The degree constrained k-cardinality minimum spanning tree problem: a lexisearch

Size: px
Start display at page:

Download "The degree constrained k-cardinality minimum spanning tree problem: a lexisearch"

Transcription

1 Decision Science Letters 7 (2018) Contents lists available at GrowingScience Decision Science Letters homeage: The degree constrained k-cardinality minimum sanning tree roblem: a lexisearch algorithm Thenealle Jayanth Kumar a and Singamsetty Purusotham a* a Deartment of Mathematics, School of Advanced Sciences, VIT University, Vellore , Tamil Nadu, India C H R O N I C L E A B S T R A C T Article history: Received January 16, 2017 Received in revised format: May 22, 2017 Acceted July 23, 2017 Available online July 25, 2017 Keywords: k-cardinality minimum sanning tree Lexi-search algorithm Degree constraint This aer deals with the degree constrained k-cardinality minimum sanning tree (k-mstpd) roblem defined on a connected, edge weighted and undirected grah. The aim of this roblem is to determine the least weighted sanning tree with exactly k vertices such that excet the root vertex, no other vertex in the resultant sanning tree exceeds the secified degree limit. The k-mstpd roblem has many ractical alications for the design of electric, communication, and transortation networks. The roblem is then formulated as a zero-one rogramming. In this aer, an exact algorithm known as Lexi-search algorithm (LSA) is develoed to tackle the k-mstpd roblem. Furthermore, the develoed LSA is rogrammed in Matlab and tested on some benchmark instances as well as on random instances and the resective results are reorted. The obtained exerimental results showed that the develoed LSA takes significantly less time to find the otimal solutions Growing Science Ltd. All rights reserved. 1. Introduction The minimum sanning tree (MST) roblem is a significant network combinatorial otimization roblem. The MST roblem is an acyclic subgrah, which connects all the vertices/nodes with the minimum overall associated weight to its edges. The k-cardinality minimum sanning tree roblem (k- MST) is a variant of the classic MST roblem and formally defined as follows: Let G ( N, E) be a weighted, connected and undirected grah having N vertices and E edges, the k-mst roblem determines the least weight sanning tree with exactly k ( k N ) vertices and k 1 edges. The k-mst was first coined by Hamacher et al. (1991) and it was roven to be NP-hard by Ravi et al. (1996). It has several otential alications like oil-field leasing, telecommunications, oen it mining and image rocessing, (see Ravi et al., 1996; Garg & Hochbaum, 1997; Philott & Wormald, 1997; Ma et al., 2000) thus it has received a great attention from the researchers in recent years. * Corresonding author. address: drurusotham.or@gmail.com (S. Purusotham) 2018 Growing Science Ltd. All rights reserved. doi: /j.dsl

2 302 Since the k-mst is NP-hard, develoing exact solution methods is again a challenging roblem. Due to this reason, most of the existing works on k-mst roblem concerns aroximate solution rocedures. However, these aroximate solution methods may not assure the exact solutions. The constant factor aroximation aroach for solving the k-mst roblem was first given by Blum et al. (1995). Subsequently, Garg and Hochbaum (1997) studied the k-mst roblem and suggested an O(log k) aroximation algorithm. A 2.5-factor heuristic algorithm for k-mst has been develoed by Arya and Ramesh (1998). Three meta-heuristics algorithms namely Tabu Search (TS), Ant Colony Otimization (ACO) and Evolutionary Comutation (EC) have been roosed by Blum and Blesa (2005) for the k-mst roblem and showed that the ACO and TS aroach works better for lower and higher cardinalities resectively. Recently, Katagiri et al. (2010) roosed a new solution rocedure using Tabu search for k-mst and shown that this method erforms better than the existing methods. An efficient hybrid aroximation algorithm using Tabu search and Ant colony otimization for solving the k-mst roblem was roosed by Katagiri et al. (2012). Purusotham and Sundara Murthy (2012) suggested the iterative techniques to solve some of the variants of network roblems. A hybrid heuristic aroach based on the Memetic algorithm and Tabu search algorithm was develoed by Katagiri and Guo (2013) for the k-mst roblem. Degree constrained minimum sanning tree (DMST) roblem is one of the variants of classic MST roblem and has been roved to be NP-hard by Kar (1972). The DMST roblem has many ractical alications such as design of comuter and communication networks, electric circuits, design of integrated circuits, road networks and energy networks (Martins & De souza, 2009). Several solution methods have been develoed in order to tackle DMST roblem, for few see, Genetic algorithm by Hanr and Wang (2006), an Ant based algorithm by Doan (2007), Learning based automata aroach by Torkestani (2013), and Branch and cut algorithm by Martinez and Cunha (2014). However, the above cited literature revealed that a limited consideration has been given to the variants of the k-mst roblem due to NP-hard nature. Infact, many ractical scenarios can be modeled as variants of k-mst roblem. In this aer, a variant of the k-mst roblem called the degree constrained k-cardinality minimum sanning tree roblem (k-mstpd) is considered and an exact solution rocedure known as Lexi-search algorithm (LSA) is develoed, which rovides the otimal solutions effectively. Without loss of generality, relaxing the degree constraint and assuming k n, the k-mstpd corresonds to classic MST roblem. Our aim is to construct the model and develo an exact Lexisearch algorithm for the k-mstpd. The rest of the aer is structured as follows: The roblem is described and then it is formulated as a zero-one integer rogramming in Section 2. Section 3 includes the concets and solution rocedure of the roosed LSA algorithm. A numerical examle is given in Section 4 to demonstrate the roosed LSA. Section 5 resents the comutational results and subsequently, the conclusions are discussed in Section Mathematical Model Let G ( N, E) be a connected, edge weighted and undirected grah, where N and E be the vertex/node set and edge set resectively. Each edge in E is associated with a non-negative weight known as cost. Given the secified ositive integers k and D, the k-mstpd aims to find the least cost sanning tree

