Locating Software Faults Based on Control Flow and Data Dependence

Size: px
Start display at page:

Download "Locating Software Faults Based on Control Flow and Data Dependence"

Transcription

1 JOURNAL OF COMPUTERS, VOL. 9, NO. 12, DECEMBER Locatng Software Faults Based on Control Flow and Data Dependence Chenghu Hu Lab of Intellgent Computng and Software Engneerng Zhejang Sc-Tech Unversty Hangzhou Zhejang, , Chna Emal: Zuohua Dng Lab of Intellgent Computng and Software Engneerng Zhejang Sc-Tech Unversty Hangzhou Zhejang, , Chna Emal: Abstract Debuggng software s a dffcult and tmeconsumng work. Fault localzaton technques are becomng extremely mportant. Coverage Based Fault Localzaton (CBFL) s very commonly used n fault locaton technque. Tarantula s a typcal one. It uses the coverage statstcs of faled executon paths and passed executon paths to calculate the suspcousness n the software. However, snce ths technque gnores the data dependency, t s hard to fnd the bugs whch are not n the suspcous code area but have data dependence wth t. In order to mprove the effcency of fault locatng, we combne control flow coverage nformaton and data dependence from program slcng. We valdate our approach expermentally usng Semens benchmark programs. The expermental results show that our approach s more effectve than Tarantula. Index Terms Fault locaton, Control flow, Program slcng,data dependence I. INTRODUCTION As the scope and complexty of software become ncreasngly tremendous, t s an ncreasngly challengng task to locate software faults. Debuggng s the man method to locate fault n software, however, t s tmeconsumng [1]. At present program slcng and program spectrum-based methods are currently the man fault locaton technques. Mark Weser recommended program slcng of error varable to exclude uncorrelated statements [2]. Program slcng s a well-known analyss technque that extracts all statements that affect varables of nterest n the program [3][4][5][6]. An executon slce-based technque as reported n [7] can be effectve n locatng the faults. Coverage based fault locaton (CBFL) technques [8][9][10][11][12] (such as Tarantula, SBI) have been used to support software debuggng, these methods use well desgned test cases to get the program coverage nformaton, then the program spectra of passed and faled executons [13] s contrasted to calculate the suspcousness [9] of ndvdual program Correspondng author: Zuohua Dng. enttes. Fnally, software developers check the program enttes accordng to the statements rankng n terms of ther fault suspcousness. However, there are stll some cases such as avalable approaches make unsatsfactory results, because the coverage statstcs of program enttes are calculated separately. Several studes [14][15] have put forward that such calculaton gnores the propagaton of nfected program states among them, whch may cause that located entty s not the really fault. Le Zhao proposed a context-aware fault localzaton approach FP va control flow analyss [14]. Erc Wong proposed a novel approach usng executon slces and nter-block data dependence to effectvely locate the faults to overcome these problems [16]. In order to further mprove the effcency of fault locaton and decrease the rate of code nspecton, we combne control flow edge coverage wth data dependence based slce technque, and calculate the control flow edge suspcousness, then rank the basc blocks n descendng order of ther suspcousness. Although the bug may not be n the suspcous code area, t s lkely to have relatonshps wth those codes that have data dependence wth the suspcous code area. We contnue to use the data dependence to locate the fault. Fnally, we conduct experments to valdate the effectveness of our approach usng benchmarks. The experment results show that our method s more effectve n locatng a program bug by examnng less code before fndng the really faulty statement than the CBFL technque Tarantula n general. The paper s organzed as follows: In Secton II we ntroduce a smple example wth Tarantula technque. Secton III dscusses our method. In Secton IV, we evaluate our method wth experments. Secton V concludes the paper and dscusses the future work. II. AN EXAMPLE In ths secton, we take a smple example to calculate the code nspecton percentage usng the CBFL technque Tarantula. The program s used to calculate the addton and subtracton of two values; t has a fault n the 7th lne, do: /jcp

