Research Article Optimal Configuration of Virtual Links for Avionics Network Systems

Size: px
Start display at page:

Download "Research Article Optimal Configuration of Virtual Links for Avionics Network Systems"

Transcription

1 Iteratioal Joural of Aerospace Egieerig Volume 205, Article ID , 9 pages Research Article Optimal Cofiguratio of Virtual Liks for Avioics Network Systems Dogha A, Kyog Hoo Kim, ad Ki-Il Kim Departmet of Iformatics, Research Ceter for Aerospace Parts Techology, Gyeogsag Natioal Uiversity, Jiju-daero 50, Jiju 660-0, Republic of Korea Correspodece should be addressed to Kyog Hoo Kim; khkim@gu.ac.kr Received 28 Jue 205; Accepted 8 October 205 Academic Editor: Lida L. Vahala Copyright 205 Dogha A et al. This is a ope access article distributed uder the Creative Commos Attributio Licese, which permits urestricted use, distributio, ad reproductio i ay medium, provided the origial work is properly cited. As the badwidth ad scalability costraits become importat desig cocers i airbore etworks, a ew techology, called Avioics Full Duplex Switched Etheret (), has bee itroduced ad stadardized as a part i ARNIC 664. However, sice previous research iterests for are maily bouded for aalyzig the respose time where flows iformatio is give, cofiguratio problem for both Maximum Trasmissio Uit (MTU) ad Badwidth Allocatio Gap (BAG) over virtual liks i etworks has ot bee addressed yet eve though it has great impact o required badwidth. Thus, i this paper, we preset two cofiguratio approaches to set MTU ad BAG values o virtual liks efficietly while meetig the requiremet of. The first is to search available feasible cofiguratio (MTU, BAG) pairs to satisfy applicatio requiremets as well as switch costraits, ad the secod is to get a optimal pair to miimize required badwidth through well-kow brach-ad-boud algorithm. We aalyze the complexity of the proposed algorithm ad the evaluate the proposed algorithm by simulatio. Fially, we prove that the proposed schemes are superior to geeral approach i the aspects of speed ad required badwidth i etworks.. Itroductio Due to icreasig demads i Aircraft Data Networks (ADNs), such as high available badwidth, miimum wirig to reduce the weight, ad low developmet cost, typical commuicatios techologies are expected to be replaced by ew oe.iotherwords,sicearnic429,mil-std-553,ad ARNIC 629 caot accommodate the metioed demads completely, a ew techology, called Avioics Full Duplex Switched Etheret (), has bee implemeted ad the stadardizedforewadn[ 3].Asaewtechologyfor ADN, reliable ad determiistic property as well as implemetatiocostshouldbecosidered.asaresult,was itroduced ad recetly deployed i data etworks o the Airbus 380 aircraft. I the poit of techical issue, the follows origial Etheret for compatibility ad scalability properties ad exteds it to esure determiistic behavior ad high reliability. I order to comply with the striget requiremets of ADNs as well as esurig them, two ew fuctios areitroducedadimplemetedi.oeistraffic cotrol by guarateeig the badwidth of each applicatio, ad the other is duplicated trasmissio for reliability alog dual redudat chaels. While the former aims to boud the jitter ad trasmit latecy withi the deadlie, the latter trasmits the same data stream over disjoit etworks cocurretly. To achieve this goal, virtual liks are itroduced ad created for each (source, destiatio) pair i. By cotrollig these virtual liks, determiistic behaviors are completely guarateed. Thus, determiig flows for the same virtual lik ad its properties become the etwork desiger s great task whe it comes to cofigurig etworks. Two parameters of virtual liks i AFDEX etworks are importat i terms of real-time requiremets: BAG (Badwidth Allocatio Gap) ad MTU (Maximum Trasfer Uit). BAG is the time duratio or period betwee two cosecutive frames, where the value of BAG is ad 28 msec i a form of power of 2. MTU is the size of message i each frame. Thus, the cofiguratio problem is to determie these two parameters of each virtual lik without missig the deadlie.

2 2 Iteratioal Joural of Aerospace Egieerig I [4], they provided several algorithms ad itegerliear programmig formulatio i order to solve the trasmissio parameters of virtual liks as well as data routig over liks i the AFDEX etworks. They provided optimal solutios to miimize reserved badwidth as well as actually cosumed badwidth, respectively. I [5], modelig method for frame maagemet was itroduced to ascertai the reliability properties of desig. Aother importat property of, reliability through redudat trasmissios, was aalyzed by formal method i [6]. Aother related work is to aalyze the system metric such as respose time of etworks. I [], they applied etwork calculus, queuig etworks simulatio ad model checkig ito evaluatig boudig ed-to-ed delays o etworks. I [8], they showed that Trajectory approach which aalyzes the worst-case delays throughout message flows outperforms the etwork calculus method uder idustrial cofiguratio. I [9], they obtai worst-case latecy ad output jitter for the etwork messages by defiig a realtime model for a commuicatios etwork based o. Aother approach i [0] is performace evaluatio system through simulatio with popular NS-2 ad aalysis of impact of several system parameters such as schedulig algorithm. Sicemostofexistigresearchworkhasassumedthe precofigured etworks i advace, cofiguratio problem should be metioed prior to deploymet. To achieve this goal,ithispaper,wefocusotwomaiproblems:(i) fidig feasible BAG ad MTU parameters of virtual liks i a switch for give virtual liks of messages ad (ii) providig a optimal solutio i feasible pairs to miimize the total badwidth. We defie two problems formallyadthesolvetheproblemsusigthebrach-adboud techique. While our earlier work [] oly provided a algorithm to solve the first problem, this paper improves ad exteds it to iclude optimal solutio for the purpose of miimizig the total badwidth. Fially, complexity of the proposed scheme ad experimetal results through diverse simulatio scearios are give to demostrate the suitability of the proposed scheme. The rest of this paper is orgaized as follows. The system model ad the problem defiitio are provided i Sectio 2. The solutio of a feasible cofiguratio problem is dealt with i Sectios 3 ad 4, while the optimal algorithm is provided i Sectio 5. Performace evaluatios are show i Sectio 6. Fially, coclusio ad further work followed i Sectio. 2. System Model ad Problem Defiitio 2.. System Model. I this paper, we assume that a avioics system is composed of may computig or sesig uits ad etwork switches to coect other computig uits. Thus, a message is uiquely defied by UDP source ad destiatio ports, as show i Figure. Sie we focus o real-time messages, a message flow f i is defied by (l i, p i ), where l i is the payload of the message i bytes ad p i is Message Trasmit Cycle (MTC) of the message i msec. That is, a message of l i bytes is geerated every p i time uits ad is delivered to the destiatio applicatio. The basic commuicatio uit i AFDEX etworks is defied as a virtual lik (VL). For example, Figure shows three virtual liks amog LRUs. These virtual liks sharig physical liks are scheduled i etwork switches. Furthermore, multiple applicatios trasmit real-time messages throughout a commo virtual lik if their source ad destiatio uits are the same. I the example of Figure, two applicatio messages are shared i the virtual lik VL 3. There are two importat parameters i a virtual lik. The first is Badwidth Allocatio Gap (BAG) to specify a periodic frame. I switches, a BAG is defied by a value of 2 k msec, where k = 0,,...,.AsallBAGsare2 k msec, virtual liks are multiplexed i switches. The secod parameter is Maximum Trasfer Uit (MTU) of the message i bytes at each frame. Payloads of applicatios i a virtual lik are trasmitted withi maximum MTU bytes i a sigle frame. If the size of a payload is greater tha the MTU, it is fragmeted ito multiple frames. Therefore, a virtual lik VL i is defied by (BAG i,mtu i, F i ) as follows: (i) BAG i : Badwidth Allocatio Gap or period of VL i i avalueof2 k msec where,,...,. (ii) MTU i : maximum trasfer uit or message size of VL i i bytes. (iii) F i : a set of message flows i VL i,wherethejth message flow is deoted as f i,j =(l i,j,p i,j ) Problem Defiitio. For a give virtual lik VL i,mtu ad BAG are cofigured so as to meet all the real-time requiremets of message flows i the lik. If the payload of amessageisgreaterthathemtusize,itistrasmitted i multiple fragmeted packets. Sice all BAGs of VLs are harmoic, the schedulability aalysis is easily derived by utilizatio aalysis. Thus, () tells the message costrait of VL i with i messages to guaratee the real-time requiremet of all message flows i the lik [2]: i j= l i,j /MTU i p i,j BAG i. () Let us assume that the system has N VLs o a switch with B badwidth i bps. Each VL i is cofigured with (MTU i,bag i ), so that MTU i bytes are trasmitted every BAG i msec. I additio, each VL message requires the overhead of 6 bytes as show i Figure 2. Sice the total badwidth of VLs should ot exceed the etwork badwidth, the followig badwidth costrait should be met: i= 8 MTU i +6 BAG i 0 3 B. (2) The last costrait of virtual lik schedulig is about jitter. The maximum allowed jitter o each virtual lik i

