The degree constrained k-cardinality minimum spanning tree problem: a lexisearch
|
|
- Augustus Page
- 6 years ago
- Views:
Transcription
1 Decision Science Letters 7 (2018) Contents lists available at GrowingScience Decision Science Letters homeage: The degree constrained k-cardinality minimum sanning tree roblem: a lexisearch algorithm Thenealle Jayanth Kumar a and Singamsetty Purusotham a* a Deartment of Mathematics, School of Advanced Sciences, VIT University, Vellore , Tamil Nadu, India C H R O N I C L E A B S T R A C T Article history: Received January 16, 2017 Received in revised format: May 22, 2017 Acceted July 23, 2017 Available online July 25, 2017 Keywords: k-cardinality minimum sanning tree Lexi-search algorithm Degree constraint This aer deals with the degree constrained k-cardinality minimum sanning tree (k-mstpd) roblem defined on a connected, edge weighted and undirected grah. The aim of this roblem is to determine the least weighted sanning tree with exactly k vertices such that excet the root vertex, no other vertex in the resultant sanning tree exceeds the secified degree limit. The k-mstpd roblem has many ractical alications for the design of electric, communication, and transortation networks. The roblem is then formulated as a zero-one rogramming. In this aer, an exact algorithm known as Lexi-search algorithm (LSA) is develoed to tackle the k-mstpd roblem. Furthermore, the develoed LSA is rogrammed in Matlab and tested on some benchmark instances as well as on random instances and the resective results are reorted. The obtained exerimental results showed that the develoed LSA takes significantly less time to find the otimal solutions Growing Science Ltd. All rights reserved. 1. Introduction The minimum sanning tree (MST) roblem is a significant network combinatorial otimization roblem. The MST roblem is an acyclic subgrah, which connects all the vertices/nodes with the minimum overall associated weight to its edges. The k-cardinality minimum sanning tree roblem (k- MST) is a variant of the classic MST roblem and formally defined as follows: Let G ( N, E) be a weighted, connected and undirected grah having N vertices and E edges, the k-mst roblem determines the least weight sanning tree with exactly k ( k N ) vertices and k 1 edges. The k-mst was first coined by Hamacher et al. (1991) and it was roven to be NP-hard by Ravi et al. (1996). It has several otential alications like oil-field leasing, telecommunications, oen it mining and image rocessing, (see Ravi et al., 1996; Garg & Hochbaum, 1997; Philott & Wormald, 1997; Ma et al., 2000) thus it has received a great attention from the researchers in recent years. * Corresonding author. address: drurusotham.or@gmail.com (S. Purusotham) 2018 Growing Science Ltd. All rights reserved. doi: /j.dsl
2 302 Since the k-mst is NP-hard, develoing exact solution methods is again a challenging roblem. Due to this reason, most of the existing works on k-mst roblem concerns aroximate solution rocedures. However, these aroximate solution methods may not assure the exact solutions. The constant factor aroximation aroach for solving the k-mst roblem was first given by Blum et al. (1995). Subsequently, Garg and Hochbaum (1997) studied the k-mst roblem and suggested an O(log k) aroximation algorithm. A 2.5-factor heuristic algorithm for k-mst has been develoed by Arya and Ramesh (1998). Three meta-heuristics algorithms namely Tabu Search (TS), Ant Colony Otimization (ACO) and Evolutionary Comutation (EC) have been roosed by Blum and Blesa (2005) for the k-mst roblem and showed that the ACO and TS aroach works better for lower and higher cardinalities resectively. Recently, Katagiri et al. (2010) roosed a new solution rocedure using Tabu search for k-mst and shown that this method erforms better than the existing methods. An efficient hybrid aroximation algorithm using Tabu search and Ant colony otimization for solving the k-mst roblem was roosed by Katagiri et al. (2012). Purusotham and Sundara Murthy (2012) suggested the iterative techniques to solve some of the variants of network roblems. A hybrid heuristic aroach based on the Memetic algorithm and Tabu search algorithm was develoed by Katagiri and Guo (2013) for the k-mst roblem. Degree constrained minimum sanning tree (DMST) roblem is one of the variants of classic MST roblem and has been roved to be NP-hard by Kar (1972). The DMST roblem has many ractical alications such as design of comuter and communication networks, electric circuits, design of integrated circuits, road networks and energy networks (Martins & De souza, 2009). Several solution methods have been develoed in order to tackle DMST roblem, for few see, Genetic algorithm by Hanr and Wang (2006), an Ant based algorithm by Doan (2007), Learning based automata aroach by Torkestani (2013), and Branch and cut algorithm by Martinez and Cunha (2014). However, the above cited literature revealed that a limited consideration has been given to the variants of the k-mst roblem due to NP-hard nature. Infact, many ractical scenarios can be modeled as variants of k-mst roblem. In this aer, a variant of the k-mst roblem called the degree constrained k-cardinality minimum sanning tree roblem (k-mstpd) is considered and an