Music Information Retrieval Schemes in Peer-to-Peer Environments

Size: px
Start display at page:

Download "Music Information Retrieval Schemes in Peer-to-Peer Environments"

Transcription

1 Journal of Computer Scence 1 (3): , 2005 ISSN Scence Publcatons, 2005 Musc Informaton Retreval Schemes n Peer-to-Peer Envronments Chaokun Wang, Janzhong L and Shengfe Sh School of Computer Scence and Technology, Harbn Insttute of Technology Harbn , People s Republc of Chna Abstract: Peer-to-peer systems are useful tools for musc applcatons. Exstng peer-to-peer systems support the storng and sharng of musc data, however they cannot effectvely and effcently support the content-based nformaton retreval and the cooperaton of muscans. Ths study focuses on the methods of content-based musc nformaton retreval n peer-to-peer envronments. Four musc nformaton retreval schemes are evaluated n detal on communcaton cost, retreval tme, update complexty and robustness. Peers-peers-coordnator scheme s found to be the best one from theoretcal analyss and smulated experments. Also, an algorthm s desgned for an mplementaton of the peers-peers-coordnator scheme and a smple but effectve method s brought forward to flter out the replca n the fnal results. The results of smulated experments show the effcency of the algorthm. Key words: Musc Informaton Retreval, Peer-to-Peer Systems, CBP2PMIR INTRODUCTION Peer-to-Peer (P2P) systems have been greatly successful n facltatng storage and exchange of huge volumes of data snce ther scalablty, fault-tolerance and self-organzng nature. In some P2P based data systems, such as Kazaa, musc data s commonly a large part of ts contents. Ths calls for technques that provde users the abltes to store musc data safely and retreve musc data quckly and accurately. Example 1: Imagne an Internet-scale P2P musc system that conssts of peers rangng from desktops behnd modem lnes to powerful servers connected to the Internet through hgh-bandwdth lnes. Each peer shares some resources wth other peers, such as musc data and porton of storage, for the common good of everyone. Peers n musc system can nterchange musc data and other nformaton. A user, for example, can store and publsh a pece of musc n the system wthout specfyng ts exact locaton. Also, he or she can search the whole system for a pece of musc, for example, the pece of musc ttled as My Sun. Ths example shows the role of P2P n storng and sharng of musc data. Example 2: Suppose that you are sttng before your computer connectng to a P2P musc system. You suddenly hear a song. It s the best song you have heard for a long tme, but you mssed the announcement and don t recognze the artst. Wouldn t t be nce f you could hum a melody you remembered, e.g. the melody showed n Fg. 1, or push a few keys on your keyboard and a few seconds later the P2P system would tell you the name of the artst and the ttle of the musc you re lstenng to? Perhaps the system even sends ths pece of 369 musc to your computer. Ths example shows that content-based nformaton retreval n P2P systems s very mportant for musc applcatons Fg. 1: A Sample Melody Example 3: In a musc communty, the computers of composers, conductors, volnsts, pansts, organsts and so on, are connected to establsh a peer-to-peer system. In ths P2P system, many tasks, such as the creaton of a huge opera, should be cooperated by several muscans together va the P2P network. Each muscan could compose hs part and communcate wth others and then send hs work to a certan muscan who s responsble to combnng all the parts nto the fnal opera. When a composer s workng on a symphony, he can use an organst s computer to tune varous musc nstruments and use a panst s computer to synthesze the symphony and use hs own computer to test the symphony. Ths example shows the role of P2P n the cooperaton of muscans. From the examples above, t can be seen that P2P systems are useful tools for musc applcatons and the P2P systems used n musc applcatons must be have abltes of supportng storng and sharng of musc data, content-based nformaton retreval and cooperaton of muscans. Although exstng P2P systems support the storng and sharng of musc data, but they can not effectvely and effcently support the content-based nformaton retreval and the cooperaton of muscans. Thus, exstng P2P systems are not sutable to musc applcatons. The purpose of our research s to create a

