International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN

Size: px
Start display at page:

Download "International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN"

Transcription

1 International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI Interconnect Souvik Singha, G.K. Mahanti Abstract - In this work, we propose a CODEC design for the forbidden transition free crosstalk avoidance CODEC. Our apping and coding schee is based on the binary nuber syste. In this paper we investigate and propose a bus forbidden transition free CODECs for reducing bus delay and our experiental results shows that the proposed CODEC coplexity is orders of agnitude better copared to the existing techniques. We used the concept of binary Fibonacci representation of integers and gave a siple recursive procedure to generate crosstalk delay code. Based on the idea, we now give a coding technique by considering a variant of binary Fibonacci representation. Here we use a variant of binary Fibonacci representation by considering the Fibonacci nuber {F, F 2, F 3, F 4 } as the basis eleents of binary Fibonacci nuber syste. By considering F as one of the basis eleents of the binary Fibonacci nuber syste, we can eliinate the possibility of siultaneous opposite transaction on adjacent lines, thus crosstalk delay can be prevented. We use the notation F to represent the set of -bit crosstalk delay free binary Fibonacci code words where the weight of i th bit is the value of i th Fibonacci nuber i.e. F i, i, in the sequence {,,2,3,5}. Now here our apping and coding schee is based on the Fibonacci nuber syste and the atheatical analysis shows that all nubers can be represented by forbidden transition free (FTF) vectors in the Fibonacci nueral syste (FSN). Crosstalk induced delay and power consuption have becoe a ajor deterinant of the syste perforances. Reducing crosstalk can greatly boost the syste perforance. So the design is highly efficient, odular and can be easily cobined with a bus partitioning technique. Index Ters- Bus Encdoing, Cross-talk, Delay, Fibonacci Nuber,Transition Free Algorith. perforance near identical and both ethods approach the INTRODUCTION theoretical lower bound. The FPF is slightly better, but by Crosstalk induced delay and power consuption have no ore than one wire. becoe a ajor deterinant of the syste perforance. Due to the non-linear nature of these codes, Reducing crosstalk can greatly boost the syste researchers have struggled to find a apping schee that perforance. is atheatically systeatic and efficient to ipleent. Bus encoding Schees can achieve the sae Since its coplexity grows exponentially with the bus size aount of bus delay iproveent as passive shielding [6] [7, 9]. with a uch lower area overhead. This code is coonly We have recently proposed systeatic apping referred to as Crosstalk Avoidance Codes (CACs). CACs schees in this work and we focus on the code design for can be eory less [4, 7, 8] or eory based [7]. Meory the FTF-CAC. We give the atheatical analysis of the based coding approaches generate a code word based on apping schee and the coding algorith based on the the previously transitted code and the current data word apping schee []. We also investigate ipleentation to be transitted. So this type of codes needs fewer issues and copare the coplexity of the code with the additional bus wires. The eory-less coding approaches, codes for FPF-CACs which we developed. But the on the other hand, use a fixed code book to generate a coparison shows that the existing FPF-CAC CODEC in codeword, norally it is solely based on the current input sipler and faster and our algorith based approach is data. The ost efficient eory-less code are forbidden also sipler and faster and both coplexity in sae. So the pattern-free (FPF) CACs and FTF- CACs. Their overhead proposed CODEC is also easier to use in conjunction with bus partitioning. The key contributions of this paper are: the presentation of a atheatical forula based on the Souvik Singha is doing his research work in National Institute of FNS which introduces an elegant and efficient apping Technology, Durgapur, India, PH E-ail: singha.souvik@gail.co between data words and code words. G. K. Mahanti is presently a professor in the departent of Electronics and Counication Engineering, NIT, Durgapur, India, PH E- ail: gautaahanti@yahoo.co 203