2 2798 JOURNAL OF COMPUTERS, VOL. 9, NO. 12, DECEMBER 2014 as we can see from the Fg. 1. Accordng to past studes [2][10][17][18][19], frst, we use some desgned test cases to run the program and get the nformaton whether the program wll pass the test or not. We also get the coverage nformaton of the program code lnes, f a statement s covered by a test case, we wll record the statement as 1, conversely record t as 0. If a statement s covered by more faled test cases, the statement s more lkely to contan the fault. Next, we calculate the suspcousness of each statement, the formula s as below: faled() s totalfaled suspcousness() s passed ( s) faled( s) totalpassed totalfaled The passed(s) represents the number of succeed test cases cover the statement s; faled(s) represents the number of faled test cases cover the statements; totalfaled represents the number of faled test cases; totalpassed represents the number of succeed test cases. Then we rank them n descendng order and examne the statement untl the fault s found. Fnally we get the percentage of code nspecton; the result s about 13.3%. Next, we recommend our method though ths example n the next secton. 1 # nclude <stdo.h> 2 double add (nt x, nt y) { 3 double s=0; 4 f(x>0 && y>0) { 5 s=x+y; 6 } 7 return 2*s;// 正确为 return s; 8 } 9 double sub (nt x, nt y) { 10 double s=0; 11 f(x-y>0) { 12 s=x-y; 13 } 14 return s; 15 } 16 double calculate (nt x, nt y, char op) 17 { 18 double s=0; 19 swtch (op) { 20 case '+': s=add(x, y); break; 21 case '-': s=sub(x, y); break; 22 } 23 return s; 24 } 25 nt man (nt argc, char *args []) { 26 FILE *fp; 27 f (args [1] ==NULL) { 28 fp=stdn; 29 } 30 else { 31 fp=fopen (args [1],"r"); 32 } 33 f (fp==null) { 34 fprntf (stout, "error\n"); 35 ext (0); 36 } 37 nt x, y; 38 char op [10]; 39 fscanf (fp,"%d", &x); 40 fscanf (fp,"%d", &y); 41 fscanf (fp,"%s", op); 42 fclose (fp); 43 double s=calculate(x, y, op [0]); 44 fprntf (stdout,"%f\n", s); 45 return 0; 46 } Fgure 1: The source code of program III. METHODLOGY In ths secton, we ntroduce the basc defntons and related technques frstly, and then explan our method. Besdes, we also take the above example descrbed n Fg. 1 to llustrate the procedure of our method and compare the effcency of fault locaton. A. The Fault Locaton Based on Control Flow Edge We frst ntroduce some defntons, A Control Flow Graph (CFG) s an executon graph G = (B, E), B = {b 1, b 2 b m } represents the basc blocks, whch are consecutve statements or expressons contanng no transfer of control except at the end. E = {e 1, e 2 e k } represents the control flow edges that go from one block to the other. Besdes, we defne Path = {p 1, p 2 p n }, e (b, b j ) represents the edge that goes from block b to b j, e(*, b j ) represents all the edges that go to b j and e (b,*) represents all the edges that start from b. B. The Fault Locaton Based on Program Slcng Technque Program slcng technque s used for decomposton of a program [20]. It s one of fault locaton methods orgnally proposed by Mark Weser [21]. A slce contans a set of statements that mght nfluence the value of a varable v at pont s, whch s based on dependence analyss. Data dependence means that a varable s depended on another statement, or vce versa. C. Caculate the Suspcousness of the Basc Block 1) The theory and method We recommend the fault locaton technque based on control flow edge [14] accordng to a smple example.

3 JOURNAL OF COMPUTERS, VOL. 9, NO. 12, DECEMBER Fgure 2: The program and control flow graph Ths basc block s B ={b 1,b 2,b 3,b 4, b 5 }, the control flow edge s E={e(b 1,b 2 ), e(b 2,b 3 ), e(b 2,b 4 ), e(b 3,b 5 ), e(b 4,b 5 )}, the executon path s Path={b 1 b 2 b 3 b 4, b 1 b 2 b 4 b 5 }. The formula of edge suspcousness calculaton s faled( e ) ( e ) (1) passed ( e ) faled( e ) faled (e ) and passed (e ) respectvely represent the number of faled executons and passed executons that cover e. In ths example, prob n (e(s,d)) represents the proporton of θ(e(s,d)) to θ(e(*,d)), that s the start suspcousness of e(s,d). prob out (e(s,d)) represents the proporton of θ(e(s,d)) to θ(e(s,*)), t represents the destnaton suspcousness of e(s,d) prob e(*, d) n( e( s, d)) (2) e(*, d) ( e( s, d)) [ ( e(*, d))] prob es (,*) out ( e( s, d)) (3) es (,*) ( e( s, d)) [ ( es (,*))] In ths example, we suppose that all the executons that cover e (b 3, b 5 ) succeed and those cover e (b 4, b 5 ) faled. Accordng to (1), we can calculate the proneness of b 4 and b 5, whch means the probablty of a block contanng faults. proness b prob e b b 2 ( e( b, b )) 4 5 ( 4) n( ( 4, 5)) 2 ( e( b4, b5 )) ( e( b3, b5 )) proness b prob e b b ( e( b, b )) 4 5 ( 5) out ( ( 4, 5)) 1 ( e( b4, b5)) Accordng to the fal executon path = {b 1,b 2 b n }, b -1 represents the predecessor block of b, b +1 represents the successor block of b. proness( b ) : proness( b ) 1 probn ( e( b 1, b )) prob ( e( b, b )) out 1 Next, n ths way we can get the rato of fault proneness of blocks from b to b n. proness( b ) : proness( b ) :...: proness( b ) 1 2 prob ( b, b ) prob ( b, b ) = 1: :...: prob ( b, b ) prob ( b, b ) n1 out out 1 n1 n n 1 n Ths rato of proneness s correspondng to a faled executon, consderng the entre program, we add all the fault proneness values whch cover the same block, and then the sum of fault proneness represents the block suspcousness, whch s shown n below formula. suspcousness( b) ( proness ( b) faled( path ) 0 & & b path ) In fact, the structure of a program s often very complex when the program contans crculatons, so the constructon of CFG wll be more complex. Le Zhao s paper ddn t menton ths case especally. In our paper, we make the followng treatment. 1) If the basc block occurs frstly n the executon, we calculate ts suspcousness. 2) If the basc block doesn t occur frstly n the executon, we don t make any changes for the suspcousness. 2) The method mplementaton Frst, we need to record the code coverage nformaton; we use the gcov tool whch GNU gcc compler comes wth to acqure the coverage nformaton. Meanwhle we can get the.gcno fle whch records the basc block and arc nformaton, though whch we can construct the control flow graph. Next, we can get the executon path of a test case by the code lnes coverage nformaton combnng wth the code lnes the basc block correspondng to. Fnally we can calculate the suspcousness of the basc block. D. Construct the Program Slce Based on Data Dependence We get the rankng of the suspcousness of basc blocks accordng to the control flow edge coverage nformaton, make use of varable data dependence relaton and then choose the block whch suspcousness s the bggest as the slce defned as D (1). E f and E p respectvely represent the code set that faled test cases and the succeed test cases cover, E all means all code sets. Next, we examne whether D (1) contans fault or not. If t does, we can locate the fault drectly, f t doesn t contan the fault, we expand the code. W.Erc Wong presents an augmentaton method to nclude addtonal code [16], n hs method, the slce D (1) = E f - E p, θ = E f - D (1), whch means the code area to examne addtonally. In our paper, D (1) represents the basc block whch suspcousness s the bggest. Besdes, we defned θ = E all - D (1), consderng more data dependency. We also defne the data dependence relaton f and only f α defnes a varable used n D (1) or α uses a varable j defned n D (1), that s, a and D (1) have the data dependence relaton, whch s defned as a@ D (1). The process s ntroduced as follows: Step1: Defne the slce S (1), whch s the frst code segment examned, S (1) = {a aθ &( a@d (1) )}. Step2: Set = 1. Step3: Examne the S () to see whether t contans the fault. Step4: If true, that s, the fault s located n the slce, then stop. Step5: Set = +1. Step6: Defne the slce S () = S (-1) {a aθ &( a@s (- 1) )},

