THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM

Size: px
Start display at page:

Download "THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM"

Transcription

1 International Journal of Physics an Mathematical Sciences ISSN: (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao an *Ming Shi Department of Mathematics an Information Science, Hebei University, Baoing , China *Author for Corresponence ABSTRACT If a person wants to travel to a place by some kins of transportation, he (or she) will consier an optimal path, which costs a shortest time among all paths. However, when a situation is not expecte to happen, such as a heavy rain, the person will have to select the secon, the thir the k-th shortest path to continue his (or her) travel. In this paper, for searching the k-th path, we give an improve Floy algorithm by constructing the iterative matrix an orinal matrix for solving the shortest path in the irecte graph an unirecte graph. The k-th shortest path algorithm can not only calculate the shortest path weights more quickly, but also fin a shortest path more irectly. Our algorithm gives a more accurate time to juge a travel plan. We use our algorithm, the iteration spee, the amount of computation is reuce to a certain egree. Two examples are given to illustrate the superiority of our algorithm. Keywors: Directe Graph an Unirecte Graph, the Shortest Time Path, k-th Shortest Time Path Algorithm INTRODUCTION With the evelopment of society, people pay much more attention to the effective use of time. In orer to save the time on traveling by vehicles, it is necessary for a person to estimate the time spent on the roa an to choose the route that costs the least time (Yan an Liu, 2000). Generally, a plan has been given in avance, but weather isasters or other no expecte events always make the plan not run properly. Uner this case, how to choose the secon path, or the k-th path (k 2) that is a problem. Up to now, many algorithms have been provie for solving the shortest path, such as Dksta algorithm which propose by Dick Stella, a computer scientist from the Netherlans, in Classical Floy algorithm was propose by Floy in The reaers can refer to (Wang, 2009). In aition, many people have stuie k-th shortest path algorithm from ifferent angles. Eppstein (1999) gave an algorithm for choosing a path on the irecte graph which allowe the existence of rings. Li (2006) gave a new k-th shortest path algorithm in an unirecte graph. Classical Floy algorithm can easily fin the shortest path between any two vertexes on a graph, but not irectly reflect the sequence of the shortest path. Dai an Cheng (201) introuce an improve Floy algorithm, using C++ language programming technology, which reflects the relationship between any two vertices of the shortest path sequence. Even though, the classical Floy algorithm still nees to give new improvement. In orer to give a new improvement for the classical Floy algorithm, we nee to fin an overcome some efects in classical Floy algorithm. This paper will o these works. More etails are as follows: Copyright 2014 Centre for Info Bio Technology (CIBTech) 24

2 International Journal of Physics an Mathematical Sciences ISSN: (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. (1) We will give a weight for every vertex. This weight stans for resience time on this vertex. Travel staff knows their travel plan an the resience time neee by the site. It is very important to improve the effective use of time. (2) When we have obtaine a vertex, we nee to search the next vertices by classical Floy algorithm. During this time, we just provie an iea that shoul compare the values of the istance between the obtaine vertices an any of next vertices. The purpose of this improvement is to elete any of unnecessary vertices in orer to save the searching time. Repeating the process escribe in the above (2) with eleting some arcs which have not new vertices connecte with, we can fin the k-th optimal route which we hope to obtain. Preliminaries Accoring to the symbol given by Wang et al., (2010), some symbols use in the paper are given as follows: W represents irecte graph an unirecte graph weighte matrix; v 0 an vt represents an arbitrary source vertex an target vertex respectively; p is the shortest path to the source point vi to the target point v j (1 i n,1 j n); is the weight matrix of the shortest path; w represent the resience time of each vertex an w 0 (1 k n); p1 is the shortest time path of the reverse p; tt is changing of vertex on the path; Inf expresses. Some of the efinitions use in this paper are erive from (Bony an Murty, 2008). Definition 1 A graph G is an orere pair (V(G),E(G)) consisting of a set V(G) of vertices an a set E(G), isjoint from V(G), of eges, together with an incience functions that associates with each ege of G an unorere pair of (not necessarily istinct) vertices of G. If e is an ege an u an v are vertices such that, Then e is sai to join u an v, an the vertices u an v are calle the s of e. We enote the numbers of vertices an eges in G by v(g) an e(g), these two basic parameters are calle the orer an size of G, respectively. Definition 2 Let G be a graph, with vertex set V an ege set E. The incience matrix of G is the nm matrix M : m G ve, where ve m is the number of times (0, 1, or 2) that vertex v an ege e are incient. Clearly, the incience matrix is just another way of specifying a graph. Algorithm Iea This section will first point the flaws in classical Floy algorithm, an secon give our improvement iea for classical Floy algorithm. For the classical Floy algorithm, the reaer can refer to Bony an Murty, (2008). Floy Algorithm Defects We can fin the efects existe in the classical Floy algorithm. Copyright 2014 Centre for Info Bio Technology (CIBTech) 25

