William S. Law. Erik K. Antonsson. Engineering Design Research Laboratory. California Institute of Technology. Abstract

Size: px
Start display at page:

Download "William S. Law. Erik K. Antonsson. Engineering Design Research Laboratory. California Institute of Technology. Abstract"

Transcription

1 Optimization Methos for Calculating Design Imprecision y William S. Law Eri K. Antonsson Engineering Design Research Laboratory Division of Engineering an Applie Science California Institute of Technology Pasaena, California Abstract The preliminary esign process is characterize by imprecision: the vagueness of an incomplete esign escription. The Metho of Imprecision uses the mathematics of fuzzy sets to explicitly represent an manipulate imprecise preliminary esign information, enabling the esigner to explore the space of alternative esigns in the context of the esigner an customer's preferences among alternatives. This paper introuces new methos to perform Metho of Imprecision calculations for general non-monotonic esign evaluation functions that aress the practical necessity to minimize the number of function evaluations. These methos utilize optimization an experiment esign. Introuction Evaluation is a ey component of preliminary esign. Evaluating alternatives early in the esign process avois further investment in inferior alternatives, an can allow more alternatives to be consiere. Traitional evaluation tools are of limite value in preliminary esign because they require a precise esign escription. Preliminary esign information is characteristically imprecise: the esign escription is vague an inistinct. The esigner must consier a clou of alternative esigns. A computational tool that consiers iniviual esigns separately provies limite insight into the structure of the clou of alternatives. A more systematic methoology is require: one that explicitly moels imprecision. The Metho of Imprecision [1, 2, 3] uses the mathematics of fuzzy sets to represent an manipulate imprecise preliminary esign information. The Imprecise Design Tool [3], a computational implementation of this methoology, supports preliminary esign ecisions base on imprecise information, an accepts any esign evaluation function as require by the application. Manuscript prepare for submission to the 21st ASME Design Automation Conference, September y KEYWORDS: Design optimization; Inustrial examples, evelopments an perspectives. 1

2 Practical computational tools for esign must be resource ecient. They must not eman too much of a esigner's time an attention, an they must prouce satisfactory answers without excessive computation. Frequently the cost of evaluating a esign is substantial, an the critical measure of computational eciency is the number of esign evaluations require. This paper presents new methos to calculate imprecision for general non-monotonic evaluation functions that aress the practical necessity to minimize the number of function evaluations. Many of these methos evolve from iscussions with engineers from the Vehicle Structures Computer Aie Design group at the For Motor Company, Dearborn, MI, an in particular Thomas Mathai. The authors gratefully acnowlege their contribution. Denitions an Notation Design alternatives are escribe by a collection of esign variables 1 ; ::; n. These variables nee not be continuous or even orinal: the esign variable \styling" may have the unorere values \conservative", \sporty", an \futuristic". The set of vali values for i is enote X i. The whole set of esign variables forms an n vector,, ~ that uniquely ienties each esign alternative intheesign variable space (DVS). Performance variables p 1 ; :::; p q measure aspects of a esign's performance. Each performance variable p j is ene by a mapping f j such that p j = f j ( ). ~ The mappings f j can be any calculation or proceure to evaluate the performance of a esign, incluing close-form equations, computational algorithms, \blac box" functions, prototype testing, an maret research. The set of vali values for p j is enote Y j. The set of performance variables for each esign alternative forms a q vector, ~p = f( ~ ), ~ that species the performance of a esign. ~ The performance variable space (PVS) encompasses all performances ~p. Imprecise variables may potentially assume any value within a possible range because the esigner oes not now, a priori, the nal value that will emerge from the esign process. Yet even though the esigner is unsure about what value to specify, certain values will be preferre over others. This preference, which may arise objectively (e.g., cost or availability of components) or subjectively (e.g., from experience), is use to quantify the imprecision associate with a esign variable. The preference that the esigner has for values of the esign variable i is represente by a preference function on X i, terme the esign preference: i ( i ):X i![0; 1] R: i ( i ) quanties the esigner's preference for values of i, an is istinct from the customary membership function in a fuzzy set, which quanties the extent to which values belong to the set. The preference that a customer has for values of the performance variable p j is similarly represente by a preference function on Y j, terme the functional requirement: pj (p j ):Y j![0; 1] R: The combine preference of the esigner an customer for a particular esign ~ is represente by anoverall preference o ( ~ ), which is a function of the esign preferences i ( i ), an the functional requirements pj (p j )= pj (f j ( ~ )): o = P, 1 ; :::; n ; p1 ; :::; pq : The combination function P reects the esign or trae-o strategy, which inicates how competing attributes of the esign shoul be trae-o against each other [1]. 2

