Testing Whether a Set of Code Words Satisfies a Given Set of Constraints *

Size: px
Start display at page:

Download "Testing Whether a Set of Code Words Satisfies a Given Set of Constraints *"

Transcription

1 JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG KAO + Department of Computer Science Nationa Tsing Hua University Hsinchu 300, Taiwan E-mai: {bertha, wanchen, peggy, wshih}@rtab.cs.nthu.edu.tw + Department of Eectrica Engineering and Computer Science Northwestern University Evanston 6008, U.S.A. E-mai: ao@northwestern.edu This paper investigates the probem of testing whether a set of code words satisfies certain bioogicay motivated Hamming distance constraints. The paper provides three efficient techniques to verify the code words, namey, the Enumeration, Tabe Looup, and Encoding methods, with appications to the design of DNA words. The Enumeration method enumerates a combinations of positions in a word, so that a the words in a set can be compared simutaneousy and the testing process is improved. The Tabe Looup method constructs a data tabe and divide each word into sub-words to reduce the time compexity of the testing process. The Encoding method which is simiar to Tabe Looup method uses a ined ist to store necessary information in addition. The proposed methods run in O(n) ~ O(og og n) times faster than the naive method when = O(og n), where n is the number of code words in a set and is the ength of a word. Keywords: DNA verification, DNA word design, code word verification, distance constraint, testing agorithm 1. INTRODUCTION The scaabe design of code words has been investigated by many researchers. Huffman [6] presented the we-nown two-pass agorithm to encode variabe-ength source codes. A new one-pass agorithm for constructing dynamic Huffman codes is then proposed in [13]. Yang et a. [14] introduce an efficient code word design method for the shortest common superstring probem which is proved to NP-hard [4]. In recent years, many code word design methods are appied to sove DNA-reated probems [5, 9-11]. For instance, one is for detecting protein-dna-binding sites [9, 10]. A number of different proteins bind into a genome. Some of these DNA-binding proteins ony bind to specific ocations where they have to execute certain functions. Another is for designing error-preventing DNA sequence [5, 11]. The potentia errors in DNA sequence shoud be minimized for reiabe DNA computing. Received March 31, 008; revised May 9, 008; accepted May 15, 008. Communicated by Tsan-sheng Hsu. * A part of the paper has been presented in Nationa Computer Symposium, NCS Dec. 007, Asia University, Taichung, Taiwan. The conference is sponsored by Asia University, Nationa Science Counci, Institute of Information Science of Academia Sinica,..., etc. 333

2 334 HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG KAO In this paper, we study the verification agorithm for designing DNA words. For the DNA word design probem, many agorithms have been deveoped. Marathe et a. [8] used a dynamic programming approach to design DNA sequences based on Hamming distance and free energy. Deaton et a. [3] used genetic search to find good encodings. Arita et a. [1] deveoped a DNA sequence design system using genetic agorithms and random generate-and-test agorithms. Tanaa et a. [1] isted sequence fitness criteria and sequences are generated using simuated anneaing method. Recenty, Kao et a. [7] considered more fitness criteria for DNA sequence design. Since some DNA word design agorithms are randomized, we need a fast verification agorithm to verify whether the output indeed satisfy the given set of constraints. Therefore, we focus on the deveopment of a fast verification agorithm that can determine whether a set of words satisfy a given set of constraints. In this paper, five constraints which are denoted as C 1, C, C 3, C 4, and C 5 are considered and these constraints can be cassified as basic Hamming distance constraint, reverse compement Hamming distance constraint, sef-compementary Hamming distance constraint, and shifting Hamming distance constraint which are proposed in [, 7, 8] for DNA word designs. To verify these constraints for a set of DNA words designed, we propose the three foowing techniques: (1) Enumeration. It enumerates a possibe combinations of + 1 positions in a word, where is the ength of a word and is the parameter for determining whether any two words in the set meet the given constraint. Note that, since the ength of a word is, then the vaue of shoud greater than zero and ess than, otherwise, the verification for DNA words is meaningess. This method determines whether the set of words satisfies the given constraints by checing whether any two sub-words seected from a possibe combinations of + 1 positions in the two words of the set are the same. () Tabe Looup. It first enumerates a possibe sub-words with a fixed ength over a given aphabet and then computes the Hamming distance between any two sub-words in the enumeration for constructing a data tabe. By dividing each word into some sub-words and ooing up the constructed data tabe, the Hamming distance between two words can be obtained. (3) Encoding. It utiizes a tabe and a ined ist for storing some necessary information. It first divides each word into some sub-words with a fixed ength and puts them into different groups. If the sub-words of different words start at the same position in the words, then the sub-words are put into the same group. Each group of sub-words are assigned a unique group ID. By sorting the sub-words in a group, it determines whether any two sub-words are the same. If a group contains two different sub-words, then update the corresponding vaue in the tabe and store the group ID into the corresponding ocation of the ined ist. After that, this method determines whether a set of words satisfies the given constraints by checing the tabe and ined ist. The time compexities of these methods for given constraints are summarized as Tabe 1. Tabe 1. Time compexities of each method for different constraints. Enumeration Tabe Looup Encoding C 1, C min{ 1, 1} On ( *( )* + ) * O( * + n * ) C 3, C min{ 1, 1} 4 On ( *( )* + * ) O( * * + n* * ) C 5 N.A. n** og On ( * * ) On ( * * * ) O ( *og + ) N.A.