3 Iteratioal Joural of Aerospace Egieerig 3 port LRU Partitio Partitio 2 port port port IP 0 UDP IP 20 UDP IP 0 UDP IP 20 UDP MAC 0 VL VL 3 VL 2 LRU 2 switch LRU 3 MAC MAC 3 MAC 2 IP UDP IP 3 UDP 2 IP 3 UDP 2 IP 2 UDP port port port port Partitio Partitio Figure : A example of virtual liks i a switch. Preamble bytes SFD byte MAC destiatio 6 bytes MAC source 6 bytes Type IPv4 2 bytes IP header 20 bytes UDP header 8 bytes payload bytes Paddig 0 6 bytes SN byte FCS 4 bytes IFG 2 bytes Overhead (50 bytes) payload Overhead ( bytes) Figure 2: The frame structure ad its overhead. the ARINC 664 specificatio requires 500 μsec [2]. Thus, the followig equatio tells the jitter costrait, where 40 μsec is the typical techological jitter i hardware level to trasmit a Etheret frame: i= (6 + MTU i) 500. (3) B I this paper, we defie two problems related to cofiguratio of virtual liks of a switch. The first problem is to fid a feasible cofiguratio of BAG ad MTU pairs of virtual liks, which satisfies three costraits of (), (2), ad (3). This is useful ad importat whe a admiistrator fids a feasible cofiguratio of a give set of real-time messages i the switch. The followig tells the formal defiitio of the problem. Defiitio. For a give set of virtual liks V = {VL i i =,...,N}, the problem of -CONF is to determie (BAG i,mtu i ) of each VL i so as to satisfy three costraits of (), (2), ad (3), where BAG i {, 2, 4, 8, 6, 32, 64, 28} ad MTU i {,2,...,4}. The secod oe is to fid a optimal cofiguratio of virtual liks for the purpose of miimizig the total badwidth. The badwidth remaiig after reservig real-time flows is geerally used for o-real-time etwork traffic. Thus, it is importat to fid a cofiguratio with the least badwidth as

4 4 Iteratioal Joural of Aerospace Egieerig Algorithm Fid Feasible BAG MTU (VL i ) () N step (2) for each message f i,j i VL i do (3) frag l i,j /( l i,j /p i,j ) (4) while frag do (3) m l i,j /frag (5) N step N step {m} (6) frag frag () edwhile (8) edfor (9) for k from 0 to do (0) MTU i,k 0 () MTU i,k the least m N step s.t. i j= ( l i,j/m /p i,j ) /2 k (2) edfor Algorithm : Algorithm of feasible BAG ad MTU pairs of a VL. log as the cofiguratio is feasible. The followig tells the secod problem defiitio. Defiitio 2. For a give set of virtual liks V = {VL i i =,...,N},theproblemof-BOPT is to fid (BAG i, MTU i ) of each VL i so as to miimize the total badwidth ad satisfy three costraits of (), (2), ad (3), where BAG i {, 2, 4, 8, 6, 32, 64, 28} ad MTU i {,2,...,4}. We solve both problems of -CONF ad - BOPT i two steps. The first step is to fid the list of (BAG i, MTU i ) which guaratees the schedulability of message flows i VL i. Each (BAG i,mtu i )shouldbeselectedsuchthatit satisfies the costrait of () (i Sectio 3). The, we fid the solutio of give virtual liks with cosideratio of two costraits of (2) ad (3) (i Sectios 4 ad 5). 3. Schedulable BAG ad MTU Pairs of a VL I etworks, multiple applicatios should sed their messages to a virtual lik queue i the system, so that the schedulig issue for those messages is required. Let us cosider a virtual lik VL with two message flows of f, (80, 0), f,2 (00, 2) as a example. The values of BAG ad MTU of VL are set to satisfy () i order to meet the realtime requiremet of two messages. The left side of () is show i Figure 3 as a step fuctio, while /BAG is also draw i the figure for differet BAG values. For a give BAG i, there exist may MTUs which satisfy (). For example, whe BAG =,allmtuscabeusedif MTU, as show i Figure 3. Sice a loger MTU size requires more badwidth ad jitter, the smallest value should be selected. Thus, MTU of the example VL is bytes whe BAG is msec. Similarly, MTUs of VL for BAGs with 2 msec ad 4 msec are give by 40 bytes ad 00 bytes i each, as show i Figure 3. WhetheMTUsizeisgreaterthathemaximumpayload size of messages, the required utilizatio is ot chaged. For example, the lower boud of the utilizatio of VL is give by about at MTU = 00. This implies that there is o MTU which guaratees the schedulability of two messages if Utilizatio /MTU /MTU 2 / (BAG =) /2 (BAG =2) /4 (BAG =4) /8 (BAG =8) MTU Figure 3: A example of feasible BAG ad MTU of a virtual lik. BAG is greater tha or equal to 8 msec. Therefore, the feasible solutios (BAG,MTU )ofvl aregiveby(,),(2,40), ad (4, 00). The pseudocode of Algorithm describes how to obtai the set of feasible BAG ad MTU pairs of a give virtual lik VL i. The first part of the algorithm gathers all step itegers at which the utilizatio fuctio begis a ew piecewise costat due to the ceilig fuctio. We deote the set of such step itegers as N step.foreachmessagef i,j,suchsteppoits are derived ad added ito N step (lies 8). The, for each 2 k value, we fid the miimum MTU which satisfies () (lies 9 2). We deote MTU i,k by the feasible MTU i case of BAG i =2 k foravirtuallikvl i.ifthere is o feasible MTU, the MTU i,k =0.Foragive i flows, the time complexity of Algorithm is O( i N step ) sice we have tofidadcheckthefeasibilityateachsteppoitofmessages. 4. Feasible BAG ad MTU Pairs of VLs 4.. Problem Defiitio. The problem of fidig feasible BAG ad MTU pairs of a give set of virtual liks is ot trivial. For