4 2800 JOURNAL OF COMPUTERS, VOL. 9, NO. 12, DECEMBER 2014 S () s the code segment of the th teraton. Step7: If S () = S ( -1), that s, no new code segment can be ncluded to the slce, then stop. Step8: Go back to Step3. In ths process, we utlze the data dependence to construct the S (), we can see that S (1) S (2) S (3)... By usng the method descrbed n the above part, we calculate the suspcousness of basc block n the Fg. 1. The result s shown n TABLE I. TABLE I THE SUSPICIOUSNESS OF BASIC BLOCK Functon Basc block Code lne Suspcousness man block1 25,27 0 man block man block man block man block man block man block man block man block man block man block man block man block man block14 vrtual block 2.5 calculate block15 16,18,19 0 calculate block calculate block calculate block calculate block19 vrtual block 0.2 sub block20 9,10,11 0 sub block sub block sub block23 vrtual block 0 add block24 2,3,4 80 add block add block add block27 vrtual block 1.33 Next, we select the bggest suspcousness of basc block as the slce D (1) and examne the statements n t, as we can see n the Table II. Although the fault may not be n the suspcous code area, t s lkely to have relatonshps wth those codes that have data dependence wth t. So f the bug s not n D (1), then we need to examne the addtonal code n S (1), S (2), etc. Fnally, we calculate the percentage of code nspecton. TABLE II THE SLICE D (1) Functon Basc block Code lne Code add block25 5 to 5 s=x+y; We don t fnd the bug by examnng the slce D (1), so we expand the code and get the slce S (1) after 1th teraton, as we can see from the Table III. After examnng the slce S (1), we don t fnd the fault stll, so we contnue to expand the code. The result s shown n Table IV. We fnd the fault n the functon add by examnng the slce S (2), we locate the fault successfully after examne 5 lnes code. We can calculate the percentage of code nspecton, whch s about 10.87%. By contrast, we use TABLE III THE SLICE S (1) Functon Basc block Code lne Code add block25 5 to 5 s=x+y; add block24 2 to 4 nt x,nt y double s=0; TABLE IV THE SLICE S (2) Functon Basc block Code lne Code add block25 5 to 5 s=x+y; add block24 2 to 4 nt x,nt y double s=0; Tarantula whch s the tradtonal fault locaton method based on coverage nformaton to get the locaton effect. From the secton II, we can know the percentage of code nspecton s about 13.3% wth Tarantula. By ths smple example, we can see that the effect of our method s better. In order to further valdate our method, we conclude a seral of experments n next secton. TABLE V STATICS OF SUBJECT PROGRAMS Program Faulty Versons Loc Test Cases prnt_tokens prnt_tokens replace schedule schedule tcas tot_nfo IV. THE EXPERIMENTAL EVALUATION In ths secton we conduct the experments to evaluate the effect of our method. A. Expermental Setup In ths study, we use the Semens sute [22] as the subject programs, whch s the most common test sute used to evaluate the effect of fault localzaton technques. An overall descrpton of Semens sute s presented n Table V. Take the prnt_tokens for example, t has seven faulty versons, and each of them has exactly one fault. The lne of codes are 472, the number of test cases are There are 132 faulty versons of the seven subject programs n total. We select Tarantula [17] whch s a typcal CBFL technque to compare wth our method. In our experments, we all select 115 faulty versons to conduct the experments n accordance wth the paper. We only consder the sngle error n ths experment, so we exclude the verson1 of pnt_tokens, versons2 and 7, verson21 of replace, verson3, 10, 11, 15, 31, 32, 33 and 40 of tcas. The errors n verson4 and 6 of prnt_tokens occur only n the header fles, we also exclude them. Verson 10 of prnt_tokens2, verson9 of schedule2 and verson 32 of replace have no test cases fal, so they are not consdered by our experments. We could collect the coverage nformaton. The experment envronment we use s Ubuntu and the