3 TESTING CODE WORDS WITH CONSTRAINTS 335 The rest of this paper is organized as foows: Section, provides basic definitions of constraints we dea with. In section 3, we propose Enumeration method to verify the given set of code words under the given constraints. Tabe Looup method and the Encoding method are presented in sections 4 and 5, respectivey. The paper is concuded in section 6.. PRELIMINARIES In this paper we dea a set of words W with two aphabets, namey, the binary aphabet {0, 1} and the DNA aphabet {A, C, G, T}. A given set of words W is assumed to each has ength and et W = n. Let X = x 1 x x denote a word, where x i denotes the ith position in X and is aso caed a character of X. X denotes the ength of X, i.e., X =. Let X[i..j] = x i x i+1 x j denote a sub-word of X, 1 i j. If i = j, then X[i..i] = X[i] = x i. The reverse of X, denoted by X R, is the word x x -1 x 1, and the sub-word of the reverse of X is denoted by X R [i..j], e.g., X R [1..3] = x x -1 x -. The compement of X, denoted by X C, is the word x 1 C x C x x C, and the sub-word of compement of X is denoted by X C [i..j], where x i C is defined as 0 C = 1 and 1 C = 0, if x i is over the binary aphabet; A C = T, C C = G, G C = C, T C = A, if x i is over the DNA aphabet. The reverse compement of X is the compement of X R, X RC = x C x -1 C x 1 C, and the sub-word of compement of X R is denoted by X RC [i..j], e.g., X RC [1..] = x C x -1 C. Note that, X[i..j] RC, denotes the reverse compement of the sub-word of X, e.g., X[1..] RC = x C x 1 C. Let + be the operation that concatenates any two words X = x 1 x x and Z = z 1 z z i, such that X + Z = x 1 x x z 1 z z i, where i > 0, and X + Z = + i. The Hamming distance between two words X and Y = y 1 y y, which is defined as d(x, Y) = {i x i y i, 1 i }, is the number of positions where X differs from Y. We are interested in verifying a given set of words W satisfies the foowing constraints [7]. Note that the foowing constraints can prevent unwanted hybridization between two DNA standards and each of them is denoted as a function C f ( f ) with a given parameter f : 1. Basic Hamming Distance Constraint ( 1 ): C 1 ( 1 ) = {d(y, X) 1 X, Y W, X Y}.. Reverse Compementary Constraint ( ): C ( ) = {d(y, X RC ) X, Y W, X Y}. 3. Shifting Hamming Constraint ( 3 ): C 3 ( 3 ) = {d(y[1..i], X[( i + 1).. ]) 3 ( i) 1 i, X, Y W, X Y}. 4. Shifting Reverse Compementary Constraint ( 4 ): C 4 ( 4 ) = {d(y[1..i], X[1..i] RC ) 4 ( i); and d(y[( i + 1).. ], X[( i + 1).. ] RC ) 4 ( i) 1 i, X, Y W, X Y}. 5. Shifting Sef Compementary Constraint ( 5 ): C 5 ( 5 ) = {d(y[1..i], Y[1..i] RC ) 5 ( i); and d(y[( i + 1).. ], Y[( i + 1).. ] RC ) 5 ( i) 1 i, Y W}. Note a naive agorithm for testing constraints C 1 and C taes O(n ) time; for testing constraints C 3 and C 4 taes O(n * * ) time; and for testing C 5 taes O(n * * ) time, where is the parameter of the given constraint. In this paper, we propose three techniques for soving the verification of a given set of words. The proposed approaches determine whether a set of words satisfies a set of combinatoria constraints faster than the naive agorithms on severa practica cases such as = O(og n). The first is Enu-

4 336 HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG KAO meration method which can be appied to constraints C 1 C 4. Whie = O(og n) and the og parameters of given constraints are no greater than ( n O og og n ), the time compexity of the Enumeration method is ower than a naive agorithm and the other methods which proposed in here. The second is Tabe Looup method which can be appied to constraints C 1 C 5. The Tabe Looup method is an efficient approach whie = O(og n) and its time compexity is ower than that of a naive agorithm for any constraint if is no greater than O(og n). Finay, the Encoding method can be appied to C 1 C 4 and its time compexity is ower than that of naive agorithm whie the order of is ess than. This method is better than the other methods whie = Ω(og n). The comparison of time compexities between naive agorithms and our techniques is summarized in Tabe. Note that, it is reasonabe to assume = O(og n), since it has been shown that a set of n words of ength O(og n + ) can be generated to fufi the constraints with high probabiity [7]. Tabe. The comparison of time compexities between naive agorithms and our agorithms assuming = O(og n) and ε is any constant ess than1. #1: Using Enumeration method, #: Using Tabe Looup method. og O(og n) ( n O ) O(og og n) O(1) C 1, C C 3, C 4 C 5 og og n naive O(n * og n) O(n * og n) O(n * og n) O(n * og n) ours On ( * og n );# O(n ); #1 O(n 1+ε ); #1 O(n * og n); #1 naive O(n * og n) ours O(n * og n); # naive O(n * og n) ours n*og n og ogn O ( );# og n og og n og n og og n On ( * ) O(n * og n * og og n) O(n * og n) On ( * );#1 O(n 1+ε * og og n); #1 O(n * og n); #1 og n og og n n*og n (og og n) On ( * ) O(n * og n * og og n) O(n * og n) O( );# O(n * og n); # n*og n og og n O ( );# 3. ENUMERATION First, our discussion is based on C 1 constraint and using the binary aphabet. For any two words X and Y in W, our probem is to test whether d(x, Y), where is the given parameter of the corresponding constraint. Our basic idea is that if d(x, Y) <, it means there are at east + 1 positions that the same in X and Y. Hence, we seect any two sub-words with ength + 1 from X and Y respectivey, and then chec if they are the same. If any two sub-words with ength + 1 of X and Y are not the same, then d(x, Y) ; otherwise, d(x, Y) <. There are totay ( + 1) combinations to seect a sub-word with ength + 1 from a word with ength. Without oss of generaity, we assume that any sub-word with ength + 1 of a word with ength is corresponding to a unique combination of + 1 positions in a word. Each combination of + 1 positions in a word is assigned a unique abe p, which is caed pth combination, where p = 1,,, ( + 1), e.g., 1st combination is 1st, nd,, ( + 1)th positions in a word and nd combination is 1st, 3rd,, ( + )th positions in a word. The detai of the Enumeration

5 TESTING CODE WORDS WITH CONSTRAINTS 337 Agorithm 1 Enumeration Agorithm 1. procedure Enumeration (W) {*Output Fai, if the constraint is not satisfied; Success, if the constraint is satisfied *}. for p from 1 to ( + 1) do 3. Let W p = {X 1,p, X,p,, X n,p } contains n sub-words with ength + 1 in W which are seected according to the pth combination, where = 1, X i,p is the sub-word of pth combination of X i, i = 1,,, n; 4. Perform radix sort on W p ; 5. if there are any two sub-words X i,p and X j,p, i j in W p are the same in the sorted resut then 6. return Fai ; 7. end if 8. end for 9. return Success ; 10. end procedure method for C 1 constraint is shown in Agorithm 1 and this agorithm can be easiy extended to dea with C constraint. Here is an exampe to show how to verify a set of words W satisfies C 1 ( 1 ) by Agorithm 1. Assume there are three words X 1 = , X = , and X 3 = in W. For C 1 (5), i.e., 1 = 5, there are ( ) = 70 combinations to seect 3 sub-words with 4 characters, + 1 = = 4, from W. When the combination of positions in a word are 1st, 3rd, 6th and 8th positions, the corresponding sub-words of the 3 words in W are 1100, 1100, 0100 (from X 1, X, and X 3, respectivey). After using radix sort at step 4, we find that two sub-words are equa (i.e., 1100), and therefore W does not satisfy constraint C 1 (5). Theorem 1 Agorithm 1 is correct and its time compexity is O(n * ( ) * min{-1, +1} ), where is the given parameter of the corresponding constraint. Proof: For any two words X and Y, the sub-words of X and Y with ength + 1 are compared in steps -8. If there exists two sub-words with ength + 1 that are equa, there must be at most 1 different positions between the two words. Therefore, it does not satisfy the Hamming distance constraint; otherwise, it does. Hence the agorithm is correct. In Agorithm 1, there are ( + 1) combinations to enumerate a possibe combinations of sub-words with ength + 1 in W. Note that, ( + 1) min{-1, +1}. The sub- words of a given pth combination with ength + 1 in W are using radix sort at step 4 in O(n * ( )) time for each p from 1 to ( + 1). Hence, the tota time compexity of Agorithm 1 is O(n * ( ) * min{-1, +1} ). The Enumeration technique can aso be used to perform testing of C 3 constraint. Note that, if the ength i of any two sub-words is ess than, where = 3, then any two sub-words with ength i must satisfy the Hamming distance constraint, since, ( i) < 0. In other words, the agorithm ony needs dea the case that the ength of a sub-word is greater than. For exampe, testing whether a given set of words W satisfies C 3 constraint, the agorithm ony needs to perform testing on any two words X a [1..i] and X b [(