2 International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October DELAY ESTIMATION FOR ON- CHIP BUS CROSS-TALK An interconnect delay is in proportion to the product of resistance and capacitance of the interconnect wire. The capacitance of the interconnection consists of CL, which is capacitance between the wire and the substrate, and CI, which is the capacitance between adjacent wires. In conventional LSI, vertical capacitance is usually larger than horizontal capacitance, because of large space between adjacent wires and low aspect ratio of cross- section of a etal wire. In present and future VLSI inter- wire coupling capacitance CI becoe doinant because horizontal shrink progress leaving vertical shrink not to cause resistance increase. So the large horizontal capacitance akes crosstalk interference between adjacent wires a serious proble in VLSI design. The crosstalk is a noise caused by inter- wire coupling capacitance between adjacent wires, and causes logic alfunctions and delay fault. C I Coonly used nueral systes include decial, binary, hexadecial. The Fibonacci-based nueral syste N(F{0,}) is the nueral syste that uses Fibonacci sequence as the base. In FNS, a nuber v is representing as the suation of soe Fibonacci nubers and defined as, v = k = d k. f k Where dk ϵ{0, } and fk is the k th Fibonacci nuber defined in previous (). The Fibonacci-based nueral syste is coplete but abiguous; therefore any nuber has at least one, but possibly ore than one representation in FNS. Now we give a very iportant identity of the Fibonacci sequence is 2 k = 0 f = f k + So we see that range of an -bit Fibonacci vector is [0, f+2] (2) (3) 3 FORBIDDEN PATTERN FREE CACS A forbidden pattern free code is a set of code words which do not contain forbidden patterns on any 3 adjacent bus bits. Forbidden patterns are defined as the two 3-bit patterns 00 and 0. So the axiu cardinality of FPF codeword is 2f +; where f is the th eleent in the Fibonacci sequence defined as f C L SUBSTRATE 0 = f where the iniu value 0 corresponds to all the bits dk being. Therefore a total of f = 2 distinct values can be represented by -bit Fibonacci vectors. 5 MAPING SCHEME THEOREM : Let dd- d2d= v, dd- d2d Fig : Scale- down Coupling Capacitance ϵ N {F (0, )} and dd- d2d is forbidden transition free code, v ϵ[0, f+2-]. Now we have seen that any data words can be represented at the code words, so the Theore states that for any nuber v [0, f+2], there exits at least one -bit Fibonacci vector d d -.. d2d = v. which represent this nuber and satisfies the forbidden transaction free property. if = 0 if = 0 + f 2 if 2 4 FIBONACCI- BASED NUMER SYSTEM A nuerical syste is a fraework where nubers are represented by nuerals in a consistent anner [0]. () In other words, a nuber of any values in the range of [0,f+2] can be apped to an bit FTF code word in the FNS space. Proof: let us first define V00 as the set of all the k-bit Fibonacci vectors which the two ost significant bits (MSBs) of 00, we have V00 ϵ [0, f k] based on (3). Siilarly, we define set V0, V0 and V. V0 ϵ[f k-, fk+], V0 ϵ [fk, 2fk] and V ϵ[fk+, fk+2]. This is also shown in figure. We can see fro Figure that the ranges of these four sets 203

3 International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October of vectors overlap. For any vector v V0, we can add an equivalent vector in V00 and dk- is coded as d k- = 0 if v < f k+, Fig 2: Range of the vectors with MSBs of 00, 0, 0 and or V0. Siilarly, any vector v V0 can be replaced by an equivalent vector in V0 or V. Now for a given nuber v, we can add an bit vector Vin = dd-...d2d in FNS that represents this value (based on the copleteness of FNS). Now assuing 0 to be the prohibited pattern at dkdk-, we can replace dkdk-...d with an equivalent k bit vector in V00 or V0 to produce a new bit vector Veq that is equivalent to Vin. Veq has no prohibited pattern at dkdk-. Also since 0 is the prohibited pattern at dkdk-, the prohibited pattern at dk+dk and dk-dk-2 is 0. We know that The first condition guarantees that the anipulations do not introduce a prohibited pattern into d.dk. The second condition guarantees that further anipulation does not destroy the pattern in dkdk-. 6 CROSSTALK AVOIDANCE CODE DESIGN To design a coding algorith that aps each input value to FTF code words in the FNS, we observe that in Figure, if dk is coded as, the 0 is eliinated on dkdk-. Conversely, if dk, is coded as, and dk- coded as 0 if v < f k-, d k- = 0 is eliinated on dkdk-. Based on the above observations, the coding algorith is straightforward. Algorith generates FTF code words with 0 prohibited at d2k+d2k and 0 prohibited at d2kd2k-. If Vin does not have the prohibited pattern, Veq does not have the prohibited pattern either since Algorith FTF encoding algorith the anipulation cause the kth bit value to either FTF (V, ) change fro 0 to or no change.. r+ = V an 2. Repeat 3 to 4 while k 2 Veq does not have the prohibited pattern at dk-dk-2 3. If ( rk+ F2 k/2 +) then dk since dk- in Veq is 0. = 0 else dk = 4. rk = rk+ fk.dk, k - -; 5. d = r2 0 if v < f k+, The encoding is carried out sequentially in - stages, siilar to a division operation. Starting fro the MSB, each stage copares the input to a Fibonacci nuber and produces a coded bit as well as a reainder. The reainder fro one stage becoes the input to the next stage. 0 if v < f k, 203

