samplng rate. The goal s to detect when the aggregate value of all the measurements n A x crosses a predetermned threshold T. To compute the aggregate we can perform value montorng va global pollng or algorthm lke [14]. Accordng to [5] value montorng drectly solves threshold montorng, and runnng O( 1 ɛ log T nstances of a threshold montorng algorthm for thresholds 1, 1+ɛ, (1 + ɛ 2,...,T solves value montorng wth relatve error ɛ. So, the two varants dffer by at most a factor of O( 1 ɛ log T. Thus determnng whether an aggregate has crossed a threshold does not requre knowng the exact value of the aggregate. A common method to reduce communcaton s to nstall local constrants or flters (n the form of an nterval [0,T ]at remote sources. Local constrants settng should mantan the property that preservng all of them, ensures that the aggregate value has not exceeded the threshold (coverng property. Each sensor after measurng the new value of x, checks condton L (x [0,T ], and the condton upon beng volated, an update s sent to the base staton to ntate global aggregate computaton. Usng ths method, vast amount of updates are fltered out at the source and are not transmtted to the base staton. The effcency of ths approach s largely dependent on flter settng method. But what values should we choose for T s? Selecton of values must satsfy the global property n A T T to conform coverng property. However, ths equaton leads to great flexblty n choosng T s. In ths respect, we face to another queston: what s the best selecton? Our goal s to mnmze communcaton cost, towards whch we should mnmze the probablty of global pollng. Every local flter volaton leads to global computaton, thus we should maxmze the probablty of preservng all local constrants max F (x 1 T 1,...,x n T n, where F s the jont cumulatve frequency dstrbuton over all the sensors. Computng the mult-dmensonal hstograms s somewhat cumbersome n terms of communcaton burden, and hence we consder more communcaton convenent assumpton of ndependence between sensor s data dstrbutons. Wth ths smplfyng assumpton, we have Pr(L = true = n F (T F (M Snce F (M s are constant, the optmzaton problem can be formulated as n max F (T (2 T subject to: (1 n A T T (3 where T =(T,..n s the vector representaton of local thresholds. Accordng to [1] local threshold selecton problem s NP-hard. They ntroduced a centralzed scheme, referred to as FPTAS, to solve the problem wthn ɛ relatve error for arbtrarly small ɛ. The soluton was based on the assumpton that all the values of F (T are ntegral powers of a constant α, whch s slghtly greater than 1. Thus, each F (T wll correspond to some α r and maxmzng n F (T wll be equvalent to maxmzng α r.lett (r be the local threshold of node such that α r F (T (r <α r+1 (4 Then, the optmzaton problem becomes n max r (5 r subject to: n A T (r T (6 where r =(r,..n s the vector representaton of powers. In order for (5 to admt a unque maxmzer, we argue that F must be an ncreasng and strctly concave functon. Indeed,