5 Iteratioal Joural of Aerospace Egieerig 5 Flows (f i,j ) Table : A example of virtual liks (B =Mbps). Payload (l i,j ) MTC (p i,j ) VL f, f, Feasible BAG ad MTU pairs s i,k (bag i,k, MTU i,k ) (, 5), (2, 9), (4, ), (8, 34), (6, 6), (32, 200) VL 2 f 2, (, 6), (2, 2), (4, 25), (8, 50), (6, 00), (32, 200) f 2, example, let us cosider the example of two virtual liks of Table where the etwork speed (B) isgivebymbps.for each virtual lik, the feasible BAG ad MTU pairs are derived by Algorithm, as show i the last colum of Table. Now, a ew problem arises about selectig appropriate BAG ad MTU pairs of two virtual liks so as to meet both costraits of (2) ad (3). There are some tradeoffs amog feasible BAG ad MTU pairs of a virtual lik VL i. Solutios with smaller BAG provide less jitter due to smaller MTU size, while they require more badwidth due to overhead of fragmetatio. For example, if we select (, 5) ad(, 6) as (BAG, MTU) of two VLs of Table, it does ot meet the badwidth costrait of (2). O the cotrary, if (2, 9) ad(2, 2) are selected as (BAG, MTU) of two VLs, this cofiguratio does ot meet the jitter costrait of (3). The selectio of (, 5)ad(2, 2)ofVL ad VL 2 satisfies both costraits so that all messages i VLs meet their real-time requiremets. Let us assume that MTU i,k is derived from Algorithm for each i ad k. Ad, let us deote it by X ik = { if BAG ad MTU of VL i are set as 2 k ad MTU i,k i each, { 0 otherwise. { (4) The, the problem of -CONF cabestatedasthe followig liear iteger problem with 8biary variables ad three costraits: to fid X ik subject to i= i= ( ( X ik = X ik MTU i,k +6 ) B 2 k 8000 X ik (6+MTU i,k )) 460 B Algorithm. For give N virtual liks, the exhaustive search of the problem -CONF takes O(8 N ) sice each virtual lik might have maximum eight solutios. I this paper, we provide a ehaced brach-ad-boud algorithm proposed i [] i order to fid a feasible solutio for give N virtual liks with their feasible BAG ad MTU pairs derived byalgorithm.i[],weusedthecumulativebadwidth ad jitter for the pruig coditio. I this work, however, we defie the boud fuctios of badwidth ad jitter for theremaiiglevelsithesearchtreeiordertofid the pruig ode as early as possible. The followig is the pruig coditio ad brach-ad-boud strategy of the proposed algorithm. (i) Pruig Coditio. The pruig coditio is two costraits of (2) ad (3). The algorithm examies whether (5) the solutios i the subset satisfy both costraits by usig the boud fuctio of miimum values of remaiig levels. The algorithm stops the search of the subset which already violates oe of two costraits. (ii) Brach-ad-Boud Strategy. The algorithm searches a feasible solutio i a leaf ode i depth-first-search (DFS) maer. This algorithm fids a feasible solutio whe it reaches ay leaf ode i the search tree. Algorithm 2 fids the set of feasible BAG ad MTU pairs of each virtual lik by callig the fuctio Fid Feasible BAG MTU ( ) proposed i Algorithm (lies, 2). Let us deote σ i by the set of feasible BAG ad MTU pairs (s i,k )ofvirtualliki. The,theboudsofbadwidth ad jitter i virtual lik i are foud by selectig the miimum values (lies 4 ). The fuctio EDFS BadB i Algorithm 2 is the recursive implemetatio at level i i the search tree. Two values of B prev ad J prev are two bouds of badwidth ad jitter of subsolutios from VL i to VL N.Foreachs i,k =(bag i,k, MTU i,k ), two costrais of (2) ad (3) are checked icludig a ew solutio of VL i (lies 4 6). If either of the two costraits is ot satisfied, it is prued. Otherwise, the depth-first-search is cotiued with two updated boud values (lie ). Whe the search reaches a leaf ode, the fuctio returs true (lie 2). The retur value of callig EDFS BadB is true; thefialsolutios is updated as to iclude s i,k (lie 9) ad the fuctio returs true. Thus, the problem of -CONF is solved by Algorithm 2. If the retur value of DFS BadB (B 0, J 0,, S) istrue, a feasible solutio is stored