5 JOURNAL OF COMPUTERS, VOL. 9, NO. 12, DECEMBER compler s gcc4.6.1, we use gcov to collect the coverage nformaton. B. Evaluaton Metrc At present, the evaluaton metrc of fault locaton adopted frequently s the score method represented by Jones [17]. In ths paper we also use the score as the evaluaton metrc, whch means the percentage of statements have to be examned untl the fault s found. Frst, we calculate the suspcousness of the basc block and rank them n a descendng order. Code wth a hgher suspcousness should be examned before that wth a lower suspcousness. The score s defned that (s / S) * 100%, s represents the number of statements we should examne untl fndng the fault and S represents the number of executable statements. In our experments, consderng that the codes we need to examne contan executed and partal non-executed statements, S represents the sze of program. C. The Result Analyss We denote our method based on control flow and data dependence by CFDD. In ths experment, we select the CBFL technque such as Tarantula to compare wth our method CFDD. As we can see from the Fg. 3, the x-axs represents the seral numbers of faults, and we select a part of fault numbers whch s 115 n total, whch reflects the overall condton. The partal fault numbers s shown n the followng fgure. The y-axs ndcates the percentage of code that need to be examned to locate a fault,.e the percentage of code nspecton. If the length of the bar s longer, the correspondng fault locaton technque s less effectve. For example, when the seral numbers of faults s 2, the percentage of code nspecton s about 21% wth the Tarantula method whle our method s about 12.4%, whch represents that CFDD s more effectve clearly. By the Fg. 3, we can also fnd that the CFDD does not always perform well for every fault; sometmes the code nspecton s a lttle hgher than Tarantula technque. In order to llustrate the ssue, we calculate the average code nspecton percentage on the seven programs of the Semens sute. It s shown n the Table VI. As we can see from the Table VI, CFDD method performs better than Tarantula on most of the seven programs, whle the effect of CFDD s lower than Tarantula on two versons. By analyzng the experment results, we fnd that when the code nspecton percentage s low wth Tarantula, our method performs slghtly worse than Tarantula. We can also fnd smlar phenomenon mentoned n Le Zhao s paper. If fault locaton s the place where the falures Fgure 3: The comparson of code nspecton percentage among Tarantula and our method TABLE VI THE COMPARISON OF CODE INSPECTION PERCENTAGE BETWEEN TARANTULA AND OUR METHOD ON THE SIEMENS SUITE verson Av era ge Ta ran tul a CF D D prnt _toke ns prnt _toke ns2 rep lac e sched ule sched ule2 occur, and then the Tarantula s sklful n locatng ths type of errors. When the code nspecton percentage wth Tarantula technque s hgh, our method tends to perform better. Because our method s based on the control flow coverage nformaton, t s good at locatng some complex faults that appear n branch condton. Our method s also based on data dependence; t can locate the type of error such as the varable defnton and the mssng code lne. In Fg. 4, we llustrate the cumulatve dstrbuton of effectveness scores per analyss method where the x-axs ndcates the percentage of code that needs to be examned. The y-axs represents the percentage of the fault verson that fault has been located account for all the fault versons. For example, f the value of horzontal axs s 30, the respondng value of y- axs s 71.3, whch means f we examne 30% code, we can fnd the errors of 71.3% fault versons. From the Fg. 4 we can fnd that although our method does not perform well n all types of faults, our method s very promsng n the fault locaton. When the code nspecton percentage s above 15% approxmately, our method can examne more faulty versons than Tarantula technque. We consder the past studes, such as the FP method based on control flow analyss, Le Zhao combnes the FP wth Tarantula, frst uses the Tarantula technque to locate errors, f the error s not found untl the percentage of code nspecton s up to some value, use the FP nstead. The results show that t s more effectve clearly. tca s tot_ nfo