4 International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October Algorith FTF encoding algorith Input V r+ = V For k = down to 2 do If ( rk+ F2 k/2 +) then dk = 0 else dk = end If rk = r k+ fk.dk end For d = r Algorith shows that an - bit FTF vector is generated in stages. Each stage outputs one bit of the output vector (dk) and the reainder (rk) that is the input to the following stage. In the kth stage, the input rk+ is copared to two Fibonacci nubers fk+ and f k. If rk+ F2 k/2 +, dk is coded as ; If rk+ < fk, dk is coded as 0; If the value rk+ is in between, dk is coded to the sae value as dk+. It encodes d by coparing the input v with only one Fibonacci nuber f+. The correctness of Algorith can be proven by showing that if after the k th stage, the partially generated output vector d,,dk+ dk is FTF, adding the output of (k-) th stage, dk- will not introduce a forbidden pattern. Now we see the total coplexity of above algorith is O () as sae as that of []. Now the equation is: Here each stage produces a single bit dk and a reainder rk. The encoder stages ipleent the arithetic function given in (4). Each stage produces a single bit dk and a reainder rk. For the MSB stage, the input rk+ is the input data to be encoded. For other stages, rk+ is the reainder of the preceding stage. If is even, the ipleentation requires one coparator, one adder and one 2: MUX. If is odd, the ipleentation only needs one adder and one MUX since the adder (subtraction) also functions as a coparator. Assuing the resources required for a coparator are sae as an adder, the total resources required for an bit bus encoder is 3/2 adders and MUXs. The nuber of bits reduces onotonically fro the MSB stage to the LSB stage. Reference [] shows that to reduced the cross-talk both Algoriths and get sae coplexity. So we have introduces one ore Algorith that is two bit pattern which is given below. If we cobine every two stages in the encoder properly, the logic can be further siplified. Let 0 be the prohibited pattern for dkd k-. So the two-bit encoder stage ipleents the following: 7 IMPLEMENTATION AND RESULTS 00 if r k+ < f k, A direct ipleentation of the encoder and decoder based d k d k- = 0 if r k+ < f k+, on algorith and equation 2 is illustrated. The encoder, which converts an n bit binary vector v = bn.b to an (5) bit vector dd-.d, consists of - stages. The r k+ if r k+ < f k, decoder converts the bus code words back to the original n bit binary vector. r k- = r k+ - f k if r k+ < f k+, Now we have applied an arbitrary decial r k+ f k+ nuber 9 that can be represented a crosstalk forbidden Equation (5) can be ipleented using two adders and transition free vector that is (000) and (000). two MUXs. Since the single-bit stage ipleentation Already as we have entioned in our introduction requires three adders and two MUXes to encode two bits, part that if a forbidden sequence present into our code this two-bit stage ipleentation is sipler. We should word then it increase the cross-talk. So on the above work point out that this siplification is only achieved when 0 we have proposed one Algorith by the help of [], in is the prohibited pattern. We can not reduce the which the forbidden transition will not be occurs in the ipleentation coplexity if 0 is the prohibited pattern code word, so whatever the code word will be fored that in the two bit ipleentation. So the algorith is will be forbidden transition free and in this way we can reduced the cross-talk. For clarity, we refer to a vector in the binary nuerical syste as a binary vector or binary code and a vector in the Fibonacci nueral syste as a Fibonacci vector or Fibonacci code. rk = rk+ fk. dk 0 if r k < f 2[k/2]+, (4) 203

5 International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October Algorith 2 FTF encoding algorith Input V: R + =V; For k = down to 2 IF ( r k+ < f k ) then dk dk- = 00 Else IF ( r k+ < f k+) then dk dk- = 0 Else dk dk- = End IF IF (r k+ < fk ) then r k- = r k + Else IF (r k+ < f k+) then r k- = r k+ f k Else r k- = r k+ f k+ End if End for d = r 2 ; [2] C. Duan, V. Cordero and S. P. Khatri, Efficient On-Chip Crosstalk Avoidance CODEC Design, IEEETransactions on VLSI Systes, to appear. [3] Madhu Mutya, Preventing Crosstalk Delay using Fibonacci Representation, Intl Conf. on VLSI Design, 2004, pp [4] Bret Victor and K. Keutzer, Bus Encoding to Prevent Crosstalk Delay, ICCAD, 200, pp [5] C. Duan and S. P. Khatri, Exploiting Crosstalk to Speed up Onchip busses, DATE 2004, pp [6] M. Mutya, ACM Transactions on Design Autoation of Electronic Systes, Vol. 4, No. 3, pp. Article 43, pp. -20, 2009 [7] C. Duan, K. Gulati and S.P. Khatri, Meory-based Cross-talk Canceling CODECs for On-chip busses, ISCAS 2006, pp 4-9. [8] C. Duan, A.Tiruala and S.P.Khatri, Analysis and Avoidance of Cross-talk in On-chip Bus, HotInterconnects, 200,pp [9] S.R. Sridhara, A. Ahed, and N. R. Shanbhag, Area and Energy- Efficient Crosstalk Avoidance Codes for On-Chip busses, Proc. of ICCD, 2004, pp 2-7. [0] Wikipedia, Nueral Syste, Now the overall coplexity in encoding approach we get O (). By help of above algorith we will get the codeword with Forbidden transition free and its coplexity in coparison to Algorith is twice. CONCLUSION The Fibonacci based nuber syste is coplete but abiguous; therefore, any nuber has at least one, but possibly ore than one representation in FNS. In this work, we present a code design for the FTF- CAC based on the Fibonacci nueral syste. Here we develop the forbidden pattern free algorith and copare to existing algorith we get the sae coplexity that is roughly O() and we given the input that is v = 9, we get the result 000 and it is Forbidden Transition Free vector. Our analysis show that all nubers can represented by FTF vectors in Fibonacci nueral syste. Copared to the CODEC for the FTF-CAC, the arithetic operations are less coplicated, results in further coplexity reduction in ipleentation. REFERENCES [] C.Duan, C.Zhu, S.P.Khatri, Forbidden Transition Free Crosstalk Avoidance CODEC Design DAC 2008, June 8-3, 2008, Anahei, California, USA, pp