exact solution rocedure known as Lexi-search algorithm (LSA) is develoed, which rovides the otimal solutions effectively. Without loss of generality, relaxing the degree constraint and assuming k n, the k-mstpd corresonds to classic MST roblem. Our aim is to construct the model and develo an exact Lexisearch algorithm for the k-mstpd. The rest of the aer is structured as follows: The roblem is described and then it is formulated as a zero-one integer rogramming in Section 2. Section 3 includes the concets and solution rocedure of the roosed LSA algorithm. A numerical examle is given in Section 4 to demonstrate the roosed LSA. Section 5 resents the comutational results and subsequently, the conclusions are discussed in Section Mathematical Model Let G ( N, E) be a connected, edge weighted and undirected grah, where N and E be the vertex/node set and edge set resectively. Each edge in E is associated with a non-negative weight known as cost. Given the secified ositive integers k and D, the k-mstpd aims to find the least cost sanning tree
3 T. J. Kumar and S. Purusotham / Decision Science Letters 7 (2018) 303 with exactly k ( k N ) vertices such that excet the root vertex, no other vertex has more than the redefined degree D. The notations and arameters which are useful for formulating the model k- MSTPD are given as follows: N n: Number of vertices/nodes. c : Associated cost fromi th node to j th node, where c c. k : Cardinality i.e. secified number of vertices, where k n D : Secified degree limit on vertices. : Root vertex. x : Binary variable. ji The mathematical model for k-mstpd using zero one rogramming is given as follows: n n min Z c x (1) i 1 j 1 subject to n n x k 1 (2) i 1 j 1 n x D; i j, i, i N (3) j 1 Subtour elimination constraints (4) x 0,1 ; i, j N (5) In this formulation, the constraint (1) reresents the objective function that minimizes the overall cost of the sanning tree. The constraint (2) tells the resultant sanning tree ossess k-1 edges. The constraint (3) ensures that excet the root vertex, no other vertex in the sanning tree is more than a redefined degree limit. The constraint (4) eliminates the subtours. Finally, the integrality constraints are given in (5). 3. Lexi-search Algorithm The Lexi-search algorithm (LSA) is a well organized Branch and Bound (B&B) algorithm suggested by Pandit (1962). In rincile, the LSA has similar features of the Branch and Bound (B&B) algorithm such as checking the feasibility, comuting the bounds, generating a feasible solution. The LSA has been roved to be roductive than the B&B aroach and is based on the following grounds Pandit (1962): It is ossible to list all the solutions in a structural hierarchy which also reflects a hierarchical ordering of the corresonding values of these configurations. Effective bounds can be set to the values of the objective function, when structural combinatorial restraints are laced on the allowable configurations Pattern A two dimensional array [ ] X x = that corresonds to the k- cardinality sanning tree is referred to as a attern. The value of the attern is evaluated by using the Eq. (6).
4 304 n n V( X) c x (6) i 1 j Alhabet Table For any given two dimensional cost array C = [ c ], there exists M = n n ordered airs, which are organized in non-decreasing order and are indexed from 1 to M, stored in an array SN (Sundara Murthy, 1979). Let L = ( b, b,..., b ), b ÎSN be an arranged sequence of indices from SN. The attern 1 2 i indicated through the ordered airs whose indices are reresented by L, which is indeendent of the order of b in the sequence. The indices in the sequence L i can be arranged in increasing order such that b <b, i = 1,2,..., - 1. The ordered sequence L i i+ 1 is said to be a word of length. The set SN is called an Alhabet table. A word L is called sensible word, if b <b, i = 1, 2,..., - 1; in any other case, the i i+ 1 word L becomes non-sensible word Word and Partial Word If = k- 1, then L is said to be a full length word or simly word. If < k- 1, then L indicates artial word. Every full length word L gives a feasible solution Uer and Lower Word The uer bound (UB) of a artial word is assumed to be a very higher value. The lower bound of a artial word ( LB( L )) for the values of the blocks of words indicated by L = ( b, b,..., b ) can be 1 2 determined as follows: LB( L ) = V ( L ) + CC( b + k ) - CC( L ); where V( L ) rovides the value of the artial word and is measured by using V( L ) = V( L ) + C( b ) withv( L ) = Proosed Lexi-search Algorithm The roosed Lexi-search algorithm (LSA) is mainly based on the features such as alhabet table, setting effective bounds, checking the feasibility and backtracking. The algorithmic stes of the roosed LSA for k-mstpd roblem are given as follows: Ste 1: Initialization Inut: C = [ c ] Cost matrix; n number of vertices; k secified number; D secified degree limit; UB an uer bound (99999, say) Ste 2: Alhabet Table Create the alhabet table using the given cost matrix C as discussed in the Section 3.2 and goto Ste 3. Ste 3: Setting effective bounds Usually, the search starts with a artial word L = ( b ) = 1, where = 1. a. Comute the lower bound of the artial word ( LB( L )) as discussed in the Section 3.4 b. If LB( L) < UB, then go to Ste 4.