6 338 HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG KAO i + 1).. ] with ength i, for i = + 1, +,,, where X a, X b W. Without oss of generaity, et W = {X 1, X,, X n } be a given set of words and W[1..i] = {X 1 [1..i], X 1 [( i + 1).. ], X [1..i], X [( i + 1).. ],, X n [1..i], X n [( i + 1).. ]} be a set of sub-words, for i = + 1,,. It is cear to see that W can be verified by using W[1..i] as an input of Agorithm 1, for i from + 1 to. Therefore, according to Theorem 1, the time compexity of testing whether a set of given words satisfies constraint C 3 is O(n * ( ) * min{-1, +1} * ), where is the given parameter of the constraint. Simiary, Agorithm 1 can be extended to dea with C 4 constraint in O(n * ( ) * min{-1, -+1} * ) time, where = TABLE LOOKUP The method, which determines Hamming distance between any two words by ooing up a precomputed tabe, is caed the Tabe Looup method. There are two data structures needed in this method: (1) Information tabe, which records the Hamming distance between any two words in W, is caed INF tabe. There are n entries in the tabe, et (i, j) denote an entry in row i and coumn j in the INF tabe. Let t i,j denote the vaue of the entry i, j in the INF tabe which is the Hamming distance between the two words X i and X j. Note that, the initia vaue of t i,j is zero, for a 1 i, j n. () Comparison tabe, which enumerates a possibe combinations of sub-words of a given ength, and provides the Hamming distance of any two sub-words in the enumeration, is caed CMP tabe. For exampe, Fig. 1 shows Hamming distance of any two sub-words with ength 3 over the binary aphabet. It is obvious to see that there are 3 sub-words in the enumeration and 3 * 3 entries in the CMP tabe, since the ength of a sub-word is 3 and the size of the binary aphabet is. The first step of Tabe Looup method is to enumerate a possibe sub-words over the given aphabet to construct the CMP tabe. Without oss of generaity, we assume that the given aphabet is binary. Note that each entry in the CMP tabe records the Hamming distance between any two sub-words exhaustivey enumerated. Second, divide each word X i W into sub-words X i [a..b] with fixed ength, where a = (g 1) * + 1, b = g *, 1 g. Since each word in W is divided into sub-words with a fixed ength, the ength of sub-words in CMP tabe is equa to, and there are * entries in CMP tabe. Note that, G = {X 1 [a..b], X [a..b],, X n [a..b]} denotes a group of sub-words of W, X i W, 1 i n. Next, compute Hamming distance between any two sub-words X i [a..b] and X j [a..b], i j, in the same group by ooing up the CMP tabe, then update the corresponding entry in the INF tabe. Finay, after a comparison processes are finished, chec the vaue of each entry in the INF tabe. If there exists a vaue ower than the parameter of the given constraint, then report that the given set of words does not satisfy the constraint. The detai of the Tabe Looup method for verifying whether a given set of words W satisfies constraint C 1 is described in Agorithm. Note Agorithm can be easiy extended to verify constraint C on any fixed aphabet. * Theorem Agorithm is correct and its time compexity is O( * + n * ) whie W is over binary aphabet.

7 TESTING CODE WORDS WITH CONSTRAINTS 339 Agorithm Tabe Looup Agorithm 1. procedure Tabe Looup (W) {* Output Fai, if the constraint is not satisfied; Success, if the constraint is satisfied *}. Enumerate a possibe sub-words with ength over the binary aphabet to construct the CMP tabe; 3. for g from 1 to do 4. Let X i,g = X i [((g 1) * + 1)..g * ], i = 1,,, n; 5. for i from 1 to n do 6. for j from 1 to n do 7. Looup the vaue of d(x i,g, X j,g ) from the CMP tabe; 8. Let t i,j = t i,j + d(x i,g, X j,g ); 9. end for 10. end for 11. end for 1. for i from 1 to n do 13. for j from 1 to n do 14. if t i,j < 1, where i j then 15. return Fai ; 16. end if 17. end for 18. end for 19. return Success ; 0. end procedure Proof: Correctness: The CMP tabe records Hamming distance between any two possibe sub-words with a fixed ength. Thus we can compare any two sub-words by examining the CMP tabe. Note that, at step 4, each word is divided into sub-words. From steps 3-11, it is obvious to see that the agorithm compares any two sub-words in the same group. For each group, the agorithm adds corresponding vaues to update INF tabe. After comparing a positions of the word, the cumuative vaues in INF tabe correspond to the Hamming distances of any two words. Therefore, Agorithm is correct. * Time compexity: Step costs O( * ) time to construct CMP tabe, since (1) it taes O( ) time to enumerate a possibe sub-words; () to record any two pairs of a possibe sub-words needs * entries; (3) to determine Hamming distance between two sub-words needs O( ) time. In steps 3-11, it is easy to see that it taes On ( * ) time to update INF tabe, and in steps 1-18 it taes O(n ) time to chec whether the vaue of each entry in INF tabe is ess than the parameter of the given constraint. There- * fore, it taes O( * + n * ) time in tota. * Coroary 3 The time compexity of Agorithm is O( α * + n * ), where α is the size of aphabet. Proof: Simiar to the proof of Theorem, the coroary is true. Here, we give an exampe for iustrating the steps in Agorithm. Assume that there nine words X 1,, X 9 in W with = 9. The CMP tabe constructed at step of Agorithm is shown in Fig. 1, and the first iteration of steps 3-11 is depicted in Fig..