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

Ascending order sort Descending order sort

Ascending order sort Descending order sort Scalable Binary Sorting Architecture Based on Rank Ordering With Linear Area-Tie Coplexity. Hatrnaz and Y. Leblebici Departent of Electrical and Coputer Engineering Worcester Polytechnic Institute Abstract

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

Efficient Crosstalk Avoidance Using Modified Redundant Fibonacci Code (MRFC) in VLSI Interconnects

Efficient Crosstalk Avoidance Using Modified Redundant Fibonacci Code (MRFC) in VLSI Interconnects World Engineering & Applied Sciences Journal 8 (1): 48-56, 2017 ISSN 2079-2204 IDOSI Publications, 2017 DOI: 10.5829/idosi.weasj.2017.48.56 Efficient Crosstalk Avoidance Using Modified Redundant Fibonacci

More information

Deterministic Voting in Distributed Systems Using Error-Correcting Codes

Deterministic Voting in Distributed Systems Using Error-Correcting Codes IEEE TRASACTIOS O PARALLEL AD DISTRIBUTED SYSTEMS, VOL. 9, O. 8, AUGUST 1998 813 Deterinistic Voting in Distributed Systes Using Error-Correcting Codes Lihao Xu and Jehoshua Bruck, Senior Meber, IEEE Abstract

More information

THE rounding operation is performed in almost all arithmetic

THE rounding operation is performed in almost all arithmetic This is the author's version of an article that has been published in this journal. Changes were ade to this version by the publisher prior to publication. The final version of record is available at http://dx.doi.org/.9/tvlsi.5.538

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

ENCODING SCHEME FOR CROSSTALK MINIMIZATION

ENCODING SCHEME FOR CROSSTALK MINIMIZATION ENCODING SCHEME FOR CROSSTALK MINIMIZATION P. Stephi and V. Vijaya Kumar Department of Electronics and Communication Engineering, Sathyabama University, Chennai, India E-Mail: stefipelsi@gmail.com ABSTRACT

More information

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

Power Optimized Transition and Forbidden Free Pattern Crosstalk Avoidance

Power Optimized Transition and Forbidden Free Pattern Crosstalk Avoidance Power Optimized Transition and Forbidden Free Pattern Crosstalk Avoidance Sigmala Mani Raju PG Scholar, Dept of ECE, Global College of Engineering & Technology, Kadapa, YSR (Dt), AP, India. Abstract: In

More information

Image Filter Using with Gaussian Curvature and Total Variation Model

Image Filter Using with Gaussian Curvature and Total Variation Model IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.

More information

Implementation of Crosstalk Elimination Using Digital Patterns Methodology

Implementation of Crosstalk Elimination Using Digital Patterns Methodology Implementation of Crosstalk Elimination Using Digital Patterns Methodology Kolli Kalpana M.Tech Student Department of ECE Nova College of Engineering and Technology, Ibrahimpatnam, Vijayawada, Krishna,

More information

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

Feature Based Registration for Panoramic Image Generation

Feature Based Registration for Panoramic Image Generation IJCSI International Journal of Coputer Science Issues, Vol. 10, Issue 6, No, Noveber 013 www.ijcsi.org 13 Feature Based Registration for Panoraic Iage Generation Kawther Abbas Sallal 1, Abdul-Mone Saleh