3 T. J. Kumar and S. Purusotham / Decision Science Letters 7 (2018) 303 with exactly k ( k N ) vertices such that excet the root vertex, no other vertex has more than the redefined degree D. The notations and arameters which are useful for formulating the model k- MSTPD are given as follows: N n: Number of vertices/nodes. c : Associated cost fromi th node to j th node, where c c. k : Cardinality i.e. secified number of vertices, where k n D : Secified degree limit on vertices. : Root vertex. x : Binary variable. ji The mathematical model for k-mstpd using zero one rogramming is given as follows: n n min Z c x (1) i 1 j 1 subject to n n x k 1 (2) i 1 j 1 n x D; i j, i, i N (3) j 1 Subtour elimination constraints (4) x 0,1 ; i, j N (5) In this formulation, the constraint (1) reresents the objective function that minimizes the overall cost of the sanning tree. The constraint (2) tells the resultant sanning tree ossess k-1 edges. The constraint (3) ensures that excet the root vertex, no other vertex in the sanning tree is more than a redefined degree limit. The constraint (4) eliminates the subtours. Finally, the integrality constraints are given in (5). 3. Lexi-search Algorithm The Lexi-search algorithm (LSA) is a well organized Branch and Bound (B&B) algorithm suggested by Pandit (1962). In rincile, the LSA has similar features of the Branch and Bound (B&B) algorithm such as checking the feasibility, comuting the bounds, generating a feasible solution. The LSA has been roved to be roductive than the B&B aroach and is based on the following grounds Pandit (1962): It is ossible to list all the solutions in a structural hierarchy which also reflects a hierarchical ordering of the corresonding values of these configurations. Effective bounds can be set to the values of the objective function, when structural combinatorial restraints are laced on the allowable configurations Pattern A two dimensional array [ ] X x = that corresonds to the k- cardinality sanning tree is referred to as a attern. The value of the attern is evaluated by using the Eq. (6).

4 304 n n V( X) c x (6) i 1 j Alhabet Table For any given two dimensional cost array C = [ c ], there exists M = n n ordered airs, which are organized in non-decreasing order and are indexed from 1 to M, stored in an array SN (Sundara Murthy, 1979). Let L = ( b, b,..., b ), b ÎSN be an arranged sequence of indices from SN. The attern 1 2 i indicated through the ordered airs whose indices are reresented by L, which is indeendent of the order of b in the sequence. The indices in the sequence L i can be arranged in increasing order such that b <b, i = 1,2,..., - 1. The ordered sequence L i i+ 1 is said to be a word of length. The set SN is called an Alhabet table. A word L is called sensible word, if b <b, i = 1, 2,..., - 1; in any other case, the i i+ 1 word L becomes non-sensible word Word and Partial Word If = k- 1, then L is said to be a full length word or simly word. If < k- 1, then L indicates artial word. Every full length word L gives a feasible solution Uer and Lower Word The uer bound (UB) of a artial word is assumed to be a very higher value. The lower bound of a artial word ( LB( L )) for the values of the blocks of words indicated by L = ( b, b,..., b ) can be 1 2 determined as follows: LB( L ) = V ( L ) + CC( b + k ) - CC( L ); where V( L ) rovides the value of the artial word and is measured by using V( L ) = V( L ) + C( b ) withv( L ) = Proosed Lexi-search Algorithm The roosed Lexi-search algorithm (LSA) is mainly based on the features such as alhabet table, setting effective bounds, checking the feasibility and backtracking. The algorithmic stes of the roosed LSA for k-mstpd roblem are given as follows: Ste 1: Initialization Inut: C = [ c ] Cost matrix; n number of vertices; k secified number; D secified degree limit; UB an uer bound (99999, say) Ste 2: Alhabet Table Create the alhabet table using the given cost matrix C as discussed in the Section 3.2 and goto Ste 3. Ste 3: Setting effective bounds Usually, the search starts with a artial word L = ( b ) = 1, where = 1. a. Comute the lower bound of the artial word ( LB( L )) as discussed in the Section 3.4 b. If LB( L) < UB, then go to Ste 4.

5 T. J. Kumar and S. Purusotham / Decision Science Letters 7 (2018) 305 c. If LB( L ) ³ UB, then eliminate the artial word L and subsequently remove the blocks of words with L as the leader. Go to Ste 6. Ste 4: Feasibility checking a. If the artial word L satisfies the degree constraint, acyclic and balancing the size of the cardinality k, then it is feasible and infeasible, otherwise. b. If the artial word L is feasible, then accet it and roceed for the subsequent artial word of order + 1 and go to Ste 5. If L is infeasible, ick u the consecutive artial word of same order by considering the letter that succeeds b in its th osition and go to Ste 3. Ste 5: Concatenation a. If L is a artial word, then this will be concatenated by using L = L * b, where * refers the concatenation oeration and go to Ste 3. b. If L is a full length word relace by LB( L ) and go to Ste 7. Ste 6: If all the words of order are exhausted and length of the word L is 1 then move to Ste 9 and go to Ste 7, otherwise. Ste 7: Backtracking Backtracking hels to imrove the solution. The current value ofub is assumed as the uer bound and roceed the search by taking the next letter of the artial word of order -1and go to Ste 3. Ste 8: Reeat the Ste 3 to 7 and discard the feasible or infeasible solutions which are not necessary to obtain the otimal solutions. Continue this rocess untilub has no further imrovement and go to Ste 9. Ste 9: Outut Record currentub and its corresonding full length word L and go to Ste 10. Ste 10: Sto Once the search gets over, the current UB gives an otimal solution and the word L rovides the comlete schedule for k-mstpd roblem. 4. Numerical Illustration In order to illustrate the roosed LSA, a numerical examle is considered for which N n 9, k 7 and D 3. Since the roblem defined on undirected grah, an uer triangular matrix is considered and the cost matrix C = [ c ] is reresented in Table 1. Note that the comonents of the cost matrix C assume the non-negative integral values. For convenience, the artial alhabet table for the cost matrix in Table 1 is shown in Table 2. In Table 2, the arrays SN, C, CC, R and CL reresents the serial number, elements of the cost matrix organized in ascending order, cumulative cost for the elements of the cost matrix, row and column indices resectively. The search table reorted in Table 3 reresents the details about how the roosed LSA comutes the feasible solution and converges to the otimal solution. In Table 3, the column indexed by SN reresents the serial number, the subsequent columns indexed by 1, 2, 3, 4, 5 and 6 indicates the first, second, third, fourth, fifth and sixth osition of the letters in a artial word resectively. The next columns labeled by v and LB tells that value of the artial word and lower bound of a artial word resectively. The successive columns R and CL reresent the row and column indices resectively. Finally, the last column Remark gives whether the artial word is acceted or rejected.