3 we assume that optmzaton varable, r,..n, belongs to a doman n whch F satsfes these assumptons. IV. OPTIMAL SOLUTION In ths secton, we solve problem (5. Problem (5 s a constraned problem, whose constrant (6 s coupled across the network. Such a constraned optmzaton problem can be effcently solved usng Interor Pont Method [4], whch necesstates the coordnaton among possbly all nodes of the networks, whch s undesrable or nfeasble. However, n the context of wreless ad-hoc and sensor networks, we are nterested n dstrbutve algorthms to solve (5. Towards ths end, we am at solvng problem (5 through ts dual. In ths respect, problem (5 s called prmal problem. In the sequel, we proceed to derve the dual problem of (5 and then present a dstrbutvely teratve algorthm as the soluton to the dual problem. A. Dervng Dual Problem We start by wrtng the Lagrangan of problem (5, as follows ( n n L(r,μ= r μ A T (r T (7 where μ > 0 s the Lagrange multpler assocated wth constrant (6. Usng Karush-Kuhn-Tucker (KKT condtons for convex optmzaton, to fnd optmal prmal varables,.e. optmal powers r, we should fnd the statonary ponts of the Lagrangan and satsfy complementary slackness condtons. The complementary slackness condtons for optmal prmal varable r and dual varable μ,are μ 0; (8 n A T (r T ; (9 ( n μ A T (r T =0 (10 In order to fnd the statonary ponts of the Lagrangan, we solve L r (r,μ =0 (11 where 0 s a vector wth all zero. For the th element of (11 we have L dt (r =1 μa (12 r dr From (4, recall that T (r s selected so that (4 s satsfed. Also, recall that α s a constant slghtly greater than 1. Therefore, the lower and upper bounds n (4 are suffcently close to each other, leadng us to approxmate F (T (r, usng the concept of geometrc mean as followng: F (T (r α r α r+1 αα r α r (13 Recallng the monotoncty assumpton of CDFs, each CDF admts a unque nverse, whch yelds the explct expresson for T as T (r =F 1 (α r (14 Substtutng (14 n (12, yelds L df 1 (α r = 1 μa (15 r dr dα r df 1 = 1 μa dr dr α r 1 df = 1 μa α r ln α dr (16 α r Settng (16 to zero and dong some algebrac manpulatons, gves an explct expresson for the optmal power r n terms of optmal Lagrange multpler μ. For the sake of presentaton, we defne 1 df G (z = dr (17 z Substtutng G (. n (16, we come up to the followng mplct equaton to obtan r 1 α r G (α r = μ (18 A ln α In order to solve problem (5 through ts dual, we need to obtan the Lagrange dual functon, or smply dual functon. The Lagrange dual functon D(μ s defned as the maxmum of the Lagrangan L(r,μ over the prmal varable r, fora gven μ. Thus, D(μ can be expressed as D(μ = max L(r,μ (19 r Based on the KKT condton and usng (18, for D(μ we get The dual problem s formulated as D(μ =L(r,μ (20 mn D(μ mn μ 0 μ 0 L(r,μ (21 Dual problem defned above can be solved usng teratve methods. In order to obtan a dstrbuted algorthm, we solve the dual problem (21 usng Gradent Projecton algorthm. We postpone solvng (21 to the next subsecton. B. Solvng The Dual In ths subsecton, we solve the dual problem usng Gradent Projecton Algorthm. To solve the dual problem, Gradent Projecton Algorthm adjusts μ n opposte drecton to the Gradent of dual functon,.e. D(μ. Precsely speakng, n the kth teraton step, μ (k s updated as follows [ ] + μ (k+1 = μ (k γ dd(μ(k (22 dμ