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

CS 361 Meeting 8 9/24/18

CS 361 Meeting 8 9/24/18 CS 36 Meeting 8 9/4/8 Announceents. Hoework 3 due Friday. Review. The closure properties of regular languages provide a way to describe regular languages by building the out of sipler regular languages

More information

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We

More information

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions *

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 607-626 (2005) A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Mebership Functions * SHIH-HSU HUANG AND JIAN-YUAN LAI + Departent of

More information

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13 Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

Privacy-preserving String-Matching With PRAM Algorithms

Privacy-preserving String-Matching With PRAM Algorithms Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,

More information

News Events Clustering Method Based on Staging Incremental Single-Pass Technique

News Events Clustering Method Based on Staging Incremental Single-Pass Technique News Events Clustering Method Based on Staging Increental Single-Pass Technique LI Yongyi 1,a *, Gao Yin 2 1 School of Electronics and Inforation Engineering QinZhou University 535099 Guangxi, China 2

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

FPL Implementation of a SIMD RISC RNS-Enabled DSP

FPL Implementation of a SIMD RISC RNS-Enabled DSP FPL Ipleentation of a SIMD RISC RNS-Enabled DSP J. RAMÍREZ (1), A. GARCÍA (1), P. G. FERNÁNDEZ (2), A. LLORIS (1) (1) Dpt. of Electronics and Coputer Technology (2) Dpt. of Electrical Engineering University

More information

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer Departent of Coputer Science and Engineering University of South Florida Tapa, FL 33620 Abstract -- The

More information

Feature Selection to Relate Words and Images

Feature Selection to Relate Words and Images The Open Inforation Systes Journal, 2009, 3, 9-13 9 Feature Selection to Relate Words and Iages Wei-Chao Lin 1 and Chih-Fong Tsai*,2 Open Access 1 Departent of Coputing, Engineering and Technology, University

More information

Verifying the structure and behavior in UML/OCL models using satisfiability solvers

Verifying the structure and behavior in UML/OCL models using satisfiability solvers IET Cyber-Physical Systes: Theory & Applications Review Article Verifying the structure and behavior in UML/OCL odels using satisfiability solvers ISSN 2398-3396 Received on 20th October 2016 Revised on

More information

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math Sarter Balanced Assessent Consortiu s, s, Stard Alignent for Math The Sarter Balanced Assessent Consortiu (SBAC) has created a hierarchy coprised of clais targets that together can be used to ake stateents

More information

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS AWNI ITRADAT Assistant Professor, Departent of Coputer Engineering, Faculty of Engineering, Hasheite University, P.O. Box 15459,

More information

Research Article A Comparison of Standard One-Step DDA Circular Interpolators with a New Cheap Two-Step Algorithm

Research Article A Comparison of Standard One-Step DDA Circular Interpolators with a New Cheap Two-Step Algorithm Modelling and Siulation in Engineering, Article ID 916539, 6 pages http://dx.doi.org/10.1155/2014/916539 Research Article A Coparison of Standard One-Step DDA Circular Interpolators with a New Cheap Two-Step

More information

Data & Knowledge Engineering

Data & Knowledge Engineering Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID

More information

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches Efficient Estiation of Inclusion Coefficient using HyperLogLog Sketches Azade Nazi, Bolin Ding, Vivek Narasayya, Surajit Chaudhuri Microsoft Research {aznazi, bolind, viveknar, surajitc}@icrosoft.co ABSTRACT

More information

Closing The Performance Gap between Causal Consistency and Eventual Consistency

Closing The Performance Gap between Causal Consistency and Eventual Consistency Closing The Perforance Gap between Causal Consistency and Eventual Consistency Jiaqing Du Călin Iorgulescu Aitabha Roy Willy Zwaenepoel EPFL ABSTRACT It is well known that causal consistency is ore expensive

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade

More information

Galois Homomorphic Fractal Approach for the Recognition of Emotion

Galois Homomorphic Fractal Approach for the Recognition of Emotion Galois Hooorphic Fractal Approach for the Recognition of Eotion T. G. Grace Elizabeth Rani 1, G. Jayalalitha 1 Research Scholar, Bharathiar University, India, Associate Professor, Departent of Matheatics,

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se

More information

Weeks 1 3 Weeks 4 6 Unit/Topic Number and Operations in Base 10

Weeks 1 3 Weeks 4 6 Unit/Topic Number and Operations in Base 10 Weeks 1 3 Weeks 4 6 Unit/Topic Nuber and Operations in Base 10 FLOYD COUNTY SCHOOLS CURRICULUM RESOURCES Building a Better Future for Every Child - Every Day! Suer 2013 Subject Content: Math Grade 3rd

More information

Geometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem.

Geometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem. Noveber 13, 2016 Geoetry. The Method of the enter of Mass (ass points): Solving probles using the Law of Lever (ass points). Menelaus theore. Pappus theore. M d Theore (Law of Lever). Masses (weights)

More information

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu

More information

A wireless sensor network for visual detection and classification of intrusions

A wireless sensor network for visual detection and classification of intrusions A wireless sensor network for visual detection and classification of intrusions ANDRZEJ SLUZEK 1,3, PALANIAPPAN ANNAMALAI 2, MD SAIFUL ISLAM 1 1 School of Coputer Engineering, 2 IntelliSys Centre Nanyang

More information

Automatic Graph Drawing Algorithms

Automatic Graph Drawing Algorithms Autoatic Graph Drawing Algoriths Susan Si sisuz@turing.utoronto.ca Deceber 7, 996. Ebeddings of graphs have been of interest to theoreticians for soe tie, in particular those of planar graphs and graphs

More information

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute

More information

λ-harmonious Graph Colouring Lauren DeDieu

λ-harmonious Graph Colouring Lauren DeDieu λ-haronious Graph Colouring Lauren DeDieu June 12, 2012 ABSTRACT In 198, Hopcroft and Krishnaoorthy defined a new type of graph colouring called haronious colouring. Haronious colouring is a proper vertex

More information

Adaptive Holistic Scheduling for In-Network Sensor Query Processing

Adaptive Holistic Scheduling for In-Network Sensor Query Processing Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,

More information

KS3 Maths Progress Delta 2-year Scheme of Work

KS3 Maths Progress Delta 2-year Scheme of Work KS3 Maths Progress Delta 2-year Schee of Work See the spreadsheet for the detail. Essentially this is an express route through our higher-ability KS3 Maths Progress student books Delta 1, 2 and 3 as follows:

More information

Design and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design

Design and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design Design and Ipleentation of Business Logic Layer Object-Oriented Design versus Relational Design Ali Alharthy Faculty of Engineering and IT University of Technology, Sydney Sydney, Australia Eail: Ali.a.alharthy@student.uts.edu.au

More information

TALLINN UNIVERSITY OF TECHNOLOGY, INSTITUTE OF PHYSICS 17. FRESNEL DIFFRACTION ON A ROUND APERTURE

TALLINN UNIVERSITY OF TECHNOLOGY, INSTITUTE OF PHYSICS 17. FRESNEL DIFFRACTION ON A ROUND APERTURE 7. FRESNEL DIFFRACTION ON A ROUND APERTURE. Objective Exaining diffraction pattern on a round aperture, deterining wavelength of light source.. Equipent needed Optical workbench, light source, color filters,

More information

Collaborative Web Caching Based on Proxy Affinities

Collaborative Web Caching Based on Proxy Affinities Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA

More information

Research on the Classification and Selection of Archive Texts with the Improved C4.5 Algorithm

Research on the Classification and Selection of Archive Texts with the Improved C4.5 Algorithm INTERNATIONAL JOURNAL OF IRUITS, SYSTEMS AND SIGNAL PROESSING Volue 2, 208 Research on the lassification and Selection of Archive Texts with the Iproved 4.5 Algorith Xianbin Lv Abstract In the age of inforation

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

Planet Scale Software Updates

Planet Scale Software Updates Planet Scale Software Updates Christos Gkantsidis 1, Thoas Karagiannis 2, Pablo Rodriguez 1, and Milan Vojnović 1 1 Microsoft Research 2 UC Riverside Cabridge, UK Riverside, CA, USA {chrisgk,pablo,ilanv}@icrosoft.co

More information

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University

More information

arxiv: v1 [cs.dc] 3 Oct 2018

arxiv: v1 [cs.dc] 3 Oct 2018 Sparse Winograd Convolutional neural networks on sall-scale systolic arrays Feng Shi, Haochen Li, Yuhe Gao, Benjain Kuschner, Song-Chun Zhu University of California Los Angeles Los Angeles, USA {shi.feng,sczh}@cs.ucla.edu

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

A Hybrid Network Architecture for File Transfers

A Hybrid Network Architecture for File Transfers JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,

More information

Implementation of fast motion estimation algorithms and comparison with full search method in H.264

Implementation of fast motion estimation algorithms and comparison with full search method in H.264 IJCSNS International Journal of Coputer Science and Network Security, VOL.8 No.3, March 2008 139 Ipleentation of fast otion estiation algoriths and coparison with full search ethod in H.264 A.Ahadi, M.M.Azadfar

More information

Multiple operand addition and multiplication

Multiple operand addition and multiplication Multiple operand addition and ultiplication by SHANKER SINGH and RONALD WAXMAN International Business Machines Corporation Poughkeepsie, N ew York INTRODUCTION Traditionally, adders used in sall- and ediu-sized