6 306 Since the roblem considered in Table 1 aims to find the least cost sanning tree with exactly k 7 (out of n 9 vertices) vertices and k 6 edges. Thus, the length of the feasible word could be 6 i.e. 6 edges. In Table 3, the LSA algorithm starts with a artial word L = 1, and it satisfies the feasibility conditions, 1 thus the artial word is acceted and denoted by A. It is seen that some of the artial words failed in satisfying the feasibility conditions and hence rejected artial words are reresented by R. Proceeding in this manner it lead to a full length feasible word L = (1, 2, 3, 4, 5,11) which ossess the objective value 6 UB=52 (feasible solution) and it is observed at 11 th row of the Table 3. The grahical reresentation of the feasible solution can be shown in Fig.1. Once the feasible solution is obtained, the current UB is assumed to be the uer bound and roceed for the backtracking in order to enhance the search sace. It is observed that the imroved solution UB=49 is observed at 14 th row of the Table 3 and its corresonding full length word could be L 6 = (1,2,3,4,6,8). Since no other solution is found to be better than the current solution, the current found solution i.e. UB=49 could be the otimal solution and further, the algorithm terminates at 19 th row of the Table 3. The grahical reresentation of otimal solution is given in Fig.2. Table 1 Cost matrix of the k-mstpd roblem C Table 2 Alhabet Table SN C CC R CL SN C CC R CL

7 T. J. Kumar and S. Purusotham / Decision Science Letters 7 (2018) 307 Table 3 Search Table SN V LB R CL Remark A A A A A R R R R R A, UB= A R A, UB = > UB, R > UB, R > UB, R > UB, R > UB, R 5. Comutational Results This section reorts the comutational details of the roosed LSA for the k-mstpd. The LSA was coded in Matlab 2016a and the exerimental analysis was carried out on a 64-bit Microsoft Windows 2010 oerating system with 4 GB of RAM PC and rocessor Intel Core i5 running at a 2.10 GHz. We evaluated the erformance of the roosed LSA by varying distinct arameters in terms of a number of vertices, the cardinality of the tree, the structure of the cost matrix and degree limit on the vertices. To assess the efficiency of the roosed LSA for the k-mstpd, seven benchmark instances taken from TSPLIB which include gr17, gr21, gr24, fri26, bayg29, dantzig42, and gr48. The extensive comutational details are reorted in Table 4. From the results in Table 4, it is seen that for all the 23 cases of seven instances, the exact solutions were found by the LSA within considerable CPU runtime ranging from seconds to seconds. From these results, it is seen that the LSA is caable in finding the otimal solutions for all the cases within ractically allowable runtimes. Note that for all the cases the root vertex is assumed as 1. Furthermore, to measure the effectiveness of the roosed LSA, the comutational exeriments were carried out on a class of 10 randomly generated small and medium test instances ranging from 15 to 100. Each class included 10 instances and overall, a total of 100 test instances with symmetric edge weights are generated and tested. The cost c assumes the randomly generated values over the range 1 to 500, i.e. 1 c 500. The exerimental results summarized in Table 5 concerns the mean results of each size of the instance by the roosed LSA. Table 5 also contains the standard deviation (SD) of CPU runtimes. The results given in Table 5 based on five indeendent runs. In Table 5, the roblems with 15 to 80 vertices with distinct cardinalities (k) could be solved in very less CPU runtimes. The CPU runtimes start rising when the roblems of size 90 or higher are tested. However, these comutational runtimes are fairly reasonable.

8 308 The overall results summarized in Table 4 and Table 5 reveal that roosed LSA could efficiently solve the k-mstpd for the small and medium size of instances. For the roblems of higher dimensions, the CPU runtimes may also be higher. Table 4 Results of the LSA for k-mstpd over benchmark instances Instance N E k D Best sol CPU Runtime (In seconds) Worst time Best time gr gr gr fri bayg dantzig gr Instance benchmark instances taken from TSPLIB; N number of vertices in the given grah; E number of edges in the given grah; k number of vertices in the resultant sanning tree; D degree limit on the vertices; Best sol. the otimal solution by the roosed LSA; Worst time worst comutational runtime (in CPU seconds) for the best found solution; Best time best comutational runtime (in CPU seconds) for the best found solution. Table 5 Mean results of the LSA for k-mstpd over random instances SN N E k D NPT CPU Runtime SD Min. Max. Avg SN roblem number; N number of vertices in the given grah; E number of edges in the given grah; k number of vertices in the resultant sanning tree; D degree limit on the vertices; NPT number of roblems tested on each dimension; Min. minimum CPU runtime (in seconds) to find best found solution for the ten runs; Max. maximum CPU runtime (in seconds) to find best found solution for the ten runs; Avg. mean CPU runtime (in seconds) to find best found solution for the ten runs; SD standard deviation of CPU runtimes. 6. Conclusions In this aer, a ractical variant of MST roblem reffered to as a degree constrained k-cardinality minimum sanning tree roblem (k-mstpd) has been taken into consideration and the model was then