4 where [z] + = max{z,0} and γ s a suffcently small constant step sze. Usng the Danskn s Theorem [3], the dervatve of D(μ s gven by dd(μ dμ = T n A T (r (23 Substtutng (23 n (22, yelds [ ( n ]+ μ (k+1 = μ (k + γ A T (r (k T (24 where r (k s the soluton to (18 for a gven μ (k.inths equaton, γ s chosen suffcently small so as to guarantee the convergence. In the economcs lterature, Lagrange multpler or dual varable, μ s called shadow prce [11] and accordngly, (24 s called shadow prce update. Ths stems from the nterpretaton of ts role n solvng the prmal problem va ts dual. From (18 t s apparent that r s a decreasng functon of μ; therefore μ can be construed as the prce whch must be pad by node to acheve the threshold T (r. As the nature of such a prce s hdden to nodes from the prmal problem perspectve, t s called shadow prce. (18 and (24 form an teratve soluton to problem (21 and thereby problem (5. At each teraton step k, dual varable μ wll be updated based on the hstory of tself and the prmal varables r. Then, t would be utlzed by each node to update prmal varable r, accordngly. Therefore, after spendng enough teraton steps, prmal and dual varables tends to prmal-optmal r and dual-optmal μ, respectvely. Based on the above teratve soluton, we propose a dstrbuted algorthm as a dstrbuted soluton to the threshold selecton problem. We deffer the algorthm untl Secton V. V. ALGORITHM In ths secton, we propose a dstrbuted algorthm based on the teratve soluton obtaned n Secton IV. Consderng (24 and (18, t s clear that the teratve soluton to problem (5 can be exploted to desgn a dstrbuted algorthm. We elaborate to employ a heurstc mechansm, proposed by Jadbabae et al [9] to come up wth a fully dstrbuted algorthm whch only requres local nformaton of the network. Snce each sensor s supposed to update μ locally, the realzed update evoluton wll dffer between sensor nodes. To avod confuson between the updated value at each node, we ntroduce ˆμ (k notaton, by whch we mean the updated value of the shadow prce at node n teraton step k. The algorthm evolves as followng: At each teraton step k, each sensor exchanges ts data, ˆμ (k and r (k, wth ts neghborng nodes,.e. those belongng to N. Then, t proceeds to update ts estmaton of the shadow prce ˆμ (k, accordng to the nearest neghbor rule, proposed by Jadbabae et al [9], whch s modfed as followng: NDTA Neghbor-based Dstrbuted Threshold Assgnment Algorthm Intalzaton Intalze the followng tems: 1. A sandt. 2. S = n A. 3. =1..n, S = N A. Man Loop Do untl max r (k+1 r (k <ɛ At each sensor node, 1. Update the shadow prce as followng: ˆμ (k+1 [ = ˆμ (k + γ 2. Update r (k ( N A T (r (k α r(k+1 G (α r(k+1 = T S S ] + accordng to the followng equaton: 1 ˆμ (k A ln α NDTA. Neghbor-based Dstrbuted Threshold Assgnment Algorthm [ ( n ˆμ (k+1 = ˆμ (k + γ A T (r (k N A n A T ]+ (25 where N A / n A denotes the fracton of total threshold T assgned to the vrtual subnetwork establshed by nodes {} N. We wll refer to ths algorthm as Neghborbased Dstrbuted Threshold Assgnment Algorthm or for short NDTA Algorthm. The NDTA Algorthm s stated below. VI. EXPERIMENTAL EVALUATION We have conducted smulaton experments to evaluate the performance of our proposed algorthm. We verfy that NDTA Algorthm, locally executed on each node, may ndeed acheve the desred global optmal threshold assgnment. In our smulaton scenaro, we consder a sensor network consstng of 100 sensor nodes. We assume that each node ncessantly takes measurements of a physcal phenomenon, whose CDF obeys an exponental dstrbuton wth the exponent parameter λ. Although such a dstrbuton may sound to be of lmted nterest, t s worth mentonng that many sgnfcant real world applcatons mght fall wthn such a framework. Amongst such applcatons are montorng the dwell tme of a traffc flow whch pursue a Posson dstrbuton. The correspondng coeffcent A s assumed to be randomly drawn from a unform dstrbuton over [0, 5]. Step sze s chosen to be γ =1.2and the total threshold T s set to 10. The most sgnfcant ssues of nterest are the evolutons of prmal and dual (shadow prce varables. Evoluton of assgned thresholds T s and shadow prce μ for NDTA Algorthm are depcted n Fg. 1 and 2, respectvely. It s apparent from these fgures that by spendng less than 300 teraton steps, convergence was acheved and thereafter, μ and T s had ntangble varatons. NDTA s ndeed a suboptmal algorthm. In order to compare the performance of NDTA wth the optmal scheme, threshold assgnment for both NDTA and optmal scheme