6 2802 JOURNAL OF COMPUTERS, VOL. 9, NO. 12, DECEMBER 2014 Fgure 4: Cumulatve comparson wth Tarantula on the Semens sute V. CONCLUSIONS AND FUTURE WORK In ths paper, we ntroduce the fault locaton technque based on control flow nformaton and data dependency. We use the control flow paths to analyze the program and calculate the block suspcousness, then we use varable data dependence relaton to choose the bggest suspcous block, then ncrease the search doman to locate the really fault. Fnally, we calculate the percentage of code nspecton. Expermental results show that our approach could fnd bugs wth lower code nspecton by programmers. Our method performs better than the Tarantula. In the future, we plan to study what effect dfferent types of faults and dfferent test cases have on our fault locaton method. We are also tryng to ntegratng wth Tarantula further and see f we can get better results. Besdes, the program n Semens sute only contans one error, what f the program contans multple faults; ths problem s worthy to study further. ACKNOWLEDGMENT Ths work s supported by NSFC under Grants No and REFERENCES [1] Jones, James Arthur. Sem-automatc fault localzaton. Dss. Georga Insttute of Technology, [2] Weser, Mark. "Programmers use slces when debuggng." Communcatons of the ACM 25.7 (1982): [3] Agrawal, Hralal, and Joseph R. Horgan. "Dynamc program slcng." ACM SIGPLAN Notces 25.6 (1990): [4] Kusumoto, Shnj, et al. "Expermental evaluaton of program slcng for fault localzaton." Emprcal Software Engneerng 7.1 (2002): [5] Mock, Markus, et al. "Improvng program slcng wth dynamc ponts-to data." Proceedngs of the 10th ACM SIGSOFT symposum on Foundatons of software engneerng. ACM, [6] Mao, Chunyu. "Dynamc Slcng Research of UML Statechart Specfcatons." Journal of Computers 6.4 (2011): [7] Agrawal, Hralal, Rchard A. DeMllo, and Eugene H. Spafford. "Debuggng wth dynamc slcng and backtrackng." Software: Practce and Experence 23.6 (1993): [8] Abreu, Ru, et al. "A practcal evaluaton of spectrumbased fault localzaton." Journal of Systems and Software (2009): [9] Yu, Yanbng, James A. Jones, and Mary Jean Harrold. "An emprcal study of the effects of test-sute reducton on fault localzaton." Proceedngs of the 30th nternatonal conference on Software engneerng. ACM, [10] Jones, James A., and Mary Jean Harrold. "Emprcal evaluaton of the tarantula automatc fault-localzaton technque." Proceedngs of the 20th IEEE/ACM nternatonal Conference on Automated software engneerng. ACM, [11] Chlmb, Trshul M., et al. "HOLMES: Effectve statstcal debuggng va effcent path proflng." Software Engneerng, ICSE IEEE 31st Internatonal Conference on. IEEE, [12] Santelces, Raul, et al. "Lghtweght fault-localzaton usng multple coverage types." Software Engneerng, ICSE IEEE 31st Internatonal Conference on. IEEE, [13] Jeffrey, Denns, Neelam Gupta, and Rajv Gupta. "Fault localzaton usng value replacement." Proceedngs of the 2008 nternatonal symposum on Software testng and analyss. ACM, [14] Zhao, Le, Lna Wang, and Xaodan Yn. "Context-aware fault localzaton va control flow analyss." Journal of Software 6.10 (2011): [15] Zhang, Zhenyu, et al. "Capturng propagaton of nfected program states." Proceedngs of the the 7th jont meetng of the European software engneerng conference and the ACM SIGSOFT symposum on The foundatons of software engneerng. ACM, [16] Wong, W. Erc, and Yu Q. "Effectve program debuggng based on executon slces and nter-block data dependency." Journal of Systems and Software 79.7 (2006): [17] Jones, James A., Mary Jean Harrold, and John Stasko. "Vsualzaton of test nformaton to assst fault localzaton." Proceedngs of the 24th nternatonal conference on Software engneerng. ACM, [18] Lna Chen. Automatc Test Cases Generaton for Statechart Specfcatons from Semantcs to Algorthm. Journal of Computers, 2011,6 (4): [19] Qan, Zhongsheng. "Test Case Generaton and Optmzaton for User Sesson-based Web Applcaton Testng." Journal of Computers 5.11 (2010): [20] Hong, Hyoung Seok, Insup Lee, and Oleg Sokolsky. "Abstract slcng: A new approach to program slcng based on abstract nterpretaton and model checkng." Source Code Analyss and Manpulaton, Ffth IEEE Internatonal Workshop on. IEEE, [21] Weser, Mark. "Program slcng." Proceedngs of the 5th nternatonal conference on Software engneerng. IEEE Press, [22] Hutchns, Monca, et al. "Experments of the effectveness of dataflow-and controlflow-based test adequacy crtera." Proceedngs of the 16th nternatonal conference on Software engneerng. IEEE Computer Socety Press, Chenghu Hu s a graduate student at the Laboratory of Intellgent Computng and Software Engneerng, Zhejang Sc- Tech Unversty, Hangzhou, Chna. Hs research nterests nclude program analyss and program fault locaton.