9 T. J. Kumar and S. Purusotham / Decision Science Letters 7 (2018) 309 modeled using zero-one rogramming. The k-mstpd may have several ractical alications, articularly in the areas like designing of networks, electric circuits, and transortation networks. We have roosed an exact solution rocedure namely Lexi-search algorithm for k-mstpd. Through numerical exeriments for various benchmark and randomly generated instances, the erformance of the develoed LSA was measured. The exerimental results reveal that the roosed LSA for the k- MSTPD is found to be roductive to obtain the otimal solutions within considerable CPU runtimes. References Arya, S., & Ramesh, H. (1998). A 2.5-factor aroximation algorithm for the k-mst roblem. Information Processing Letters, 65(3), Blum, A., Ravi, R., & Vemala, S. (1996, July). A constant-factor aroximation algorithm for the k MST roblem. In Proceedings of the twenty-eighth annual ACM symosium on Theory of comuting ( ). ACM. Blum, C., & Blesa, M. J. (2005). New metaheuristic aroaches for the edge-weighted k- cardinality tree roblem. Comuters & Oerations Research, 32(6), Doan, M. N. (2007, Setember). An effective ant-based algorithm for the degree-constrained minimum sanning tree roblem. In Evolutionary Comutation, CEC IEEE Congress on ( ). IEEE. Garg, N., Hochbaum, D. (1997). An O(log k) aroximation algorithm for the k minimum sanning tree roblem in the lane. Algorithmica, 18(1), Hamacher, H.W., Jorsten, K., & Maffioli, F. (1991). Weighted k-cardinality trees. Technical Reort, , Politecnico di Milano, Diartimento di Elettronica, Italy. Hanr, L., & Wang, Y. (2006). A novel genetic algorithm for degree-constrained minimum sanning tree roblem. International Journal of comuter science and Network Security, 6(7A), Kar, R. M. (1972). Reducibility among combinatorial roblems. In Comlexity of comuter comutations ( ). Sringer US. Katagiri, H., Hayashida, T., Nishizaki, I., & Ishimatsu, J. (2010). An aroximate solution method based on tabu search for k-minimum sanning tree roblems. International Journal of Knowledge Engineering and Soft Data Paradigms, 2(3), Katagiri, H., Hayashida, T., Nishizaki, I., & Guo, Q. (2012). A hybrid algorithm based on tabu search and ant colony otimization for k-minimum sanning tree roblems. Exert Systems with Alications, 39(5), Katagiri, H., & Guo, Q. (2013). A Hybrid-Heuristics Algorithm for k-minimum Sanning Tree Problems. In IAENG Transactions on Engineering Technologies ( ). Sringer Netherlands. Ma, B., Hero, A., Gorman, J., & Michel, O. (2000). Image registration with minimum sanning tree algorithm. In Image Processing, Proceedings International Conference on (Vol. 1, ). IEEE. Martinez, L. C., & Da Cunha, A. S. (2014). The min-degree constrained minimum sanning tree roblem: Formulations and Branch-and-cut algorithm. Discrete Alied Mathematics, 164, Martins, P., & de Souza, M. C. (2009). VNS and second order heuristics for the min-degree constrained minimum sanning tree roblem. Comuters & Oerations Research, 36(11), Pandit, S. N. (1962). The loading roblem. Oerations Research, 10(5), Purusotham, S. & Sundara Murthy, M. (2012). A new aroach for solving the network roblems, OPSEARCH, 49(1), Philott, A. B., & Wormald, N. C. (2000). On the Otimal Extraction of Ore from an Oen Cast Mine. Deartment of Engineering Science, University of Auckland. Ravi, R., Sundaram, R., Marathe, M. V., Rosenkrantz, D. J., & Ravi, S. S. (1996). Sanning trees short or small. SIAM Journal on Discrete Mathematics, 9(2),

10 310 Sundara Murthy, M. (1979). Combinatorial rogramming roblems - A attern recognition aroach. Ph.D Thesis, REC, Warangal, India. Torkestani, J. A. (2013). Degree constrained minimum sanning tree roblem: a learning automata aroach. The Journal of Suercomuting, 64(1), TSBLIB: htts://github.com/drozdowski/tsplib.net/tree/master/tsplib95/ts 2018 by the authors; licensee Growing Science, Canada. This is an oen access article distributed under the terms and conditions of the Creative Commons Attribution (CC-BY) license (htt://creativecommons.org/licenses/by/4.0/).

AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS

AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS Philie LACOMME, Christian PRINS, Wahiba RAMDANE-CHERIF Université de Technologie de Troyes, Laboratoire d Otimisation des Systèmes Industriels (LOSI)

More information

An approximate solution method based on tabu search for k-minimum spanning tree problems

An approximate solution method based on tabu search for k-minimum spanning tree problems An approximate solution method based on tabu search for k-minimum spanning tree problems Jun Ishimatsu, Hideki Katagiri, Ichiro Nishizaki and Tomohiro Hayashida Graduate School of Engineering, Hiroshima

More information

Randomized algorithms: Two examples and Yao s Minimax Principle

Randomized algorithms: Two examples and Yao s Minimax Principle Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum

More information

Directed File Transfer Scheduling

Directed File Transfer Scheduling Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was

More information

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION Yugoslav Journal of Oerations Research (00), umber, 5- A BICRITERIO STEIER TREE PROBLEM O GRAPH Mirko VUJO[EVI], Milan STAOJEVI] Laboratory for Oerational Research, Faculty of Organizational Sciences University

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal

More information

A MEMETIC ALGORITHM BASED ON TABU SEARCH FOR K-CARDINALITY TREE PROBLEMS. Qingqiang Guo, Hideki Katagiri. Received May 28, 2013

A MEMETIC ALGORITHM BASED ON TABU SEARCH FOR K-CARDINALITY TREE PROBLEMS. Qingqiang Guo, Hideki Katagiri. Received May 28, 2013 Scientiae Mathematicae Japonicae Online, e-2013, 609 619 609 A MEMETIC ALGORITHM BASED ON TABU SEARCH FOR K-CARDINALITY TREE PROBLEMS Qingqiang Guo, Hideki Katagiri Received May 28, 2013 Abstract. A combinatorial

More information

split split (a) (b) split split (c) (d)

split split (a) (b) split split (c) (d) International Journal of Foundations of Comuter Science c World Scientic Publishing Comany ON COST-OPTIMAL MERGE OF TWO INTRANSITIVE SORTED SEQUENCES JIE WU Deartment of Comuter Science and Engineering

More information

Efficient Parallel Hierarchical Clustering

Efficient Parallel Hierarchical Clustering Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore

More information

Chapter 8: Adaptive Networks

Chapter 8: Adaptive Networks Chater : Adative Networks Introduction (.1) Architecture (.2) Backroagation for Feedforward Networks (.3) Jyh-Shing Roger Jang et al., Neuro-Fuzzy and Soft Comuting: A Comutational Aroach to Learning and

More information

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces Wavelet Based Statistical Adated Local Binary atterns for Recognizing Avatar Faces Abdallah A. Mohamed 1, 2 and Roman V. Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville,

More information

Stereo Disparity Estimation in Moment Space

Stereo Disparity Estimation in Moment Space Stereo Disarity Estimation in oment Sace Angeline Pang Faculty of Information Technology, ultimedia University, 63 Cyberjaya, alaysia. angeline.ang@mmu.edu.my R. ukundan Deartment of Comuter Science, University

More information

An Efficient Video Program Delivery algorithm in Tree Networks*

An Efficient Video Program Delivery algorithm in Tree Networks* 3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,

More information

A Novel Iris Segmentation Method for Hand-Held Capture Device

A Novel Iris Segmentation Method for Hand-Held Capture Device A Novel Iris Segmentation Method for Hand-Held Cature Device XiaoFu He and PengFei Shi Institute of Image Processing and Pattern Recognition, Shanghai Jiao Tong University, Shanghai 200030, China {xfhe,

More information

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture

More information

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1 Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and

More information

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems Matlab Virtual Reality Simulations for otimizations and raid rototying of flexible lines systems VAMVU PETRE, BARBU CAMELIA, POP MARIA Deartment of Automation, Comuters, Electrical Engineering and Energetics

More information

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu

More information

Lecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model.

Lecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model. U.C. Berkeley CS273: Parallel and Distributed Theory Lecture 18 Professor Satish Rao Lecturer: Satish Rao Last revised Scribe so far: Satish Rao (following revious lecture notes quite closely. Lecture

More information

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical

More information

Extracting Optimal Paths from Roadmaps for Motion Planning

Extracting Optimal Paths from Roadmaps for Motion Planning Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu

More information

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model Ad Hoc Networks (4) 5 68 Contents lists available at SciVerse ScienceDirect Ad Hoc Networks journal homeage: www.elsevier.com/locate/adhoc Latency-minimizing data aggregation in wireless sensor networks

More information

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment

More information

Weighted Page Rank Algorithm based on In-Out Weight of Webpages

Weighted Page Rank Algorithm based on In-Out Weight of Webpages Indian Journal of Science and Technology, Vol 8(34), DOI: 10.17485/ijst/2015/v8i34/86120, December 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 eighted Page Rank Algorithm based on In-Out eight

More information

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,

More information

Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern

Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern Face Recognition Based on Wavelet Transform and Adative Local Binary Pattern Abdallah Mohamed 1,2, and Roman Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville, Louisville,

More information

A Hybrid Algorithm Based on Memetic Algorithm and Tabu Search for k-minimum Spanning Tree Problems

A Hybrid Algorithm Based on Memetic Algorithm and Tabu Search for k-minimum Spanning Tree Problems A Hybrid Algorithm Based on Memetic Algorithm and Tabu Search for k-minimum Spanning Tree Problems Qingqiang Guo, Hideki Katagiri, Ichiro Nishizaki, and Tomohiro Hayashida Abstract A combinatorial optimization

More information

Lecture 8: Orthogonal Range Searching

Lecture 8: Orthogonal Range Searching CPS234 Comutational Geometry Setember 22nd, 2005 Lecture 8: Orthogonal Range Searching Lecturer: Pankaj K. Agarwal Scribe: Mason F. Matthews 8.1 Range Searching The general roblem of range searching is

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

Table 1: An overview of metaheuristic aroaches to tackle the k-cardinality tree roblem. Publication Problem-tye Metaheuristic M.J. Blesa and F. Xhafa

Table 1: An overview of metaheuristic aroaches to tackle the k-cardinality tree roblem. Publication Problem-tye Metaheuristic M.J. Blesa and F. Xhafa Ant Colony Otimization for the Edge-Weighted k-cardinality Tree Problem Christian Blum IRIDIA Université Libre de Bruxelles Brussels, Belgium e-mail: cblum@ulb.ac.be tel: (32) 2 650 3168, fax: (32) 2 650

More information

Evaluation of Metaheuristics for Robust Graph Coloring Problem

Evaluation of Metaheuristics for Robust Graph Coloring Problem Proceedings of the Federated Conference on Comuter Science and Information Systems. 519 524 DOI: 10.15439/2015F293 ACSIS, Vol. 5 Evaluation of Metaheuristics for Robust Grah Coloring Problem Zbigniew Kokosiński

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,

More information

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links

More information

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal International Journal of Information and Electronics Engineering, Vol. 1, No. 1, July 011 An Efficient VLSI Architecture for Adative Rank Order Filter for Image Noise Removal M. C Hanumantharaju, M. Ravishankar,

More information

Ensemble Learning Based on Parametric Triangular Norms

Ensemble Learning Based on Parametric Triangular Norms Send Orders for Rerints to rerints@benthamscience.ae The Oen Automation and Control Systems Journal, 2014, 6, 997-1003 997 Ensemble Learning Based on Parametric Triangular Norms Oen Access Pengtao Jia

More information

Applying the fuzzy preference relation to the software selection

Applying the fuzzy preference relation to the software selection Proceedings of the 007 WSEAS International Conference on Comuter Engineering and Alications, Gold Coast, Australia, January 17-19, 007 83 Alying the fuzzy reference relation to the software selection TIEN-CHIN

More information

Submission. Verifying Properties Using Sequential ATPG

Submission. Verifying Properties Using Sequential ATPG Verifying Proerties Using Sequential ATPG Jacob A. Abraham and Vivekananda M. Vedula Comuter Engineering Research Center The University of Texas at Austin Austin, TX 78712 jaa, vivek @cerc.utexas.edu Daniel

More information

Truth Trees. Truth Tree Fundamentals

Truth Trees. Truth Tree Fundamentals Truth Trees 1 True Tree Fundamentals 2 Testing Grous of Statements for Consistency 3 Testing Arguments in Proositional Logic 4 Proving Invalidity in Predicate Logic Answers to Selected Exercises Truth

More information

A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems

A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems Cheng-Yuan Chang and I-Lun Tseng Deartment of Comuter Science and Engineering Yuan Ze University,

More information

Hardware-Accelerated Formal Verification

Hardware-Accelerated Formal Verification Hardare-Accelerated Formal Verification Hiroaki Yoshida, Satoshi Morishita 3 Masahiro Fujita,. VLSI Design and Education Center (VDEC), University of Tokyo. CREST, Jaan Science and Technology Agency 3.