2 P2P musc system that has the three abltes above and supports most of musc applcatons. In the rest of the study, CBP2PMIR s used to express content-based musc nformaton retreval n P2P envronments. There has been a consderable amount of work on content-based nformaton retreval for musc data n non-p2p envronments. A varety of results were ganed n symbolc musc nformaton retreval (MIR), whch s musc nformaton retreval on musc events, such as MIDI data [1, 2, 5, 6]. Other works focused on acoustc MIR, whch s musc nformaton retreval on musc dgtal sgnals, such as WAV format [3, 4, 7]. Most of the prevous research work on content-based musc nformaton retreval s not related to P2P envronments. Also, they cannot be drectly appled to P2P systems. Many P2P systems have been developed. They can be dvded nto three classes. One s centralzed, such as Napster. The second one s decentralzed, such as Gnutella. The thrd one s hybrd that combnes the advantages of centralzed and decentralzed systems, such as Kazaa and Morpheus. All the P2P systems are dentfer or keyword based rather than content based. They can hardly process musc queres, such as a melody hummed. Four schemes of CBP2PMIR are proposed n our prevous conference studes [9] and the query processng methods n each one are also presented n t. The frst two schemes are centralzed. The thrd one s dstrbuted. And the last one s hybrd. The proposed four schemes have some common features. Frst, musc resource s dspersed over the whole system. Second, musc data s transferred drectly from one peer to another. Fnally, the systems behave n ad-hoc manner, that s, any peer can moves n to and moves out of the P2P system freely. The performance of the schemes s dfferent n term of communcaton cost, robustness and nformaton retreval tme. Also, t should be evaluated so that the best scheme can be selected. Assumptons and Parameters: The key problem of CBP2PMIR s an optmzaton problem, that s, developng a musc retreval algorthm so that COMM and TIME are mnmzed under the constran condton RTN n, where COMM s the communcaton cost and TIME s the tme of processng a musc query Q and RTN s the number of musc fles n query result. Parameters used n the followng evaluaton are defned n Table 1. In the rest of the study, R and N are used to denote the set of nonnegatve real numbers and the set of postve ntegers respectvely. Communcaton Cost: In each scheme, the communcaton cost conssts of four parts. The frst part s the musc feature Qf transferred from the queryng peer to the coordnator or other peers. The second s the results, {(Pd, Md j, Cf(Qf, Mf j))}, transferred from the coordnator or other peers to the queryng peer, where J. Computer Sc., 1 (3): , Pd s the network dentfer of the th peer, Md j s the dentfer of the j th musc fle n the th peer, Mf j s the feature of the j th musc fle n the th peer and Cf s a musc feature-matchng functon, that s, Cf: Mf Mf RANK, where Mf s the set of musc features and RANK [0, 1] s a set of real numbers.. The thrd s the set of the user s downloadng requests, {(the network dentfer of the queryng peer, the network dentfer of a destnaton peer, the dentfer of a selected musc fle)}, transferred from queryng peers to destnaton peers. The last s the musc fles downloaded. From the descrpton of the queryng processes n the four musc nformaton retreval schemes n [9] and the parameters n Table 1, we can easly derve the communcaton cost of each scheme. Due to the lmtaton of the paper length, we gnore the dervng process here and only gve the results n Table 2. Please note that t' t,and (w + w w d ) W when the number of peers n a system s suffcently large. Lemma 1: The COMM of PsC s less than that of PsC +. Proof: The result follows from Table 2. Lemma 2: When the number of peers n a system s suffcently large, the COMM of PsPs s less than that of PsC. Proof: Snce the number of peers s suffcently large (W ), t. Because of w, d, q and re beng all constants, w+w w d -1 s also a constant and there s an upper bound for t'. Thus, [(w+w w d -1) q]/(re t) 0, 1-[(w+w w d -1) q]/(re t) 1 and furthermore t'/t 1-[(w+w w d -1) q]/(re t). Fnally, we have (w+w w d ) q +t' re+n q'+n m t re + q + n q' + n m, that s, the COMM of PsPs s less than that of PsC. Lemma 3: The COMM of PsPsC s not more than that of PsPs. Proof: It only needs to show that when the query results are the same n PsPsC and PsPs schemes and user selects all fles from the merged results, the COMM of PsPsC s not more than that of PsPs. Snce user selects all fles from the merged results n both schemes, the number of musc fles satsfyng the user s query n PsPs s equal to that n PsPsC when the fnal results n the two schemes are the same,.e. t' = t''. Accordng to defnton of PsPsC scheme, Cas n PsPsC, a data structure n the coordnator for acceleratng the nformaton retreval process, can accelerate musc nformaton retrevng by locatng the retrevng to some but not all peers on whch there are more musc fles matchng user s query. Let Ht be the rato of the number

3 J. Computer Sc., 1 (3): , 2005 Table 1: Defntons of Parameters Parameter Name Defnton Scope of Applcaton q=2spd+sqf Spd s sze, n bytes, of peer d, sqf s sze, n bytes, of the musc all schemes feature extracted from a user s query Q re=2spd+smd+r Spd s sze, n bytes, of peer d, smd s sze, n bytes, of a musc fle s all schemes d and r s sze, n bytes, of the matchng value between ths fle and Q t Number of musc fles satsfyng Q PsC, PsC + n Number of musc fles a user selects all schemes q'=2spd+md Spd s sze, n bytes, of peer d and smd s sze, n bytes, of a musc all schemes fle s d m Average sze, n bytes, of musc fles all schemes W Number of peers n P2P system all schemes w Wdth of the system PsPs, PsPsC d Depth of the system PsPs, PsPsC t' Number of fles satsfyng Q PsPs W' Number of peers satsfyng Q PsPsC t'' Number of fles satsfyng Q PsPsC Table 2: Communcaton Cost of Each Scheme Part PsC PsC + PsPs PsPsC 1 q W q (w + w w d ) q W' q 2 t re t re t' re t'' re 3 n q' n q' n q' n q' 4 n m n m n m n m COMM q + t re+ q W + t re+ (w + w w d ) q+ W' q + t'' re+ n q' + n m n q' + n m t' re + n q' + n m n q' + n m of fles satsfyng user s query to the number of peers nvolved n the processng of user s query. Ht n PsPsC scheme s hgher than Ht n PsPs scheme. That means t''/w' t'/(w + w w d ). Thus W' (w + w w d ) and W' q + t'' re+ n q' + n m (w +w w d ) q +t' re+n q' +n m, that s, the COMM of PsPsC s not more than that of PsPs. Theorem 1: When the number of peers n the system s suffcently large, the COMM of PsPsC s the least. Proof: The result follows from Lemmas 1, 2, and 3. Retreval Tme: The retreval tme of each scheme s composed by three parts. The frst part s the tme for computaton,.e. the tme used for feature-matchng. The second part s the tme used to merge the local results from the peers and to sort the fnal results. The last part s the tme used for communcaton that has been dscussed n the above text. Thus we wll consder the tme for computaton, mergng and sortng here. The retreval tme of each scheme s lsted n Table 3, where A = {(Mf j, Cf(Qf, Mf j)) j N} s the set of features of musc fles stored on the th peer, A = {(Mf j, Cf(Qf, Mf j)), j N} = N A s the set of features of all musc fles stored n a whole P2P system, T(A ) s the tme for computng and sortng Cf(Qf, Mf j) of A, T(A) s the tme for computng and sortng Cf(Qf, Mf j) of A, M{t} s the tme for mergng the result of t fles and M{t'} and other peers. 371 M{t''} are smlar to M{t}. It s obvous that the TIME of PsC s more than others. Because W' W, M{t''} M{t}, the TIME of PsPsC s less than the TIME of PsC+. Because W' (w + w w d ) when t'' = t' from Lemma 3, the tme for computng and mergng n PsPs s more than max{t(a )} + M{t''}, that s, the TIME of PsPsC s less than the TIME of PsPs. Thus the TIME of PsPsC s the least. Update Complexty and Robustness: The update n a P2P system ncludes musc fle update on a peer and peer movng n to or movng out of the P2P system. In PsC scheme, a peer sends ts network dentfer and the features of ts shared musc peces to the coordnator when t moves n to the P2P system. The nformaton of the peer should be deleted from the coordnator when t moves out of the P2P system. The nformaton of a document should be added nto or deleted from the coordnator when t s added nto or deleted from the shared musc set of a peer. In PsC + scheme, the network dentfer of a peer s saved n the coordnator when t moves n to the P2P system. The nformaton should be deleted from the coordnator when t moves out of the P2P system. In PsPs scheme, the network dentfer of a peer s saved n ts neghbor peers when the peer moves n to the P2P system. When the peer moves out of the P2P system, ts nformaton should be deleted from ts neghbor peers. Document update of a peer n these two schemes has no effect on