3 International Journal of Physics an Mathematical Sciences ISSN: (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. Defect 1 For travelers, it is necessary to calculate the accurate time require for their travels. But in the classical Floy algorithm, a traveler cannot fin the resience time at every vertex. Hence, classical Floy algorithm cannot reflect the shortest time path irectly. Defect 2 Using classical Floy algorithm to fin the k-th shortest path, a traveler nees to calculate the shortest path between two vertexes v i an v j each time to calculate the n (here n is the number of vertices in the irecte graph an unirecte graph.) aition, an the insertion of the mile vertex v k is obviously the length of the path is not be shortene, reucing the computational efficiency. Classical Floy algorithm is escribe in the reference (Xie an Li, 1995). When we calculate the large-scale path, the times for calculating becomes bigger. Improvement Iea In orer to overcome Defects 1 an 2, we will give the iea of our algorithm as follows. Accoring to the esigning a plan of a travel, the irecte graph an unirecte graph is set up. Base on this graph, the classical Floy algorithm can run. Hence, we will improve classical Floy algorithm with the irecte graph an unirecte graph. To improve Defect 1. Base on the irecte graph an unirecte graph, for each vertex, we give a weight w satisfying w 0, where w is the resience time on vertex k. It can be achieve in the jugment time accuracy. To improve Defect 2. When calculating the short path between two vertices v i an v j, we shoul treat the insertion of the vertex vk comparison the length of the path first. If t ik t or t kj t or w t, t 1,2,... n, then the length of vertex v i passes through the vertex v k to reach the vertex v j not shorter than the original. So, we no longer nee to calculate t t, an will fin the next vertex uring the search. This etermination ik kj will elete many unnecessary calculate vertices. All of these vertices are not involve in calculation. Thus, this improvement will greatly reuce the amount of calculation. Algorithm Process In the above section, we have introuce the iea of our algorithm. Firstly, this section will provie the process of our algorithm using Matlab language. Seconly, we will analyze the complexity of our algorithm. Thirly, we will compare the properties between our algorithm an classical Floy algorithm. First, we provie some notations use in Matlab. Copyright 2014 Centre for Info Bio Technology (CIBTech) 26

4 International Journal of Physics an Mathematical Sciences ISSN: (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. p represents the path matrix represents the shortest weight path matrix Secon, because our algorithm nees to call improve Floy algorithm (or say, prepare algorithm), so we present an algorithm as a prepare process for our algorithm. Prepare Algorithm Input: The irecte graph an unirecte graph matrix W; the source point v 0 ; the target point vt. Output: The source point v0 to the target point vt an the shortest path ( v0, vt ). With Matlab language, the concrete process is as follows: Matlab proceures are escribe as follows function floy(w,v0,vt) n=length(w); =w; k=1; for i=1:n (i,i)=0; while k<=n for i=1:n for j=1:n if (i,j)>(i,k)&&(i,j)>(k,j)&&(i,j)>w(k,k)&&i~=k&&k~=j %iterative shortest path (i,j) (i,j)=min((i,j),(i,k)+(k,j)+w(k,k)); k=k+1; k=1; p1(k)=vt; %shortest path target vertex vt tt=vt; %tt=v0the shortest path to the of the search while tt~=v0 for j=1:n if (v0,tt)==w(v0,j) k=k+1; p1(k)=v0; tt=v0; break; else if v0~=j&&(v0,j)==(v0,tt)-w(j,tt)-w(j,j) k=k+1; %the recor of the shortest path number (reverse) p1(k)=j; tt=j; break; Copyright 2014 Centre for Info Bio Technology (CIBTech) 27

5 International Journal of Physics an Mathematical Sciences ISSN: (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. k=1; r=fin(p1~=0); t=length(r); for j=t:(-1):1 %the recor of the shortest path number (positive) p(k)=p1(r(j)); k=k+1; isp() isp((v0,vt)) isp(p) The k-th Shortest Path Algorithm Our algorithm is to elete some arcs an call the prepare algorithm to calculate the k-th shortest path. Input: the irecte graph an unirecte graph weighte matrix W, the source point v 0, the target point vt. Output: Source point v0 to target point vt, shortest path k( v0, vt) an the shortest path pk. Matlab proceures are escribe as follows p1, p2, p, p4, p5, pk represent the first, secon, thir, fourth, fifth, the k-th shortest path respectively. 1, 2,, 4, 5, k represent the length of the p1, p2, p, p4, p5, pk respectively. a represents weighte graph matrix. Step 1: Calculation of the Secon Shortest Path Algorithm Secon path algorithm function [2,p2]=k2th(w,v0,vt) n=length(w); [1,p1]=floy(w,v0,vt);% for the most short circuit num1=length(p1); 2=inf; for i=1:(num1-1) a=w; a(p1(i),p1(i+1))=inf; % elete an ege on the shortest way a(p1(i+1),p1(i))=inf; [,path]=floy(a,v0,vt); % recalculate the short circuit if <2 2=; p2=path; Step 2: Calculation of the Thir Shortest Path Algorithm Matlab proceures are escribe as follows function [,p]=kth(w,v0,vt) [1,p1]=floy(w,v0,vt); [2,p2]=k2th(w,v0,vt); num1=length(p1); num2=length(p2); =inf; for i=1:(num1-1) for j=1:(num2-1) Copyright 2014 Centre for Info Bio Technology (CIBTech) 28