More information

Efficient stereo vision for obstacle detection and AGV Navigation

Efficient stereo vision for obstacle detection and AGV Navigation Efficient stereo vision for obstacle detection and AGV Navigation Rita Cucchiara, Emanuele Perini, Giuliano Pistoni Diartimento di Ingegneria dell informazione, University of Modena and Reggio Emilia,

More information

A Model-Adaptable MOSFET Parameter Extraction System

A Model-Adaptable MOSFET Parameter Extraction System A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information

Interactive Image Segmentation

Interactive Image Segmentation Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).

More information

Collective communication: theory, practice, and experience

Collective communication: theory, practice, and experience CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Comutat.: Pract. Exer. 2007; 19:1749 1783 Published online 5 July 2007 in Wiley InterScience (www.interscience.wiley.com)..1206 Collective

More information

Learning Robust Locality Preserving Projection via p-order Minimization

Learning Robust Locality Preserving Projection via p-order Minimization Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence Learning Robust Locality Preserving Projection via -Order Minimization Hua Wang, Feiing Nie, Heng Huang Deartment of Electrical

More information

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method ITB J. Eng. Sci. Vol. 39 B, No. 1, 007, 1-19 1 Leak Detection Modeling and Simulation for Oil Pieline with Artificial Intelligence Method Pudjo Sukarno 1, Kuntjoro Adji Sidarto, Amoranto Trisnobudi 3,

More information

Equality-Based Translation Validator for LLVM

Equality-Based Translation Validator for LLVM Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented

More information

Swift Template Matching Based on Equivalent Histogram

Swift Template Matching Based on Equivalent Histogram Swift emlate Matching ased on Equivalent istogram Wangsheng Yu, Xiaohua ian, Zhiqiang ou * elecommunications Engineering Institute Air Force Engineering University Xi an, PR China *corresonding author:

More information

Figure 8.1: Home age taken from the examle health education site (htt:// Setember 14, 2001). 201

Figure 8.1: Home age taken from the examle health education site (htt://  Setember 14, 2001). 201 200 Chater 8 Alying the Web Interface Profiles: Examle Web Site Assessment 8.1 Introduction This chater describes the use of the rofiles develoed in Chater 6 to assess and imrove the quality of an examle

More information

Recognizing Convex Polygons with Few Finger Probes

Recognizing Convex Polygons with Few Finger Probes Pattern Analysis and Alications manuscrit No. (will be inserted by the editor) Recognizing Convex Polygons with Few Finger Probes Sumanta Guha Kiêu Trọng Khánh Received: date / Acceted: date Abstract The

More information

An Iteratively Reweighted Norm Algorithm for Total Variation Regularization

An Iteratively Reweighted Norm Algorithm for Total Variation Regularization An Iteratively eweighted Norm Algorithm for Total Variation egularization Paul odríguez and Brendt Wohlberg Abstract Total Variation TV regularization has become a oular method for a wide variety of image

More information

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Journal of Comuting and Information Technology - CIT 8, 2000, 1, 1 12 1 Comlexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Eunice E. Santos Deartment of Electrical

More information

A GPU Heterogeneous Cluster Scheduling Model for Preventing Temperature Heat Island

A GPU Heterogeneous Cluster Scheduling Model for Preventing Temperature Heat Island A GPU Heterogeneous Cluster Scheduling Model for Preventing Temerature Heat Island Yun-Peng CAO 1,2,a and Hai-Feng WANG 1,2 1 School of Information Science and Engineering, Linyi University, Linyi Shandong,

More information

A Morphological LiDAR Points Cloud Filtering Method based on GPGPU

A Morphological LiDAR Points Cloud Filtering Method based on GPGPU A Morhological LiDAR Points Cloud Filtering Method based on GPGPU Shuo Li 1, Hui Wang 1, Qiuhe Ma 1 and Xuan Zha 2 1 Zhengzhou Institute of Surveying & Maing, No.66, Longhai Middle Road, Zhengzhou, China

More information

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution Texture Maing with Vector Grahics: A Nested Mimaing Solution Wei Zhang Yonggao Yang Song Xing Det. of Comuter Science Det. of Comuter Science Det. of Information Systems Prairie View A&M University Prairie

More information

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism Erlin Yao, Mingyu Chen, Rui Wang, Wenli Zhang, Guangming Tan Key Laboratory of Comuter System and Architecture Institute

More information

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China

More information

Detection of Occluded Face Image using Mean Based Weight Matrix and Support Vector Machine

Detection of Occluded Face Image using Mean Based Weight Matrix and Support Vector Machine Journal of Comuter Science 8 (7): 1184-1190, 2012 ISSN 1549-3636 2012 Science Publications Detection of Occluded Face Image using Mean Based Weight Matrix and Suort Vector Machine 1 G. Nirmala Priya and

More information

Introduction to Parallel Algorithms

Introduction to Parallel Algorithms CS 1762 Fall, 2011 1 Introduction to Parallel Algorithms Introduction to Parallel Algorithms ECE 1762 Algorithms and Data Structures Fall Semester, 2011 1 Preliminaries Since the early 1990s, there has

More information

1.5 Case Study. dynamic connectivity quick find quick union improvements applications

1.5 Case Study. dynamic connectivity quick find quick union improvements applications . Case Study dynamic connectivity quick find quick union imrovements alications Subtext of today s lecture (and this course) Stes to develoing a usable algorithm. Model the roblem. Find an algorithm to