More information

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant

More information

Chunjie Duan Brock J. LaMeres Sunil P. Khatri. On and Off-Chip Crosstalk Avoidance in VLSI Design

Chunjie Duan Brock J. LaMeres Sunil P. Khatri. On and Off-Chip Crosstalk Avoidance in VLSI Design Chunjie Duan Brock J. LaMeres Sunil P. Khatri On and Off-Chip Crosstalk Avoidance in VLSI Design 123 On and Off-Chip Crosstalk Avoidance in VLSI Design Chunjie Duan Brock J. LaMeres Sunil P. Khatri On

More information

Block-LDPC Codes Vs Duo-Binary Turbo-Codes for European Next Generation Wireless Systems

Block-LDPC Codes Vs Duo-Binary Turbo-Codes for European Next Generation Wireless Systems Block-LDPC Codes Vs Duo-Binary Turbo-Codes for European Next Generation Wireless Systes Thierry Lestable* Ernesto Zieran # Marie-Helene Haon + and Stephan Stiglayr & (*) Advanced Technology & Standards

More information

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage 216 IEEE 23rd International Conference on High Perforance Coputing A Low-Cost Multi-Failure Resilient Replication Schee for High Data Availability in Cloud Storage Jinwei Liu* and Haiying Shen *Departent

More information

INSERTION SORT is O(n log n)

INSERTION SORT is O(n log n) INSERTION SORT is On log n) Michael A. Bender Martín Farach-Colton Miguel A. Mosteiro Abstract Traditional INSERTION SORT runs in On 2 ) tie because each insertion takes On) tie. When people run INSERTION

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

A New Generic Model for Vision Based Tracking in Robotics Systems

A New Generic Model for Vision Based Tracking in Robotics Systems A New Generic Model for Vision Based Tracking in Robotics Systes Yanfei Liu, Ada Hoover, Ian Walker, Ben Judy, Mathew Joseph and Charly Heranson lectrical and Coputer ngineering Departent Cleson University

More information

Gromov-Hausdorff Distance Between Metric Graphs

Gromov-Hausdorff Distance Between Metric Graphs Groov-Hausdorff Distance Between Metric Graphs Jiwon Choi St Mark s School January, 019 Abstract In this paper we study the Groov-Hausdorff distance between two etric graphs We copute the precise value

More information

COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS

COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS International Journal of Coputer Science and Counication Vol. 3, No. 1, January-June 2012, pp. 181-185 COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS A.H. Karode 1, S.R. Suralkar 2, Manoj Bagde

More information

Approaching the Skyline in Z Order

Approaching the Skyline in Z Order Approaching the Skyline in Z Order KenC.K.Lee Baihua Zheng Huajing Li Wang-Chien Lee cklee@cse.psu.edu bhzheng@su.edu.sg huali@cse.psu.edu wlee@cse.psu.edu Pennsylvania State University, University Park,

More information

Knowledge Discovery Applied to Agriculture Economy Planning

Knowledge Discovery Applied to Agriculture Economy Planning Knowledge Discovery Applied to Agriculture Econoy Planning Bing-ru Yang and Shao-un Huang Inforation Engineering School University of Science and Technology, Beiing, China, 100083 Eail: bingru.yang@b.col.co.cn

More information

A simplified approach to merging partial plane images

A simplified approach to merging partial plane images A siplified approach to erging partial plane iages Mária Kruláková 1 This paper introduces a ethod of iage recognition based on the gradual generating and analysis of data structure consisting of the 2D

More information

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS Evaluation of the Tiing Properties of Two Control Networs: CAN and PROFIBUS Max Mauro Dias Santos 1, Marcelo Ricardo Steer 2 and Francisco Vasques 3 1 UnilesteMG, CEP 35170-056, Coronel Fabriciano MG Brasil.

More information

Optimal Route Queries with Arbitrary Order Constraints

Optimal Route Queries with Arbitrary Order Constraints IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL.?, NO.?,? 20?? 1 Optial Route Queries with Arbitrary Order Constraints Jing Li, Yin Yang, Nikos Maoulis Abstract Given a set of spatial points DS,

More information

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networs F. Mousavi Madani Departent of coputer engineering Alzahra University Tehran, Iran, osavif@alzahra.ac.ir Received:

More information

Distributed Multicast Tree Construction in Wireless Sensor Networks

Distributed Multicast Tree Construction in Wireless Sensor Networks Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,

More information

Experiences with complex user profiles for approximate P2P community matching

Experiences with complex user profiles for approximate P2P community matching Experiences with coplex user profiles for approxiate PP counity atching Patrizio Dazzi ISTI-CNR Pisa, Italy p.dazzi@isti.cnr.it Matteo Mordacchini IIT-CNR Pisa, Italy.ordacchini@iit.cnr.it Fabio Baglini