7 JOURNAL OF COMPUTERS, VOL. 9, NO. 12, DECEMBER Zuohua Dng receved hs Ph.D. degree n mathematcs and M.S. degree n computer scence from the Unversty of South Florda, Tampa, FL, USA, n 1996 and 1998, respectvely. He s currently a Professor and the Drector of the Laboratory of Intellgent Computng and Software Engneerng, Zhejang Sc-Tech Unversty, Hangzhou, Chna, and has been a Research Professor at the Natonal Insttute for Systems Test and Productvty, USA, snce From 1998 to 2001, he was a Senor Software Engneer wth Advanced Fber Communcaton, USA. Hs research nterests nclude system modelng, program analyss, servce computng and Petr nets, subjects on whch he has authored and coauthored more than 70 papers..

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

Life Tables (Times) Summary. Sample StatFolio: lifetable times.sgp

Life Tables (Times) Summary. Sample StatFolio: lifetable times.sgp Lfe Tables (Tmes) Summary... 1 Data Input... 2 Analyss Summary... 3 Survval Functon... 5 Log Survval Functon... 6 Cumulatve Hazard Functon... 7 Percentles... 7 Group Comparsons... 8 Summary The Lfe Tables

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Learning-Based Top-N Selection Query Evaluation over Relational Databases

Learning-Based Top-N Selection Query Evaluation over Relational Databases Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Alignment Results of SOBOM for OAEI 2010

Alignment Results of SOBOM for OAEI 2010 Algnment Results of SOBOM for OAEI 2010 Pegang Xu, Yadong Wang, Lang Cheng, Tany Zang School of Computer Scence and Technology Harbn Insttute of Technology, Harbn, Chna pegang.xu@gmal.com, ydwang@ht.edu.cn,

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

USING GRAPHING SKILLS

USING GRAPHING SKILLS Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

A Topology-aware Random Walk

A Topology-aware Random Walk A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble

More information

An Improved Image Segmentation Algorithm Based on the Otsu Method

An Improved Image Segmentation Algorithm Based on the Otsu Method 3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment JOURNAL OF COMPUTERS, VOL. 4, NO. 9, SEPTEMBER 2009 873 Improved Resource Allocaton Algorthms for Practcal Image Encodng n a Ubqutous Computng Envronment Manxong Dong, Long Zheng, Kaoru Ota, Song Guo School

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

3D vector computer graphics

3D vector computer graphics 3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Optimizing Document Scoring for Query Retrieval

Optimizing Document Scoring for Query Retrieval Optmzng Document Scorng for Query Retreval Brent Ellwen baellwe@cs.stanford.edu Abstract The goal of ths project was to automate the process of tunng a document query engne. Specfcally, I used machne learnng

More information

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract

More information

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Reliability Analysis of Aircraft Condition Monitoring Network Using an Enhanced BDD Algorithm

Reliability Analysis of Aircraft Condition Monitoring Network Using an Enhanced BDD Algorithm Chnese Journal of Aeronautcs 25 (2012) 925-930 Contents lsts avalable at ScenceDrect Chnese Journal of Aeronautcs journal homepage: www.elsever.com/locate/cja Relablty Analyss of Arcraft Condton Montorng

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Study on Properties of Traffic Flow on Bus Transport Networks

Study on Properties of Traffic Flow on Bus Transport Networks Study on Propertes of Traffc Flow on Bus Transport Networks XU-HUA YANG, JIU-QIANG ZHAO, GUANG CHEN, AND YOU-YU DONG College of Computer Scence and Technology Zhejang Unversty of Technology Hangzhou, 310023,

More information

A NEW APPROACH FOR SUBWAY TUNNEL DEFORMATION MONITORING: HIGH-RESOLUTION TERRESTRIAL LASER SCANNING

A NEW APPROACH FOR SUBWAY TUNNEL DEFORMATION MONITORING: HIGH-RESOLUTION TERRESTRIAL LASER SCANNING A NEW APPROACH FOR SUBWAY TUNNEL DEFORMATION MONITORING: HIGH-RESOLUTION TERRESTRIAL LASER SCANNING L Jan a, Wan Youchuan a,, Gao Xanjun a a School of Remote Sensng and Informaton Engneerng, Wuhan Unversty,129

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Querying by sketch geographical databases. Yu Han 1, a *

Querying by sketch geographical databases. Yu Han 1, a * 4th Internatonal Conference on Sensors, Measurement and Intellgent Materals (ICSMIM 2015) Queryng by sketch geographcal databases Yu Han 1, a * 1 Department of Basc Courses, Shenyang Insttute of Artllery,

More information

Maximum Variance Combined with Adaptive Genetic Algorithm for Infrared Image Segmentation