More information

Constrained Path Optimisation for Underground Mine Layout

Constrained Path Optimisation for Underground Mine Layout Constrained Path Otimisation for Underground Mine Layout M. Brazil P.A. Grossman D.H. Lee J.H. Rubinstein D.A. Thomas N.C. Wormald Abstract The major infrastructure comonent reuired to develo an underground

More information

Cross products. p 2 p. p p1 p2. p 1. Line segments The convex combination of two distinct points p1 ( x1, such that for some real number with 0 1,

Cross products. p 2 p. p p1 p2. p 1. Line segments The convex combination of two distinct points p1 ( x1, such that for some real number with 0 1, CHAPTER 33 Comutational Geometry Is the branch of comuter science that studies algorithms for solving geometric roblems. Has alications in many fields, including comuter grahics robotics, VLSI design comuter

More information

I ACCEPT NO RESPONSIBILITY FOR ERRORS ON THIS SHEET. I assume that E = (V ).

I ACCEPT NO RESPONSIBILITY FOR ERRORS ON THIS SHEET. I assume that E = (V ). 1 I ACCEPT NO RESPONSIBILITY FOR ERRORS ON THIS SHEET. I assume that E = (V ). Data structures Sorting Binary heas are imlemented using a hea-ordered balanced binary tree. Binomial heas use a collection

More information

SKIN CANCER LESION CLASSIFICATION USING LBP BASED HYBRID CLASSIFIER

SKIN CANCER LESION CLASSIFICATION USING LBP BASED HYBRID CLASSIFIER DOI: htt://dx.doi.org/10.26483/ijarcs.v8i7.4469 Volume 8, No. 7, July August 2017 International Journal of Advanced Research in Comuter Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No.

More information

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions

More information

Randomized Selection on the Hypercube 1

Randomized Selection on the Hypercube 1 Randomized Selection on the Hyercube 1 Sanguthevar Rajasekaran Det. of Com. and Info. Science and Engg. University of Florida Gainesville, FL 32611 ABSTRACT In this aer we resent randomized algorithms

More information

Earthenware Reconstruction Based on the Shape Similarity among Potsherds

Earthenware Reconstruction Based on the Shape Similarity among Potsherds Original Paer Forma, 16, 77 90, 2001 Earthenware Reconstruction Based on the Shae Similarity among Potsherds Masayoshi KANOH 1, Shohei KATO 2 and Hidenori ITOH 1 1 Nagoya Institute of Technology, Gokiso-cho,

More information

Multicommodity Network Flow - Methods and Applications

Multicommodity Network Flow - Methods and Applications Multicommodity Network Flow - Methods and Alications Joe Lindström Linköing University joeli89@student.liu.se Abstract This survey describes the Multicommodity Network Flow roblem, a network flow roblem

More information

Brief Contributions. A Geometric Theorem for Network Design 1 INTRODUCTION

Brief Contributions. A Geometric Theorem for Network Design 1 INTRODUCTION IEEE TRANSACTIONS ON COMPUTERS, VOL. 53, NO., APRIL 00 83 Brief Contributions A Geometric Theorem for Network Design Massimo Franceschetti, Member, IEEE, Matthew Cook, and Jehoshua Bruck, Fellow, IEEE

More information

UPDATING ALGORITHMS FOR CONSTRAINT DELAUNAY TIN

UPDATING ALGORITHMS FOR CONSTRAINT DELAUNAY TIN UPDATING ALGORITMS FOR CONSTRAINT DELAUNAY TIN WU LiXin a,b WANG YanBing a, c a Institute for GIS/RS/GPS & Subsidence Engineering Research, China Uni Mining & Technology, Beijing, China, 100083 - awulixin@263.net,

More information

Source Coding and express these numbers in a binary system using M log

Source Coding and express these numbers in a binary system using M log Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is

More information

Distributed Estimation from Relative Measurements in Sensor Networks

Distributed Estimation from Relative Measurements in Sensor Networks Distributed Estimation from Relative Measurements in Sensor Networks #Prabir Barooah and João P. Hesanha Abstract We consider the roblem of estimating vectorvalued variables from noisy relative measurements.

More information

Using Rational Numbers and Parallel Computing to Efficiently Avoid Round-off Errors on Map Simplification

Using Rational Numbers and Parallel Computing to Efficiently Avoid Round-off Errors on Map Simplification Using Rational Numbers and Parallel Comuting to Efficiently Avoid Round-off Errors on Ma Simlification Maurício G. Grui 1, Salles V. G. de Magalhães 1,2, Marcus V. A. Andrade 1, W. Randolh Franklin 2,

More information

CMSC 425: Lecture 16 Motion Planning: Basic Concepts

CMSC 425: Lecture 16 Motion Planning: Basic Concepts : Lecture 16 Motion lanning: Basic Concets eading: Today s material comes from various sources, including AI Game rogramming Wisdom 2 by S. abin and lanning Algorithms by S. M. LaValle (Chats. 4 and 5).

More information

EE678 Application Presentation Content Based Image Retrieval Using Wavelets

EE678 Application Presentation Content Based Image Retrieval Using Wavelets EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective

More information

CS649 Sensor Networks IP Track Lecture 6: Graphical Models

CS649 Sensor Networks IP Track Lecture 6: Graphical Models CS649 Sensor Networks IP Track Lecture 6: Grahical Models I-Jeng Wang htt://hinrg.cs.jhu.edu/wsn06/ Sring 2006 CS 649 1 Sring 2006 CS 649 2 Grahical Models Grahical Model: grahical reresentation of joint

More information

Building Better Nurse Scheduling Algorithms

Building Better Nurse Scheduling Algorithms Building Better Nurse Scheduling Algorithms Annals of Oerations Research, 128, 159-177, 2004. Dr Uwe Aickelin Dr Paul White School of Comuter Science University of the West of England University of Nottingham