4 J. Computer Sc., 1 (3): , 2005 Table 3: Retreval Tme of Each Scheme Part PsC PsC + PsPs PsPsC Computaton tme T(A) max{t(a )} max{t(a )} max{t(a )} Merge tme M{t} M{t'} M{t''} TIME T(A) max{t(a )}+M{t} max{t(a )} +M{t'} max{t(a )}+M{t''} Remark = 1,...,W = 1,..., (w + w w d ) = 1,...,W' In PsPsC scheme, the network dentfer of a peer s saved n the coordnator and ts neghbor peers when t moves n to a P2P system. Also, the statstc of the shared musc fles of the peer s saved n the coordnator. When the peer moves out of the P2P system, the nformaton s deleted from the coordnator and ts neghbor peers. After a pece of musc s added nto or deleted from the shared musc set of a peer, the correspondng statstc saved n the coordnator should be updated f the dfference between the new statstc and the old one s more than a value specfed by the system. In concluson, when a peer moves n to or moves out of a P2P system, the update cost of PsC + scheme s smallest, the update cost of PsPs scheme s smaller than the update costs of PsPsC scheme and PsC scheme. When musc fles are updated on a peer, the update costs of PsC + and PsPs scheme are all smallest, the update cost of PsC scheme s largest and the update cost of PsPsC scheme s between them. In PsC and PsC + schemes, the coordnator s easly overloaded and becomes the bottleneck of the whole system. P2P systems constructed by these schemes have weak robustness. For example, f the coordnator s attacked by denal of servce from a malcous peer, the system can be faled. Inversely, PsPs scheme has strong robustness because t s fully dstrbuted. However the number of messages sent by peers n the scheme s numerous. The communcaton cost of PsPs scheme s hgh. PsPsC s a hybrd system that takes the advantages of PsC, PsC + and PsPs schemes. It can contnue workng va neghbor peers when there s somethng wrong wth the coordnator. PsPsC scheme has strong robustness. Performance Evaluaton of Schemes: From the above comparson, PsPsC scheme s better than others n terms of communcaton cost, retreval tme and robustness except ts update performance beng lower n some cases. Thereby our CBP2PMIR system s developed n the lght of ths scheme. In order to compare the performance of the four schemes, a smulator, whch smulates P2P systems of 10,000 PIII/600 personal computers, s frst created. Then, four sets of musc fles wth szes of 1,268,870, 3,169,806, 5,073,459 and 6,341,780 are respectvely used. Each set s generated by all the peers each of whch randomly generates one of ts subsets based on dfferent mean and standard devaton between 0 and 1 under the normal dstrbuton. Fnally we run 15 queres on the four sets n four musc nformaton retreval schemes mentoned 372 prevously. The features of the queres are 0.2, 0.25, 0.3, 0.35, 0.4, 0.45, 0.5, 0.55, 0.6, 0.65, 0.7, 0.75, 0.8, 0.85 and 0.9. The parameters spd=4bytes, sqf=8bytes, smd=4bytes, r=8bytes, so q=16bytes and re=20bytes. The expermental results are shown n Table 4. In the table, each retreval tme s the average value of retreval tmes of the 15 queres. The retreval tme of a query s the elapsed tme from the tme of the query beng submtted by a user to the tme of the query result beng sent to the user. The retreval tme n PsC scheme s very long because the comparson of all documents wth the query and the sortng of results are performed n the coordnator. When the computaton s dspersed over the peers, retreval tme comes down as n PsC + scheme. If there are some ndces n the coordnator, the retreval tme used n PsC and PsC + schemes wll be shorter. The retreval tme n PsPs scheme s short, but the query result may be lost because that some peers may not be searched durng the query processng. Tme used n PsPsC scheme s the smallest because the query s processed approxmately and computaton s performed n dstrbuted manner. If a user only needs approxmate answer, PsPsC scheme s the best selecton. In ths scheme, f the coordnator faled, the system can stll run n PsPs scheme whose performance s stll very hgh. If a user needs exact answer, PsC + s a good selecton. Implementaton of PSPSC Scheme: In a P2P envronment, there are usually a lot of musc fles smlar to a query submtted by a user. However, the user often wants a porton of the whole smlar musc fles. Therefore, approxmate query processng s very common for musc nformaton retreval n P2P envronments and then PsPsC scheme s very mportant. In ths study, an mplementaton of PsPsC scheme s also proposed. Two key problems are consdered. The frst problem s how to fnd the set of destnaton-lke peers. In a P2P data system, a peer s called a destnaton-lke peer of a query f there are perhaps lots of musc fles smlar to the query on the peer. The second problem s how to flter out the repeated musc fles. In the followng dscusson, PNIopt represents the set of destnaton-lke peers, each element n whch s the network dentfer of a destnaton-lke peer. In musc theory, an nterval s the dfference n ptch between the current note and the prevous note. The unt of nterval used n ths study s semtone. For example, the nterval between "do" and "re" s 2 semtones, whle