6 International Journal of Physics an Mathematical Sciences ISSN: (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. a=w; a(p1(i),p1(i+1))=inf; a(p1(i+1),p1(i))=inf; a(p2(j),p2(j+1))=inf; a(p2(j+1),p2(j))=inf; [,path]=floy(a,v0,vt); if < =; p=path; Step : Calculation of the Fourth Shortest Path Algorithm function [4,p4]=k4th(w,v0,vt) [1,p1]=floy(w,v0,vt); [2,p2]=k2th(w,v0,vt); [,p]=kth(w,v0,vt); num1=length(p1); num2=length(p2); num=length(p); 4=inf; for i=1:(num1-1) for j=1:(num2-1) for k=1:(num-1) a=w; a(p1(i),p1(i+1))=inf; a(p1(i+1),p1(i))=inf; a(p2(j),p2(j+1))=inf; a(p2(j+1),p2(j))=inf; a(p(k),p(k+1))=inf; a(p(k+1),p(k))=inf; [,path]=floy(a,v0,vt); if <4 4=; p4=path; Step 4: Calculation of the Fifth Shortest Path Algorithm function [5,p5]=k5th(w,v0,vt) [1,p1]=floy(w,v0,vt); [2,p2]=k2th(w,v0,vt); [,p]=kth(w,v0,vt); [4,p4]=k4th(w,v0,vt); num1=length(p1); num2=length(p2); Copyright 2014 Centre for Info Bio Technology (CIBTech) 29

7 International Journal of Physics an Mathematical Sciences ISSN: (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. num=length(p); num4=length(p4); 5=inf; for i=1:(num1-1) for j=1:(num2-1) for k=1:(num-1) for l=1:(num4-1) a=w; a(p1(i),p1(i+1))=inf; a(p1(i+1),p1(i))=inf; a(p2(j),p2(j+1))=inf; a(p2(j+1),p2(j))=inf; a(p(k),p(k+1))=inf; a(p(k+1),p(k))=inf; a(p4(l),p4(l+1))=inf; a(p4(l+1),p4(l))=inf; [,path]=floy(a,v0,vt); if <5 5=; p5=path; Step k-1. We will obtain the k-1-th shortest path as the similar process to the k-th shortest path algorithm in Step 1. Step k. Calculation of the k-th Shortest Path 1. Delete the k-1path, an get the weight graph w ( i, jl ) ; ( i, j ) 2. Calculate the shortest path weight L ( i, j ) an the shortest path L in the weight graph w ( i, jl ) ; ( i, jl ). Take k min{ }, an get the corresponent path pk. k Complexity Analysis This subsection will analyze the complexity for the above algorithms. For the prepare algorithm, we only nee to calculate the n-2 times in the calculation of the vertex v i to the vertex v j of the shortest path t because k i, j. Before the calculation of compare, that if t1 t1 ik, t1 t1 kj, t1 t1 w Copyright 2014 Centre for Info Bio Technology (CIBTech) 0 t k, every time you want to is without calculation t 1 t 1. Especially, when the i-th row or the j-th column element is greater than or equal to t 1,at this time, we obtain t t 1, aition calculation is 0. In the prepare algorithm, the computation of the shortest path t the vertex is a ranom variable, recore as X. Now, suppose that a ranom variable X value in 0 : n-2 is n 2 possible, resulting in ranom variable mathematical expectation is, namely in the calculation of the 2 ik kj

8 International Journal of Physics an Mathematical Sciences ISSN: (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. shortest t in the vertex v i to a vertex v j, aition amount of calculation for n 2 2 an istance matrix in 2 1 n elements, so the complexity of the algorithm is about O n. Because the weight of each matrix is 2 not the same, so a three jugments, the possible existence of two cases: when the three juge conitions cannot elete search vertices, as was the complexity of the algorithm an the classical Floy algorithm; when the three juge conitions can be elete to fin the vertex, the complexity of the algorithm will be far below the classical Floy algorithm. As a result of the three jugment conitions, we elete an unnecessary calculation vertex, resulting in a ecrease in the number of cycles. Using prepare algorithm, we can obtain the1st shortest path, the time complexity is about On. Using the k-th shortest path algorithm of Step 1, we can obtain the 2n shortest path, the time complexity is about On 1. Using the k-th shortest path algorithm of Step 2, we can obtain the r shortest path, the time complexity is about On 2. Using the k-th shortest path algorithm of Step k, we can obtain the k-th shortest path, the time complexity is about On. Thus, the complexity of obtaining the k-th shortest path is about O n k. Comparision This subsection will compare some properties between our algorithm provie above an classical Floy algorithm from the three facts: storage space, juging travel time in accuracy an the complexity of time algorithm. After that, we will use a table to sum up the two algorithms. 1) Storage Space In our algorithm, we give three conitions t t ik, Copyright 2014 Centre for Info Bio Technology (CIBTech) 1 t t w, t t kj for jugment. So, when looking for the weight time matrix, the computation time of our algorithm will be smaller. That is, m (m represents the number of vertices of the matrix after the eletion of the vertex, an n is the number of the matrix vertices) When three conitions are ae to elete the vertices, the number of cycles is obviously reuce. When the three conitions cannot be satisfie, namely m=n, the complexity of our algorithm an the classical Floy algorithm are the same; When three conitions can elete some vertexes, namely m<n. The time complexity of the algorithm is less than that the classical Floy algorithm. 2) Juging Travel Time in Accuracy Because peoples work scheule is very tight, the time for the expecte travel arrangements also require more accurate. It requires a precise time to juge a travel plan. In our algorithm, for each vertex k, we give a weight. This follows that our result is the closer to the peoples hope. Using classical Floy algorithm, travelers cannot achieve the accurate jugment. Classical Floy algorithm will not be more accurate to close to peoples travel time. ) Complexity of Time Algorithm Accoring to the subsection complexity analysis, we fin that the complexity of our algorithm is the same as that in classical Floy algorithm uner m=n, an is not the same uner m n.