3 DVS yj µ D α µ α 2 f j α 1 p α jmin p j α max p j Figure 1. The Level Interval Algorithm. Imprecision Calculations After specifying esign preferences 1 ; :::; n an functional requirements p1 ; :::; p q, an ientifying the appropriate esign strategy, the iniviual i are combine to obtain, the combine esign preference on the DVS. is then inuce onto the PVS, using the extension principle [4]: (~p) = supf ( ) ~ j ~p = f ~ ( )g ~ where sup over the null set is ene to be zero. ( ) ~ is the combine esign preference on the DVS, as istinct from (~p), the combine esign preference inuce onto the PVS. (~p) is obtaine by mapping ( )onto ~ the PVS. Previously, (~p) has been calculate using the Level Interval Algorithm, orlia [2], rst propose by Dong an Wong [5] as the \Fuzzy Weighte Average" algorithm an also calle the \Vertex Metho". The LIA uses M esign preference -cuts D 1 ; :::; D M in the DVS to calculate iniviual inuce {cut intervals [p j min ;p j ] which together ene the max inuce {cuts P in the PVS: D = f ~ 2 DVS j ( ~ ) g = [ 1 min ; 1 max] :::[ n P = f~p 2 PVS j (~p) g = [p 1 min ;p 1 max] :::[p q min ; nmax] min ;p ] qmax where =1; :::; M. For each, the LIA evaluates p j = f j ( ) ~ for the 2 n permutations of -cut en points which correspon to the corners of an n-cube ene by D (there are n esign variables an M-cuts). Figure 1 illustrates how -cuts D in two esign variables 1 an 2 are inuce onto the interval [p j min ;p ]. jmax f j is evaluate at the 2 n = 4 corner points of each D rectangle. It is assume that p an j min p j will occur at these corner max points, an not insie D. This is not true in general: the mapping f j :DVS!Y j an the combination function P must satisfy certain conitions for the LIA to be exact [6]. In practice, these conitions require that f j be monotonic: a severe restriction. 3

4 i ( i ) iniviual esign preference on X i (esigner), i =1; :::; n ( ) ~ (~p) combine esign preference on the DVS combine esign preference inuce onto the PVS pj (p j ) iniviual functional requirement ony j (customer), j =1; :::; q p (~p) combine functional requirement on the PVS p ( ) ~ o ( ) ~ o (~p) P combine functional requirement mappe bac onto the DVS overall preference on the DVS overall preference on the PVS combination function D -cut in the DVS, within which ( ) ~ ( =1; :::; M ) P -cut in the PVS, within which (~p) ( =1; :::; M ) Optimization The limitations of the LIA stem from the assumption that the extreme values of f j will occur at the corner points of the D n-cube. The algorithm may thus be improve by relaxing this assumption. The problem restate is to n: p j min = minfp j = f j ( ~ ) j ~ 2 D g p j max = maxfp j = f j ( ~ ) j ~ 2 D g Fining extrema within a subspace is a constraine optimization problem. Optimization techniques are ivie into two categories: traitional an stochastic. Traitional methos converge in relatively few function evaluations but are less robust, tening to become stuc in local minima. Stochastic methos such as genetic algorithms are more robust, but require a large number of function evaluations. Where function evaluations are relatively expensive, as is common in esign, traitional optimization methos are preferre. The algorithm utilize here is Powell's metho, which begins as a one at a time search. After each iteration a heuristic etermines whether to replace the irection of maximum ecrease with the net irection move uring the last iteration. This allows minimization own valleys while avoiing linear epenence in the set of search irections [7]. An important feature for a practical computational tool is a means to trae-o the number of function evaluations against accuracy. Such an ajustment enables the esigner to use the same program to obtain quic estimates as well as precise evaluations. This is implemente as a user-specie fractional precision that enes termination criteria for the optimization algorithm. Suppose that it is necessary to incur the minimum number of function evaluations. A fractional precision of 1 woul be specie, creating automatically satise termination criteria, an the optimization woul procee through exactly one iteration of a one at a time search using the maximum step size. The algorithm begins at one corner of the search space D, an checs corners in each of the n irections given by 1 ; :::; n,moving to the minimum each time. It expens n + 1 function evaluations to n each en point, an therefore 2n +2per -cut, as compare to 2 n per -cut for the LIA. This is a substantial improvement, but the -cut interval obtaine by this metho is still only correct if f j is monotonic. If, however, f j is nown to be monotonic, 2n+2 is not the minimum number of function evaluations. The rst pass of the optimization algorithm ienties the irection for each 4