5 J. Computer Sc., 1 (3): , 2005 Table 4: Average Retreval Tme n Each Scheme n a Smulator (Seconds) Number of docs PsC PsC + PsPs PsPsC 1,268, ,169, ,073, ,341, the nterval between "re" and "m" s 1 semtone. A sequence of ntervals can be used to represent a melody. For example, the sequence of nterval of the melody n Fg. 1 s ( ). Also, a sequence of ntervals can be used to represent a pece of musc because a monophonc melody can be extracted from a pece of musc [8]. Defnton 1: Let d be a postve nteger. For a pece of musc whose sequence of ntervals s Seq = ( j... Nsum ), 1 j N sum, j s an nterval value, N sum s the number of all ntervals n Seq. Let N d be the number of ntervals whose absolute values are not less than d, Rat d = N d /N sum s called the rato of d nterval of the pece of musc. Let d be 2, the rato of d nterval of the melody n Fg. 1 s When d s gven n a P2P system, Rat d can be abbrevated to Rat. For two peces of musc m 1 and m 2, Ratm 1 and Ratm 2 are respectvely the ratos of d nterval of m 1 and m 2. Let offset be a small postve number, m 1 s called smlar to m 2 f Ratm 1 -Ratm 2 <offset, that s, Ratm 1 s close enough to Ratm 2. Defnton 2: Let d be a gven postve nteger. For a set of musc fles, f a varable R d s used to denote the rato of d nterval of each pece of musc n the set, (a, b) s called the feature of d nterval of ths set, where (1) a s the mean of R d ; (2) b s the standard devaton of R d. It s obvous that 0 a, b 1. Defnton 3: Let d be a gven postve nteger. S = {(a, b) 0 a, b 1} s called the space of d nterval features, where (a, b) S f and only f (a, b) s the feature of d nterval of a certan musc set. Defnton 4: Gven 0 a m, b n 1 (m, n = 0, 1, 2,..., v), a 0 = 0 < a 1 < a 2 <... < a v-1 < a v = 1 and b 0 = 0 < b 1 < b 2 <... < b v-1 < b v = 1, S s parttoned by these ponts nto v 2 subspaces that are denoted by S j, where (1). S j Φ, 1, j v, S j = {(a, b) a -1 a < a, b j-1 b < b j }, 1, j (v - 1); S j = {(a, b) a -1 a a, b j-1 b< b j }, = v, 1 j (v-1); S j = {(a, b) a -1 a < a, b j-1 b b j }, 1 (v - 1), j = v; S j = {(a, b) a -1 a a, b j-1 b b j }, = j = v; (2). S S =Φ, 1 1, 2, j 1, j 2 v, 1 2 or j 1 j 2 ; 1 j1 2 j2 (3). v U S = S. j, j= 1 {S j, j = 1,..., v} s called a partton of S and (a 0, a 1,..., a v, b 0, b 1,..., b v ) s called the parttonng sequence. Defnton 5: S (k,h) s called the expandng set of (k, h), f (k, h) s the feature of d nterval of a certan musc set, S (k,h) ={(a,b) a [max(k-α, 0), mn(k+α, 1)], b [max(k-β, 0), mn(k+β, 1)]} S, where α, β [0, 1]. Then α s called the expandng factor on mean, β s called the expandng factor on standard devaton. Defnton 6: Supposng that E S, {S j, j = 1,..., v} s a partton of S, G {S j, j = 1,..., v}, G s called the mnmal overlay of E f (1) E U S ' ; (2)G' G, E U S ' G' = G. ' Defnton 7: S = {(a, b) 0 a, b 1} s the space of d nterval features, {S mn m, n = 1,..., v} s a partton of S. In the PsPsC scheme, the mappng f:{pd } {S mn } s called a partton mappng, f f(pd )=S mn (a, b ) S mn, where (a, b ) s the feature of d nterval of the shared musc set on the th peer. Please note that the shared musc fles on a peer may have more than one feature of d nterval. For example, the shared musc fles on a peer can be clustered nto several sets and then one feature of d nterval can be extracted from each set. To smplfy the dscusson of the mplementaton, a peer only corresponds to one feature of d nterval n ths secton, that s, a peer only corresponds to one set of musc fles. But t can be extended to be sutable for other envronments. In the rest of ths study, ff(s mn ) s used to denote the set {Pd f(pd )=S mn, N}. An mplementaton of Cas, the data structure n the coordnator, s {ff(s mn ) m, n = 1,..., v}. The Algorthm to Fnd PNIopt: Gven parameters d, parttonng sequence, expandng factors α and β, the algorthm to fnd PNIopt can be descrbed as follows. Input: a musc query Q, whch s a pece of musc, a song sung, or a melody hummed. 373