9 International Journal of Physics an Mathematical Sciences ISSN: (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. From the above three points 1), 2) an ), we may obtain the following Table 1. Table 1: Comparison of the Algorithm in this Paper an Classical Floy Algorithm Property Algorithm in this Paper Classical Floy Algorithm Whether Juge Yes No Travel Time in Accuracy Storage Space m=n m<n m=n Complexity of Time Algorithm the Same Reuce the Same Om = On Om On Om = On Remark: In our algorithm, there are three conitions for eleting vertices. The first vertex cannot be connecte irectly to the vertex. The secon insert vertex cannot make the length of the path shorter. The thir vertex weight is longer than the istance of the two vertices. The vertices are not involve in calculation, thus reucing the amount of calculation greatly. Example We provie two examples to verify the feasibility of our algorithm in irecte graph an unirecte graph, respectively. Example 1 In this paper, we use the example as that in Zhang an Wu (2009) to calculate. Our algorithm is joine the weights of the vertex. Hence, for each vertex in the original graph, we give a weight as v1=, v2=4, v=, v4=4, v5=. A irecte graph is shown in Figure 1. We hope to calculate the shortest path among all vertexes. Figure 1 A Directe Graph Solution: 0 From Figure 1, we initial weighte istance matrix D an serial number matrix A 0 as the following D 2 4 0, A ; Copyright 2014 Centre for Info Bio Technology (CIBTech) 2

10 International Journal of Physics an Mathematical Sciences ISSN: (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. Matrix D 1 an serial number matrix A 1 are calculate by using initial weighte istance matrix D 0 an serial number matrix A 0 accoring to the Step 2 in prepare algorithm. For iterative matrix 1, since the first row in the iterative matrix D 0 elements are not less than iterative matrix 0 12 number matrix is 12 element, so o not calculate 1 A, an then a12 a 0 0 1k k2, irectly get remains unchange Copyright 2014 Centre for Info Bio Technology (CIBTech). The corresponing serial For iterative matrix 1, because the value of the first element in the first row of the iterative matrix D 0 is smaller than the element, it is only Therefore, there is min, w min, At this time, we ecie v 1 v 2. The corresponing serial number matrix is A Similarly, the other elements in 1 D an , an there is a 1 v A are calculate as follows: 1 a15 v2 ; 1 a21 v ; min, w, w min,1 2 4, 4 7, a min, w min, , min, w min,1 2 6, , a2 0 ; , a24 0 ; min, w, w min,2 1, , a , a4 0 ; min, w min, , a , a41 ; , a42 0 ; min, w min,11 4 6, a , a45 ; , a51 ; , a52 0 ; min, w min, 1 4 8, a min, w min, 1 4 8, a So, we get the matrix D 1 1 D an A 1 are as follows v2 v2 v v v , A 0 v1 0 0 v v v2 v v4 1 4 v2 ; ; 1 5 v2 ; 1 54 v2 ; 1 14 v2 ; 1 2 v1 ;

11 International Journal of Physics an Mathematical Sciences ISSN: (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. 1 0 Clearly, we have D D. This nees to continue iteration. Using the above metho, we get the matrix 2 D an A 2 are the following: v2 v2 v v v D , A 0 v1 0 0 v v2, v 0 v v2, v 0 v2 v2 0 The comparison is not ifficult to fin D 2 D 1 2, an then it calculates D accoring to the D D By comparison, we can know D 2 D by algorithm termination. The corresponing element a 2 A is the shortest path between vertex v i an vertex v j. So the value of the corresponing element 2 D is the shortest path length between vertex v1 an vertex v5. For example, we seek the shortest path time an shortest path between vertex v1 an vertex v5. Look for the elements 2 15 an a 2 15 corresponing to the matrix 2 D an 2 Copyright 2014 Centre for Info Bio Technology (CIBTech) 4 A. 2 in 2 15 in When we encounter a path from vertex v1 to vertex v5, we cannot go, then we take this path to elete. We 0 make some of the elements in the matrix D into. Here we give the secon shortest time path. We can use the improve Floy algorithm to work out the first path. The first shortest time path is v1-v2- v5, the require time is 5. When the first path v2 to v5 in this roa cannot go, we make elements in the matrix We initial weighte istance matrix D 0 an serial number matrix A 0 as follows. D , A Then use the improve Floy algorithm to calculate, you can get the secon shortest time path is v1-v2- v4-v5, the require time is 1; 0 0 Then we elete the shortest time path is v1-v2-v4-v5. We make elements in the matrix 24, 25. Then use the improve Floy algorithm to calculate, you can get the thir shortest time path is v1-v-v4- v5, the require time is 16; Then we elete the shortest time path is v1-v-v4-v5. We make elements in the matrix,,