5 T. J. Kumar and S. Purusotham / Decision Science Letters 7 (2018) 305 c. If LB( L ) ³ UB, then eliminate the artial word L and subsequently remove the blocks of words with L as the leader. Go to Ste 6. Ste 4: Feasibility checking a. If the artial word L satisfies the degree constraint, acyclic and balancing the size of the cardinality k, then it is feasible and infeasible, otherwise. b. If the artial word L is feasible, then accet it and roceed for the subsequent artial word of order + 1 and go to Ste 5. If L is infeasible, ick u the consecutive artial word of same order by considering the letter that succeeds b in its th osition and go to Ste 3. Ste 5: Concatenation a. If L is a artial word, then this will be concatenated by using L = L * b, where * refers the concatenation oeration and go to Ste 3. b. If L is a full length word relace by LB( L ) and go to Ste 7. Ste 6: If all the words of order are exhausted and length of the word L is 1 then move to Ste 9 and go to Ste 7, otherwise. Ste 7: Backtracking Backtracking hels to imrove the solution. The current value ofub is assumed as the uer bound and roceed the search by taking the next letter of the artial word of order -1and go to Ste 3. Ste 8: Reeat the Ste 3 to 7 and discard the feasible or infeasible solutions which are not necessary to obtain the otimal solutions. Continue this rocess untilub has no further imrovement and go to Ste 9. Ste 9: Outut Record currentub and its corresonding full length word L and go to Ste 10. Ste 10: Sto Once the search gets over, the current UB gives an otimal solution and the word L rovides the comlete schedule for k-mstpd roblem. 4. Numerical Illustration In order to illustrate the roosed LSA, a numerical examle is considered for which N n 9, k 7 and D 3. Since the roblem defined on undirected grah, an uer triangular matrix is considered and the cost matrix C = [ c ] is reresented in Table 1. Note that the comonents of the cost matrix C assume the non-negative integral values. For convenience, the artial alhabet table for the cost matrix in Table 1 is shown in Table 2. In Table 2, the arrays SN, C, CC, R and CL reresents the serial number, elements of the cost matrix organized in ascending order, cumulative cost for the elements of the cost matrix, row and column indices resectively. The search table reorted in Table 3 reresents the details about how the roosed LSA comutes the feasible solution and converges to the otimal solution. In Table 3, the column indexed by SN reresents the serial number, the subsequent columns indexed by 1, 2, 3, 4, 5 and 6 indicates the first, second, third, fourth, fifth and sixth osition of the letters in a artial word resectively. The next columns labeled by v and LB tells that value of the artial word and lower bound of a artial word resectively. The successive columns R and CL reresent the row and column indices resectively. Finally, the last column Remark gives whether the artial word is acceted or rejected.
6 306 Since the roblem considered in Table 1 aims to find the least cost sanning tree with exactly k 7 (out of n 9 vertices) vertices and k 6 edges. Thus, the length of the feasible word could be 6 i.e. 6 edges. In Table 3, the LSA algorithm starts with a artial word L = 1, and it satisfies the feasibility conditions, 1 thus the artial word is acceted and denoted by A. It is seen that some of the artial words failed in satisfying the feasibility conditions and hence rejected artial words are reresented by R. Proceeding in this manner it lead to a full length feasible word L = (1, 2, 3, 4, 5,11) which ossess the objective value 6 UB=52 (feasible solution) and it is observed at 11 th row of the Table 3. The grahical reresentation of the feasible solution can be shown in Fig.1. Once the feasible solution is obtained, the current UB is assumed to be the uer bound and roceed for the backtracking in order to enhance the search sace. It is observed that the imroved solution UB=49 is observed at 14 th row of the Table 3 and its corresonding full length word could be L 6 = (1,2,3,4,6,8). Since no other solution is found to be better than the current solution, the current found solution i.e. UB=49 could be the otimal solution and further, the algorithm terminates at 19 th row of the Table 3. The grahical reresentation of otimal solution is given in Fig.2. Table 1 Cost matrix of the k-mstpd roblem C Table 2 Alhabet Table SN C CC R CL SN C CC R CL
7 T. J. Kumar and S. Purusotham / Decision Science Letters 7 (2018) 307 Table 3 Search Table SN V LB R CL Remark A A A A A R R R R R A, UB= A R A, UB = > UB, R > UB, R > UB, R > UB, R > UB, R 5. Comutational Results This section reorts the comutational details of the roosed LSA for the k-mstpd. The LSA was coded in Matlab 2016a and the exerimental analysis was carried out on a 64-bit Microsoft Windows 2010 oerating system with 4 GB of RAM PC and rocessor Intel Core i5 running at a 2.10 GHz. We evaluated the erformance of the roosed LSA by varying distinct arameters in terms of a number of vertices, the cardinality of the tree, the structure of the cost matrix and degree limit on the vertices. To assess the efficiency of the roosed LSA for the k-mstpd, seven benchmark instances taken from TSPLIB which include gr17, gr21, gr24, fri26, bayg29, dantzig42, and gr48. The extensive comutational details are reorted in Table 4. From the results in Table 4, it is seen that for all the 23 cases of seven instances, the exact solutions were found by the LSA within considerable CPU runtime ranging from seconds to seconds. From these results, it is seen that the LSA is caable in finding the otimal solutions for all the cases within ractically allowable runtimes. Note that for all the cases the root vertex is assumed as 1. Furthermore, to measure the effectiveness of the roosed LSA, the comutational exeriments were carried out on a class of 10 randomly generated small and medium test instances ranging from 15 to 100. Each class included 10 instances and overall, a total of 100 test instances with symmetric edge weights are generated and tested. The cost c assumes the randomly generated values over the range 1 to 500, i.e. 1 c 500. The exerimental results summarized in Table 5 concerns the mean results of each size of the instance by the roosed LSA. Table 5 also contains the standard deviation (SD) of CPU runtimes. The results given in Table 5 based on five indeendent runs. In Table 5, the roblems with 15 to 80 vertices with distinct cardinalities (k) could be solved in very less CPU runtimes. The CPU runtimes start rising when the roblems of size 90 or higher are tested. However, these comutational runtimes are fairly reasonable.