6 J. Computer Sc., 1 (3): , 2005 Output: the set of destnaton-lke peers PNIopt. Steps: * Extract the sequence of ntervals of Q; * Compute Rat Q - the rato of d nterval of Q. Please note that Rat Q s consdered as Qf n ths mplementaton of PsPsC scheme, that s, Pf(Q)=Qf=Rat Q, where Pf denotes the operaton of computng the rato of d nterval of Q from the sequence of ntervals of Q; * Compute Qps=Stat({Q})=(a Q, b Q ), where Stat( ) s the operaton of computng the feature of d nterval of a set of musc fles. Obvously a Q = Rat Q, b Q = 0; * Compute S(a Q,b Q ), - the expandng set of Qps; * Compute G - the mnmal overlay of S(a Q,b Q ), G {S mn m, n = 1,..., v}; * Compute PNI opt = ff ( S ') Pd f ( Pd ) = S ', N U = U { } = {Pd f(pd ) G, N}; * Return PNI opt. PNIopt can be refned by tunng parttonng sequence, v, α and β. Flterng Method: In the mplementaton of PsPsC scheme, the coordnator sends PNIopt to the queryng peer. The queryng peer sends Rat Q, the feature of the musc query, to these destnaton-lke peers. Each destnaton-lke peer, say the k th peer, returns the local result, that s, Pd k and {( Mf k j, Cf(Rat Q, Mf k j)) Cf(Rat Q, Mf k j)<offset, j N}, to the queryng peer, where offset s the matchng condton gven by the user. The queryng peer receves all results, sorts them and exhbts them to the user. Repeated copes of a verson of a pece of musc stored n dfferent peers may be returned. Thus, t s mportant to flter out the redundant musc fles n the result shown to the user. In ths study a smple and effectve method s presented to flter out the repettons n the results. Musc fles wth the same content perhaps have dfferent names n dfferent peers, but they have the same szes and usually have the same tmestamps (the date and tme attrbutes of fles). So the szes or the tmestamps of musc fles wth equal matchng values can be used to judge whether these fles are repeated. Usually the sze of fle s enough for the job. Let the format of the result be Pd k and {(Mf k j, Fs k j, Cf(Rat Q, Mf k j)) Cf(Rat Q, Mf k j)<offset, j N}, where Fs k j s the sze of the j th smlar musc fle n the k th destnaton-lke peer. Durng the mergng and sortng of results from destnaton-lke peers, f the queryng peer fnds some musc fles wth the same matchng values, t compares ther szes and then deletes the replca when they are the same. RESULTS Some smulated experments are desgned to show the effcency of the proposed algorthm. In order to measure the expermental results, the followng concepts are ntroduced. Defnton 8: Supposng that Q s the nput query, Clst s the set of network dentfers of all peers and PNIopt CLst s the output, PR = PNI opt Clst s called peer-rato, whch represents the percentage of destnaton-lke peers n all peers. Defnton 9: Gven a value of offset, the followng rato s called ht-rato HR = PNIopt Clst Ph Ph, where Ph ={Md j Cf(Qf, Mf j)<offset, j N} = {Md j Rat Q - RatMd j < offset, j N}. HR represents the percentage of the number of musc fles smlar to Q n PNI opt to the number of all musc fles smlar to Q n the whole P2P system. Defnton 10: The rato of HR to PR s called acceleratng-rato HR η =. PR η represents the effcency of the proposed algorthm. The followng experments are made n our smulator wth 6,341,780 musc fles. The 15 queres mentoned prevously are also processed n the smulator. The parameter v s set to 5 and the parttonng sequence (a 0, a 1,..., a v, b 0, b 1,..., b v ) s altered from a 0 = 0 < a 1 < a 2 <... < a v-1 < a v = 1, b 0 = 0 < b 1 < b 2 <... < b v-1 < b v = 1 to 0 a 0 < a 1 < a 2 <... < a v-1 < a v 1, 0 b 0 < b 1 < b 2 <... < b v-1 < b v 1, 0 a x, b y 1, x, y = 0, 1, 2,..., v, where a 0, a v, b 0 and b v are determned by the experment data. Dfferent expandng factors α and β are selected to test the dfferent effects. Then the averages of PR, HR and η are computed and shown as follows. Fgure 2 shows the relatonshp between average HR and offset at dfferent expandng factors. When α ncreases, HR ncreases because more peers are searched for smlar musc to Q. The same s true of β. When offset ncreases, HR decreases. It s better to keep offset wthn 374