12 International Journal of Physics an Mathematical Sciences ISSN: (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. Then use the improve Floy algorithm to calculate, you can get the fourth shortest time path is v1-v2-v- v4-v5, the require time is 19; Then we elete the shortest time path is v1-v2-v-v4-v5. We make elements in the matrix, 0 45,, Then use the improve Floy algorithm to calculate, you can get the fifth shortest time path is v1-v-v4- v2-v5, the require time is 24. Example 2 We accoring to the reference (Wang et al., 2010, pp.2) case in 2.5, to the eitor gives a figure close to the actual circumstance of unirecte weighte time graph. Figure 2 shows the graph of a city s subway line. A traveler wants to travel by subway. Here we esign a travel plan, He (She) wants from the vertex v2 to vertex v11. However, when a path cannot travel, the next secon, thir, fourth, fifth of the shortest path how to go? What is the shortest time to the shortest path? 0 12 Figure 2: Unirecte Weighte Time Graph Using our algorithm, we calculate the accuracy of shortest time an the corresponing shortest path. Five kin of shortest time path are shown in the following: vertex v2 to vertex v11 The first shortest time path is v2-v5-v9-v11, the require time is 62; The secon shortest time path is v2-v5-v9-v8-v11, the require time is 87; The thir shortest time path is v2-v-v7-v10-v11, the require time is 92; The fourth shortest time path is v2-v5-v9-v10-v11, the require time is 92; The fifth shortest time path is v2-v-v5-v9-v11, the require time is 97. As can be seen from the above results, we can use our algorithm to fin the shortest path of any two vertices in the graph an the shortest time to sp. In aition, by using our algorithm, we can estimate more accurate travel time for travelers than using the classical Floy algorithm. So, our algorithm is more effective for travelers than the classical Floy algorithm. Base on the two examples above, we obtain the comparison of the cycle times of our algorithm an the classical Floy algorithm. Table 2: Cycle Times Cycle Times Our Algorithm Classic Floy Algorithm Vertices Table 2 shows the number of cycle times of our algorithm an the classical Floy algorithm for searching the k-th shortest path. In this experiment, two examples of the cycle times are much lower than the classic Copyright 2014 Centre for Info Bio Technology (CIBTech) 5

13 International Journal of Physics an Mathematical Sciences ISSN: (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. Floy algorithm, an it means that the time efficiency of our algorithm is higher than that of the classical Floy algorithm. With the increasing of the number of vertices, the reuction of the number of cycles of our algorithm becomes more an more obviously. Conclusion In this paper, we improve the classical Floy algorithm, which cannot effectively improve the search efficiency of the problem. In our algorithm in the irecte graph an unirecte graph, there are three conitions ae to elete the vertex. The first vertex cannot be connecte irectly to the vertex. The secon insert vertex cannot make the length of the path shorter. The thir vertex weight is longer than the istance of the two vertices. The vertices are not involve in calculation, thus reucing the amount of calculation greatly. Therefore, our algorithm improves the search efficiency. The resience time is ae at each vertex of the improve algorithm, which is more convenient to calculate the travel time. When the roa cannot move, we nee the k-th shortest path. Our algorithm is to remove some arcs an call the preparation algorithm to calculate the k-th shortest path. Our algorithms give the traveler multiple choice. In the future, we hope to fin the k-th shortest path using much smaller time an faster running spee. ACKNOWLEDGMENTS This paper is grante by NSF of China ( ) an NSF of Hebei province (A , A ). REFERENCES Bony JA an Murty USR (2008). Graph Theory, (San Francisco: Springer Press, California). Dai XY an Cheng GZ (201). Improvement an optimization of Floy algorithm. Journal of Xichang College 26(1) Eppstein D (1999). Fining the k shortest paths. SIAM Journal on Computing 28(2) Li CJ (2006). A new algorithm to fin the k shortest paths. Journal of Shanong University 41(4) Wang SH (2009). Graph Theory (Being: Being Science an Technology Press, China). Wang HY, Huang Q, Li CT an Chu BZ (2010). Graph Theory Algorithm an its MATLAB Implementation, (Being: Being Beihang University Press, China). Xie Z an Li JP (1995). Network Algorithm an Complexity Theory, (Being: Being National University of Defense Technology Press, China). Yan HB an Liu YC (2000). A new algorithm for fining short cut in a city s roa net base on GIS technology Chinese. Journal of Computers (in Chinese) 2(2) Zhang DQ an Wu GL (2009). Optimize Floy Algorithm for Shortest Paths Problem. Journal of Xuchang University 28(2) Copyright 2014 Centre for Info Bio Technology (CIBTech) 6

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

2-connected graphs with small 2-connected dominating sets

2-connected graphs with small 2-connected dominating sets 2-connecte graphs with small 2-connecte ominating sets Yair Caro, Raphael Yuster 1 Department of Mathematics, University of Haifa at Oranim, Tivon 36006, Israel Abstract Let G be a 2-connecte graph. A