5 Fg. 1. Evoluton of The Assgned Thresholds T (r for Some Nodes Usng NDTA Algorthm Fg. 3. Comparson Between NDTA and Centralzed Scheme whch acts usng only local nformaton of the network usng the data whch has been provded by the neghborng nodes. The results extracted from the expermental evaluaton was promsng and demonstrated the acheved performance of the NDTA algorthm s qute comparable to the results of the centralzed approach. Fg. 2. Evoluton of The Shadow Prce μ for Some Nodes Usng NDTA Algorthm whch s obtaned usng a centralzed algorthm s depcted n Fg. 3, whch shows that the result of NDTA s qute close to the optmal case. VII. CONCLUSION There have been many studes explorng varous applcatons of WSNs such as montorng. In ths paper, we addressed the problem of dstrbuted threshold selecton for aggregate threshold montorng n WSNs. The nature of such networks has nduced the desgn of dstrbuted algorthms for exchangng the nformaton among the sensor nodes. We formulated threshold selecton problem as an optmzaton problem that consders the data dstrbuton of dstnct montorng varables, and whose objectve s to mnmze the probablty of global pollng. The orgnal problem was non-convex, thus we adopted the so called FPTAS reformulaton whch was convex and has been solved usng a centralzed approach. We elaborated ths method and solved the problem va ts dual so as to acheve a dstrbuted soluton. Our dstrbuted soluton leads to the fully dstrbuted algorthm called NDTA, REFERENCES [1] S. Aggrawal, S. Deb, K. V. M. Nadu and R. Rastog, Effcent Detecton of Dstrbuted Constrant Volatons, In ICDE, pp , [2] B. Babcock and C. Olston, Dstrbuted Top-k Montorng, In SIGMOD, pp , [3] D. Bertsekas, Nonlnear Programmng, Athena Scentfc, [4] S. Boyd, A. Ghosh, B. Prabhakar and D. Shah, Gossp Algorthms: Desgn, Analyss, and Applcatons, In INFOCOM, pp , [5] G. Cormode, S. Muthurkshnan, K. Y. Algorthms for Dstrbuted Functonal Montorng, In SODA, [6] A. Deshpande, C. Guestrn, S. Madden, J. M. Hellersten and W. Hong, Model-Drven Data Acquston n Sensor Networks, In VLDB, pp , [7] A. Deshpande, C. Guestrn and S. Madden, Usng Probablstc Models for Data Management n Acqustonal Envronments, In CIDR, pp , [8] M. Dlman and D. Raz, Effcent Reactve Montorng, In INFOCOM, pp , [9] A. Jadbabae, J. Ln and A. Stephen Morse, Coordnaton of Groups of Moble Autonomous Agents Usng Nearest Neghbor Rules, In IEEE Transactons on Automatc Control, vol. 48, no. 6, pp , June [10] S. Kashyap, J. Ramamrtham, R. Rastog and P. Shukla, Effcent Constrant Montorng Usng Adaptve Thresholds, In ICDE, pp , [11] F. P. Kelly, A. Maulloo and D. K. H. Tan, Rate Control for Communcaton Networks: Shadow Prces, Proportonal Farness, and Stablty, Operatonal Research Socety, vol. 49, no. 3, pp , [12] R. Keralapura, G. Cormode and J. Ramamrtham, Communcaton- Effcent Dstrbuted Montorng of Thresholded Counts, In SIGMOD, pp , [13] D. Kfer, B. Sha and J. Gehrke, Detectng Change n Data Streams, In VLDB, pp , [14] C. Olston, J. Jang, and J. Wdom. Adaptve flters for contnuous queres over dstrbuted data streams. In SIGMOD, [15] V. Poosala and Y. Ioannds, Selectvty Estmaton Wthout The Attrbute Value Independence Assumpton, In VLDB, pp , [16] I. Sharfman, A. Schuster and D. Keren, A Geometrc Approach to Montorng Threshold Functons over Dstrbuted Data Streams, In SIGMOD, pp , 2006.

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

5 The Primal-Dual Method

5 The Primal-Dual Method 5 The Prmal-Dual Method Orgnally desgned as a method for solvng lnear programs, where t reduces weghted optmzaton problems to smpler combnatoral ones, the prmal-dual method (PDM) has receved much attenton

More information

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated.