7 Fg. 2: The Average HR n the P2P System of Peers Fg. 3: The Average η n the P2P System of Peers a proper range, such as [0.001, 0.01] n these experments, to get the more stable HR. Fgure 3 shows the relatonshp between average η and offset at dfferent expandng factors. When α ncreases, η decreases snce peers wth lower Ph are searched. The same s true of β. When offset ncreases, η decreases because more rrelevant ngredents are nvolved n the retreval process, such as more dssmlar musc fles to Q. In concluson, HR and η are always stable at certan expandng factors α and β. An expandng factor α or β can be ncreased to mprove HR, but the acceleratng rato η wll fall. When takng α = 0.01, β = 0.15 and offset = 0.005, HR wll be close to one fourth (23.91%) and η wll be more than 4 (4.1191). It s a good tradeoff. CONCLUSIONS J. Computer Sc., 1 (3): , 2005 CBP2PMIR s ntroduced n ths study. Four schemes of CBP2PMIR are evaluated n detal on communcaton cost, retreval tme, update complexty and robustness. PsPsC scheme s found out to be the best one for 375 approxmate queres and PsC+ s best for exact queres. After that, an mplementaton of PsPsC scheme s presented. Based on some useful concepts, an algorthm s desgned to fnd the destnaton-lke peers. A smple yet effectve algorthm s also gven to flter out the replca n the fnal results. Experments show that these algorthms are very effcent. AKNOWLEDGEMENT Ths work was supported by the 973 Research Plan of Chna under Grant No. G , the NSF of Chna under Grant No , the 863 Research Plan of Chna under Grant No. 2002AA and the Army Research Plan of Chna under Grant No REFERENCES 1. Downe, D. and M. Nelson, Evaluaton of a Smple and Effectve Musc Informaton Retreval Method. In Proceedngs of the 23 rd Intl. ACM SIGIR Conf. on Res. and Development n Informaton Retreval, Athens, Greece, pp: Hsu, J.-L., C.-C. Lu and A.L.P. Chen, Dscoverng Nontrval Repeatng Patterns n Musc Data. IEEE Transactons on Multmeda, 3: Jn, H. and H.V. Jagadsh, Indexng Hdden Markov Models for Musc Retreval. In Proceedngs of the 3 rd Intl. Symposum on Musc Informaton Retreval, Servce des Publcatons, Pars, France. 4. Lu, C.-C. and P.-J. Tsa, Content-Based Retreval of MP3 Musc Objects. In Proceedngs of the 10 th ACM Intl. Conf. on Informaton and Knowledge Management, Atlanta, Georga, USA, pp: Melucc, M. and N. Oro, Muscal Informaton Retreval usng Melodc Surface. In Proceedngs of the 4 th ACM Intl. Conf. on Dgtal lbrares, Berkeley, Calforna, USA, pp: Shalev-Shwartz, S., S. Dubnov, N. Fredman and Y. Snger, Robust Temporal and Spectral Modelng for Query by Melody. In Proceedngs of the 25 th Intl. ACM SIGIR Conf. on Res. and Development n Informaton Retreval, Tampere, Fnland, pp: Tzanetaks, G. and P. Cook, Muscal Genre Classfcaton of Audo Sgnals. IEEE Transactons on Speech and Audo Processng, 10: Utdenbogerd, A.L. and J. Zobel, Manpulaton of Musc for Melody Matchng. In Proceedngs of the 6 th ACM Intl. Conf. on Multmeda, Brstol, Unted Kngdom, pp: Wang, C., J. L and S. Sh, A Knd of Content-Based Musc Informaton Retreval Method n a Peer-to-Peer Envronment. In Proceedngs of the 3 rd Intl. Symposum on Musc Informaton Retreval, Servce des Publcatons, Pars, France, pp:

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe CSCI 104 Sortng Algorthms Mark Redekopp Davd Kempe Algorthm Effcency SORTING 2 Sortng If we have an unordered lst, sequental search becomes our only choce If we wll perform a lot of searches t may be benefcal

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Learning-Based Top-N Selection Query Evaluation over Relational Databases

Learning-Based Top-N Selection Query Evaluation over Relational Databases Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **

More information

A Novel Distributed Collaborative Filtering Algorithm and Its Implementation on P2P Overlay Network*

A Novel Distributed Collaborative Filtering Algorithm and Its Implementation on P2P Overlay Network* A Novel Dstrbuted Collaboratve Flterng Algorthm and Its Implementaton on P2P Overlay Network* Peng Han, Bo Xe, Fan Yang, Jajun Wang, and Rumn Shen Department of Computer Scence and Engneerng, Shangha Jao

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

Structural Analysis of Musical Signals for Indexing and Thumbnailing

Structural Analysis of Musical Signals for Indexing and Thumbnailing Structural Analyss of Muscal Sgnals for Indexng and Thumbnalng We Cha Barry Vercoe MIT Meda Laboratory {chawe, bv}@meda.mt.edu Abstract A muscal pece typcally has a repettve structure. Analyss of ths structure

More information

A Topology-aware Random Walk

A Topology-aware Random Walk A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Federated Search of Text-Based Digital Libraries in Hierarchical Peer-to-Peer Networks

Federated Search of Text-Based Digital Libraries in Hierarchical Peer-to-Peer Networks Federated Search of Text-Based Dgtal Lbrares n Herarchcal Peer-to-Peer Networks Je Lu School of Computer Scence Carnege Mellon Unversty Pttsburgh, PA 15213 jelu@cs.cmu.edu Jame Callan School of Computer

More information

A Deflected Grid-based Algorithm for Clustering Analysis

A Deflected Grid-based Algorithm for Clustering Analysis A Deflected Grd-based Algorthm for Clusterng Analyss NANCY P. LIN, CHUNG-I CHANG, HAO-EN CHUEH, HUNG-JEN CHEN, WEI-HUA HAO Department of Computer Scence and Informaton Engneerng Tamkang Unversty 5 Yng-chuan

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems Real-tme Fault-tolerant Schedulng Algorthm for Dstrbuted Computng Systems Yun Lng, Y Ouyang College of Computer Scence and Informaton Engneerng Zheang Gongshang Unversty Postal code: 310018 P.R.CHINA {ylng,

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Can We Beat the Prefix Filtering? An Adaptive Framework for Similarity Join and Search

Can We Beat the Prefix Filtering? An Adaptive Framework for Similarity Join and Search Can We Beat the Prefx Flterng? An Adaptve Framework for Smlarty Jon and Search Jannan Wang Guolang L Janhua Feng Department of Computer Scence and Technology, Tsnghua Natonal Laboratory for Informaton

More information

Needed Information to do Allocation

Needed Information to do Allocation Complexty n the Database Allocaton Desgn Must tae relatonshp between fragments nto account Cost of ntegrty enforcements Constrants on response-tme, storage, and processng capablty Needed Informaton to

More information

Music/Voice Separation using the Similarity Matrix. Zafar Rafii & Bryan Pardo

Music/Voice Separation using the Similarity Matrix. Zafar Rafii & Bryan Pardo Musc/Voce Separaton usng the Smlarty Matrx Zafar Raf & Bryan Pardo Introducton Muscal peces are often characterzed by an underlyng repeatng structure over whch varyng elements are supermposed Propellerheads