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

arxiv: v2 [math.co] 5 Jun 2018

arxiv: v2 [math.co] 5 Jun 2018 Some useful lemmas on the ege Szege inex arxiv:1805.06578v [math.co] 5 Jun 018 Shengjie He 1 1. Department of Mathematics, Beijing Jiaotong University, Beijing, 100044, China Abstract The ege Szege inex

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

Image compression predicated on recurrent iterated function systems

Image compression predicated on recurrent iterated function systems 2n International Conference on Mathematics & Statistics 16-19 June, 2008, Athens, Greece Image compression preicate on recurrent iterate function systems Chol-Hui Yun *, Metzler W. a an Barski M. a * Faculty

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

Fast Fractal Image Compression using PSO Based Optimization Techniques

Fast Fractal Image Compression using PSO Based Optimization Techniques Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting

More information

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

Calculation on diffraction aperture of cube corner retroreflector

Calculation on diffraction aperture of cube corner retroreflector November 10, 008 / Vol., No. 11 / CHINESE OPTICS LETTERS 8 Calculation on iffraction aperture of cube corner retroreflector Song Li (Ó Ø, Bei Tang (», an Hui Zhou ( ï School of Electronic Information,

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

Kinematic Analysis of a Family of 3R Manipulators

Kinematic Analysis of a Family of 3R Manipulators Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,

More information

A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Based on Gravity

A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Based on Gravity Worl Applie Sciences Journal 16 (10): 1387-1392, 2012 ISSN 1818-4952 IDOSI Publications, 2012 A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Base on Gravity Aliasghar Rahmani Hosseinabai,

More information

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,

More information

Physics INTERFERENCE OF LIGHT

Physics INTERFERENCE OF LIGHT Physics INTERFERENCE OF LIGHT Q.1 State the principle of superposition of waves an explain the concept of interference of light. Ans. Principle of superposition of waves : When two or more waves, traveling

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpenCourseWare http://ocw.mit.eu 6.854J / 18.415J Avance Algorithms Fall 2008 For inormation about citing these materials or our Terms o Use, visit: http://ocw.mit.eu/terms. 18.415/6.854 Avance Algorithms

More information

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

5th International Conference on Advanced Design and Manufacturing Engineering (ICADME 2015)

5th International Conference on Advanced Design and Manufacturing Engineering (ICADME 2015) 5th International Conference on Avance Design an Manufacturing Engineering (ICADME 25) Research on motion characteristics an application of multi egree of freeom mechanism base on R-W metho Xiao-guang

More information

APPROXIMATION DISTANCE CALCULATION ON CONCEPT LATTICE

APPROXIMATION DISTANCE CALCULATION ON CONCEPT LATTICE International Journal of Physics and Mathematical Sciences ISSN: 77-111 (Online) 015 Vol. 5 (3) July- September, pp. 7-13/Mao et al. APPROXIMATION DISTANC CALCULATION ON CONCPT LATTIC Hua Mao, *Ran Kang,

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT

More information

Animated Surface Pasting

Animated Surface Pasting Animate Surface Pasting Clara Tsang an Stephen Mann Computing Science Department University of Waterloo 200 University Ave W. Waterloo, Ontario Canaa N2L 3G1 e-mail: clftsang@cgl.uwaterloo.ca, smann@cgl.uwaterloo.ca

More information

Data Mining: Clustering

Data Mining: Clustering Bi-Clustering COMP 790-90 Seminar Spring 011 Data Mining: Clustering k t 1 K-means clustering minimizes Where ist ( x, c i t i c t ) ist ( x m j 1 ( x ij i, c c t ) tj ) Clustering by Pattern Similarity

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Design of Policy-Aware Differentially Private Algorithms

Design of Policy-Aware Differentially Private Algorithms Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Uninformed search methods

Uninformed search methods CS 1571 Introuction to AI Lecture 4 Uninforme search methos Milos Hauskrecht milos@cs.pitt.eu 539 Sennott Square Announcements Homework assignment 1 is out Due on Thursay, September 11, 014 before the

More information

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

Classical Mechanics Examples (Lagrange Multipliers)

Classical Mechanics Examples (Lagrange Multipliers) Classical Mechanics Examples (Lagrange Multipliers) Dipan Kumar Ghosh Physics Department, Inian Institute of Technology Bombay Powai, Mumbai 400076 September 3, 015 1 Introuction We have seen that the

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

d 3 d 4 d d d d d d d d d d d 1 d d d d d d

d 3 d 4 d d d d d d d d d d d 1 d d d d d d Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

Estimating Velocity Fields on a Freeway from Low Resolution Video

Estimating Velocity Fields on a Freeway from Low Resolution Video Estimating Velocity Fiels on a Freeway from Low Resolution Vieo Young Cho Department of Statistics University of California, Berkeley Berkeley, CA 94720-3860 Email: young@stat.berkeley.eu John Rice Department

More information

Reformulation and Solution Algorithms for Absolute and Percentile Robust Shortest Path Problems