5 i in which f j increases. Subsequent extrema can then be irectly evaluate, without the nee for searching. Hence where f j is monotonic, n + 2 function evaluations are require for the rst -cut an 2 for each subsequent -cut. Design of Experiments Statistical esign of experiments sees to erive information about a process using as few observations as possible. It has two aims: to separate the eects to be measure from ranom noise, an to moel the process with regression equations. The function f j can be treate as an unnown process, which a shrew optimization metho shoul examine with a few function evaluations before searching for extrema. Statistical esign of experiments is an ecient metho to conuct this preliminary examination. Note that if the process is eterministic, e.g., a computer program, repeate function evaluations will always give the same answer: the output contains no noise. Therefore statistical signicance tests to istinguish the signal are unnecessary. This paper iscusses only the use of experiment esign to moel the function, though statistical signicance tests are a valuable technique for processes subject to noise. Because the proceure is to be encoe in a computer program, avance experiment esign techniques cannot be implemente. Hence only a linear regression moel will be tte to the function. Such a simple moel will aequately approximate the eect of few, if any, esign variables, but that is sucient. The purpose is not to replace the entire function with a sophisticate regression moel, but rather to ientify esign variables with near-linear eects. For each of these variables, the function can then be approximate by a linear equation, shrining the search space by one imension. The function shoul therefore be moele over the search space D. But which D? -cuts with higher are subsets of -cuts with lower. Thus D 1, the -cut with the lowest, contains all the other -cuts. Any regression equations foun to be acceptable over D 1 will be acceptable over all -cuts. Hence only one set of experiments over D 1 is require to explore the entire search space. The Imprecise Design Tool will use a2level experiment esign with a center point to serve as a curvature chec. A full factorial esign woul evaluate the same 2 n corner points of D as the LIA, but since there are n main eects an 1 average to be etermine, only n+1 evaluations are strictly necessary (excluing the center point). A fractional factorial esign, which only evaluates a balance subset of corner points, is more ecient. In reucing a full factorial esign own to a fractional factorial esign, some interactions are unavoiably confoune with other interactions, so that their eects cannot be istinguishe. It is assume that main interactions, ue to a single variable, are more liely than two-way interactions, which are in turn more liely than three-way an higher orer interactions. Since only main eects will be estimate, they must not be confoune with each other. This requires a resolution III (or higher) esign. But it is esirable for main eects also not to be confoune with two-way interactions, an this requires a resolution IV esign [8]. For n = 8, the smallest resolution IV esign is a 2 8,4 fractional factorial esign requiring 16 observations. A resolution III esign woul require 12 observations. Resolution III esigns approach the strictly necessary n + 1 function evaluations. Resolution IV esigns require between 2n an 4n, 4 function evaluations [9]. For n = 8, 16 function evaluations woul be use: 9 evaluations are strictly necessary to estimate the 8 main eects an 1 average, an so there are 7 \reunant" evaluations. But these evaluations are not waste: they allow main eects to be separate from two-way interactions, an they provie 7 extra 5