8 308 The overall results summarized in Table 4 and Table 5 reveal that roosed LSA could efficiently solve the k-mstpd for the small and medium size of instances. For the roblems of higher dimensions, the CPU runtimes may also be higher. Table 4 Results of the LSA for k-mstpd over benchmark instances Instance N E k D Best sol CPU Runtime (In seconds) Worst time Best time gr gr gr fri bayg dantzig gr Instance benchmark instances taken from TSPLIB; N number of vertices in the given grah; E number of edges in the given grah; k number of vertices in the resultant sanning tree; D degree limit on the vertices; Best sol. the otimal solution by the roosed LSA; Worst time worst comutational runtime (in CPU seconds) for the best found solution; Best time best comutational runtime (in CPU seconds) for the best found solution. Table 5 Mean results of the LSA for k-mstpd over random instances SN N E k D NPT CPU Runtime SD Min. Max. Avg SN roblem number; N number of vertices in the given grah; E number of edges in the given grah; k number of vertices in the resultant sanning tree; D degree limit on the vertices; NPT number of roblems tested on each dimension; Min. minimum CPU runtime (in seconds) to find best found solution for the ten runs; Max. maximum CPU runtime (in seconds) to find best found solution for the ten runs; Avg. mean CPU runtime (in seconds) to find best found solution for the ten runs; SD standard deviation of CPU runtimes. 6. Conclusions In this aer, a ractical variant of MST roblem reffered to as a degree constrained k-cardinality minimum sanning tree roblem (k-mstpd) has been taken into consideration and the model was then
9 T. J. Kumar and S. Purusotham / Decision Science Letters 7 (2018) 309 modeled using zero-one rogramming. The k-mstpd may have several ractical alications, articularly in the areas like designing of networks, electric circuits, and transortation networks. We have roosed an exact solution rocedure namely Lexi-search algorithm for k-mstpd. Through numerical exeriments for various benchmark and randomly generated instances, the erformance of the develoed LSA was measured. The exerimental results reveal that the roosed LSA for the k- MSTPD is found to be roductive to obtain the otimal solutions within considerable CPU runtimes. References Arya, S., & Ramesh, H. (1998). A 2.5-factor aroximation algorithm for the k-mst roblem. Information Processing Letters, 65(3), Blum, A., Ravi, R., & Vemala, S. (1996, July). A constant-factor aroximation algorithm for the k MST roblem. In Proceedings of the twenty-eighth annual ACM symosium on Theory of comuting ( ). ACM. Blum, C., & Blesa, M. J. (2005). New metaheuristic aroaches for the edge-weighted k- cardinality tree roblem. Comuters & Oerations Research, 32(6), Doan, M. N. (2007, Setember). An effective ant-based algorithm for the degree-constrained minimum sanning tree roblem. In Evolutionary Comutation, CEC IEEE Congress on ( ). IEEE. Garg, N., Hochbaum, D. (1997). An O(log k) aroximation algorithm for the k minimum sanning tree roblem in the lane. Algorithmica, 18(1), Hamacher, H.W., Jorsten, K., & Maffioli, F. (1991). Weighted k-cardinality trees. Technical Reort, , Politecnico di Milano, Diartimento di Elettronica, Italy. Hanr, L., & Wang, Y. (2006). A novel genetic algorithm for degree-constrained minimum sanning tree roblem. International Journal of comuter science and Network Security, 6(7A), Kar, R. M. (1972). Reducibility among combinatorial roblems. In Comlexity of comuter comutations ( ). Sringer US. Katagiri, H., Hayashida, T., Nishizaki, I., & Ishimatsu, J. (2010). An aroximate solution method based on tabu search for k-minimum sanning tree roblems. International Journal of Knowledge Engineering and Soft Data Paradigms, 2(3), Katagiri, H., Hayashida, T., Nishizaki, I., & Guo, Q. (2012). A hybrid algorithm based on tabu search and ant colony otimization for k-minimum sanning tree roblems. Exert Systems with Alications, 39(5), Katagiri, H., & Guo, Q. (2013). A Hybrid-Heuristics Algorithm for k-minimum Sanning Tree Problems. In IAENG Transactions on Engineering Technologies ( ). Sringer Netherlands. Ma, B., Hero, A., Gorman, J., & Michel, O. (2000). Image registration with minimum sanning tree algorithm. In Image Processing, Proceedings International Conference on (Vol. 1, ). IEEE. Martinez, L. C., & Da Cunha, A. S. (2014). The min-degree constrained minimum sanning tree roblem: Formulations and Branch-and-cut algorithm. Discrete Alied Mathematics, 164, Martins, P., & de Souza, M. C. (2009). VNS and second order heuristics for the min-degree constrained minimum sanning tree roblem. Comuters & Oerations Research, 36(11), Pandit, S. N. (1962). The loading roblem. Oerations Research, 10(5), Purusotham, S. & Sundara Murthy, M. (2012). A new aroach for solving the network roblems, OPSEARCH, 49(1), Philott, A. B., & Wormald, N. C. (2000). On the Otimal Extraction of Ore from an Oen Cast Mine. Deartment of Engineering Science, University of Auckland. Ravi, R., Sundaram, R., Marathe, M. V., Rosenkrantz, D. J., & Ravi, S. S. (1996). Sanning trees short or small. SIAM Journal on Discrete Mathematics, 9(2),
10 310 Sundara Murthy, M. (1979). Combinatorial rogramming roblems - A attern recognition aroach. Ph.D Thesis, REC, Warangal, India. Torkestani, J. A. (2013). Degree constrained minimum sanning tree roblem: a learning automata aroach. The Journal of Suercomuting, 64(1), TSBLIB: htts://github.com/drozdowski/tsplib.net/tree/master/tsplib95/ts 2018 by the authors; licensee Growing Science, Canada. This is an oen access article distributed under the terms and conditions of the Creative Commons Attribution (CC-BY) license (htt://creativecommons.org/licenses/by/4.0/).
AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS
AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS Philie LACOMME, Christian PRINS, Wahiba RAMDANE-CHERIF Université de Technologie de Troyes, Laboratoire d Otimisation des Systèmes Industriels (LOSI)
More informationAn approximate solution method based on tabu search for k-minimum spanning tree problems
An approximate solution method based on tabu search for k-minimum spanning tree problems Jun Ishimatsu, Hideki Katagiri, Ichiro Nishizaki and Tomohiro Hayashida Graduate School of Engineering, Hiroshima
More informationRandomized algorithms: Two examples and Yao s Minimax Principle
Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum
More informationDirected File Transfer Scheduling
Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was
More informationA BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION
Yugoslav Journal of Oerations Research (00), umber, 5- A BICRITERIO STEIER TREE PROBLEM O GRAPH Mirko VUJO[EVI], Milan STAOJEVI] Laboratory for Oerational Research, Faculty of Organizational Sciences University
More informationAUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.
inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.
More informationAn empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs
An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science
More informationImproved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties
Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal
More informationA MEMETIC ALGORITHM BASED ON TABU SEARCH FOR K-CARDINALITY TREE PROBLEMS. Qingqiang Guo, Hideki Katagiri. Received May 28, 2013
Scientiae Mathematicae Japonicae Online, e-2013, 609 619 609 A MEMETIC ALGORITHM BASED ON TABU SEARCH FOR K-CARDINALITY TREE PROBLEMS Qingqiang Guo, Hideki Katagiri Received May 28, 2013 Abstract. A combinatorial
More informationsplit split (a) (b) split split (c) (d)
International Journal of Foundations of Comuter Science c World Scientic Publishing Comany ON COST-OPTIMAL MERGE OF TWO INTRANSITIVE SORTED SEQUENCES JIE WU Deartment of Comuter Science and Engineering
More informationEfficient Parallel Hierarchical Clustering
Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore
More informationChapter 8: Adaptive Networks
Chater : Adative Networks Introduction (.1) Architecture (.2) Backroagation for Feedforward Networks (.3) Jyh-Shing Roger Jang et al., Neuro-Fuzzy and Soft Comuting: A Comutational Aroach to Learning and
More informationWavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces
Wavelet Based Statistical Adated Local Binary atterns for Recognizing Avatar Faces Abdallah A. Mohamed 1, 2 and Roman V. Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville,
More informationStereo Disparity Estimation in Moment Space
Stereo Disarity Estimation in oment Sace Angeline Pang Faculty of Information Technology, ultimedia University, 63 Cyberjaya, alaysia. angeline.ang@mmu.edu.my R. ukundan Deartment of Comuter Science, University
More informationAn Efficient Video Program Delivery algorithm in Tree Networks*
3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,
More informationA Novel Iris Segmentation Method for Hand-Held Capture Device
A Novel Iris Segmentation Method for Hand-Held Cature Device XiaoFu He and PengFei Shi Institute of Image Processing and Pattern Recognition, Shanghai Jiao Tong University, Shanghai 200030, China {xfhe,
More informationOMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications
OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture
More informationMulticast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1
Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and
More informationMatlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems
Matlab Virtual Reality Simulations for otimizations and raid rototying of flexible lines systems VAMVU PETRE, BARBU CAMELIA, POP MARIA Deartment of Automation, Comuters, Electrical Engineering and Energetics
More informationA CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH
A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu
More informationLecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model.
U.C. Berkeley CS273: Parallel and Distributed Theory Lecture 18 Professor Satish Rao Lecturer: Satish Rao Last revised Scribe so far: Satish Rao (following revious lecture notes quite closely. Lecture
More informationLearning Motion Patterns in Crowded Scenes Using Motion Flow Field
Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical
More informationExtracting Optimal Paths from Roadmaps for Motion Planning
Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu
More informationAd Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model
Ad Hoc Networks (4) 5 68 Contents lists available at SciVerse ScienceDirect Ad Hoc Networks journal homeage: www.elsevier.com/locate/adhoc Latency-minimizing data aggregation in wireless sensor networks
More informationA DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans
Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment
More informationWeighted Page Rank Algorithm based on In-Out Weight of Webpages
Indian Journal of Science and Technology, Vol 8(34), DOI: 10.17485/ijst/2015/v8i34/86120, December 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 eighted Page Rank Algorithm based on In-Out eight
More informationIMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model
IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,
More informationFace Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern
Face Recognition Based on Wavelet Transform and Adative Local Binary Pattern Abdallah Mohamed 1,2, and Roman Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville, Louisville,
More informationA Hybrid Algorithm Based on Memetic Algorithm and Tabu Search for k-minimum Spanning Tree Problems
A Hybrid Algorithm Based on Memetic Algorithm and Tabu Search for k-minimum Spanning Tree Problems Qingqiang Guo, Hideki Katagiri, Ichiro Nishizaki, and Tomohiro Hayashida Abstract A combinatorial optimization
More informationLecture 8: Orthogonal Range Searching