8 340 HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG KAO Fig. 1. Exampe of CMP tabe. Fig.. Iustration of the steps in Tabe Looup Agorithm and resuts in INF tabe. Next, we appy Tabe Looup method to dea with the verification of constraints C 3, C 4, and C 5. We first consider the cases of verifying constraints C 3 and C 4. Unie the cases of verifying constraints C 1 and C, the agorithm proposed here does not divide a word X p into sub-words, and then to compare them with sub-words of X q. Therefore, INF tabe is not needed here. However, it needs to enumerate a possibe words with ength to construct the CMP tabe. In addition, the agorithm extracts two sub-words X p [1..i] and X q [( i + 1).. ] from X p and X q, respectivey, and concatenates a word Y with the sub-words such that P = X p [1..i] + Y, Q = X q [( i + 1).. ] + Y, and P = Q =. By doing so, the Hamming distance between two extracted sub-words of X p and X q can be obtained from the CMP tabe. Then the agorithm determines whether the constraint is satisfied or not. The detai of the agorithm which is caed Tabe_Shift is shown in Agorithm 3. Agorithm 3 focuses on verifying constraint C 3 and can be easiy extended to verify constraint C 4. Theorem 4 Agorithm 3 is correct and its time compexity is O( * * + n * * ). Proof: Simiar to the proof of Theorem, this agorithm is correct. Time compexity of step in Agorithm 3 is O( * * ) and it taes O(n * * ) in steps Therefore, the time compexity of Agorithm 3 is O( * * + n * * ). For the constraint C 5, the sub-words X a [1..i] and X a [( i + 1).. ] of a word X a for i from to have to be compared with their reverse compement X a [1..i] RC and X a [( i + 1).. ] RC, respectivey, where X a W and a = 1,,, n. As step in Agorithm, it

9 TESTING CODE WORDS WITH CONSTRAINTS 341 Agorithm 3 Tabe_Shift Agorithm 1. procedure Tabe_Shift(W) {* Output Fai, if the constraint is not satisfied; Success, if the constraint is satisfied}. Enumerate a possibe words with ength over the binary aphabet to construct the CMP tabe; 3. for i from + 1 to do 4. Let Y = 11 1, where Y = i; 5. for p from 1 to n do 6. for q from 1 to n do 7. Let P = X p [1..i] + Y and Q = X q [( i + 1).. ] + Y; 8. Looup the vaue of d(p, Q) from the CMP tabe; 9. if d(p, Q) < 3 then 10. return Fai ; 11. end if 1. end for 13. end for 14. end for 15. return Success ; 16. end procedure enumerates a possibe sub-words with ength og over the binary aphabet to construct a og og by CMP tabe. As step 7 in Agorithm 3, it concatenates dummy characters to sub-words X a [1..i], X a [1..i] RC, X a [( i + 1).. ], and X a [( i + 1).. ] RC, so that the ength of the varied sub-words is equa to. Note a sub-word concatenates with dummy characters is caed a varied sub-word. Then it divides each varied sub-word into og sub-words with ength og and oos up CMP tabe to determine whether W satisfies constraint C 5. Simiar to the proof of Theorem and Theorem 4, it taes O( * og ) time to construct CMP tabe and the time compexity of verifying constraint C 5 is O( * og + n* * 5. ENCODING ). og In this section, we utiize the Encoding technique to verify whether a set of words satisfies constraints C 1 C 4. We appy two data structures to speed up the checing. (1) INF tabe (Information tabe): the tabe records the Hamming distance between any two words in the given set of words as described in section 4. () NZO ined ist: the main function of NZO ined-ist is to store the group number of two compared sub-words whie the two sub-words are different. NZO ined ist consists of two inds of nodes: Head nodes and Data nodes. Head node stores the abe (i, j) of any two words X i and X j in data fied and a pointer points to Data nodes, where X i, X j W. Therefore, there are n Head nodes in the ist. Note that, the initia vaue in in the fied of Head node is NULL. Data node stores the group ID, which is defined ater, of two compared subwords if the sub-word of X i and the sub-word of X j are different. The NZO ined ist is iustrated in Fig. 3. In this method, first, each word X i W is divided into * sub-words each with ength. These sub-words are denoted as X i,1, X i,,, X where X = X [a..b], i,g i, i, *

10 34 HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG KAO Fig. 3. An iustration of the NZO ined ist. a = (g 1) * + 1, b = g *, 1 g *, and is the parameter of the given con straint. Let G g = {X 1,g, X,g,, X n,g } denote a set of n sub-words, where g is the group ID of G g. Note that, 1 g *. and the tota number of groups is *. Second, using radix sort to sort the sub-words of each group, and then chec if any two sub-words in same group are different. If X i,g and X j,g are different, then update the INF tabe, i.e., t i,j = t i,j + 1, and insert a new Data node with group ID g into the corresponding ocation of the NZO ined ist. Note that the initia vaue of each entry in the INF tabe is 0. Finay, for each entry in the INF tabe, chec if t i,j <. If the vaue t i,j of the entry in the INF tabe is ess than, then scan the corresponding nodes in the NZO ined ist to find the subwords of X i and X j, such that these sub-words are compared again to determine whether d(i, j). To simpify the discussion, et Head(i, j) denote a Head node in which the vaue of data fied is (i, j) and et Data(i, j)[g] denote a Data node, which is ined to Head(i, j) and stores a group ID g in its data fied. The detai of the Encoding method for verifying constraint C 1 is shown in Agorithm 4. The agorithm can easiy be extended to dea with constraint C. We give an exampe to iustrate the steps of Encoding method for verifying constraint C 1. First, we assume that there are eight words, each word has eight bits, and the given parameter =. In steps 3-4, each word is divided into 8* = 4 groups, i.e., G 1,, G 4, as shown in Fig. 4 (a). And Fig. 4 (b) shows the steps 5-13 in the Encoding method. If the vaue of t i, j in INF tabe is ess than, then according to NZO ined ist, we now which sub-words need to be compared again to determine whether the d(i, j). From the INF tabe and NZO ined ist shown in Fig. 5, it is nown that two pairs of sub-words X 1 [1..] and X 3 [1..], X 7 [5..6] and X 3 [5..6] need to be compared again in this exampe. Theorem 5 Agorithm 4 is correct and its time compexity is On ( * * ). Proof: First, we prove the correctness of the agorithm. The vaue in the INF tabe corresponding to two words X i and X j ony be added when the sub-words of X i and X j are different. Therefore, if this vaue is greater or equa to, it means d(x i, X j ) must be greater than or equa to, where is the parameter of the given constraint. Our agorithm checs each entry of the INF tabe to mae sure that any two words satisfy the constraint. However, there may be some entries with vaue ess than, and the sub-words of these entries need to be compared again. To compare those sub-words, the agorithm utiizes the NZO ined ist to eep the information of those sub-words as step 10, such that the sub-words can be easiy extracted from the words. Therefore, our agorithm is correct. Second, we