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated. Some Advanced SP Tools 1. umulatve Sum ontrol (usum) hart For the data shown n Table 9-1, the x chart can be generated. However, the shft taken place at sample #21 s not apparent. 92 For ths set samples,

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Maintaining temporal validity of real-time data on non-continuously executing resources

Maintaining temporal validity of real-time data on non-continuously executing resources Mantanng temporal valdty of real-tme data on non-contnuously executng resources Tan Ba, Hong Lu and Juan Yang Hunan Insttute of Scence and Technology, College of Computer Scence, 44, Yueyang, Chna Wuhan

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Classification / Regression Support Vector Machines

Classification / Regression Support Vector Machines Classfcaton / Regresson Support Vector Machnes Jeff Howbert Introducton to Machne Learnng Wnter 04 Topcs SVM classfers for lnearly separable classes SVM classfers for non-lnearly separable classes SVM

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

Biostatistics 615/815

Biostatistics 615/815 The E-M Algorthm Bostatstcs 615/815 Lecture 17 Last Lecture: The Smplex Method General method for optmzaton Makes few assumptons about functon Crawls towards mnmum Some recommendatons Multple startng ponts

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

GSLM Operations Research II Fall 13/14

GSLM Operations Research II Fall 13/14 GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are

More information

Control strategies for network efficiency and resilience with route choice

Control strategies for network efficiency and resilience with route choice Control strateges for networ effcency and reslence wth route choce Andy Chow Ru Sha Centre for Transport Studes Unversty College London, UK Centralsed strateges UK 1 Centralsed strateges Some effectve

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

EVALUATION OF THE PERFORMANCES OF ARTIFICIAL BEE COLONY AND INVASIVE WEED OPTIMIZATION ALGORITHMS ON THE MODIFIED BENCHMARK FUNCTIONS

EVALUATION OF THE PERFORMANCES OF ARTIFICIAL BEE COLONY AND INVASIVE WEED OPTIMIZATION ALGORITHMS ON THE MODIFIED BENCHMARK FUNCTIONS Academc Research Internatonal ISS-L: 3-9553, ISS: 3-9944 Vol., o. 3, May 0 EVALUATIO OF THE PERFORMACES OF ARTIFICIAL BEE COLOY AD IVASIVE WEED OPTIMIZATIO ALGORITHMS O THE MODIFIED BECHMARK FUCTIOS Dlay

More information

Support Vector Machines. CS534 - Machine Learning

Support Vector Machines. CS534 - Machine Learning Support Vector Machnes CS534 - Machne Learnng Perceptron Revsted: Lnear Separators Bnar classfcaton can be veed as the task of separatng classes n feature space: b > 0 b 0 b < 0 f() sgn( b) Lnear Separators

More information

Smoothing Spline ANOVA for variable screening

Smoothing Spline ANOVA for variable screening Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

Cost-efficient deployment of distributed software services

Cost-efficient deployment of distributed software services 1/30 Cost-effcent deployment of dstrbuted software servces csorba@tem.ntnu.no 2/30 Short ntroducton & contents Cost-effcent deployment of dstrbuted software servces Cost functons Bo-nspred decentralzed

More information

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm , pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Programming in Fortran 90 : 2017/2018

Programming in Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.

More information

Very simple computational domains can be discretized using boundary-fitted structured meshes (also called grids)

Very simple computational domains can be discretized using boundary-fitted structured meshes (also called grids) Structured meshes Very smple computatonal domans can be dscretzed usng boundary-ftted structured meshes (also called grds) The grd lnes of a Cartesan mesh are parallel to one another Structured meshes

More information

Message-Passing Algorithms for Quadratic Programming Formulations of MAP Estimation

Message-Passing Algorithms for Quadratic Programming Formulations of MAP Estimation Message-Passng Algorthms for Quadratc Programmng Formulatons of MAP Estmaton Akshat Kumar Department of Computer Scence Unversty of Massachusetts Amherst akshat@cs.umass.edu Shlomo Zlbersten Department

More information

Minimization of the Expected Total Net Loss in a Stationary Multistate Flow Network System

Minimization of the Expected Total Net Loss in a Stationary Multistate Flow Network System Appled Mathematcs, 6, 7, 793-87 Publshed Onlne May 6 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/.436/am.6.787 Mnmzaton of the Expected Total Net Loss n a Statonary Multstate Flow Networ System