CPS234 Comutational Geometry Setember 22nd, 2005 Lecture 8: Orthogonal Range Searching Lecturer: Pankaj K. Agarwal Scribe: Mason F. Matthews 8.1 Range Searching The general roblem of range searching is
More informationSensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network
1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann
More informationTable 1: An overview of metaheuristic aroaches to tackle the k-cardinality tree roblem. Publication Problem-tye Metaheuristic M.J. Blesa and F. Xhafa
Ant Colony Otimization for the Edge-Weighted k-cardinality Tree Problem Christian Blum IRIDIA Université Libre de Bruxelles Brussels, Belgium e-mail: cblum@ulb.ac.be tel: (32) 2 650 3168, fax: (32) 2 650
More informationEvaluation of Metaheuristics for Robust Graph Coloring Problem
Proceedings of the Federated Conference on Comuter Science and Information Systems. 519 524 DOI: 10.15439/2015F293 ACSIS, Vol. 5 Evaluation of Metaheuristics for Robust Grah Coloring Problem Zbigniew Kokosiński
More informationSpace-efficient Region Filling in Raster Graphics
"The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich
More informationSensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s
Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,
More informationPREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS
PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links
More informationAn Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal
International Journal of Information and Electronics Engineering, Vol. 1, No. 1, July 011 An Efficient VLSI Architecture for Adative Rank Order Filter for Image Noise Removal M. C Hanumantharaju, M. Ravishankar,
More informationEnsemble Learning Based on Parametric Triangular Norms
Send Orders for Rerints to rerints@benthamscience.ae The Oen Automation and Control Systems Journal, 2014, 6, 997-1003 997 Ensemble Learning Based on Parametric Triangular Norms Oen Access Pengtao Jia
More informationApplying the fuzzy preference relation to the software selection
Proceedings of the 007 WSEAS International Conference on Comuter Engineering and Alications, Gold Coast, Australia, January 17-19, 007 83 Alying the fuzzy reference relation to the software selection TIEN-CHIN
More informationSubmission. Verifying Properties Using Sequential ATPG
Verifying Proerties Using Sequential ATPG Jacob A. Abraham and Vivekananda M. Vedula Comuter Engineering Research Center The University of Texas at Austin Austin, TX 78712 jaa, vivek @cerc.utexas.edu Daniel
More informationTruth Trees. Truth Tree Fundamentals
Truth Trees 1 True Tree Fundamentals 2 Testing Grous of Statements for Consistency 3 Testing Arguments in Proositional Logic 4 Proving Invalidity in Predicate Logic Answers to Selected Exercises Truth
More informationA Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems
A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems Cheng-Yuan Chang and I-Lun Tseng Deartment of Comuter Science and Engineering Yuan Ze University,
More informationHardware-Accelerated Formal Verification
Hardare-Accelerated Formal Verification Hiroaki Yoshida, Satoshi Morishita 3 Masahiro Fujita,. VLSI Design and Education Center (VDEC), University of Tokyo. CREST, Jaan Science and Technology Agency 3.
More informationEfficient stereo vision for obstacle detection and AGV Navigation
Efficient stereo vision for obstacle detection and AGV Navigation Rita Cucchiara, Emanuele Perini, Giuliano Pistoni Diartimento di Ingegneria dell informazione, University of Modena and Reggio Emilia,
More informationA Model-Adaptable MOSFET Parameter Extraction System
A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313
More informationEfficient Processing of Top-k Dominating Queries on Multi-Dimensional Data
Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of
More informationInteractive Image Segmentation
Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).
More informationCollective communication: theory, practice, and experience
CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Comutat.: Pract. Exer. 2007; 19:1749 1783 Published online 5 July 2007 in Wiley InterScience (www.interscience.wiley.com)..1206 Collective
More informationLearning Robust Locality Preserving Projection via p-order Minimization
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence Learning Robust Locality Preserving Projection via -Order Minimization Hua Wang, Feiing Nie, Heng Huang Deartment of Electrical
More informationLeak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method
ITB J. Eng. Sci. Vol. 39 B, No. 1, 007, 1-19 1 Leak Detection Modeling and Simulation for Oil Pieline with Artificial Intelligence Method Pudjo Sukarno 1, Kuntjoro Adji Sidarto, Amoranto Trisnobudi 3,
More informationEquality-Based Translation Validator for LLVM
Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented
More informationSwift Template Matching Based on Equivalent Histogram
Swift emlate Matching ased on Equivalent istogram Wangsheng Yu, Xiaohua ian, Zhiqiang ou * elecommunications Engineering Institute Air Force Engineering University Xi an, PR China *corresonding author:
More informationFigure 8.1: Home age taken from the examle health education site (htt:// Setember 14, 2001). 201
200 Chater 8 Alying the Web Interface Profiles: Examle Web Site Assessment 8.1 Introduction This chater describes the use of the rofiles develoed in Chater 6 to assess and imrove the quality of an examle
More informationRecognizing Convex Polygons with Few Finger Probes
Pattern Analysis and Alications manuscrit No. (will be inserted by the editor) Recognizing Convex Polygons with Few Finger Probes Sumanta Guha Kiêu Trọng Khánh Received: date / Acceted: date Abstract The
More informationAn Iteratively Reweighted Norm Algorithm for Total Variation Regularization
An Iteratively eweighted Norm Algorithm for Total Variation egularization Paul odríguez and Brendt Wohlberg Abstract Total Variation TV regularization has become a oular method for a wide variety of image
More informationComplexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks
Journal of Comuting and Information Technology - CIT 8, 2000, 1, 1 12 1 Comlexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Eunice E. Santos Deartment of Electrical
More informationA GPU Heterogeneous Cluster Scheduling Model for Preventing Temperature Heat Island
A GPU Heterogeneous Cluster Scheduling Model for Preventing Temerature Heat Island Yun-Peng CAO 1,2,a and Hai-Feng WANG 1,2 1 School of Information Science and Engineering, Linyi University, Linyi Shandong,
More informationA Morphological LiDAR Points Cloud Filtering Method based on GPGPU
A Morhological LiDAR Points Cloud Filtering Method based on GPGPU Shuo Li 1, Hui Wang 1, Qiuhe Ma 1 and Xuan Zha 2 1 Zhengzhou Institute of Surveying & Maing, No.66, Longhai Middle Road, Zhengzhou, China
More informationTexture Mapping with Vector Graphics: A Nested Mipmapping Solution
Texture Maing with Vector Grahics: A Nested Mimaing Solution Wei Zhang Yonggao Yang Song Xing Det. of Comuter Science Det. of Comuter Science Det. of Information Systems Prairie View A&M University Prairie
More informationA New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism
A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism Erlin Yao, Mingyu Chen, Rui Wang, Wenli Zhang, Guangming Tan Key Laboratory of Comuter System and Architecture Institute
More informationAn Efficient Coding Method for Coding Region-of-Interest Locations in AVS2
An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China
More informationDetection of Occluded Face Image using Mean Based Weight Matrix and Support Vector Machine
Journal of Comuter Science 8 (7): 1184-1190, 2012 ISSN 1549-3636 2012 Science Publications Detection of Occluded Face Image using Mean Based Weight Matrix and Suort Vector Machine 1 G. Nirmala Priya and
More informationIntroduction to Parallel Algorithms
CS 1762 Fall, 2011 1 Introduction to Parallel Algorithms Introduction to Parallel Algorithms ECE 1762 Algorithms and Data Structures Fall Semester, 2011 1 Preliminaries Since the early 1990s, there has
More information1.5 Case Study. dynamic connectivity quick find quick union improvements applications
. Case Study dynamic connectivity quick find quick union imrovements alications Subtext of today s lecture (and this course) Stes to develoing a usable algorithm. Model the roblem. Find an algorithm to
More informationConstrained Path Optimisation for Underground Mine Layout
Constrained Path Otimisation for Underground Mine Layout M. Brazil P.A. Grossman D.H. Lee J.H. Rubinstein D.A. Thomas N.C. Wormald Abstract The major infrastructure comonent reuired to develo an underground
More informationCross products. p 2 p. p p1 p2. p 1. Line segments The convex combination of two distinct points p1 ( x1, such that for some real number with 0 1,
CHAPTER 33 Comutational Geometry Is the branch of comuter science that studies algorithms for solving geometric roblems. Has alications in many fields, including comuter grahics robotics, VLSI design comuter
More informationI ACCEPT NO RESPONSIBILITY FOR ERRORS ON THIS SHEET. I assume that E = (V ).
1 I ACCEPT NO RESPONSIBILITY FOR ERRORS ON THIS SHEET. I assume that E = (V ). Data structures Sorting Binary heas are imlemented using a hea-ordered balanced binary tree. Binomial heas use a collection
More informationSKIN CANCER LESION CLASSIFICATION USING LBP BASED HYBRID CLASSIFIER
DOI: htt://dx.doi.org/10.26483/ijarcs.v8i7.4469 Volume 8, No. 7, July August 2017 International Journal of Advanced Research in Comuter Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No.
More informationShuigeng Zhou. May 18, 2016 School of Computer Science Fudan University
Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions
More informationRandomized Selection on the Hypercube 1
Randomized Selection on the Hyercube 1 Sanguthevar Rajasekaran Det. of Com. and Info. Science and Engg. University of Florida Gainesville, FL 32611 ABSTRACT In this aer we resent randomized algorithms
More informationEarthenware Reconstruction Based on the Shape Similarity among Potsherds
Original Paer Forma, 16, 77 90, 2001 Earthenware Reconstruction Based on the Shae Similarity among Potsherds Masayoshi KANOH 1, Shohei KATO 2 and Hidenori ITOH 1 1 Nagoya Institute of Technology, Gokiso-cho,
More informationMulticommodity Network Flow - Methods and Applications
Multicommodity Network Flow - Methods and Alications Joe Lindström Linköing University joeli89@student.liu.se Abstract This survey describes the Multicommodity Network Flow roblem, a network flow roblem
More informationBrief Contributions. A Geometric Theorem for Network Design 1 INTRODUCTION
IEEE TRANSACTIONS ON COMPUTERS, VOL. 53, NO., APRIL 00 83 Brief Contributions A Geometric Theorem for Network Design Massimo Franceschetti, Member, IEEE, Matthew Cook, and Jehoshua Bruck, Fellow, IEEE
More informationUPDATING ALGORITHMS FOR CONSTRAINT DELAUNAY TIN
UPDATING ALGORITMS FOR CONSTRAINT DELAUNAY TIN WU LiXin a,b WANG YanBing a, c a Institute for GIS/RS/GPS & Subsidence Engineering Research, China Uni Mining & Technology, Beijing, China, 100083 - awulixin@263.net,
More informationSource Coding and express these numbers in a binary system using M log
Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is
More informationDistributed Estimation from Relative Measurements in Sensor Networks
Distributed Estimation from Relative Measurements in Sensor Networks #Prabir Barooah and João P. Hesanha Abstract We consider the roblem of estimating vectorvalued variables from noisy relative measurements.
More informationUsing Rational Numbers and Parallel Computing to Efficiently Avoid Round-off Errors on Map Simplification
Using Rational Numbers and Parallel Comuting to Efficiently Avoid Round-off Errors on Ma Simlification Maurício G. Grui 1, Salles V. G. de Magalhães 1,2, Marcus V. A. Andrade 1, W. Randolh Franklin 2,
More informationCMSC 425: Lecture 16 Motion Planning: Basic Concepts
: Lecture 16 Motion lanning: Basic Concets eading: Today s material comes from various sources, including AI Game rogramming Wisdom 2 by S. abin and lanning Algorithms by S. M. LaValle (Chats. 4 and 5).