Reformulation and Solution Algorithms for Absolute and Percentile Robust Shortest Path Problems > REPLACE THIS LINE WITH YOUR PAPER IENTIFICATION NUMBER (OUBLE-CLICK HERE TO EIT) < 1 Reformulation an Solution Algorithms for Absolute an Percentile Robust Shortest Path Problems Xuesong Zhou, Member,

More information

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times Algorithm for Intermoal Optimal Multiestination Tour with Dynamic Travel Times Neema Nassir, Alireza Khani, Mark Hickman, an Hyunsoo Noh This paper presents an efficient algorithm that fins the intermoal

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

10. WAVE OPTICS ONE MARK QUESTIONS

10. WAVE OPTICS ONE MARK QUESTIONS 1 10. WAVE OPTICS ONE MARK QUESTIONS 1. Define wavefront.. What is the shape of wavefront obtaine from a point source at a (i) small istance (ii) large istance? 3. Uner what conitions a cylinrical wavefront

More information

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember 107 IEICE TRANS INF & SYST, VOLE88 D, NO5 MAY 005 LETTER An Improve Neighbor Selection Algorithm in Collaborative Filtering Taek-Hun KIM a), Stuent Member an Sung-Bong YANG b), Nonmember SUMMARY Nowaays,

More information

Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Based on Complexity

Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Based on Complexity Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Base on Complexity Xiangao Huang 1 Wei Huang 2 Xiaozhou Liu 3 Chao Wang 4 Zhu jing Wang 5 Tao Wang 1 1 College of Engineering, Shantou

More information

NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2.

NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2. JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 13/009, ISSN 164-6037 Krzysztof WRÓBEL, Rafał DOROZ * fingerprint, reference point, IPAN99 NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES

More information

Multi-camera tracking algorithm study based on information fusion

Multi-camera tracking algorithm study based on information fusion International Conference on Avance Electronic Science an Technolog (AEST 016) Multi-camera tracking algorithm stu base on information fusion a Guoqiang Wang, Shangfu Li an Xue Wen School of Electronic

More information

A multiple wavelength unwrapping algorithm for digital fringe profilometry based on spatial shift estimation

A multiple wavelength unwrapping algorithm for digital fringe profilometry based on spatial shift estimation University of Wollongong Research Online Faculty of Engineering an Information Sciences - Papers: Part A Faculty of Engineering an Information Sciences 214 A multiple wavelength unwrapping algorithm for

More information

A PSO Optimized Layered Approach for Parametric Clustering on Weather Dataset

A PSO Optimized Layered Approach for Parametric Clustering on Weather Dataset Vol.3, Issue.1, Jan-Feb. 013 pp-504-508 ISSN: 49-6645 A PSO Optimize Layere Approach for Parametric Clustering on Weather Dataset Shikha Verma, 1 Kiran Jyoti 1 Stuent, Guru Nanak Dev Engineering College

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

Dual Arm Robot Research Report

Dual Arm Robot Research Report Dual Arm Robot Research Report Analytical Inverse Kinematics Solution for Moularize Dual-Arm Robot With offset at shouler an wrist Motivation an Abstract Generally, an inustrial manipulator such as PUMA

More information

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.

More information

6 Gradient Descent. 6.1 Functions

6 Gradient Descent. 6.1 Functions 6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Additional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication

Additional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Aitional Divie an Conquer Algorithms Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Divie an Conquer Closest Pair Let s revisit the closest pair problem. Last

More information

Tight Wavelet Frame Decomposition and Its Application in Image Processing

Tight Wavelet Frame Decomposition and Its Application in Image Processing ITB J. Sci. Vol. 40 A, No., 008, 151-165 151 Tight Wavelet Frame Decomposition an Its Application in Image Processing Mahmu Yunus 1, & Henra Gunawan 1 1 Analysis an Geometry Group, FMIPA ITB, Banung Department

More information

A Revised Simplex Search Procedure for Stochastic Simulation Response Surface Optimization

A Revised Simplex Search Procedure for Stochastic Simulation Response Surface Optimization 272 INFORMS Journal on Computing 0899-1499 100 1204-0272 $05.00 Vol. 12, No. 4, Fall 2000 2000 INFORMS A Revise Simplex Search Proceure for Stochastic Simulation Response Surface Optimization DAVID G.

More information

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Short-term prediction of photovoltaic power based on GWPA - BP neural network model

Short-term prediction of photovoltaic power based on GWPA - BP neural network model Short-term preiction of photovoltaic power base on GWPA - BP neural networ moel Jian Di an Shanshan Meng School of orth China Electric Power University, Baoing. China Abstract In recent years, ue to China's

More information

Adjusted Probabilistic Packet Marking for IP Traceback

Adjusted Probabilistic Packet Marking for IP Traceback Ajuste Probabilistic Packet Marking for IP Traceback Tao Peng, Christopher Leckie, an Kotagiri Ramamohanarao 2 ARC Special Research Center for Ultra-Broaban Information Networks Department of Electrical

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

Average D-distance Between Edges of a Graph

Average D-distance Between Edges of a Graph Indian Journal of Science and Technology, Vol 8(), 5 56, January 05 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 OI : 07485/ijst/05/v8i/58066 Average -distance Between Edges of a Graph Reddy Babu