6 6 Iteratioal Joural of Aerospace Egieerig Algorithm Fid Feasible Cofiguratios (V) / V={VL i i=,...,n} / () for i from to N do (2) call Fid Feasible BAG MTU (VL i ) (3) S (4) for i from to N do (5) B i mi si,k σ i {(MTU i,k + 6)/bag i,k } (6) J i mi si,k σ i {MTU i,k + 6} () edfor (8) B 0 N i= B i (9) J 0 N i= J i (0) result EDFS BadB (B 0,J 0,,S) () retur S Fuctio EDFS BadB (B prev,j prev,i,s) (2) if i=n+the retur true (3) for each s i,k of VL i do (4) B curr B prev B i +(MTU i,k + 6)/bag i,k (5) J curr J prev J i + MTU i,k +6 (6) if B curr B/8000 ad J curr 460 B the () result EDFS BadB (B curr,j curr,i+,s) (8) if result = true the (9) S S {s i,k } (20) retur true (2) edif (22) edif (23) edfor (24) retur false Algorithm2:Theproposedalgorithmfor-CONF. i S. Otherwise, the empty set is retured, which implies o feasible cofiguratio is foud for a give set of virtual liks. 5. Optimal Solutio of BAG ad MTU Pairs for Reducig Badwidth I this sectio, we focus o fidig a optimal cofiguratio of virtual liks i terms of the used badwidth of the cofiguratio. It is importat to miimize the total badwidth of virtual liks for real-time traffic because we ca use the remaiig badwidth for o-real-time etwork traffic i avioics systems. The problem of -CONF fids a feasible solutio which satisfies three costraits of switch as soo as possible, so that it does ot miimize the badwidth. However, -BOPT fids a feasible solutio which miimizes the total badwidth, so that the problem is rewritte as follows: to miimize 8000 subject to i= ( X ik MTU i,k +6 ) 2 k (6) X ik = () i= i= ( ( X ik MTU i,k +6 ) B 2 k 8000 (8) X ik (6 + MTU i,k )) 460 B 8. (9) For example, there are two feasible cofiguratios i Table : {(, 5), (2, 2)} ad {(2, 9), (, 6)} uder the badwidth costrait of Mbps. The first cofiguratio requires 892 kbps, while the secod oe uses 888 kbps. Thus, i this case, {(2, 9), (, 6)} is the optimal cofiguratio of two virtual liks. I order to solve the problem, we provide a brach-adboudalgorithm.theboudfuctioisthesameasoe i Algorithm 2, so that we use the miimum badwidth adjitterforboudvaluesofeachode.thus,thepruig coditio is two costraits of (8) ad (9) usig the boud fuctios. The brach strategy is differet from DFS. Sice thealgorithmfidsaoptimalsolutioassooaspossible, we select a ode with the miimum badwidth boud fuctio ad brach its child odes. The pseudocode of this is show i Algorithm 3. Sice the brach-ad-boud techique searches all possible cases i the worst-case, the time complexity of Algorithm 3 is O(2 N ) for give N virtual liks. I Algorithm 3, a ode has four data: ode.level for the ode level, ode.b for the badwidth boud, ode.j for the jitter boud, ad ode.s for the selected cofiguratio from theroottotheode.weuseapriority-queueformaagig live odes i the order of badwidth boud. The fuctio isert ode i Q (i, B, J, S) makesaodewithfourdata ad iserts it ito the priority queue. The, the fuctio get first i Q ( ) returs the miimum-badwidth ode i curretly live odes i the queue. Whe the algorithm reaches a leaf ode (lie 2), it fids a optimal solutio ad returs the cofiguratio (lie 3). The brach strategy is implemeted by the priority queue. The fuctio call of get first i Q () selects such ode to brach amog live odes. For all child odes of the selected ode, the boud fuctios of badwidth ad jitter are updated (lies 6-). The pruig coditio is checked i lie 8. If a ew child ode is ot prued, it is added i the priority queue (lie 9). The algorithm repeats this procedure utilitfidsaoptimalsolutioorthereisoliveodeithe queue. If there is o feasible cofiguratio for virtual liks, it returs the empty set for otifyig o feasible solutio (lie 22). 6. Performace Evaluatios I this sectio, we show performace evaluatio of the proposed algorithm. First, we evaluate the executio time of the proposed algorithms compared with the brute-force search ad the previous work []. I the experimets, we geerate five virtual liks with two message flows i each virtual lik. The payload of a message is radomly geerated from 20 to 80 bytes. The MTC or period of a message is

7 Iteratioal Joural of Aerospace Egieerig Algorithm Fid Miimum Badwidth Cofiguratio (V) () for i from to N do (2) call Fid Feasible BAG MTU (VL i ) (3) for i from to N do (4) B i log si,k σ i {(MTU i,k + 6)/bag i,k } (5) J i log si,k σ i {MTU i,k + 6} (6) edfor () B 0 N i= B i (8) J 0 N i= J i (9) isert ode i Q (0, B 0,J 0, ); (0) while is empty Q ()=false do () ode get first i Q (); (2) if ode.level = N the (3) retur ode.s; (4) i ode.level + (5) for each s i,k of VL i do (6) B curr ode.b B i +(MTU i,k + 6)/bag i,k () J curr ode.j J i + MTU i,k +6 (8) if B curr B/8000 ad J curr 460 B the (9) isert ode i Q (i, B curr,j curr,ode.s {s i,k }); (20) edfor (2) edwhile (22) retur Algorithm 3: The Bouded BFS BadB algorithm Normalized executio time Normalized executio time ~60 60~0 0~60 60~20 20~260 MTC 0~60 60~0 0~60 60~20 20~260 MTC Brute-force DFS EDFS (a) -CONF Brute-force B-DFS EBFS (b) -BOPT Figure 4: Normalized executio times of algorithms. radomly selected amog five differet itervals, as show i Figure 4. The etwork badwidth is set as 6 Mbps. ForeachcaseofFigure4,wegeerate5000radomsets of five virtual liks ad measure the average executio time of algorithms. Figure 4(a) shows the ormalized executio times of the brute-force search, DFS i [], ad EDFS i this paper for solvig -CONF. Similarly, Figure 4(b) shows the performace of the proposed algorithm EBFS compared to the brute-force search ad the modified versio of DFS [] for solvig -BOPT. As show i Figure 4, the proposed algorithms ru much faster tha the exhaustive search algorithm due to the brachad-boud techique. Let us ote that the y-axis i Figure 4 is log-scale value. Table 2 shows the average umber of BAG ad MTU pairs per virtual lik. As the MTCs become larger, the umber of possible solutios of each virtual lik is icreased, which requires more executio time, as show i Figure 4. Sice we use boud fuctios for badwidth ad jitter, the proposed oes are faster tha the previous algorithm i [].