11 TESTING CODE WORDS WITH CONSTRAINTS 343 Agorithm 4 Encoding Agorithm 1. procedure Encoding (W) {* Output Fai, if the constraint is not satisfied; Success, if the constraint is satisfied *}. for g from 1 to * 1 do 3. Let X i,g = X i [((g 1) * 1).. * + g ], i= 1,, K, n ; Let G g = {X 1,g, X,g,, X n,g }; 5. Perform radix sort on G g ; 6. for i from 1 to n do 7. for j from 1 to n do 8. if X i,g X j,g, where i j then 9. t i,j = t i,j + 1; {* Update INF tabe *} 10. Create a new Data node: Data(i, j)[g] and insert the node into the ocation after Head(i, j) in the NZO ined ist 11. end if 1. end for 13. end for 14. end for 15. for i from 1 to n do 16. for j from 1 to n do 17. if t i,j < 1 then 18. Find the Head node Head(i, j) and et d = 0; 19. whie The in fied of Head(i, j) NULL do 0. Let g be the vaue that stored in the data fied of a Data node, which is ined after Head(i, j), i.e., Data(i, j)[g ], then remove this Data node; 1. Compute Hamming distance between X i,g and X j,g ;. Let d = d + d(x i,g, X j,g ); 3. end whie 4. if d < 1 then 5. return Fai 6. end if 7. end if 8. end for 9. end for 30. return Success 31. end procedure anayze the time compexity of the agorithm. Each word in the set is partitioned into * sub-words each with ength. After radix sort, it compares any two sub-words, and then updates the INF tabe and adds new node into the NZO ined ist. Thus it taes On ( * * ) time in steps -14. If there is any entry in the INF tabe with vaue ess than, then the number of groups which is stored in corresponding ocation of the NZO ined ist must be ess than. Therefore, using information stored in the entries of the NZO ined ist, the agorithm in steps 15-9 compares the sub-words again to determine whether the d(i, j) in On ( * * ) time. Hence, it taes On ( * * ) time in tota.

12 344 HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG KAO (a) (b) Fig. 4. (a) Each word is divided into * sub-words each with ength ; (b) An iustration of steps for updating the INF tabe. ING Tabe NZO ined ist Fig. 5. Reationship between INF tabe and NZO ined ist. Note that, the Encoding technique can aso be used to verify constraints C 3 and C 4. It first concatenates i dummy characters to sub-words X a [1..i] and X a [( i + 1).. ], for i from + 1 to, where X a W, a = 1,, n. Then, simiar to Agorithm 4, it divides the varied sub-words into sub-words each with ength * and uses INF tabe and NZO ined ist to perform the testing. It is easy to see that the time compexity of verifying constraints C 3 and C 4 is On ( * * * ), where is the given parameter of the corresponding constraint. 6. CONCLUDING REMARKS We have proposed three techniques for soving the verification of the given set of words. The first is Enumeration method which can be appied to constraints C 1 C 4 whie og the parameters of the given constraints in beow ( n O og ogn ). The second is Tabe Looup method which can be appied to constraints C 1 C 5. The Tabe Looup method is an appropriate approach whie the ength of a word and the given parameter of a constraint are in the same order O(og n). Finay, the Encoding method can aso be appied to C 1 C 4 whie the ength of a word is greater than the order O(og n). The proposed approaches determine whether a set of words satisfy a set of combinatoria constraints faster than the trivia soution.

13 TESTING CODE WORDS WITH CONSTRAINTS 345 REFERENCES 1. M. Arita, A. Nishiawa, M. Hagiya, K. Komiya, H. Gouzu, and K. Saamoto, Improving sequence design for DNA computing, in Proceedings of the Genetic and Evoutionary Computation Conference, 000, pp A. Brenneman and A. E. Condon, Strand design for bio-moecuar computation, Theoretica Computer Science, Vo. 87, 001, pp R. Deaton, R. C. Murphy, M. Garzon, D. R. Franceschetti, and S. E. Stevens Jr., Reiabiity and efficiency of a DNA-based computation, Physica Review Letters, Vo. 8, 1998, pp J. K. Gaant, String compression agorithms, Ph.D. dissertation, Department of Eectrica Engineering and Computer Science, Princeton University, Princeton, NJ, M. Garzon, R. Deaton, P. Neathery, R. C. Murphy, S. E. Stevens Jr., and D. R. Franceschetti, A new metric for DNA computing, in Proceedings of Genetic Programming, 1997, pp D. A. Huffman, A method for the construction of minimum-redundancy codes, in Proceedings of the Institute of Radio Engineers, Vo. 40, 1951, pp M. Y. Kao, M. Sanghi, and R. Schweer, Randomized fast design of short DNA words, Lecture Notes in Computer Science, Vo. 3580, 005, pp A. Marathe, A. Condon, and R. M. Corn, On combinatoria DNA word design, Journa of Computationa Bioogy, Vo. 8, 001, pp T. Martinetz, J. E. Gewehr, and J. T. Kim, Statistica earning for detecting protein-dna-binding sites, in Proceedings of the Internationa Joint Conference on Neura Networs, Vo. 4, 003, pp W. Shi and W. Zhou, Identifying transcription factor binding sites in promoters of human genes, in Proceedings of Internationa Muti-Conference on Computing in the Goba Information Technoogy, 006, pp S. Y. Shin, D. Kim, I. H. Lee, and B. T. Zhang, Evoutionary sequence generation for reiabe DNA computing, in Proceedings of Congress on Evoutionary Computation, 00, pp F. Tanaa, M. Naatsugawa, M. Yamamoto, T. Shiba, and A. Ohuchi, Deveoping support system for sequence design in DNA computing, in Proceedings of the 7th Internationa Worshop on DNA Based Computers, 00, pp J. Vitter, Design and anaysis of dynamic Huffman codes, Journa of the Association for Computing Machinery, Vo. 34, 1987, pp E. H. Yang and Z. Zhang, The shortest common superstring probem: Average case anaysis for both exact and approximate matching, IEEE Transactions on Information Theory, Vo. 45, 1999, pp Hsin-Wen Wei ( ) received the B.S. degree in Information and Computer Engineering from Chung Yuan Christian University in 000. She is currenty a Ph.D. candidate in Computer Science at Nationa Tsing Hua University in Taiwan. Her research interests are in scheduing theory, rea-time and embedded computer systems, and graph theory.

14 346 HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG KAO Wan-Chen Lu ( ) received the B.S. degree in Information Management from Chang Gang University in 00, and the Ph.D. degree in Computer Science from Nationa Tsing Hua University in 007. Her research interests are scheduing theory, rea-time systems, mutimedia systems, and graph theory. Pei-Chi Huang ( ) received the B.S. degree in Industria Technoogy Education from Nationa Taiwan Norma University in 004, and M.S. degree in Computer Science from Nationa Tsing Hua University in 005. She is currenty a Ph.D. candidate in Computer Science at Nationa Tsing Hua University in Taiwan. Her research interests are scheduing theory, rea-time systems, and graph theory. Wei-Kuan Shih ( ) received the B.S. and M.S. degrees in Computer Science from the Nationa Taiwan University, and the Ph.D. degree in Computer Science from the University of Iinois, Urbana-Champaign. From 1986 to 1988, he was with the Institute of Information Science, Academia Sinica, Taiwan. He is a Professor in the Department of Computer Science at the Nationa Tsing Hua University, Taiwan. His research interests are rea-time systems, VLSI design automation, and wireess communication. Ming-Yang Kao ( ) received the Ph.D. degree in Computer Science from Yae University in He is a Professor in the Department of Eectrica Engineering and Computer Science at Northwestern University, Evanston, IL. His research interests incude appications, design, anaysis, and impementation of agorithms.