More information

A Decentralized Lifetime Maximization Algorithm for Distributed Applications in Wireless Sensor Networks

A Decentralized Lifetime Maximization Algorithm for Distributed Applications in Wireless Sensor Networks A Decentralzed Lfetme Maxmzaton Algorthm for Dstrbuted Applcatons n Wreless Sensor Networks Vrgna Pllon, Mauro Franceschell, Lug Atzor, Alessandro Gua Dept. of Electrcal and Electronc Engneerng, Unversty

More information

F Geometric Mean Graphs

F Geometric Mean Graphs Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 2 (December 2015), pp. 937-952 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) F Geometrc Mean Graphs A.

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

Backpropagation: In Search of Performance Parameters

Backpropagation: In Search of Performance Parameters Bacpropagaton: In Search of Performance Parameters ANIL KUMAR ENUMULAPALLY, LINGGUO BU, and KHOSROW KAIKHAH, Ph.D. Computer Scence Department Texas State Unversty-San Marcos San Marcos, TX-78666 USA ae049@txstate.edu,

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

Kent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming

Kent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming CS 4/560 Desgn and Analyss of Algorthms Kent State Unversty Dept. of Math & Computer Scence LECT-6 Dynamc Programmng 2 Dynamc Programmng Dynamc Programmng, lke the dvde-and-conquer method, solves problems

More information

Accounting for the Use of Different Length Scale Factors in x, y and z Directions

Accounting for the Use of Different Length Scale Factors in x, y and z Directions 1 Accountng for the Use of Dfferent Length Scale Factors n x, y and z Drectons Taha Soch (taha.soch@kcl.ac.uk) Imagng Scences & Bomedcal Engneerng, Kng s College London, The Rayne Insttute, St Thomas Hosptal,

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Decson surface s a hyperplane (lne n 2D) n feature space (smlar to the Perceptron) Arguably, the most mportant recent dscovery n machne learnng In a nutshell: map the data to a predetermned

More information

LECTURE NOTES Duality Theory, Sensitivity Analysis, and Parametric Programming

LECTURE NOTES Duality Theory, Sensitivity Analysis, and Parametric Programming CEE 60 Davd Rosenberg p. LECTURE NOTES Dualty Theory, Senstvty Analyss, and Parametrc Programmng Learnng Objectves. Revew the prmal LP model formulaton 2. Formulate the Dual Problem of an LP problem (TUES)

More information

Summarizing Data using Bottom-k Sketches

Summarizing Data using Bottom-k Sketches Summarzng Data usng Bottom-k Sketches Edth Cohen AT&T Labs Research 8 Park Avenue Florham Park, NJ 7932, USA edth@research.att.com Ham Kaplan School of Computer Scence Tel Avv Unversty Tel Avv, Israel

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

DECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks

DECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks da Rocha Henrques et al. EURASIP Journal on Wreless Communcatons and Networkng (2016) 2016:163 DOI 10.1186/s13638-016-0662-9 RESEARCH Open Access DECA: dstrbuted energy conservaton algorthm for process

More information

Repeater Insertion for Two-Terminal Nets in Three-Dimensional Integrated Circuits

Repeater Insertion for Two-Terminal Nets in Three-Dimensional Integrated Circuits Repeater Inserton for Two-Termnal Nets n Three-Dmensonal Integrated Crcuts Hu Xu, Vasls F. Pavlds, and Govann De Mchel LSI - EPFL, CH-5, Swtzerland, {hu.xu,vasleos.pavlds,govann.demchel}@epfl.ch Abstract.