More information

Experimental Comparison of Shortest Path Approaches for Timetable Information

Experimental Comparison of Shortest Path Approaches for Timetable Information Exerimental Comarison of Shortest Path roaches for Timetable Information Evangelia Pyrga Frank Schulz Dorothea Wagner Christos Zaroliagis bstract We consider two aroaches that model timetable information

More information

Privacy Preserving Moving KNN Queries

Privacy Preserving Moving KNN Queries Privacy Preserving Moving KNN Queries arxiv:4.76v [cs.db] 4 Ar Tanzima Hashem Lars Kulik Rui Zhang National ICT Australia, Deartment of Comuter Science and Software Engineering University of Melbourne,

More information

A Symmetric FHE Scheme Based on Linear Algebra

A Symmetric FHE Scheme Based on Linear Algebra A Symmetric FHE Scheme Based on Linear Algebra Iti Sharma University College of Engineering, Comuter Science Deartment. itisharma.uce@gmail.com Abstract FHE is considered to be Holy Grail of cloud comuting.

More information

Face Recognition Using Legendre Moments

Face Recognition Using Legendre Moments Face Recognition Using Legendre Moments Dr.S.Annadurai 1 A.Saradha Professor & Head of CSE & IT Research scholar in CSE Government College of Technology, Government College of Technology, Coimbatore, Tamilnadu,

More information

Collective Communication: Theory, Practice, and Experience. FLAME Working Note #22

Collective Communication: Theory, Practice, and Experience. FLAME Working Note #22 Collective Communication: Theory, Practice, and Exerience FLAME Working Note # Ernie Chan Marcel Heimlich Avi Purkayastha Robert van de Geijn Setember, 6 Abstract We discuss the design and high-erformance

More information

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics structure arises in many alications of geometry. The dual structure, called a Delaunay triangulation also has many interesting roerties. Figure 3: Voronoi diagram and Delaunay triangulation. Search: Geometric

More information

Theoretical Analysis of Graphcut Textures

Theoretical Analysis of Graphcut Textures Theoretical Analysis o Grahcut Textures Xuejie Qin Yee-Hong Yang {xu yang}@cs.ualberta.ca Deartment o omuting Science University o Alberta Abstract Since the aer was ublished in SIGGRAPH 2003 the grahcut

More information

CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE

CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE Petra Surynková Charles University in Prague, Faculty of Mathematics and Physics, Sokolovská 83,

More information

Robust Real Time Pattern Matching using Bayesian Sequential Hypothesis Testing

Robust Real Time Pattern Matching using Bayesian Sequential Hypothesis Testing Robust Real Time Pattern Matching using Bayesian Sequential Hyothesis Testing Ofir Pele and Michael Werman Abstract This aer describes a method for robust real time attern matching. We first introduce

More information

Weight Co-occurrence based Integrated Color and Intensity Matrix for CBIR

Weight Co-occurrence based Integrated Color and Intensity Matrix for CBIR Weight Co-occurrence based Integrated Color and Intensity Matrix for CBIR Megha Agarwal, 2R.P. Maheshwari Indian Institute of Technology Roorkee 247667, Uttarakhand, India meghagarwal29@gmail.com, 2rmaheshwari@gmail.com

More information

Grouping of Patches in Progressive Radiosity

Grouping of Patches in Progressive Radiosity Grouing of Patches in Progressive Radiosity Arjan J.F. Kok * Abstract The radiosity method can be imroved by (adatively) grouing small neighboring atches into grous. Comutations normally done for searate

More information

Fuzzy Logic and ANFIS based Image Centroid Tracking and Filtering Schemes

Fuzzy Logic and ANFIS based Image Centroid Tracking and Filtering Schemes Fuzzy Logic and ANFIS based Image Centroid Tracking and Filtering Schemes Parimala, A., Asstt. Prof., Det. of Telecommunication, MSRIT; Jain University Research Scholar, Bangalore. Raol, J. R., Prof. Emeritus,

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Distrib. Comut. 71 (2011) 288 301 Contents lists available at ScienceDirect J. Parallel Distrib. Comut. journal homeage: www.elsevier.com/locate/jdc Quality of security adatation in arallel

More information

3D Surface Simplification Based on Extended Shape Operator

3D Surface Simplification Based on Extended Shape Operator 3D Surface Simlification Based on Extended Shae Oerator JUI-LIG TSEG, YU-HSUA LI Deartment of Comuter Science and Information Engineering, Deartment and Institute of Electrical Engineering Minghsin University

More information

Image Segmentation Using Topological Persistence

Image Segmentation Using Topological Persistence Image Segmentation Using Toological Persistence David Letscher and Jason Fritts Saint Louis University Deartment of Mathematics and Comuter Science {letscher, jfritts}@slu.edu Abstract. This aer resents

More information

10. Parallel Methods for Data Sorting

10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting... 1 10.1. Parallelizing Princiles... 10.. Scaling Parallel Comutations... 10.3. Bubble Sort...3 10.3.1. Sequential Algorithm...3

More information

Multidimensional Service Weight Sequence Mining based on Cloud Service Utilization in Jyaguchi

Multidimensional Service Weight Sequence Mining based on Cloud Service Utilization in Jyaguchi Proceedings of the International MultiConference of Engineers and Comuter Scientists 2013 Vol I, Multidimensional Service Weight Sequence Mining based on Cloud Service Utilization in Jyaguchi Shree Krishna

More information

A STUDY ON CALIBRATION OF DIGITAL CAMERA

A STUDY ON CALIBRATION OF DIGITAL CAMERA A STUDY ON CALIBRATION OF DIGITAL CAMERA Ryuji Matsuoka a, *, Kiyonari Fukue a, Kohei Cho a, Haruhisa Shimoda a, Yoshiaki Matsumae a, Kenji Hongo b, Seiju Fujiwara b a Tokai University Research & Information

More information

Optimization of Collective Communication Operations in MPICH

Optimization of Collective Communication Operations in MPICH To be ublished in the International Journal of High Performance Comuting Alications, 5. c Sage Publications. Otimization of Collective Communication Oerations in MPICH Rajeev Thakur Rolf Rabenseifner William

More information