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802.

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802. A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irreguar LDPC Codes in the IEEE 82.16e Standards Yeong-Luh Ueng and Chung-Chao Cheng Dept. of Eectrica Engineering,

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism Backing-up Fuzzy Contro of a Truck-traier Equipped with a Kingpin Siding Mechanism G. Siamantas and S. Manesis Eectrica & Computer Engineering Dept., University of Patras, Patras, Greece gsiama@upatras.gr;stam.manesis@ece.upatras.gr

More information

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University Arithmetic Coding Prof. Ja-Ling Wu Department of Computer Science and Information Engineering Nationa Taiwan University F(X) Shannon-Fano-Eias Coding W..o.g. we can take X={,,,m}. Assume p()>0 for a. The

More information

Chapter Multidimensional Direct Search Method

Chapter Multidimensional Direct Search Method Chapter 09.03 Mutidimensiona Direct Search Method After reading this chapter, you shoud be abe to:. Understand the fundamentas of the mutidimensiona direct search methods. Understand how the coordinate

More information

A Petrel Plugin for Surface Modeling

A Petrel Plugin for Surface Modeling A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica

More information

Research of Classification based on Deep Neural Network

Research of  Classification based on Deep Neural Network 2018 Internationa Conference on Sensor Network and Computer Engineering (ICSNCE 2018) Research of Emai Cassification based on Deep Neura Network Wang Yawen Schoo of Computer Science and Engineering Xi

More information

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions 2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing

More information

TSR: Topology Reduction from Tree to Star Data Grids

TSR: Topology Reduction from Tree to Star Data Grids 03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

Alpha labelings of straight simple polyominal caterpillars

Alpha labelings of straight simple polyominal caterpillars Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

MACHINE learning techniques can, automatically,

MACHINE learning techniques can, automatically, Proceedings of Internationa Joint Conference on Neura Networks, Daas, Texas, USA, August 4-9, 203 High Leve Data Cassification Based on Network Entropy Fiipe Aves Neto and Liang Zhao Abstract Traditiona

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction

More information

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing 100039, China shentao@casm.ac.cn Xu Dehe Institute of resources and environment, North

More information

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line American J. of Engineering and Appied Sciences 3 (): 5-24, 200 ISSN 94-7020 200 Science Pubications Appication of Inteigence Based Genetic Agorithm for Job Sequencing Probem on Parae Mixed-Mode Assemby

More information

An Exponential Time 2-Approximation Algorithm for Bandwidth

An Exponential Time 2-Approximation Algorithm for Bandwidth An Exponentia Time 2-Approximation Agorithm for Bandwidth Martin Fürer 1, Serge Gaspers 2, Shiva Prasad Kasiviswanathan 3 1 Computer Science and Engineering, Pennsyvania State University, furer@cse.psu.edu

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

Efficient Histogram-based Indexing for Video Copy Detection

Efficient Histogram-based Indexing for Video Copy Detection Efficient Histogram-based Indexing for Video Copy Detection Chih-Yi Chiu, Jenq-Haur Wang*, and Hung-Chi Chang Institute of Information Science, Academia Sinica, Taiwan *Department of Computer Science and

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae

More information

Automatic Grouping for Social Networks CS229 Project Report

Automatic Grouping for Social Networks CS229 Project Report Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct

More information

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method 297 Rea-Time Feature escriptor Matching via a Muti-Resoution Ehaustive Search Method Chi-Yi Tsai, An-Hung Tsao, and Chuan-Wei Wang epartment of Eectrica Engineering, Tamang University, New Taipei City,

More information

Blackboard Mechanism Based Ant Colony Theory for Dynamic Deployment of Mobile Sensor Networks

Blackboard Mechanism Based Ant Colony Theory for Dynamic Deployment of Mobile Sensor Networks Journa of Bionic Engineering 5 (2008) 197 203 Bacboard Mechanism Based Ant Coony Theory for Dynamic Depoyment of Mobie Sensor Networs Guang-ping Qi, Ping Song, Ke-jie Li Schoo of Aerospace Science and

More information

Automatic Hidden Web Database Classification

Automatic Hidden Web Database Classification Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,

More information

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Y.LI AND B.BHANU CAMERA ASSIGNMENT: A GAME-THEORETIC

More information

Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters

Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters Crossing Minimiation Probems o Drawing Bipartite Graphs in Two Custers Lanbo Zheng, Le Song, and Peter Eades Nationa ICT Austraia, and Schoo o Inormation Technoogies, University o Sydney,Austraia Emai:

More information

PAPER Delay Constrained Routing and Link Capacity Assignment in Virtual Circuit Networks

PAPER Delay Constrained Routing and Link Capacity Assignment in Virtual Circuit Networks 2004 PAPER Deay Constrained Routing and Link Capacity Assignment in Virtua Circuit Networks Hong-Hsu YEN a), Member and FrankYeong-Sung LIN b), Nonmember SUMMARY An essentia issue in designing, operating

More information

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) botton@poms.uc.ac.be Bernard

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations Formuation of Loss minimization Probem Using Genetic Agorithm and Line-Fow-based Equations Sharanya Jaganathan, Student Member, IEEE, Arun Sekar, Senior Member, IEEE, and Wenzhong Gao, Senior member, IEEE

More information

Path-Based Protection for Surviving Double-Link Failures in Mesh-Restorable Optical Networks

Path-Based Protection for Surviving Double-Link Failures in Mesh-Restorable Optical Networks Path-Based Protection for Surviving Doube-Link Faiures in Mesh-Restorabe Optica Networks Wensheng He and Arun K. Somani Dependabe Computing and Networking Laboratory Department of Eectrica and Computer

More information

Fastest-Path Computation

Fastest-Path Computation Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

Split Restoration with Wavelength Conversion in WDM Networks*

Split Restoration with Wavelength Conversion in WDM Networks* Spit Reoration with aveength Conversion in DM Networks* Yuanqiu Luo and Nirwan Ansari Advanced Networking Laborator Department of Eectrica and Computer Engineering New Jerse Initute of Technoog Universit

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-7435 Voume 10 Issue 16 BioTechnoogy 014 An Indian Journa FULL PAPER BTAIJ, 10(16), 014 [999-9307] Study on prediction of type- fuzzy ogic power system based

More information

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES Eya En Gad, Akshay Gadde, A. Saman Avestimehr and Antonio Ortega Department of Eectrica Engineering University of Southern