6 points to verify the accuracy of the linear regression moel. The number of function evaluations can also be trae-o against accuracy for the esign of experiments. The linear regression equations obtaine replace the function where the approximation is acceptable. The criteria for \acceptable", which etermine how accurately the function is moele, are irectly relate to the user-specie fractional precision use by the optimization algorithm. Thus a single parameter traes-o computational eort against accuracy for both optimization an experiment esign. Relaxing the criteria for moel acceptability minimizes the number of function evaluations. Yet there are essential conitions that still must be satise: if the sign of the graient for a esign variable i is in oubt or if the center point is an extremum, the linear regression equation for i must be rejecte. If the function is benign, a maximum of 4n, 3 evaluations (incluing the center point) will be incurre to obtain the regression equations an up to 2 evaluations will be require for the preicte -cut en points. 4n, 1evaluations excees the n +1evaluations require for a one at a time search, but the avantages are fourfol: 1. Monotonicity is not assume: up to 3n, 5 \reunant" points test for monotonicity an linearity. 2. The center point tests for curvature. 3. The entire ata set is use in estimating each eect, instea of two points. 4. An even istribution of corner points is sample, instea of n + 1 ajacent corners. Discussion Figure 2 shows the role of optimization an experiment esign in the Imprecise Design Tool. The information ow for one performance variable p j = f j ( ) ~ is shown. -cut intervals [p j min ;p j ] can be calculate separately for each Y max j, an then combine in the uppermost preference calculation moule. All Metho of Imprecision calculations that explicitly involve preference occur at this level. Mapping -cuts from the DVS to Y j requires optimization, which searches for the inuce -cut interval [p j min ;p ] that correspons to jmax D. To o so, the experiment esign moule is calle repeately to evaluate the function f j at ierent esigns. ~ The rst time the moule is calle, it conucts a fractional factorial experiment over D 1, the -cut with lowest, an constructs linear regression equations. For subsequent calls, regression equations replace the function f j for any esign variables that are aequately approximate. The fractional precision use by the optimization an experiment esign moules traes-o the number of function evaluations against accuracy. For the two esign alternatives in the turbofan engine esign example in [3], the Imprecise Design Tool using the LIA require 12 an 128 function evaluations. The alternatives ha 4 an 5 -cuts with some coincient en points, especially for the rst alternative. Although there were nominally 8 esign variables for both alternatives, the number of imensions in the search space was 3 an 6. Using only optimization, an without taing avantage of monotonicity, the current version of the Imprecise Design Tool require 12 an 38 function evaluations to obtain the same results. As expecte, optimization has a greater avantage for larger n. 6

7 DVS µ 1,...,µ n fractional precision δ µ p 1,...,µ p q PVS µ () Preference Calculations µ (p) D α δ Optimization p α jmin p α jmax D α1 δ Experiment Design fj () Imprecise Design Tool f j f () j Figure 2. The Imprecise Design Tool. Conclusion This paper has presente new methos to perform Metho of Imprecision calculations. These methos, which use optimization an experiment esign techniques, provie two important enhancements: 1. Evaluation functions are no longer assume to be monotonic. 2. The number of function evaluations require is substantially reuce. Preliminary esign necessarily eals with imprecise esign escriptions. Traitional evaluation tools lac a systematic methoology to accommoate imprecision an eliver only isconnecte information on iniviual esigns. The Metho of Imprecision uses the mathematics of fuzzy sets to represent an manipulate imprecise preliminary esign information, enabling the esigner to explore an unerstan the space of alternative esigns in the context of the esigner an customer's preferences among alternatives. This paper has presente continuing wor in implementing this methoology in a practical computational esign tool. 7

8 Acnowlegments This material is base upon wor supporte, in part, by: The National Science Founation uner a NSF Grant No. DDM Any opinions, nings, conclusions, or recommenations expresse in this publication are those of the authors an o not necessarily reect the views of the sponsors. References [1] Kevin N. Otto an Eri K. Antonsson. Trae-O Strategies in Engineering Design. Research in Engineering Design, 3(2):87{104, [2] Kristin L. Woo, Kevin N. Otto, an Eri K. Antonsson. Engineering Design Calculations with Fuzzy Parameters. Fuzzy Sets an Systems, 52(1):1{20, November [3] William S. Law an Eri K. Antonsson. Incluing Imprecision in Engineering Design Calculations. In Design Theory an Methology { DTM '94, volume DE-68, pages 109{ 114. ASME, September [4] L. A. Zaeh. Fuzzy sets. Information an Control, 8:338{353, [5] W. M. Dong an F. S. Wong. Fuzzy weighte averages an implementation of the extension principle. Fuzzy Sets an Systems, 21(2):183{199, February [6] Kevin N. Otto, Anrew D. Lewis, an Eri K. Antonsson. Approximating -cuts with the Vertex Metho. Fuzzy Sets an Systems, 55(1):43{50, April [7] P. Aby an M. Dempster. Introuction to Optimization Methos. Chapman an Hall, Lonon, [8] T. Barer. Quality by Experimental Design. Marcel Deer, Inc., New Yor, [9] M. Phae. Quality Engineering Using Robust Design. Prentice Hall, Englewoo Clis, NJ,