8 8 Iteratioal Joural of Aerospace Egieerig Normalized badwidth ~60 60~0 0~60 60~20 20~260 Normalized executio time MTC Brute-force B-DFS EBFS Number of VLs Figure 5: Badwidth compariso. Table 2: The average umber of BAG ad MTU pairs per VL. BF DFS EDFS (a) -CONF MTC BAG ad MTU pairs per VL Next, we compared the badwidth reserved by the solutios of -BOPT with feasible solutios of -CONF. AsshowiFigure5,theproposedalgorithmfor- BOPT reduces much badwidth, so that the remaiig badwidth ca be used for other o-real-time etwork traffic. We also aalyzed the effect of algorithm executio times i terms of the umber of virtual liks. I Figure 6, we icreased the umber of virtual liks from to 6, where each virtual lik icludes two messages. As show i Figure 6, the executio time of brute-force search icreases expoetially sice the search space is O(2 N ).Letusotethaty-axis i Figure 6 is log-scale. Although the time complexity of the proposed algorithm is O(2 N ),bothedfs ad EBFS are much faster tha the previous algorithms i []. This is maily becauseweuseefficietboudfuctiosithealgorithms. The executio time of EBFS i case of 6 virtual liks is decreased sice the algorithm decides that there is o solutio i the upper-layer of solutio trees. Normalized executio time BF B-DFS EBFS Number of VLs (b) -BOPT Figure 6: Normalized executio times with respect to the umber of virtual liks.. Coclusios I this paper, we provided a efficiet algorithm to fid feasible cofiguratio of a switch for the purpose of meetig the real-time requiremets of all messages i avioics. Two importat parameters of BAG ad MTU of virtual liks are cosidered i the cofiguratio problem. The proposed algorithm is based o brach-ad-boud techique so that the simulatio results show that it is faster tha the exhaustive search algorithm of the previous work. We also provide a optimal solutio of the problem for the purpose of reducig the total badwidth of cofiguratio. Throughout simulatios, we showed that the algorithm rus fastadreducesmuchbadwidthcomparedwiththealgorithmtofidafeasibleset.theproposedalgorithmisuseful whe the remaiig badwidth for real-time traffic is used for other etwork traffic. Sice the etwork cofiguratio becomes a importat issue i avioics systems, we will ivestigate may problems based o the results of this paper. For example, we will exted the problem ito multiple switches or discuss the routig issues through the etworks.

9 Iteratioal Joural of Aerospace Egieerig 9 Coflict of Iterests The authors declare that there is o coflict of iterests regardig the publicatio of this paper. Ackowledgmets This work was supported by Basic Sciece Research Program through the Natioal Research Foudatio of Korea (NRF) fuded by the Miistry of Sciece, ICT & Future Plaig (o. NRF-205RAAA ), ad the BK2 Plus Program (Research Team for Software Platform o Umaed Aerial Vehicle, 2A ) fuded by the Miistry of Educatio (MOE, Korea) ad Natioal Research Foudatio of Korea (NRF). Refereces [] R. L. Alea, J. P. Ossefort, K. I. Laws, A. Goforth, ad F. Figueroa, Commuicatios for itegrated modular avioics, i Proceedigs of the IEEE Aerospace Coferece, pp. 8, IEEE, Big Sky, Mot, USA, March 200. [2] Tutorial, ifokiosk/techsat TUT--EN.pdf. [3] /ARNIC 664 Tutorial, guto/afdx detailed.pdf. [4] A. Al Sheikh, O. Bru, M. Chéramy, ad P.-E. Hladik, Optimal desig of virtual liks i etworks, Real-Time Systems, vol. 49, o. 3, pp , 203. [5] I. Saha ad S. Roy, A fiite state modelig of frame maagemet usig spi, i Formal Methods: Applicatios ad Techology,vol.4346ofLecture Notes i Computer Sciece,pp , Spriger, Berli, Germay, 200. [6] J. Täubrich ad R. vo Haxlede, Formal specificatio ad aalysis of redudacy maagemet algorithms, i Computer Safety, Reliability, ad Security, vol.4680oflecture Notes i Computer Sciece, pp , Spriger, Berli, Germay, 200. [] H. Charara, J.-L. Scharbarg, J. Ermot, ad C. Fraboul, Methods for boudig ed-to-ed delays o a etwork, i Proceedigs of the 8th Euromicro Coferece o Real-Time Systems (ECRTS 06), pp , Dresde, Germay, July [8] M.Tawk,X.Liu,L.Jia,G.Zhu,Y.Savaria,adF.Hu, Optimal schedulig ad delay aalysis for ed systems, SAE Techical Paper , SAE Iteratioal, 20. [9]J.J.Gutierrez,J.C.Palecia,adM.G.Harbour, Respose time aalysis i etworks with sub-virtual liks ad prioritized switches, i XV Joradas de Tiempo Real,Satader, 202. [0] D. Sog, X. Zeg, L. Dig, ad Q. Hu, The desig ad implemetatio of the etwork simulatio system, i Proceedigs of the Iteratioal Coferece o Multimedia Techology (ICMT 0), pp. 4, Nigbo, Chia, October 200. [] D. A, H. W. Jeo, K. H. Kim, ad K. I. Kim, A feasible cofiguratio of etworks for real-time flows i avioics systems, i Proceedigs of the Iteratioal Workshop o Real- Time ad Distributed Computig i Emergig Applicatios (REACTION 3), Vacouver, Caada, Decebmer 203.

10 Iteratioal Joural of Rotatig Machiery Egieerig Joural of The Scietific World Joural Iteratioal Joural of Distributed Sesor Networks Joural of Sesors Joural of Cotrol Sciece ad Egieerig Advaces i Civil Egieerig Submit your mauscripts at Joural of Joural of Electrical ad Computer Egieerig Robotics VLSI Desig Advaces i OptoElectroics Iteratioal Joural of Navigatio ad Observatio Chemical Egieerig Active ad Passive Electroic Compoets Ateas ad Propagatio Aerospace Egieerig Iteratioal Joural of Iteratioal Joural of Iteratioal Joural of Modellig & Simulatio i Egieerig Shock ad Vibratio Advaces i Acoustics ad Vibratio

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute

More information

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis IOSR Joural of Egieerig Redudacy Allocatio for Series Parallel Systems with Multiple Costraits ad Sesitivity Aalysis S. V. Suresh Babu, D.Maheswar 2, G. Ragaath 3 Y.Viaya Kumar d G.Sakaraiah e (Mechaical

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules

More information

Counting the Number of Minimum Roman Dominating Functions of a Graph

Counting the Number of Minimum Roman Dominating Functions of a Graph Coutig the Number of Miimum Roma Domiatig Fuctios of a Graph SHI ZHENG ad KOH KHEE MENG, Natioal Uiversity of Sigapore We provide two algorithms coutig the umber of miimum Roma domiatig fuctios of a graph

More information

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem Exact Miimum Lower Boud Algorithm for Travelig Salesma Problem Mohamed Eleiche GeoTiba Systems mohamed.eleiche@gmail.com Abstract The miimum-travel-cost algorithm is a dyamic programmig algorithm to compute