Maximum Variance Combined with Adaptive Genetic Algorithm for Infrared Image Segmentation Internatonal Conference on Logstcs Engneerng, Management and Computer Scence (LEMCS 5) Maxmum Varance Combned wth Adaptve Genetc Algorthm for Infrared Image Segmentaton Huxuan Fu College of Automaton Harbn

More information

arxiv: v1 [cs.ro] 21 Jul 2018

arxiv: v1 [cs.ro] 21 Jul 2018 Mult-sesson Map Constructon n Outdoor Dynamc Envronment* Xaqng Dng 1, Yue Wang 1, Huan Yn 1, L Tang 1, Rong Xong 1 arxv:1807.08098v1 [cs.ro] 21 Jul 2018 Abstract Map constructon n large scale outdoor envronment

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

A MODEL-BASED BOOK BOUNDARY DETECTION TECHNIQUE FOR BOOKSHELF IMAGE ANALYSIS

A MODEL-BASED BOOK BOUNDARY DETECTION TECHNIQUE FOR BOOKSHELF IMAGE ANALYSIS A MODEL-BASED BOOK BOUNDARY DETECTION TECHNIQUE FOR BOOKSHELF IMAGE ANALYSIS Ej TAIRA, Sech UCHIDA, Hroak SAKOE Graduate School of Informaton Scence and Electrcal Engneerng, Kyushu Unversty Faculty of

More information

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems Real-tme Fault-tolerant Schedulng Algorthm for Dstrbuted Computng Systems Yun Lng, Y Ouyang College of Computer Scence and Informaton Engneerng Zheang Gongshang Unversty Postal code: 310018 P.R.CHINA {ylng,

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,

More information

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.

More information

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

BIN XIA et al: AN IMPROVED K-MEANS ALGORITHM BASED ON CLOUD PLATFORM FOR DATA MINING

BIN XIA et al: AN IMPROVED K-MEANS ALGORITHM BASED ON CLOUD PLATFORM FOR DATA MINING An Improved K-means Algorthm based on Cloud Platform for Data Mnng Bn Xa *, Yan Lu 2. School of nformaton and management scence, Henan Agrcultural Unversty, Zhengzhou, Henan 450002, P.R. Chna 2. College

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to

More information

Ontology Generator from Relational Database Based on Jena

Ontology Generator from Relational Database Based on Jena Computer and Informaton Scence Vol. 3, No. 2; May 2010 Ontology Generator from Relatonal Database Based on Jena Shufeng Zhou (Correspondng author) College of Mathematcs Scence, Laocheng Unversty No.34

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

Algorithm To Convert A Decimal To A Fraction

Algorithm To Convert A Decimal To A Fraction Algorthm To Convert A ecmal To A Fracton by John Kennedy Mathematcs epartment Santa Monca College 1900 Pco Blvd. Santa Monca, CA 90405 jrkennedy6@gmal.com Except for ths comment explanng that t s blank

More information

Mining Web Logs with PLSA Based Prediction Model to Improve Web Caching Performance

Mining Web Logs with PLSA Based Prediction Model to Improve Web Caching Performance JOURAL OF COMPUTERS, VOL. 8, O. 5, MAY 2013 1351 Mnng Web Logs wth PLSA Based Predcton Model to Improve Web Cachng Performance Chub Huang Department of Automaton, USTC Key laboratory of network communcaton

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

Assembler. Building a Modern Computer From First Principles.

Assembler. Building a Modern Computer From First Principles. Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought

More information

A Clustering Algorithm for Chinese Adjectives and Nouns 1

A Clustering Algorithm for Chinese Adjectives and Nouns 1 Clusterng lgorthm for Chnese dectves and ouns Yang Wen, Chunfa Yuan, Changnng Huang 2 State Key aboratory of Intellgent Technology and System Deptartment of Computer Scence & Technology, Tsnghua Unversty,

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented

More information

A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1

A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1 A Resources Vrtualzaton Approach Supportng Unform Access to Heterogeneous Grd Resources 1 Cunhao Fang 1, Yaoxue Zhang 2, Song Cao 3 1 Tsnghua Natonal Labatory of Inforamaton Scence and Technology 2 Department

More information

A high precision collaborative vision measurement of gear chamfering profile

A high precision collaborative vision measurement of gear chamfering profile Internatonal Conference on Advances n Mechancal Engneerng and Industral Informatcs (AMEII 05) A hgh precson collaboratve vson measurement of gear chamferng profle Conglng Zhou, a, Zengpu Xu, b, Chunmng

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

The Man-hour Estimation Models & Its Comparison of Interim Products Assembly for Shipbuilding

The Man-hour Estimation Models & Its Comparison of Interim Products Assembly for Shipbuilding Internatonal Journal of Operatons Research Internatonal Journal of Operatons Research Vol., No., 9 4 (005) The Man-hour Estmaton Models & Its Comparson of Interm Products Assembly for Shpbuldng Bn Lu and

More information

A Concurrent Non-Recursive Textured Algorithm for Distributed Multi-Utility State Estimation