More information

Figure 1: 2D arm. Figure 2: 2D arm with labelled angles

Figure 1: 2D arm. Figure 2: 2D arm with labelled angles 2D Kinematics Consier a robotic arm. We can sen it commans like, move that joint so it bens at an angle θ. Once we ve set each joint, that s all well an goo. More interesting, though, is the question of

More information

FINDING OPTICAL DISPERSION OF A PRISM WITH APPLICATION OF MINIMUM DEVIATION ANGLE MEASUREMENT METHOD

FINDING OPTICAL DISPERSION OF A PRISM WITH APPLICATION OF MINIMUM DEVIATION ANGLE MEASUREMENT METHOD Warsaw University of Technology Faculty of Physics Physics Laboratory I P Joanna Konwerska-Hrabowska 6 FINDING OPTICAL DISPERSION OF A PRISM WITH APPLICATION OF MINIMUM DEVIATION ANGLE MEASUREMENT METHOD.

More information

A new fuzzy visual servoing with application to robot manipulator

A new fuzzy visual servoing with application to robot manipulator 2005 American Control Conference June 8-10, 2005. Portlan, OR, USA FrA09.4 A new fuzzy visual servoing with application to robot manipulator Marco A. Moreno-Armenariz, Wen Yu Abstract Many stereo vision

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

A Block-Based Blind Source Separation Approach With Equilateral Triangular Microphone Array

A Block-Based Blind Source Separation Approach With Equilateral Triangular Microphone Array APSIPA ASC 2011 Xi an A Block-Base Blin Source Separation Approach With Equilateral Triangular Microphone Array Jian Zhang, Zhonghua Fu an Lei Xie Shaanxi Provincial Key Laboratory of Speech an Image Information

More information

Advanced method of NC programming for 5-axis machining

Advanced method of NC programming for 5-axis machining Available online at www.scienceirect.com Proceia CIRP (0 ) 0 07 5 th CIRP Conference on High Performance Cutting 0 Avance metho of NC programming for 5-axis machining Sergej N. Grigoriev a, A.A. Kutin

More information

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks Hinawi Publishing Corporation International Journal of Distribute Sensor Networks Volume 2014, Article ID 936379, 17 pages http://x.oi.org/10.1155/2014/936379 Research Article REALFLOW: Reliable Real-Time

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stolyar Abstract Backpressure-base aaptive routing

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.

More information

A Plane Tracker for AEC-automation Applications

A Plane Tracker for AEC-automation Applications A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)

More information

Erdös-Gallai-type results for conflict-free connection of graphs

Erdös-Gallai-type results for conflict-free connection of graphs Erdös-Gallai-type results for conflict-free connection of graphs Meng Ji 1, Xueliang Li 1,2 1 Center for Combinatorics and LPMC arxiv:1812.10701v1 [math.co] 27 Dec 2018 Nankai University, Tianjin 300071,

More information

Depth Sizing of Surface Breaking Flaw on Its Open Side by Short Path of Diffraction Technique

Depth Sizing of Surface Breaking Flaw on Its Open Side by Short Path of Diffraction Technique 17th Worl Conference on Nonestructive Testing, 5-8 Oct 008, Shanghai, China Depth Sizing of Surface Breaking Flaw on Its Open Sie by Short Path of Diffraction Technique Hiroyuki FUKUTOMI, Shan LIN an Takashi

More information

Pairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11:

Pairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11: airwise alignment using shortest path algorithms, Gunnar Klau, November 9,, : 3 3 airwise alignment using shortest path algorithms e will iscuss: it graph Dijkstra s algorithm algorithm (GDU) 3. References

More information

The Journal of Systems and Software

The Journal of Systems and Software The Journal of Systems an Software 83 (010) 1864 187 Contents lists available at ScienceDirect The Journal of Systems an Software journal homepage: www.elsevier.com/locate/jss Embeing capacity raising

More information

Petri Nets with Time and Cost (Tutorial)

Petri Nets with Time and Cost (Tutorial) Petri Nets with Time an Cost (Tutorial) Parosh Aziz Abulla Department of Information Technology Uppsala University Sween parosh@it.uu.se Richar Mayr School of Informatics, LFCS University of Einburgh Unite

More information

Secure Network Coding for Distributed Secret Sharing with Low Communication Cost

Secure Network Coding for Distributed Secret Sharing with Low Communication Cost Secure Network Coing for Distribute Secret Sharing with Low Communication Cost Nihar B. Shah, K. V. Rashmi an Kannan Ramchanran, Fellow, IEEE Abstract Shamir s (n,k) threshol secret sharing is an important

More information

NEWTON METHOD and HP-48G

NEWTON METHOD and HP-48G NEWTON METHOD an HP-48G DE TING WU DEPART. of MATH. MOREHOUSE COLLEGE I. Introuction Newton metho is an often-use proceure to fin the approximate values of the solutions of an equation. Now, it is covere

More information

PERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING

PERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING PERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING PAMELA RUSSELL ADVISOR: PAUL CULL OREGON STATE UNIVERSITY ABSTRACT. Birchall an Teor prove that

More information

Learning Polynomial Functions. by Feature Construction

Learning Polynomial Functions. by Feature Construction I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate

More information