More information

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162 oward Efficient Spatia Variation Decomposition via Sparse Regression Wangyang Zhang, Karthik Baakrishnan, Xin Li, Duane Boning and Rob Rutenbar 3 Carnegie Meon University, Pittsburgh, PA 53, wangyan@ece.cmu.edu,

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Attention The materias beow are

More information

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER Internationa Journa on Technica and Physica Probems of Engineering (IJTPE) Pubished by Internationa Organization of IOTPE ISSN 077-358 IJTPE Journa www.iotpe.com ijtpe@iotpe.com September 014 Issue 0 Voume

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

Service Scheduling for General Packet Radio Service Classes

Service Scheduling for General Packet Radio Service Classes Service Scheduing for Genera Packet Radio Service Casses Qixiang Pang, Amir Bigoo, Victor C. M. Leung, Chris Schoefied Department of Eectrica and Computer Engineering, University of British Coumbia, Vancouver,

More information

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong

More information

Minimizing Resource Cost for Camera Stream Scheduling in Video Data Center

Minimizing Resource Cost for Camera Stream Scheduling in Video Data Center Gao YH, Ma HD, Liu W. Minimizing resource cost for camera stream scheduing in video data center. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 555 570 May 2017. DOI 10.1007/s11390-017-1743-x Minimizing

More information

Further Concepts in Geometry

Further Concepts in Geometry ppendix F Further oncepts in Geometry F. Exporing ongruence and Simiarity Identifying ongruent Figures Identifying Simiar Figures Reading and Using Definitions ongruent Trianges assifying Trianges Identifying

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y. FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four

More information

Design of IP Networks with End-to. to- End Performance Guarantees

Design of IP Networks with End-to. to- End Performance Guarantees Design of IP Networks with End-to to- End Performance Guarantees Irena Atov and Richard J. Harris* ( Swinburne University of Technoogy & *Massey University) Presentation Outine Introduction Mutiservice

More information

A HYBRID FEATURE SELECTION METHOD BASED ON FISHER SCORE AND GENETIC ALGORITHM

A HYBRID FEATURE SELECTION METHOD BASED ON FISHER SCORE AND GENETIC ALGORITHM Journa of Mathematica Sciences: Advances and Appications Voume 37, 2016, Pages 51-78 Avaiabe at http://scientificadvances.co.in DOI: http://dx.doi.org/10.18642/jmsaa_7100121627 A HYBRID FEATURE SELECTION

More information

Massively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks.

Massively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks. assivey Parae Part of Speech Tagging Using in-ax oduar Neura Networks Bao-Liang Lu y, Qing a z, ichinori Ichikawa y, & Hitoshi Isahara z y Lab. for Brain-Operative Device, Brain Science Institute, RIEN

More information

FACE RECOGNITION WITH HARMONIC DE-LIGHTING. s: {lyqing, sgshan, wgao}jdl.ac.cn

FACE RECOGNITION WITH HARMONIC DE-LIGHTING.  s: {lyqing, sgshan, wgao}jdl.ac.cn FACE RECOGNITION WITH HARMONIC DE-LIGHTING Laiyun Qing 1,, Shiguang Shan, Wen Gao 1, 1 Graduate Schoo, CAS, Beijing, China, 100080 ICT-ISVISION Joint R&D Laboratory for Face Recognition, CAS, Beijing,

More information

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Register Aocation Consider the foowing assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Assume that two registers are avaiabe. Starting from the eft a compier woud generate

More information

Genetic Algorithms for Parallel Code Optimization

Genetic Algorithms for Parallel Code Optimization Genetic Agorithms for Parae Code Optimization Ender Özcan Dept. of Computer Engineering Yeditepe University Kayışdağı, İstanbu, Turkey Emai: eozcan@cse.yeditepe.edu.tr Abstract- Determining the optimum

More information

Cross-layer Design for Efficient Resource Utilization in WiMedia UWB-based WPANs

Cross-layer Design for Efficient Resource Utilization in WiMedia UWB-based WPANs Cross-ayer Design for Efficient Resource Utiization in WiMedia UWB-based WPANs RAED AL-ZUBI and MARWAN KRUNZ Department of Eectrica and Computer Engineering. University of Arizona. Utra-wideband (UWB)

More information

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study

More information

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters Optimization and Appication of Support Vector Machine Based on SVM Agorithm Parameters YAN Hui-feng 1, WANG Wei-feng 1, LIU Jie 2 1 ChongQing University of Posts and Teecom 400065, China 2 Schoo Of Civi

More information

IJOART. Copyright 2013 SciResPub. Shri Venkateshwara University, Institute of Computer & Information Science. India. Uttar Pradesh, India

IJOART. Copyright 2013 SciResPub. Shri Venkateshwara University, Institute of Computer & Information Science. India. Uttar Pradesh, India Internationa Journa of Advancements in Research & Technoogy, Voume, Issue 6, June-04 ISSN 78-7763 89 Pattern assification for andwritten Marathi haracters using Gradient Descent of Distributed error with

More information

An Alternative Approach for Solving Bi-Level Programming Problems

An Alternative Approach for Solving Bi-Level Programming Problems American Journa of Operations Research, 07, 7, 9-7 http://www.scirp.org/ourna/aor ISSN Onine: 60-889 ISSN rint: 60-880 An Aternative Approach for Soving Bi-Leve rogramming robems Rashmi Bira, Viay K. Agarwa,

More information

Space-Time Trade-offs.

Space-Time Trade-offs. Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe

More information

Digital Image Watermarking Algorithm Based on Fast Curvelet Transform

Digital Image Watermarking Algorithm Based on Fast Curvelet Transform J. Software Engineering & Appications, 010, 3, 939-943 doi:10.436/jsea.010.310111 Pubished Onine October 010 (http://www.scirp.org/journa/jsea) 939 igita Image Watermarking Agorithm Based on Fast Curveet

More information

Sample of a training manual for a software tool

Sample of a training manual for a software tool Sampe of a training manua for a software too We use FogBugz for tracking bugs discovered in RAPPID. I wrote this manua as a training too for instructing the programmers and engineers in the use of FogBugz.