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications 14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

UB at GeoCLEF Department of Geography Abstract

UB at GeoCLEF Department of Geography   Abstract UB at GeoCLEF 2006 Mguel E. Ruz (1), Stuart Shapro (2), June Abbas (1), Slva B. Southwck (1) and Davd Mark (3) State Unversty of New York at Buffalo (1) Department of Lbrary and Informaton Studes (2) Department

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Application of VCG in Replica Placement Strategy of Cloud Storage

Application of VCG in Replica Placement Strategy of Cloud Storage Internatonal Journal of Grd and Dstrbuted Computng, pp.27-40 http://dx.do.org/10.14257/jgdc.2016.9.4.03 Applcaton of VCG n Replca Placement Strategy of Cloud Storage Wang Hongxa Computer Department, Bejng

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

Mining User Similarity Using Spatial-temporal Intersection

Mining User Similarity Using Spatial-temporal Intersection www.ijcsi.org 215 Mnng User Smlarty Usng Spatal-temporal Intersecton Ymn Wang 1, Rumn Hu 1, Wenhua Huang 1 and Jun Chen 1 1 Natonal Engneerng Research Center for Multmeda Software, School of Computer,

More information

Background Removal in Image indexing and Retrieval

Background Removal in Image indexing and Retrieval Background Removal n Image ndexng and Retreval Y Lu and Hong Guo Department of Electrcal and Computer Engneerng The Unversty of Mchgan-Dearborn Dearborn Mchgan 4818-1491, U.S.A. Voce: 313-593-508, Fax:

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Design of Structure Optimization with APDL

Design of Structure Optimization with APDL Desgn of Structure Optmzaton wth APDL Yanyun School of Cvl Engneerng and Archtecture, East Chna Jaotong Unversty Nanchang 330013 Chna Abstract In ths paper, the desgn process of structure optmzaton wth

More information

Description of NTU Approach to NTCIR3 Multilingual Information Retrieval

Description of NTU Approach to NTCIR3 Multilingual Information Retrieval Proceedngs of the Thrd NTCIR Workshop Descrpton of NTU Approach to NTCIR3 Multlngual Informaton Retreval Wen-Cheng Ln and Hsn-Hs Chen Department of Computer Scence and Informaton Engneerng Natonal Tawan

More information

GSLM Operations Research II Fall 13/14

GSLM Operations Research II Fall 13/14 GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

Chapter 6 Programmng the fnte element method Inow turn to the man subject of ths book: The mplementaton of the fnte element algorthm n computer programs. In order to make my dscusson as straghtforward

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

Sorting Review. Sorting. Comparison Sorting. CSE 680 Prof. Roger Crawfis. Assumptions

Sorting Review. Sorting. Comparison Sorting. CSE 680 Prof. Roger Crawfis. Assumptions Sortng Revew Introducton to Algorthms Qucksort CSE 680 Prof. Roger Crawfs Inserton Sort T(n) = Θ(n 2 ) In-place Merge Sort T(n) = Θ(n lg(n)) Not n-place Selecton Sort (from homework) T(n) = Θ(n 2 ) In-place

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Estimating Costs of Path Expression Evaluation in Distributed Object Databases

Estimating Costs of Path Expression Evaluation in Distributed Object Databases Estmatng Costs of Path Expresson Evaluaton n Dstrbuted Obect Databases Gabrela Ruberg, Fernanda Baão, and Marta Mattoso Department of Computer Scence COPPE/UFRJ P.O.Box 685, Ro de Janero, RJ, 2945-970

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Programming in Fortran 90 : 2017/2018

Programming in Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values

More information

A New Transaction Processing Model Based on Optimistic Concurrency Control

A New Transaction Processing Model Based on Optimistic Concurrency Control A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,

More information

Spatial Data Dynamic Balancing Distribution Method Based on the Minimum Spatial Proximity for Parallel Spatial Database

Spatial Data Dynamic Balancing Distribution Method Based on the Minimum Spatial Proximity for Parallel Spatial Database JOURNAL OF SOFTWARE, VOL. 6, NO. 7, JULY 211 1337 Spatal Data Dynamc Balancng Dstrbuton Method Based on the Mnmum Spatal Proxmty for Parallel Spatal Database Yan Zhou College of Automaton Unversty of Electrc

More information

Collaboratively Regularized Nearest Points for Set Based Recognition

Collaboratively Regularized Nearest Points for Set Based Recognition Academc Center for Computng and Meda Studes, Kyoto Unversty Collaboratvely Regularzed Nearest Ponts for Set Based Recognton Yang Wu, Mchhko Mnoh, Masayuk Mukunok Kyoto Unversty 9/1/013 BMVC 013 @ Brstol,

More information

CS1100 Introduction to Programming

CS1100 Introduction to Programming Factoral (n) Recursve Program fact(n) = n*fact(n-) CS00 Introducton to Programmng Recurson and Sortng Madhu Mutyam Department of Computer Scence and Engneerng Indan Insttute of Technology Madras nt fact

More information

A fast algorithm for color image segmentation

A fast algorithm for color image segmentation Unersty of Wollongong Research Onlne Faculty of Informatcs - Papers (Arche) Faculty of Engneerng and Informaton Scences 006 A fast algorthm for color mage segmentaton L. Dong Unersty of Wollongong, lju@uow.edu.au

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated.