A Concurrent Non-Recursive Textured Algorithm for Distributed Multi-Utility State Estimation 1 A Concurrent Non-ecursve Textured Algorthm for Dstrbuted Mult-Utlty State Estmaton Garng M. Huang, Senor Member, IEEE, and Jansheng Le, Student Member, IEEE Abstract: Durng power deregulaton, power companes

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

Software Trustworthiness Static Measurement Model and the Tool

Software Trustworthiness Static Measurement Model and the Tool Avalable onlne at www.jpe-onlne.com vol. 13, no. 7, November 2017, pp. 1101-1110 DOI: 10.23940/jpe.17.07.p13.11011110 Software Trustworthness Statc Measurement Model and the Tool Yan L, Zhqang Wu, Yxang

More information

Design of Structure Optimization with APDL

Design of Structure Optimization with APDL Desgn of Structure Optmzaton wth APDL Yanyun School of Cvl Engneerng and Archtecture, East Chna Jaotong Unversty Nanchang 330013 Chna Abstract In ths paper, the desgn process of structure optmzaton wth

More information

Petri Net Based Software Dependability Engineering

Petri Net Based Software Dependability Engineering Proc. RELECTRONIC 95, Budapest, pp. 181-186; October 1995 Petr Net Based Software Dependablty Engneerng Monka Hener Brandenburg Unversty of Technology Cottbus Computer Scence Insttute Postbox 101344 D-03013

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

RESEARCH ON EQUIVALNCE OF SPATIAL RELATIONS IN AUTOMATIC PROGRESSIVE CARTOGRAPHIC GENERALIZATION

RESEARCH ON EQUIVALNCE OF SPATIAL RELATIONS IN AUTOMATIC PROGRESSIVE CARTOGRAPHIC GENERALIZATION RESEARCH ON EQUIVALNCE OF SPATIAL RELATIONS IN AUTOMATIC PROGRESSIVE CARTOGRAPHIC GENERALIZATION Guo Qngsheng Du Xaochu Wuhan Unversty Wuhan Unversty ABSTRCT: In automatc cartographc generalzaton, the

More information

Mining User Similarity Using Spatial-temporal Intersection

Mining User Similarity Using Spatial-temporal Intersection www.ijcsi.org 215 Mnng User Smlarty Usng Spatal-temporal Intersecton Ymn Wang 1, Rumn Hu 1, Wenhua Huang 1 and Jun Chen 1 1 Natonal Engneerng Research Center for Multmeda Software, School of Computer,

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 97-735 Volume Issue 9 BoTechnology An Indan Journal FULL PAPER BTAIJ, (9), [333-3] Matlab mult-dmensonal model-based - 3 Chnese football assocaton super league

More information

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks 2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng

More information

SURFACE PROFILE EVALUATION BY FRACTAL DIMENSION AND STATISTIC TOOLS USING MATLAB

SURFACE PROFILE EVALUATION BY FRACTAL DIMENSION AND STATISTIC TOOLS USING MATLAB SURFACE PROFILE EVALUATION BY FRACTAL DIMENSION AND STATISTIC TOOLS USING MATLAB V. Hotař, A. Hotař Techncal Unversty of Lberec, Department of Glass Producng Machnes and Robotcs, Department of Materal

More information

A Novel Distributed Collaborative Filtering Algorithm and Its Implementation on P2P Overlay Network*

A Novel Distributed Collaborative Filtering Algorithm and Its Implementation on P2P Overlay Network* A Novel Dstrbuted Collaboratve Flterng Algorthm and Its Implementaton on P2P Overlay Network* Peng Han, Bo Xe, Fan Yang, Jajun Wang, and Rumn Shen Department of Computer Scence and Engneerng, Shangha Jao

More information

A New Transaction Processing Model Based on Optimistic Concurrency Control

A New Transaction Processing Model Based on Optimistic Concurrency Control A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Accounting for the Use of Different Length Scale Factors in x, y and z Directions

Accounting for the Use of Different Length Scale Factors in x, y and z Directions 1 Accountng for the Use of Dfferent Length Scale Factors n x, y and z Drectons Taha Soch (taha.soch@kcl.ac.uk) Imagng Scences & Bomedcal Engneerng, Kng s College London, The Rayne Insttute, St Thomas Hosptal,

More information

Optimization of integrated circuits by means of simulated annealing. Jernej Olenšek, Janez Puhan, Árpád Bűrmen, Sašo Tomažič, Tadej Tuma

Optimization of integrated circuits by means of simulated annealing. Jernej Olenšek, Janez Puhan, Árpád Bűrmen, Sašo Tomažič, Tadej Tuma Optmzaton of ntegrated crcuts by means of smulated annealng Jernej Olenšek, Janez Puhan, Árpád Bűrmen, Sašo Tomažč, Tadej Tuma Unversty of Ljubljana, Faculty of Electrcal Engneerng, Tržaška 25, Ljubljana,

More information