More information

Heterogeneous Radial Basis Function Networks

Heterogeneous Radial Basis Function Networks Proceedings of the International Conference on Neural Networks (ICNN ), vol. 2, pp. 23-2, June. Heterogeneous Radial Basis Function Networks D. Randall Wilson, Tony R. Martinez e-ail: randy@axon.cs.byu.edu,

More information

Using an induction prover for verifying arithmetic circuits

Using an induction prover for verifying arithmetic circuits Int J STTT (2000) 3: 1 34 2000 Springer-Verlag Using an induction prover for verifying arithetic circuits Deepak Kapur 1, M. Subraania 2 1 Departent of Coputer Science,University of New Mexico,Albuquerque,NM

More information

I-0 Introduction. I-1 Introduction. Objectives: Quote:

I-0 Introduction. I-1 Introduction. Objectives: Quote: I-0 Introduction Objectives: Explain necessity of parallel/ultithreaded algoriths Describe different fors of parallel processing Present coonly used architectures Introduce a few basic ters Coents: Try

More information

Short Papers. Crosstalk in VLSI Interconnections

Short Papers. Crosstalk in VLSI Interconnections IEEE TRANSACTIONS ON COPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTES, VOL. 8, NO. 2, DECEBER 999 87 Short Papers Crosstalk in VLSI Interconnections Ashok Vittal, Lauren Hui Chen, algorzata arek-sadowska,

More information

Data Caching for Enhancing Anonymity

Data Caching for Enhancing Anonymity Data Caching for Enhancing Anonyity Rajiv Bagai and Bin Tang Departent of Electrical Engineering and Coputer Science Wichita State University Wichita, Kansas 67260 0083, USA Eail: {rajiv.bagai, bin.tang}@wichita.edu

More information

Boosted Detection of Objects and Attributes

Boosted Detection of Objects and Attributes L M M Boosted Detection of Objects and Attributes Abstract We present a new fraework for detection of object and attributes in iages based on boosted cobination of priitive classifiers. The fraework directly

More information

Novel Image Representation and Description Technique using Density Histogram of Feature Points

Novel Image Representation and Description Technique using Density Histogram of Feature Points Novel Iage Representation and Description Technique using Density Histogra of Feature Points Keneilwe ZUVA Departent of Coputer Science, University of Botswana, P/Bag 00704 UB, Gaborone, Botswana and Tranos

More information

EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B.

EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B. EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B. Girod1 1 Stanford University, USA 2 Qualco Inc., USA ABSTRACT We study

More information

Improve Peer Cooperation using Social Networks

Improve Peer Cooperation using Social Networks Iprove Peer Cooperation using Social Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Noveber 5, 2007 Corresponding

More information

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of

More information

Shape Optimization of Quad Mesh Elements

Shape Optimization of Quad Mesh Elements Shape Optiization of Quad Mesh Eleents Yufei Li 1, Wenping Wang 1, Ruotian Ling 1, and Changhe Tu 2 1 The University of Hong Kong 2 Shandong University Abstract We study the proble of optiizing the face

More information

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design A Fast Multi-Obective Genetic Algorith for Hardware-Software Partitioning In Ebedded Syste Design 1 M.Jagadeeswari, 2 M.C.Bhuvaneswari 1 Research Scholar, P.S.G College of Technology, Coibatore, India

More information

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural

More information

QoS and Sensible Routing Decisions

QoS and Sensible Routing Decisions QoS and Sensible Routing Decisions Erol Gelenbe Dept. of Electrical & Electronic Engineering Iperial College London SW7 2BT e.gelenbe@iperial.ac.uk Abstract Network Quality of Service (QoS) criteria of

More information

Using the KressArray for Reconfigurable Computing

Using the KressArray for Reconfigurable Computing Using the KressArray for econfigurable Coputing einer Hartenstein, Michael Herz, Thoas Hoffann, Ulrich Nageldinger University of Kaiserslautern, Erwin-Schroedinger-Strasse, D-67663 Kaiserslautern, Gerany

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

Effects of Desingularization and Collocation-Point Shift on Steady Waves with Forward Speed

Effects of Desingularization and Collocation-Point Shift on Steady Waves with Forward Speed Effects of Desingularization and Collocation-Point Shift on Steady Waves with Forward Speed Yonghwan Ki* & Dick K.P. Yue** Massachusetts Institute of Technology, Departent of Ocean Engineering, Cabridge,

More information

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm roceedings of the 7th International Conference on Innovation & Manageent 893 Research on a Kind of QoS-Sensitive Seantic Web Services Coposition Method Based on Genetic Algorith Cao Hongjiang, Nie Guihua,

More information