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated. Some Advanced SP Tools 1. umulatve Sum ontrol (usum) hart For the data shown n Table 9-1, the x chart can be generated. However, the shft taken place at sample #21 s not apparent. 92 For ths set samples,

More information

BIN XIA et al: AN IMPROVED K-MEANS ALGORITHM BASED ON CLOUD PLATFORM FOR DATA MINING

BIN XIA et al: AN IMPROVED K-MEANS ALGORITHM BASED ON CLOUD PLATFORM FOR DATA MINING An Improved K-means Algorthm based on Cloud Platform for Data Mnng Bn Xa *, Yan Lu 2. School of nformaton and management scence, Henan Agrcultural Unversty, Zhengzhou, Henan 450002, P.R. Chna 2. College

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

Specifications in 2001

Specifications in 2001 Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key

More information

Optimizing Document Scoring for Query Retrieval

Optimizing Document Scoring for Query Retrieval Optmzng Document Scorng for Query Retreval Brent Ellwen baellwe@cs.stanford.edu Abstract The goal of ths project was to automate the process of tunng a document query engne. Specfcally, I used machne learnng

More information

Vectorization of Image Outlines Using Rational Spline and Genetic Algorithm

Vectorization of Image Outlines Using Rational Spline and Genetic Algorithm 01 Internatonal Conference on Image, Vson and Computng (ICIVC 01) IPCSIT vol. 50 (01) (01) IACSIT Press, Sngapore DOI: 10.776/IPCSIT.01.V50.4 Vectorzaton of Image Outlnes Usng Ratonal Splne and Genetc

More information

SCALABLE AND VISUALIZATION-ORIENTED CLUSTERING FOR EXPLORATORY SPATIAL ANALYSIS

SCALABLE AND VISUALIZATION-ORIENTED CLUSTERING FOR EXPLORATORY SPATIAL ANALYSIS SCALABLE AND VISUALIZATION-ORIENTED CLUSTERING FOR EXPLORATORY SPATIAL ANALYSIS J.H.Guan, F.B.Zhu, F.L.Ban a School of Computer, Spatal Informaton & Dgtal Engneerng Center, Wuhan Unversty, Wuhan, 430079,

More information

Massive XML Data Mining in Cloud Computing Environment

Massive XML Data Mining in Cloud Computing Environment JOURNAL OF MULTIMEDIA, VOL. 9, NO. 8, AUGUST 2014 1011 Massve XML Data Mnng n Cloud Computng Envronment Zhao L Department of Computer Scence, Xnyang College of Agrculture and Forestry, Xnyang, Chna Emal:

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to

More information

(1) The control processes are too complex to analyze by conventional quantitative techniques.

(1) The control processes are too complex to analyze by conventional quantitative techniques. Chapter 0 Fuzzy Control and Fuzzy Expert Systems The fuzzy logc controller (FLC) s ntroduced n ths chapter. After ntroducng the archtecture of the FLC, we study ts components step by step and suggest a

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

AN INDEXING METHOD FOR SUPPORTING SPATIAL QUERIES IN STRUCTURED PEER-TO-PEER SYSTEMS

AN INDEXING METHOD FOR SUPPORTING SPATIAL QUERIES IN STRUCTURED PEER-TO-PEER SYSTEMS AN INDEXING METHOD FOR SUPPORTING SPATIAL QUERIES IN STRUCTURED PEER-TO-PEER SYSTEMS Lngku Meng a, Wenun Xe a, *, Dan Lu a, b a School of Remote Sensng and Informaton Engneerng, Wuhan Unversty, Wuhan 4379,

More information

Optimal Workload-based Weighted Wavelet Synopses

Optimal Workload-based Weighted Wavelet Synopses Optmal Workload-based Weghted Wavelet Synopses Yoss Matas School of Computer Scence Tel Avv Unversty Tel Avv 69978, Israel matas@tau.ac.l Danel Urel School of Computer Scence Tel Avv Unversty Tel Avv 69978,

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

Suppression for Luminance Difference of Stereo Image-Pair Based on Improved Histogram Equalization

Suppression for Luminance Difference of Stereo Image-Pair Based on Improved Histogram Equalization Suppresson for Lumnance Dfference of Stereo Image-Par Based on Improved Hstogram Equalzaton Zhao Llng,, Zheng Yuhu 3, Sun Quansen, Xa Deshen School of Computer Scence and Technology, NJUST, Nanjng, Chna.School

More information

A METHOD FOR FACTOR SCREENING OF SIMULATION EXPERIMENTS BASED ON ASSOCIATION RULE MINING

A METHOD FOR FACTOR SCREENING OF SIMULATION EXPERIMENTS BASED ON ASSOCIATION RULE MINING A METHOD FOR FACTOR SCREENING OF SIMULATION EXPERIMENTS BASED ON ASSOCIATION RULE MINING Lngyun Lu (a), We L (b), Png Ma (c), Mng Yang (d) Control and Smulaton Center, Harbn Insttute of Technology, Harbn

More information

Parallel Implementation of Classification Algorithms Based on Cloud Computing Environment

Parallel Implementation of Classification Algorithms Based on Cloud Computing Environment TELKOMNIKA, Vol.10, No.5, September 2012, pp. 1087~1092 e-issn: 2087-278X accredted by DGHE (DIKTI), Decree No: 51/Dkt/Kep/2010 1087 Parallel Implementaton of Classfcaton Algorthms Based on Cloud Computng

More information

Explicit Formulas and Efficient Algorithm for Moment Computation of Coupled RC Trees with Lumped and Distributed Elements

Explicit Formulas and Efficient Algorithm for Moment Computation of Coupled RC Trees with Lumped and Distributed Elements Explct Formulas and Effcent Algorthm for Moment Computaton of Coupled RC Trees wth Lumped and Dstrbuted Elements Qngan Yu and Ernest S.Kuh Electroncs Research Lab. Unv. of Calforna at Berkeley Berkeley

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

USING GRAPHING SKILLS

USING GRAPHING SKILLS Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp

More information