More information

Collaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Middle Attacks

Collaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Middle Attacks Coaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Midde Attacks Seung Yeob Nam a, Sirojiddin Djuraev a, Minho Park b a Department of Information and Communication Engineering, Yeungnam

More information

Response Surface Model Updating for Nonlinear Structures

Response Surface Model Updating for Nonlinear Structures Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,

More information

1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation

1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation 1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER 2014 Bacward Fuzzy Rue Interpoation Shangzhu Jin, Ren Diao, Chai Que, Senior Member, IEEE, and Qiang Shen Abstract Fuzzy rue interpoation

More information

QoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization

QoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization QoS-Aware Data Transmission and Wireess Energy Transfer: Performance Modeing and Optimization Dusit Niyato, Ping Wang, Yeow Wai Leong, and Tan Hwee Pink Schoo of Computer Engineering, Nanyang Technoogica

More information

On Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture

On Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture On inding the est Partia Muticast Protection Tree under ua-homing rchitecture Mei Yang, Jianping Wang, Xiangtong Qi, Yingtao Jiang epartment of ectrica and omputer ngineering, University of Nevada Las

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

SOFT SENSOR DEVELOPMENT AND OPTIMIZATION OF THE COMMERCIAL PETROCHEMICAL PLANT INTEGRATING SUPPORT VECTOR REGRESSION AND GENETIC ALGORITHM

SOFT SENSOR DEVELOPMENT AND OPTIMIZATION OF THE COMMERCIAL PETROCHEMICAL PLANT INTEGRATING SUPPORT VECTOR REGRESSION AND GENETIC ALGORITHM From the SeectedWorks of Dr. Sandip Kumar Lahiri 2009 SOFT SENSOR DEVELOPMENT AND OPTIMIZATION OF THE COMMERCIAL PETROCHEMICAL PLANT INTEGRATING SUPPORT VECTOR REGRESSION AND GENETIC ALGORITHM sandip k

More information

DETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM

DETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM DETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM Le Minh 1, Thanh Hai Nguyen 2, Tran Nghia Khanh 2, Vo Văn Toi 2, Ngo Van Thuyen 1 1 University of Technica

More information

Community-Aware Opportunistic Routing in Mobile Social Networks

Community-Aware Opportunistic Routing in Mobile Social Networks IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014 5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 014 Topoogy-Transparent Scheduing in Mobie Ad Hoc Networks With Mutipe Packet Reception Capabiity Yiming Liu, Member, IEEE,

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

A probabilistic fuzzy method for emitter identification based on genetic algorithm

A probabilistic fuzzy method for emitter identification based on genetic algorithm A probabitic fuzzy method for emitter identification based on genetic agorithm Xia Chen, Weidong Hu, Hongwen Yang, Min Tang ATR Key Lab, Coege of Eectronic Science and Engineering Nationa University of

More information

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing Rea-Time Image Generation with Simutaneous Video Memory Read/rite Access and Fast Physica Addressing Mountassar Maamoun 1, Bouaem Laichi 2, Abdehaim Benbekacem 3, Daoud Berkani 4 1 Department of Eectronic,

More information

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network Service Chain (SC) Mapping with Mutipe SC Instances in a Wide Area Network This is a preprint eectronic version of the artice submitted to IEEE GobeCom 2017 Abhishek Gupta, Brigitte Jaumard, Massimo Tornatore,

More information

understood as processors that match AST patterns of the source language and translate them into patterns in the target language.

understood as processors that match AST patterns of the source language and translate them into patterns in the target language. A Basic Compier At a fundamenta eve compiers can be understood as processors that match AST patterns of the source anguage and transate them into patterns in the target anguage. Here we wi ook at a basic

More information

On-Chip CNN Accelerator for Image Super-Resolution

On-Chip CNN Accelerator for Image Super-Resolution On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement

More information

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah Journa of Lightwave Technoogy Page of CFP: Cooperative Fast Protection Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapocai and Hussein T. Mouftah Abstract We introduce a nove protection scheme, caed Cooperative

More information

A Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks

A Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks Sensors 2013, 13, 16424-16450; doi:10.3390/s131216424 Artice OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journa/sensors A Near-Optima Distributed QoS Constrained Routing Agorithm for Mutichanne Wireess

More information

(0,l) (0,0) (l,0) (l,l)

(0,l) (0,0) (l,0) (l,l) Parae Domain Decomposition and Load Baancing Using Space-Fiing Curves Srinivas Auru Fatih E. Sevigen Dept. of CS Schoo of EECS New Mexico State University Syracuse University Las Cruces, NM 88003-8001

More information

A Method for Calculating Term Similarity on Large Document Collections

A Method for Calculating Term Similarity on Large Document Collections $ A Method for Cacuating Term Simiarity on Large Document Coections Wofgang W Bein Schoo of Computer Science University of Nevada Las Vegas, NV 915-019 bein@csunvedu Jeffrey S Coombs and Kazem Taghva Information

More information

Model-driven Collaboration and Information Integration for Enhancing Video Semantic Concept Detection

Model-driven Collaboration and Information Integration for Enhancing Video Semantic Concept Detection Mode-driven Coaboration and Information Integration for Enhancing Video Semantic Concept Detection Tao Meng, Mei-Ling Shyu Department of Eectrica and Computer Engineering University of Miami Cora Gabes,

More information

Chapter 5 Combinational ATPG

Chapter 5 Combinational ATPG Chapter 5 Combinationa ATPG 2 Outine Introduction to ATPG ATPG for Combinationa Circuits Advanced ATPG Techniques 3 Input and Output of an ATPG ATPG (Automatic Test Pattern Generation) Generate a set of

More information

Fuzzy Perceptual Watermarking For Ownership Verification

Fuzzy Perceptual Watermarking For Ownership Verification Fuzzy Perceptua Watermarking For Ownership Verification Mukesh Motwani 1 and Frederick C. Harris, Jr. 1 1 Computer Science & Engineering Department, University of Nevada, Reno, NV, USA Abstract - An adaptive

More information

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department

More information

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:

More information

A VLSI Architecture of JPEG2000 Encoder

A VLSI Architecture of JPEG2000 Encoder A VLSI Architecture of JPEG2000 Encoder Leibo LIU, Ning CHEN, Hongying MENG, Li ZHANG, Zhihua WANG, and Hongyi CHEN Abstract This paper proposes a VLSI architecture of JPEG2000 encoder, which functionay

More information

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks Ad Hoc Networks (3) 683 698 Contents ists avaiabe at SciVerse ScienceDirect Ad Hoc Networks journa homepage: www.esevier.com/ocate/adhoc Dynamic agent-based hierarchica muticast for wireess mesh networks

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

Discrete elastica model for shape design of grid shells

Discrete elastica model for shape design of grid shells Abstracts for IASS Annua Symposium 017 5 8th September, 017, Hamburg, Germany Annette Böge, Manfred Grohmann (eds.) Discrete eastica mode for shape design of grid shes Yusuke SAKAI* and Makoto OHSAKI a

More information

CERIAS Tech Report Replicated Parallel I/O without Additional Scheduling Costs by Mikhail J. Atallah Center for Education and Research

CERIAS Tech Report Replicated Parallel I/O without Additional Scheduling Costs by Mikhail J. Atallah Center for Education and Research CERIAS Tech Report 2003-50 Repicated Parae I/O without Additiona Scheduing Costs by Mikhai J. Ataah Center for Education and Research Information Assurance and Security Purdue University, West Lafayette,

More information