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

Advanced method of NC programming for 5-axis machining

Advanced method of NC programming for 5-axis machining Available online at www.scienceirect.com Proceia CIRP (0 ) 0 07 5 th CIRP Conference on High Performance Cutting 0 Avance metho of NC programming for 5-axis machining Sergej N. Grigoriev a, A.A. Kutin

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Verifying performance-based design objectives using assemblybased vulnerability

Verifying performance-based design objectives using assemblybased vulnerability Verying performance-base esign objectives using assemblybase vulnerability K.A. Porter Calornia Institute of Technology, Pasaena, Calornia, USA A.S. Kiremijian Stanfor University, Stanfor, Calornia, USA

More information

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing Inexing the Eges A simple an yet efficient approach to high-imensional inexing Beng Chin Ooi Kian-Lee Tan Cui Yu Stephane Bressan Department of Computer Science National University of Singapore 3 Science

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

d 3 d 4 d d d d d d d d d d d 1 d d d d d d

d 3 d 4 d d d d d d d d d d d 1 d d d d d d Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching

More information

Fault Simulation with Parallel Critical Path Tracing for Combinational Circuits Using Structurally Synthesized BDDs

Fault Simulation with Parallel Critical Path Tracing for Combinational Circuits Using Structurally Synthesized BDDs Fault Simulation with Parallel Critical Path Tracing for Combinational Circuits Using Structurall Snthesize BDDs Sergei Devaze, Jaan Rai, Artur Jutman, Raimun Ubar Tallinn Universit of Technolog, Estonia

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Inuence of Cross-Interferences on Blocked Loops: to know the precise gain brought by blocking. It is even dicult to determine for which problem

Inuence of Cross-Interferences on Blocked Loops: to know the precise gain brought by blocking. It is even dicult to determine for which problem Inuence of Cross-Interferences on Blocke Loops A Case Stuy with Matrix-Vector Multiply CHRISTINE FRICKER INRIA, France an OLIVIER TEMAM an WILLIAM JALBY University of Versailles, France State-of-the art

More information

Inverse Model to Determine the Optimal Number of Drops of RDC Column Using Fuzzy Approach

Inverse Model to Determine the Optimal Number of Drops of RDC Column Using Fuzzy Approach Inverse Moel to Determine the Optimal Number of Drops of RDC Column Using Fuzzy Approach 1 HAFEZ IBRAHIM, 2 JAMALLUDIN TALIB, 3 NORMAH MAAN Department of Mathematics Universiti Teknologi Malaysia 81310

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

Impact of cache interferences on usual numerical dense loop. nests. O. Temam C. Fricker W. Jalby. University of Leiden INRIA University of Versailles

Impact of cache interferences on usual numerical dense loop. nests. O. Temam C. Fricker W. Jalby. University of Leiden INRIA University of Versailles Impact of cache interferences on usual numerical ense loop nests O. Temam C. Fricker W. Jalby University of Leien INRIA University of Versailles Niels Bohrweg 1 Domaine e Voluceau MASI 2333 CA Leien 78153

More information

P. Fua and Y. G. Leclerc. SRI International. 333 Ravenswood Avenue, Menlo Park, CA

P. Fua and Y. G. Leclerc. SRI International. 333 Ravenswood Avenue, Menlo Park, CA Moel Driven Ege Detection P. Fua an Y. G. Leclerc SI International 333 avenswoo Avenue, Menlo Park, CA 9425 (fua@ai.sri.com leclerc@ai.sri.com) Machine Vision an Applications, 3, 199 Abstract Stanar ege

More information

Design of Policy-Aware Differentially Private Algorithms

Design of Policy-Aware Differentially Private Algorithms Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

Learning Polynomial Functions. by Feature Construction

Learning Polynomial Functions. by Feature Construction I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Characterizing Decoding Robustness under Parametric Channel Uncertainty

Characterizing Decoding Robustness under Parametric Channel Uncertainty Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -

More information

6 Gradient Descent. 6.1 Functions

6 Gradient Descent. 6.1 Functions 6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output

More information

Investigation into a new incremental forming process using an adjustable punch set for the manufacture of a doubly curved sheet metal

Investigation into a new incremental forming process using an adjustable punch set for the manufacture of a doubly curved sheet metal 991 Investigation into a new incremental forming process using an ajustable punch set for the manufacture of a oubly curve sheet metal S J Yoon an D Y Yang* Department of Mechanical Engineering, Korea

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

PERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING

PERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING PERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING PAMELA RUSSELL ADVISOR: PAUL CULL OREGON STATE UNIVERSITY ABSTRACT. Birchall an Teor prove that