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers * Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured

More information

A Polynomial Interval Shortest-Route Algorithm for Acyclic Network

A Polynomial Interval Shortest-Route Algorithm for Acyclic Network A Polyomial Iterval Shortest-Route Algorithm for Acyclic Network Hossai M Akter Key words: Iterval; iterval shortest-route problem; iterval algorithm; ucertaity Abstract A method ad algorithm is preseted

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

Relay Placement Based on Divide-and-Conquer

Relay Placement Based on Divide-and-Conquer Relay Placemet Based o Divide-ad-Coquer Ravabakhsh Akhlaghiia, Azadeh Kaviafar, ad Mohamad Javad Rostami, Member, IACSIT Abstract I this paper, we defie a relay placemet problem to cover a large umber

More information

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach Performace Aalysis of Multiclass FIFO: Motivatio, Difficulty ad a Network alculus Approach Yumig Jiag Norwegia Uiversity of Sciece ad Techology (NTNU) 1 19 March 2014, 2d Workshop o Network alculus, Bamberg,

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

On (K t e)-saturated Graphs

On (K t e)-saturated Graphs Noame mauscript No. (will be iserted by the editor O (K t e-saturated Graphs Jessica Fuller Roald J. Gould the date of receipt ad acceptace should be iserted later Abstract Give a graph H, we say a graph

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations Applied Mathematical Scieces, Vol. 1, 2007, o. 25, 1203-1215 A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045, Oe

More information

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process Vol.133 (Iformatio Techology ad Computer Sciece 016), pp.85-89 http://dx.doi.org/10.1457/astl.016. Euclidea Distace Based Feature Selectio for Fault Detectio Predictio Model i Semicoductor Maufacturig

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045 Oe Brookigs Drive St. Louis, Missouri 63130-4899, USA jaegerg@cse.wustl.edu

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

An Algorithm to Solve Multi-Objective Assignment. Problem Using Interactive Fuzzy. Goal Programming Approach

An Algorithm to Solve Multi-Objective Assignment. Problem Using Interactive Fuzzy. Goal Programming Approach It. J. Cotemp. Math. Scieces, Vol. 6, 0, o. 34, 65-66 A Algorm to Solve Multi-Objective Assigmet Problem Usig Iteractive Fuzzy Goal Programmig Approach P. K. De ad Bharti Yadav Departmet of Mathematics

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

A Generalized Set Theoretic Approach for Time and Space Complexity Analysis of Algorithms and Functions

A Generalized Set Theoretic Approach for Time and Space Complexity Analysis of Algorithms and Functions Proceedigs of the 10th WSEAS Iteratioal Coferece o APPLIED MATHEMATICS, Dallas, Texas, USA, November 1-3, 2006 316 A Geeralized Set Theoretic Approach for Time ad Space Complexity Aalysis of Algorithms

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

A Note on Least-norm Solution of Global WireWarping

A Note on Least-norm Solution of Global WireWarping A Note o Least-orm Solutio of Global WireWarpig Charlie C. L. Wag Departmet of Mechaical ad Automatio Egieerig The Chiese Uiversity of Hog Kog Shati, N.T., Hog Kog E-mail: cwag@mae.cuhk.edu.hk Abstract

More information

Solving Fuzzy Assignment Problem Using Fourier Elimination Method

Solving Fuzzy Assignment Problem Using Fourier Elimination Method Global Joural of Pure ad Applied Mathematics. ISSN 0973-768 Volume 3, Number 2 (207), pp. 453-462 Research Idia Publicatios http://www.ripublicatio.com Solvig Fuzzy Assigmet Problem Usig Fourier Elimiatio

More information

Cubic Polynomial Curves with a Shape Parameter

Cubic Polynomial Curves with a Shape Parameter roceedigs of the th WSEAS Iteratioal Coferece o Robotics Cotrol ad Maufacturig Techology Hagzhou Chia April -8 00 (pp5-70) Cubic olyomial Curves with a Shape arameter MO GUOLIANG ZHAO YANAN Iformatio ad

More information

A Study on the Performance of Cholesky-Factorization using MPI

A Study on the Performance of Cholesky-Factorization using MPI A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y

More information

Enhancing Cloud Computing Scheduling based on Queuing Models

Enhancing Cloud Computing Scheduling based on Queuing Models Ehacig Cloud Computig Schedulig based o Queuig Models Mohamed Eisa Computer Sciece Departmet, Port Said Uiversity, 42526 Port Said, Egypt E. I. Esedimy Computer Sciece Departmet, Masoura Uiversity, Masoura,

More information

IS-IS in Detail. ISP Workshops

IS-IS in Detail. ISP Workshops IS-IS i Detail ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 27 th November

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged

More information

Computational Geometry

Computational Geometry Computatioal Geometry Chapter 4 Liear programmig Duality Smallest eclosig disk O the Ageda Liear Programmig Slides courtesy of Craig Gotsma 4. 4. Liear Programmig - Example Defie: (amout amout cosumed

More information

On Nonblocking Folded-Clos Networks in Computer Communication Environments

On Nonblocking Folded-Clos Networks in Computer Communication Environments O Noblockig Folded-Clos Networks i Computer Commuicatio Eviromets Xi Yua Departmet of Computer Sciece, Florida State Uiversity, Tallahassee, FL 3306 xyua@cs.fsu.edu Abstract Folded-Clos etworks, also referred

More information

Dynamic Programming and Curve Fitting Based Road Boundary Detection

Dynamic Programming and Curve Fitting Based Road Boundary Detection Dyamic Programmig ad Curve Fittig Based Road Boudary Detectio SHYAM PRASAD ADHIKARI, HYONGSUK KIM, Divisio of Electroics ad Iformatio Egieerig Chobuk Natioal Uiversity 664-4 Ga Deokji-Dog Jeoju-City Jeobuk

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

COSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1

COSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1 COSC 1P03 Ch 7 Recursio Itroductio to Data Structures 8.1 COSC 1P03 Recursio Recursio I Mathematics factorial Fiboacci umbers defie ifiite set with fiite defiitio I Computer Sciece sytax rules fiite defiitio,

More information

BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM

BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM MATEC Web of Cofereces 79, 01014 (016) DOI: 10.1051/ mateccof/0167901014 T 016 BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM Staislav Shidlovskiy 1, 1 Natioal Research

More information

Accuracy Improvement in Camera Calibration

Accuracy Improvement in Camera Calibration Accuracy Improvemet i Camera Calibratio FaJie L Qi Zag ad Reihard Klette CITR, Computer Sciece Departmet The Uiversity of Aucklad Tamaki Campus, Aucklad, New Zealad fli006, qza001@ec.aucklad.ac.z r.klette@aucklad.ac.z