More information

Game Based Virtual Bandwidth Allocation for Virtual Networks in Data Centers

Game Based Virtual Bandwidth Allocation for Virtual Networks in Data Centers Avaable onlne at www.scencedrect.com Proceda Engneerng 23 (20) 780 785 Power Electroncs and Engneerng Applcaton, 20 Game Based Vrtual Bandwdth Allocaton for Vrtual Networks n Data Centers Cu-rong Wang,

More information

Structure Formation of Social Network

Structure Formation of Social Network Structure Formaton of Socal Network DU Nan 1, FENG Hu 2, HUANG Zgang 3, Sally MAKI 4, WANG Ru(Ruby) 5, and ZHAO Hongxa (Melssa) 6 1 Bejng Unversty of Posts and Telecommuncatons, Chna 2 Fudan Unversty,

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

Optimal Workload-based Weighted Wavelet Synopses

Optimal Workload-based Weighted Wavelet Synopses Optmal Workload-based Weghted Wavelet Synopses Yoss Matas School of Computer Scence Tel Avv Unversty Tel Avv 69978, Israel matas@tau.ac.l Danel Urel School of Computer Scence Tel Avv Unversty Tel Avv 69978,

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

LECTURE : MANIFOLD LEARNING

LECTURE : MANIFOLD LEARNING LECTURE : MANIFOLD LEARNING Rta Osadchy Some sldes are due to L.Saul, V. C. Raykar, N. Verma Topcs PCA MDS IsoMap LLE EgenMaps Done! Dmensonalty Reducton Data representaton Inputs are real-valued vectors

More information

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

A Topology-aware Random Walk

A Topology-aware Random Walk A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble

More information

11. APPROXIMATION ALGORITHMS

11. APPROXIMATION ALGORITHMS Copng wth NP-completeness 11. APPROXIMATION ALGORITHMS load balancng center selecton prcng method: vertex cover LP roundng: vertex cover generalzed load balancng knapsack problem Q. Suppose I need to solve

More information

APPLICATION OF PREDICTION-BASED PARTICLE FILTERS FOR TELEOPERATIONS OVER THE INTERNET

APPLICATION OF PREDICTION-BASED PARTICLE FILTERS FOR TELEOPERATIONS OVER THE INTERNET APPLICATION OF PREDICTION-BASED PARTICLE FILTERS FOR TELEOPERATIONS OVER THE INTERNET Jae-young Lee, Shahram Payandeh, and Ljljana Trajovć School of Engneerng Scence Smon Fraser Unversty 8888 Unversty

More information

Fitting: Deformable contours April 26 th, 2018

Fitting: Deformable contours April 26 th, 2018 4/6/08 Fttng: Deformable contours Aprl 6 th, 08 Yong Jae Lee UC Davs Recap so far: Groupng and Fttng Goal: move from array of pxel values (or flter outputs) to a collecton of regons, objects, and shapes.

More information

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,

More information

Maximum Variance Combined with Adaptive Genetic Algorithm for Infrared Image Segmentation

Maximum Variance Combined with Adaptive Genetic Algorithm for Infrared Image Segmentation Internatonal Conference on Logstcs Engneerng, Management and Computer Scence (LEMCS 5) Maxmum Varance Combned wth Adaptve Genetc Algorthm for Infrared Image Segmentaton Huxuan Fu College of Automaton Harbn

More information

A Facet Generation Procedure. for solving 0/1 integer programs

A Facet Generation Procedure. for solving 0/1 integer programs A Facet Generaton Procedure for solvng 0/ nteger programs by Gyana R. Parja IBM Corporaton, Poughkeepse, NY 260 Radu Gaddov Emery Worldwde Arlnes, Vandala, Oho 45377 and Wlbert E. Wlhelm Teas A&M Unversty,

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

An efficient iterative source routing algorithm

An efficient iterative source routing algorithm An effcent teratve source routng algorthm Gang Cheng Ye Tan Nrwan Ansar Advanced Networng Lab Department of Electrcal Computer Engneerng New Jersey Insttute of Technology Newar NJ 7 {gc yt Ansar}@ntedu

More information

MOBILE Cloud Computing (MCC) extends the capabilities

MOBILE Cloud Computing (MCC) extends the capabilities 1 Resource Sharng of a Computng Access Pont for Mult-user Moble Cloud Offloadng wth Delay Constrants Meng-Hs Chen, Student Member, IEEE, Mn Dong, Senor Member, IEEE, Ben Lang, Fellow, IEEE arxv:1712.00030v2