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

Local Path Planning with Proximity Sensing for Robot Arm Manipulators. 1. Introduction

Local Path Planning with Proximity Sensing for Robot Arm Manipulators. 1. Introduction Local Path Planning with Proximity Sensing for Robot Arm Manipulators Ewar Cheung an Vlaimir Lumelsky Yale University, Center for Systems Science Department of Electrical Engineering New Haven, Connecticut

More information

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

A Revised Simplex Search Procedure for Stochastic Simulation Response Surface Optimization

A Revised Simplex Search Procedure for Stochastic Simulation Response Surface Optimization 272 INFORMS Journal on Computing 0899-1499 100 1204-0272 $05.00 Vol. 12, No. 4, Fall 2000 2000 INFORMS A Revise Simplex Search Proceure for Stochastic Simulation Response Surface Optimization DAVID G.

More information

Handling missing values in kernel methods with application to microbiology data

Handling missing values in kernel methods with application to microbiology data an Machine Learning. Bruges (Belgium), 24-26 April 2013, i6oc.com publ., ISBN 978-2-87419-081-0. Available from http://www.i6oc.com/en/livre/?gcoi=28001100131010. Hanling missing values in kernel methos

More information

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

NAND flash memory is widely used as a storage

NAND flash memory is widely used as a storage 1 : Buffer-Aware Garbage Collection for Flash-Base Storage Systems Sungjin Lee, Dongkun Shin Member, IEEE, an Jihong Kim Member, IEEE Abstract NAND flash-base storage evice is becoming a viable storage

More information

PART 2. Organization Of An Operating System

PART 2. Organization Of An Operating System PART 2 Organization Of An Operating System CS 503 - PART 2 1 2010 Services An OS Supplies Support for concurrent execution Facilities for process synchronization Inter-process communication mechanisms

More information

Optimal Oblivious Path Selection on the Mesh

Optimal Oblivious Path Selection on the Mesh Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract

More information

From an Abstract Object-Oriented Model to a Ready-to-Use Embedded System Controller

From an Abstract Object-Oriented Model to a Ready-to-Use Embedded System Controller From an Abstract Object-Oriente Moel to a Reay-to-Use Embee System Controller Stanislav Chachkov, Diier Buchs Software Engineering Laboratory, Swiss Feeral Institute for Technology 1015 Lausanne, Switzerlan

More information

Computer Graphics Chapter 7 Three-Dimensional Viewing Viewing

Computer Graphics Chapter 7 Three-Dimensional Viewing Viewing Computer Graphics Chapter 7 Three-Dimensional Viewing Outline Overview of Three-Dimensional Viewing Concepts The Three-Dimensional Viewing Pipeline Three-Dimensional Viewing-Coorinate Parameters Transformation

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Evolutionary Optimisation Methods for Template Based Image Registration

Evolutionary Optimisation Methods for Template Based Image Registration Evolutionary Optimisation Methos for Template Base Image Registration Lukasz A Machowski, Tshilizi Marwala School of Electrical an Information Engineering University of Witwatersran, Johannesburg, South

More information

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples

More information

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body International Engineering Mathematics Volume 04, Article ID 46593, 7 pages http://x.oi.org/0.55/04/46593 Research Article Invisci Uniform Shear Flow past a Smooth Concave Boy Abullah Mura Department of

More information

Dual Arm Robot Research Report

Dual Arm Robot Research Report Dual Arm Robot Research Report Analytical Inverse Kinematics Solution for Moularize Dual-Arm Robot With offset at shouler an wrist Motivation an Abstract Generally, an inustrial manipulator such as PUMA

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpenCourseWare http://ocw.mit.eu 6.854J / 18.415J Avance Algorithms Fall 2008 For inormation about citing these materials or our Terms o Use, visit: http://ocw.mit.eu/terms. 18.415/6.854 Avance Algorithms

More information

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

MANJUSHA K.*, ANAND KUMAR M., SOMAN K. P.