More information

Heaps. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015

Heaps. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 201 Heaps 201 Goodrich ad Tamassia xkcd. http://xkcd.com/83/. Tree. Used with permissio uder

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

Relationship between augmented eccentric connectivity index and some other graph invariants

Relationship between augmented eccentric connectivity index and some other graph invariants Iteratioal Joural of Advaced Mathematical Scieces, () (03) 6-3 Sciece Publishig Corporatio wwwsciecepubcocom/idexphp/ijams Relatioship betwee augmeted eccetric coectivity idex ad some other graph ivariats

More information

GTS Scheduling Scheme for Real-Time Communication in IEEE Industrial Wireless Sensor Networks

GTS Scheduling Scheme for Real-Time Communication in IEEE Industrial Wireless Sensor Networks Idia Joural of Sciece ad Techology, Vol 9(7), DOI:.7485/ijst/6/v9i7/87734, February 6 ISSN (Prit) : 974-6846 ISSN (Olie) : 974-5645 GTS Schedulig Scheme for Real-Time Commuicatio i IEEE8.5.4 Idustrial

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme Improvig Iformatio Retrieval System Security via a Optimal Maximal Codig Scheme Dogyag Log Departmet of Computer Sciece, City Uiversity of Hog Kog, 8 Tat Chee Aveue Kowloo, Hog Kog SAR, PRC dylog@cs.cityu.edu.hk

More information

Guaranteeing Hard Real Time End-to-End Communications Deadlines

Guaranteeing Hard Real Time End-to-End Communications Deadlines Guarateeig Hard Real Time Ed-to-Ed Commuicatios Deadlies K. W. Tidell A. Burs A. J. Welligs Real Time Systems Research Group Departmet of Computer Sciece Uiversity of York e-mail: ke@mister.york.ac.uk

More information

arxiv: v2 [cs.ds] 24 Mar 2018

arxiv: v2 [cs.ds] 24 Mar 2018 Similar Elemets ad Metric Labelig o Complete Graphs arxiv:1803.08037v [cs.ds] 4 Mar 018 Pedro F. Felzeszwalb Brow Uiversity Providece, RI, USA pff@brow.edu March 8, 018 We cosider a problem that ivolves

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

condition w i B i S maximum u i

condition w i B i S maximum u i ecture 10 Dyamic Programmig 10.1 Kapsack Problem November 1, 2004 ecturer: Kamal Jai Notes: Tobias Holgers We are give a set of items U = {a 1, a 2,..., a }. Each item has a weight w i Z + ad a utility

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems

More information

An Algorithm to Solve Fuzzy Trapezoidal Transshipment Problem

An Algorithm to Solve Fuzzy Trapezoidal Transshipment Problem Iteratioal Joural of Systems Sciece ad Applied Mathematics 206; (4): 58-62 http://www.sciecepublishiggroup.com/j/ssam doi: 0.648/j.ssam.206004.4 A Algorithm to Solve Fuzzy Trapezoidal Trasshipmet Problem

More information

Ontology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection

Ontology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection 2017 Asia-Pacific Egieerig ad Techology Coferece (APETC 2017) ISBN: 978-1-60595-443-1 Otology-based Decisio Support System with Aalytic Hierarchy Process for Tour Pacage Selectio Tie-We Sug, Chia-Jug Lee,

More information

Lecture 5. Counting Sort / Radix Sort

Lecture 5. Counting Sort / Radix Sort Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018

More information

Mobile terminal 3D image reconstruction program development based on Android Lin Qinhua

Mobile terminal 3D image reconstruction program development based on Android Lin Qinhua Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 05) Mobile termial 3D image recostructio program developmet based o Adroid Li Qihua Sichua Iformatio Techology College

More information

1 Enterprise Modeler

1 Enterprise Modeler 1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio

More information

4-Prime cordiality of some cycle related graphs

4-Prime cordiality of some cycle related graphs Available at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 193-9466 Vol. 1, Issue 1 (Jue 017), pp. 30 40 Applicatios ad Applied Mathematics: A Iteratioal Joural (AAM) 4-Prime cordiality of some cycle related

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

A Parallel DFA Minimization Algorithm

A Parallel DFA Minimization Algorithm A Parallel DFA Miimizatio Algorithm Ambuj Tewari, Utkarsh Srivastava, ad P. Gupta Departmet of Computer Sciece & Egieerig Idia Istitute of Techology Kapur Kapur 208 016,INDIA pg@iitk.ac.i Abstract. I this

More information

BASED ON ITERATIVE ERROR-CORRECTION

BASED ON ITERATIVE ERROR-CORRECTION A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity

More information

GPUMP: a Multiple-Precision Integer Library for GPUs

GPUMP: a Multiple-Precision Integer Library for GPUs GPUMP: a Multiple-Precisio Iteger Library for GPUs Kaiyog Zhao ad Xiaowe Chu Departmet of Computer Sciece, Hog Kog Baptist Uiversity Hog Kog, P. R. Chia Email: {kyzhao, chxw}@comp.hkbu.edu.hk Abstract

More information

DESIGN AND ANALYSIS OF LDPC DECODERS FOR SOFTWARE DEFINED RADIO

DESIGN AND ANALYSIS OF LDPC DECODERS FOR SOFTWARE DEFINED RADIO DESIGN AND ANALYSIS OF LDPC DECODERS FOR SOFTWARE DEFINED RADIO Sagwo Seo, Trevor Mudge Advaced Computer Architecture Laboratory Uiversity of Michiga at A Arbor {swseo, tm}@umich.edu Yumig Zhu, Chaitali

More information

Calculation and Simulation of Transmission Reliability in Wireless Sensor Network Based on Network Coding

Calculation and Simulation of Transmission Reliability in Wireless Sensor Network Based on Network Coding Calculatio ad Simulatio of Trasmissio Reliability i Wireless Sesor Network Based o Network Codig https://doi.org/0.399/ijoe.v3i2.7883 Zhifu Lua Weifag Uiversity of Sciece ad Techology, Weifag, Chia 92268476@qq.com

More information

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1 Adaptive Graph Partitioig Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, ad W. J. Dewar 1 1 School of Electrical Egieerig Uiversity of New South Wales, Australia 2 Divisio of Radiophysics

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 9, 85-0 (2003) Evaluatio of Distributed ad Replicated HLR for Locatio Maagemet i PCS Network Departmet of Computer Sciece ad Iformatio Egieerig Natioal Chiao

More information

Hashing Functions Performance in Packet Classification

Hashing Functions Performance in Packet Classification Hashig Fuctios Performace i Packet Classificatio Mahmood Ahmadi ad Stepha Wog Computer Egieerig Laboratory Faculty of Electrical Egieerig, Mathematics ad Computer Sciece Delft Uiversity of Techology {mahmadi,

More information

Chapter 5. Functions for All Subtasks. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 5. Functions for All Subtasks. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 5 Fuctios for All Subtasks Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 5.1 void Fuctios 5.2 Call-By-Referece Parameters 5.3 Usig Procedural Abstractio 5.4 Testig ad Debuggig

More information

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods.