More informationEE678 Application Presentation Content Based Image Retrieval Using Wavelets
EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective
More informationCS649 Sensor Networks IP Track Lecture 6: Graphical Models
CS649 Sensor Networks IP Track Lecture 6: Grahical Models I-Jeng Wang htt://hinrg.cs.jhu.edu/wsn06/ Sring 2006 CS 649 1 Sring 2006 CS 649 2 Grahical Models Grahical Model: grahical reresentation of joint
More informationBuilding Better Nurse Scheduling Algorithms
Building Better Nurse Scheduling Algorithms Annals of Oerations Research, 128, 159-177, 2004. Dr Uwe Aickelin Dr Paul White School of Comuter Science University of the West of England University of Nottingham
More informationExperimental Comparison of Shortest Path Approaches for Timetable Information
Exerimental Comarison of Shortest Path roaches for Timetable Information Evangelia Pyrga Frank Schulz Dorothea Wagner Christos Zaroliagis bstract We consider two aroaches that model timetable information
More informationPrivacy Preserving Moving KNN Queries
Privacy Preserving Moving KNN Queries arxiv:4.76v [cs.db] 4 Ar Tanzima Hashem Lars Kulik Rui Zhang National ICT Australia, Deartment of Comuter Science and Software Engineering University of Melbourne,
More informationA Symmetric FHE Scheme Based on Linear Algebra
A Symmetric FHE Scheme Based on Linear Algebra Iti Sharma University College of Engineering, Comuter Science Deartment. itisharma.uce@gmail.com Abstract FHE is considered to be Holy Grail of cloud comuting.
More informationFace Recognition Using Legendre Moments
Face Recognition Using Legendre Moments Dr.S.Annadurai 1 A.Saradha Professor & Head of CSE & IT Research scholar in CSE Government College of Technology, Government College of Technology, Coimbatore, Tamilnadu,
More informationCollective Communication: Theory, Practice, and Experience. FLAME Working Note #22
Collective Communication: Theory, Practice, and Exerience FLAME Working Note # Ernie Chan Marcel Heimlich Avi Purkayastha Robert van de Geijn Setember, 6 Abstract We discuss the design and high-erformance
More informationLecture 2: Fixed-Radius Near Neighbors and Geometric Basics
structure arises in many alications of geometry. The dual structure, called a Delaunay triangulation also has many interesting roerties. Figure 3: Voronoi diagram and Delaunay triangulation. Search: Geometric
More informationTheoretical Analysis of Graphcut Textures
Theoretical Analysis o Grahcut Textures Xuejie Qin Yee-Hong Yang {xu yang}@cs.ualberta.ca Deartment o omuting Science University o Alberta Abstract Since the aer was ublished in SIGGRAPH 2003 the grahcut
More informationCENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE
CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE Petra Surynková Charles University in Prague, Faculty of Mathematics and Physics, Sokolovská 83,
More informationRobust Real Time Pattern Matching using Bayesian Sequential Hypothesis Testing
Robust Real Time Pattern Matching using Bayesian Sequential Hyothesis Testing Ofir Pele and Michael Werman Abstract This aer describes a method for robust real time attern matching. We first introduce
More informationWeight Co-occurrence based Integrated Color and Intensity Matrix for CBIR
Weight Co-occurrence based Integrated Color and Intensity Matrix for CBIR Megha Agarwal, 2R.P. Maheshwari Indian Institute of Technology Roorkee 247667, Uttarakhand, India meghagarwal29@gmail.com, 2rmaheshwari@gmail.com
More informationGrouping of Patches in Progressive Radiosity
Grouing of Patches in Progressive Radiosity Arjan J.F. Kok * Abstract The radiosity method can be imroved by (adatively) grouing small neighboring atches into grous. Comutations normally done for searate
More informationFuzzy Logic and ANFIS based Image Centroid Tracking and Filtering Schemes
Fuzzy Logic and ANFIS based Image Centroid Tracking and Filtering Schemes Parimala, A., Asstt. Prof., Det. of Telecommunication, MSRIT; Jain University Research Scholar, Bangalore. Raol, J. R., Prof. Emeritus,
More informationJ. Parallel Distrib. Comput.
J. Parallel Distrib. Comut. 71 (2011) 288 301 Contents lists available at ScienceDirect J. Parallel Distrib. Comut. journal homeage: www.elsevier.com/locate/jdc Quality of security adatation in arallel
More information3D Surface Simplification Based on Extended Shape Operator
3D Surface Simlification Based on Extended Shae Oerator JUI-LIG TSEG, YU-HSUA LI Deartment of Comuter Science and Information Engineering, Deartment and Institute of Electrical Engineering Minghsin University
More informationImage Segmentation Using Topological Persistence
Image Segmentation Using Toological Persistence David Letscher and Jason Fritts Saint Louis University Deartment of Mathematics and Comuter Science {letscher, jfritts}@slu.edu Abstract. This aer resents
More information10. Parallel Methods for Data Sorting
10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting... 1 10.1. Parallelizing Princiles... 10.. Scaling Parallel Comutations... 10.3. Bubble Sort...3 10.3.1. Sequential Algorithm...3
More informationMultidimensional Service Weight Sequence Mining based on Cloud Service Utilization in Jyaguchi
Proceedings of the International MultiConference of Engineers and Comuter Scientists 2013 Vol I, Multidimensional Service Weight Sequence Mining based on Cloud Service Utilization in Jyaguchi Shree Krishna
More informationA STUDY ON CALIBRATION OF DIGITAL CAMERA
A STUDY ON CALIBRATION OF DIGITAL CAMERA Ryuji Matsuoka a, *, Kiyonari Fukue a, Kohei Cho a, Haruhisa Shimoda a, Yoshiaki Matsumae a, Kenji Hongo b, Seiju Fujiwara b a Tokai University Research & Information
More informationOptimization of Collective Communication Operations in MPICH
To be ublished in the International Journal of High Performance Comuting Alications, 5. c Sage Publications. Otimization of Collective Communication Oerations in MPICH Rajeev Thakur Rolf Rabenseifner William
More information