More information

An Optimization Algorithm for Minimum Connected Dominating Set Problem in Wireless Sensor Network

An Optimization Algorithm for Minimum Connected Dominating Set Problem in Wireless Sensor Network IEMS Vol. 10, No. 3, pp. 221-231, September 2011. An Optmzaton Algorthm for Mnmum Connected Domnatng Set Problem n Wreless Sensor Network Namsu Ahn Defense Agency for Technology and Qualty 275-18, Boksu-dong,

More information

Unsupervised Learning

Unsupervised Learning Pattern Recognton Lecture 8 Outlne Introducton Unsupervsed Learnng Parametrc VS Non-Parametrc Approach Mxture of Denstes Maxmum-Lkelhood Estmates Clusterng Prof. Danel Yeung School of Computer Scence and

More information

APPLICATION OF PREDICTION-BASED PARTICLE FILTERS FOR TELEOPERATIONS OVER THE INTERNET

APPLICATION OF PREDICTION-BASED PARTICLE FILTERS FOR TELEOPERATIONS OVER THE INTERNET APPLICATION OF PREDICTION-BASED PARTICLE FILTERS FOR TELEOPERATIONS OVER THE INTERNET Jae-young Lee, Shahram Payandeh, and Ljljana Trajovć School of Engneerng Scence Smon Fraser Unversty 8888 Unversty

More information

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION 24 CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION The present chapter proposes an IPSO approach for multprocessor task schedulng problem wth two classfcatons, namely, statc ndependent tasks and

More information

An Accurate Evaluation of Integrals in Convex and Non convex Polygonal Domain by Twelve Node Quadrilateral Finite Element Method

An Accurate Evaluation of Integrals in Convex and Non convex Polygonal Domain by Twelve Node Quadrilateral Finite Element Method Internatonal Journal of Computatonal and Appled Mathematcs. ISSN 89-4966 Volume, Number (07), pp. 33-4 Research Inda Publcatons http://www.rpublcaton.com An Accurate Evaluaton of Integrals n Convex and

More information

A Five-Point Subdivision Scheme with Two Parameters and a Four-Point Shape-Preserving Scheme

A Five-Point Subdivision Scheme with Two Parameters and a Four-Point Shape-Preserving Scheme Mathematcal and Computatonal Applcatons Artcle A Fve-Pont Subdvson Scheme wth Two Parameters and a Four-Pont Shape-Preservng Scheme Jeqng Tan,2, Bo Wang, * and Jun Sh School of Mathematcs, Hefe Unversty

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

CHAPTER 2 DECOMPOSITION OF GRAPHS

CHAPTER 2 DECOMPOSITION OF GRAPHS CHAPTER DECOMPOSITION OF GRAPHS. INTRODUCTION A graph H s called a Supersubdvson of a graph G f H s obtaned from G by replacng every edge uv of G by a bpartte graph,m (m may vary for each edge by dentfyng

More information

IP mobility support is becoming very important as the

IP mobility support is becoming very important as the 706 IEEE TRANSACTIONS ON COMPUTERS, VOL. 52, NO. 6, JUNE 2003 A New Scheme for Reducng Lnk and Sgnalng Costs n Moble IP Young J. Lee and Ian F. Akyldz, Fellow, IEEE Abstract IP moblty support s provded

More information

Efficient Load-Balanced IP Routing Scheme Based on Shortest Paths in Hose Model. Eiji Oki May 28, 2009 The University of Electro-Communications

Efficient Load-Balanced IP Routing Scheme Based on Shortest Paths in Hose Model. Eiji Oki May 28, 2009 The University of Electro-Communications Effcent Loa-Balance IP Routng Scheme Base on Shortest Paths n Hose Moel E Ok May 28, 2009 The Unversty of Electro-Communcatons Ok Lab. Semnar, May 28, 2009 1 Outlne Backgroun on IP routng IP routng strategy

More information