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods. Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig

More information

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,

More information

Σ P(i) ( depth T (K i ) + 1),

Σ P(i) ( depth T (K i ) + 1), EECS 3101 York Uiversity Istructor: Ady Mirzaia DYNAMIC PROGRAMMING: OPIMAL SAIC BINARY SEARCH REES his lecture ote describes a applicatio of the dyamic programmig paradigm o computig the optimal static

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,

More information

An Algorithm of Mobile Robot Node Location Based on Wireless Sensor Network

An Algorithm of Mobile Robot Node Location Based on Wireless Sensor Network A Algorithm of Mobile Robot Node Locatio Based o Wireless Sesor Network https://doi.org/0.399/ijoe.v3i05.7044 Peg A Nigbo Uiversity of Techology, Zhejiag, Chia eirxvrp2269@26.com Abstract I the wireless

More information

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects. The

More information

CMSC Computer Architecture Lecture 10: Caches. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 10: Caches. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 10: Caches Prof. Yajig Li Uiversity of Chicago Midterm Recap Overview ad fudametal cocepts ISA Uarch Datapath, cotrol Sigle cycle, multi cycle Pipeliig Basic idea,

More information

Transitioning to BGP

Transitioning to BGP Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April

More information

Data Structures and Algorithms. Analysis of Algorithms

Data Structures and Algorithms. Analysis of Algorithms Data Structures ad Algorithms Aalysis of Algorithms Outlie Ruig time Pseudo-code Big-oh otatio Big-theta otatio Big-omega otatio Asymptotic algorithm aalysis Aalysis of Algorithms Iput Algorithm Output

More information

An upper bound model for TCP and UDP throughput in IPv4 and IPv6

An upper bound model for TCP and UDP throughput in IPv4 and IPv6 ARTICLE IN PRESS Joural of Network ad Computer Applicatios 31 (2008) 585 602 www.elsevier.com/locate/jca A upper boud model for TCP ad UDP throughput i IPv4 ad IPv6 Eric Gamess, Ria Suro s Cetral Uiversity

More information

Master Informatics Eng. 2017/18. A.J.Proença. Memory Hierarchy. (most slides are borrowed) AJProença, Advanced Architectures, MiEI, UMinho, 2017/18 1

Master Informatics Eng. 2017/18. A.J.Proença. Memory Hierarchy. (most slides are borrowed) AJProença, Advanced Architectures, MiEI, UMinho, 2017/18 1 Advaced Architectures Master Iformatics Eg. 2017/18 A.J.Proeça Memory Hierarchy (most slides are borrowed) AJProeça, Advaced Architectures, MiEI, UMiho, 2017/18 1 Itroductio Programmers wat ulimited amouts

More information

Fuzzy Rule Selection by Data Mining Criteria and Genetic Algorithms

Fuzzy Rule Selection by Data Mining Criteria and Genetic Algorithms Fuzzy Rule Selectio by Data Miig Criteria ad Geetic Algorithms Hisao Ishibuchi Dept. of Idustrial Egieerig Osaka Prefecture Uiversity 1-1 Gakue-cho, Sakai, Osaka 599-8531, JAPAN E-mail: hisaoi@ie.osakafu-u.ac.jp

More information

Sectio 4, a prototype project of settig field weight with AHP method is developed ad the experimetal results are aalyzed. Fially, we coclude our work

Sectio 4, a prototype project of settig field weight with AHP method is developed ad the experimetal results are aalyzed. Fially, we coclude our work 200 2d Iteratioal Coferece o Iformatio ad Multimedia Techology (ICIMT 200) IPCSIT vol. 42 (202) (202) IACSIT Press, Sigapore DOI: 0.7763/IPCSIT.202.V42.0 Idex Weight Decisio Based o AHP for Iformatio Retrieval

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time ( 3.1) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step- by- step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information

Analysis of Algorithms

Analysis of Algorithms Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Ruig Time Most algorithms trasform iput objects ito output objects. The

More information

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks Iterferece Aware Chael Assigmet Scheme i Multichael Wireless Mesh Networks Sumyeg Kim Departmet of Computer Software Egieerig Kumoh Natioal Istitute of Techology Gum South Korea Abstract Wireless mesh

More information

Properties and Embeddings of Interconnection Networks Based on the Hexcube

Properties and Embeddings of Interconnection Networks Based on the Hexcube JOURNAL OF INFORMATION PROPERTIES SCIENCE AND AND ENGINEERING EMBEDDINGS OF 16, THE 81-95 HEXCUBE (2000) 81 Short Paper Properties ad Embeddigs of Itercoectio Networks Based o the Hexcube JUNG-SING JWO,

More information

Greedy Algorithms. Interval Scheduling. Greedy Algorithms. Interval scheduling. Greedy Algorithms. Interval Scheduling

Greedy Algorithms. Interval Scheduling. Greedy Algorithms. Interval scheduling. Greedy Algorithms. Interval Scheduling Greedy Algorithms Greedy Algorithms Witer Paul Beame Hard to defie exactly but ca give geeral properties Solutio is built i small steps Decisios o how to build the solutio are made to maximize some criterio

More information

Fuzzy Minimal Solution of Dual Fully Fuzzy Matrix Equations

Fuzzy Minimal Solution of Dual Fully Fuzzy Matrix Equations Iteratioal Coferece o Applied Mathematics, Simulatio ad Modellig (AMSM 2016) Fuzzy Miimal Solutio of Dual Fully Fuzzy Matrix Equatios Dequa Shag1 ad Xiaobi Guo2,* 1 Sciece Courses eachig Departmet, Gasu

More information

EFFECT OF QUERY FORMATION ON WEB SEARCH ENGINE RESULTS

EFFECT OF QUERY FORMATION ON WEB SEARCH ENGINE RESULTS Iteratioal Joural o Natural Laguage Computig (IJNLC) Vol. 2, No., February 203 EFFECT OF QUERY FORMATION ON WEB SEARCH ENGINE RESULTS Raj Kishor Bisht ad Ila Pat Bisht 2 Departmet of Computer Sciece &

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information