MANJUSHA K.*, ANAND KUMAR M., SOMAN K. P. Journal of Engineering Science an echnology Vol. 13, No. 1 (2018) 141-157 School of Engineering, aylor s University IMPLEMENAION OF REJECION SRAEGIES INSIDE MALAYALAM CHARACER RECOGNIION SYSEM BASED ON

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle

More information

Exploring Context with Deep Structured models for Semantic Segmentation

Exploring Context with Deep Structured models for Semantic Segmentation APPEARING IN IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, APRIL 2017. 1 Exploring Context with Deep Structure moels for Semantic Segmentation Guosheng Lin, Chunhua Shen, Anton van en

More information

Adjacency Matrix Based Full-Text Indexing Models

Adjacency Matrix Based Full-Text Indexing Models 1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,

More information

UNIT 9 INTERFEROMETRY

UNIT 9 INTERFEROMETRY UNIT 9 INTERFEROMETRY Structure 9.1 Introuction Objectives 9. Interference of Light 9.3 Light Sources for 9.4 Applie to Flatness Testing 9.5 in Testing of Surface Contour an Measurement of Height 9.6 Interferometers

More information

Fast Window Based Stereo Matching for 3D Scene Reconstruction

Fast Window Based Stereo Matching for 3D Scene Reconstruction The International Arab Journal of Information Technology, Vol. 0, No. 3, May 203 209 Fast Winow Base Stereo Matching for 3D Scene Reconstruction Mohamma Mozammel Chowhury an Mohamma AL-Amin Bhuiyan Department

More information

A Duality Based Approach for Realtime TV-L 1 Optical Flow

A Duality Based Approach for Realtime TV-L 1 Optical Flow A Duality Base Approach for Realtime TV-L 1 Optical Flow C. Zach 1, T. Pock 2, an H. Bischof 2 1 VRVis Research Center 2 Institute for Computer Graphics an Vision, TU Graz Abstract. Variational methos

More information

Genetic Fuzzy Logic Control Technique for a Mobile Robot Tracking a Moving Target

Genetic Fuzzy Logic Control Technique for a Mobile Robot Tracking a Moving Target .IJCSI.org 67 Genetic Fuzzy Logic Control Technique for a Mobile Robot Tracking a Moving Target Karim Benbouaballah an Zhu Qi-an College of Automation, Harbin Engineering University Harbin, 151, China

More information

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao

More information

Exploring Context with Deep Structured models for Semantic Segmentation

Exploring Context with Deep Structured models for Semantic Segmentation 1 Exploring Context with Deep Structure moels for Semantic Segmentation Guosheng Lin, Chunhua Shen, Anton van en Hengel, Ian Rei between an image patch an a large backgroun image region. Explicitly moeling

More information

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,

More information

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic WLAN Inoor Positioning Base on Eucliean Distances an Fuzzy Logic Anreas TEUBER, Bern EISSFELLER Institute of Geoesy an Navigation, University FAF, Munich, Germany, e-mail: (anreas.teuber, bern.eissfeller)@unibw.e

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Linus Svärm Petter Stranmark Centre for Mathematical Sciences, Lun University {linus,petter}@maths.lth.se Abstract Shift-map image processing is a new framework base on energy

More information

A Comparative Evaluation of Iris and Ocular Recognition Methods on Challenging Ocular Images

A Comparative Evaluation of Iris and Ocular Recognition Methods on Challenging Ocular Images A Comparative Evaluation of Iris an Ocular Recognition Methos on Challenging Ocular Images Vishnu Naresh Boeti Carnegie Mellon University Pittsburgh, PA 523 naresh@cmu.eu Jonathon M Smereka Carnegie Mellon

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

New Version of Davies-Bouldin Index for Clustering Validation Based on Cylindrical Distance

New Version of Davies-Bouldin Index for Clustering Validation Based on Cylindrical Distance New Version of Davies-Boulin Inex for lustering Valiation Base on ylinrical Distance Juan arlos Roas Thomas Faculta e Informática Universia omplutense e Mari Mari, España correoroas@gmail.com Abstract

More information

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure

More information

Rough Set Approach for Classification of Breast Cancer Mammogram Images

Rough Set Approach for Classification of Breast Cancer Mammogram Images Rough Set Approach for Classification of Breast Cancer Mammogram Images Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative Methos an Information Systems

More information

2-connected graphs with small 2-connected dominating sets

2-connected graphs with small 2-connected dominating sets 2-connecte graphs with small 2-connecte ominating sets Yair Caro, Raphael Yuster 1 Department of Mathematics, University of Haifa at Oranim, Tivon 36006, Israel Abstract Let G be a 2-connecte graph. A

More information

A MIMO Fuzzy Controller for tracking: Robot control. Carl Crane Professor, Mechanical Engineering University of Florida Gainesville, FL 32611

A MIMO Fuzzy Controller for tracking: Robot control. Carl Crane Professor, Mechanical Engineering University of Florida Gainesville, FL 32611 A MIMO Fuzzy Controller for tracking: Robot control Paul A.C. Mason Assistant Professor, Kevin Walchko Research Assistant Carl Crane Professor, Mechanical Engineering University of Floria Gainesville,

More information

Estimating Velocity Fields on a Freeway from Low Resolution Video

Estimating Velocity Fields on a Freeway from Low Resolution Video Estimating Velocity Fiels on a Freeway from Low Resolution Vieo Young Cho Department of Statistics University of California, Berkeley Berkeley, CA 94720-3860 Email: young@stat.berkeley.eu John Rice Department

More information

An Anti-Aliasing Technique for Splatting

An Anti-Aliasing Technique for Splatting An Anti-Aliasing Technique for Splatting J. Ewar Swan II 1,2,3 Klaus Mueller 2 Torsten Möller 1,2 Naeem Shareef 1,2 Roger Crawfis 1,2 Roni Yagel 1,2 1 Avance Computing Center for the Arts an Design 2 Department

More information

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times Algorithm for Intermoal Optimal Multiestination Tour with Dynamic Travel Times Neema Nassir, Alireza Khani, Mark Hickman, an Hyunsoo Noh This paper presents an efficient algorithm that fins the intermoal

More information

Short-term prediction of photovoltaic power based on GWPA - BP neural network model

Short-term prediction of photovoltaic power based on GWPA - BP neural network model Short-term preiction of photovoltaic power base on GWPA - BP neural networ moel Jian Di an Shanshan Meng School of orth China Electric Power University, Baoing. China Abstract In recent years, ue to China's

More information

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA Preprint, August 5, 2018. 1 All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA Mikhail Ivanov, Frerik Brännström, Alexanre Graell i Amat, an Petar Popovski Department of Signals an Systems,

More information

X y. f(x,y,d) f(x,y,d) Peak. Motion stereo space. parameter space. (x,y,d) Motion stereo space. Parameter space. Motion stereo space.

X y. f(x,y,d) f(x,y,d) Peak. Motion stereo space. parameter space. (x,y,d) Motion stereo space. Parameter space. Motion stereo space. 3D Shape Measurement of Unerwater Objects Using Motion Stereo Hieo SAITO Hirofumi KAWAMURA Masato NAKAJIMA Department of Electrical Engineering, Keio Universit 3-14-1Hioshi Kouhoku-ku Yokohama 223, Japan

More information

Blind Data Classification using Hyper-Dimensional Convex Polytopes

Blind Data Classification using Hyper-Dimensional Convex Polytopes Blin Data Classification using Hyper-Dimensional Convex Polytopes Brent T. McBrie an Gilbert L. Peterson Department of Electrical an Computer Engineering Air Force Institute of Technology 9 Hobson Way

More information

Research Article Research on Law s Mask Texture Analysis System Reliability

Research Article Research on Law s Mask Texture Analysis System Reliability Research Journal of Applie Sciences, Engineering an Technology 7(19): 4002-4007, 2014 DOI:10.19026/rjaset.7.761 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitte: November

More information

Controlling formations of multiple mobile robots. Jaydev P. Desai Jim Ostrowski Vijay Kumar

Controlling formations of multiple mobile robots. Jaydev P. Desai Jim Ostrowski Vijay Kumar Controlling formations of multiple mobile robots Jayev P. Desai Jim Ostrowski Vijay Kumar General Robotics an Active Sensory Perception (GRASP) Laboratory, University of Pennsylvania 340 Walnut Street,

More information

Data Mining: Clustering

Data Mining: Clustering Bi-Clustering COMP 790-90 Seminar Spring 011 Data Mining: Clustering k t 1 K-means clustering minimizes Where ist ( x, c i t i c t ) ist ( x m j 1 ( x ij i, c c t ) tj ) Clustering by Pattern Similarity

More information

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative

More information

TCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model

TCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model TCP Symbiosis: Congestion Control Mechanisms of TCP base on Lotka-Volterra Competition Moel Go Hasegawa Cybermeia Center Osaka University 1-3, Machikaneyama-cho, Toyonaka, Osaka 56-43, JAPAN Email: hasegawa@cmc.osaka-u.ac.jp

More information