Minimizing Memory Access By Improving Register Usage Through High-level Transformations

Size: px
Start display at page:

Download "Minimizing Memory Access By Improving Register Usage Through High-level Transformations"

Transcription

1 Minimizing Memory Access By Improving Register Usage Troug Hig-level Transformations San Li Scool of Computer Engineering anyang Tecnological University anyang Avenue, SIGAPORE Moammed Javed Absar STMicroelectronics Asia Pacific Pte. Ltd. 20 Science Park Road, SIGAPORE Abstract Multimedia signal processing software typically ave to process large amounts of data. Te algoritms often involve te andling of data arrays in te form of nested loops. Experiments sow tat for tis kind of applications data transfer (memory access) operations consume muc more power tan data-pat operations. Our objective is to reduce memory access related power consumption by reducing te number of data transfers between processor and memory, or between a iger (closer to processor) level of memory and a memory at a lower level using source program transformation. In tis paper, we propose a source-to-source transformation metod to improve register usage for multi-dimensional arrays in nested loops. Significant improvement is demonstrated troug some bencmark programs. I. ITRODUCTIO Power consumption as become an increasingly important cost factor in embedded system designs. One of te reasons is te proliferation of battery powered portable and-eld devices. Moreover, ig power dissipation also means costly packaging and cooling requirements and lower reliability. Consequently, power-efficiency is a critical concern wen designing an embedded system. Our specific target of power reduction is multimedia applications. Tis kind of applications is data-intensive and access large amounts of data. Power consumption of tese applications is largely contributed by data transfer and memory access operations [8], [9], [14], [10], [11]. In contrast, data-pat operations consume muc less power. Hence, reducing data memory access will lead to a reduction of power consumed by te application. Generally, in a program data are stored as arrays and are often manipulated inside (nested) loops. Witout any optimization to te source code, redundant access to te arrays often exist and sould terefore be minimized. Our approac to tis problem is to perform ig-level source-to-source transformations so tat temporally reused data can be stored in registers instead. However, temporal reuse can appen in various forms. In order to select and perform suitable ig-level transformations for different kinds of temporal reuse automatically, a systematic metod is required. Tis paper proposes suc a metod tat improves te register allocation of subscripted array variables under normal compilation conditions, wit compilers wic use coloring-based register allocators. Te major contribution of our work is tat multiple-index subscripted variables are explored in our metod. In contrast, te previous works [7], [6], [12], [13], [5] restrict array references to be single-index subscripts. Tis limits te maximum exploitation of temporal reuse. II. MULTIPLE-IDEX SUBSCRIPTED VARIABLE Subscripted variable is array reference inside a loop nest (e.g. x[i][j]). Multiple-index subscripted variable means tat an array reference can ave more tan one loop index variables in eac of its dimensions (e.g. x[i + j][j] and x[2i j]). A general form of for (I 1 = b 1; I 1 < (b 1 +1); I 1 += t 1) for (I 2 = b 2; I 2 < (b 2 +1); I 2 += t 2) for (I M = b M; I M < (b M +1); I M += t M) x[ ] H c [ I1 I2 IM] M1 or [ f ( f ( ] [ I 1 11 Fig. 1. loop M M1 c M [ c1 c2 M I M M2 c 2 c ] I M M c ] General form of multiple-index subscripted variable x in a nest Multiple-index subscripted variable is illustrated in Fig. 1. Te array reference x[ ] as dimensions inside a loop nest wit a dept of M. In eac dimension, a subscript expression f n ( (1 n ) can ave maximal M loop index variables I m (1 m M). Tat is to say, te subscript value of te nt dimension of te array is determined by more tan one loop index variables. Wen it is te case, te array reference x is said to be a multiple-index subscripted variable. A multiple-index subscripted variable generates temporal reuse if it accesses te same datum in different iterations; tis kind of variables is exploitable in improving register allocation. Tose tat fail to generate temporal reuses will not be considered during register allocation. Weter multiple-index subscripted variable can generate temporal reuse is determined by bot its subscript expressions and te boundary values of te loop nest. Tis is explained in more detail in te section III-A. Temporal reuse generated by a multiple-index subscripted variable is referred to self-temporal reuse. However, tis is different from te self-temporal reuse described in [15]. In [15] te self-temporal reuse of an array reference is generated by invariant loop index variable only, wereas, te self-temporal reuse ere is generated by multiple loop indices. Fig. 2 gives an example of te two cases. Bot reference x[i] in Fig. 2(a) and reference x[i + j] in Fig. 2(b) generate temporal reuses. x[i] is invariant to loop index j. Wit te same value of i, x[i] accesses te same datum trougout te entire loop j. In tis example, x[i] as 10 instances from x[0] to x[9]. Every instance is accessed 10 times wic is te boundary value of loop j. In contrast, x[i + j] does not ave any invariant loop. Its subscript is a function of bot loop indices i and j. Te temporal reuse generated by x[i + j] results from bot loop indices i and j. For example, x[i + j] accesses te instance x[1] twice for (i = 1 j = 0) and

2 Fig. 2. for (i = 0; i < 10; i++) for (j = 0; j < 10; j++) = x[i] (a) for (i = 0; i < 10; i++) for (j = 0; j < 10; j++) = x[i+j] (b) Examples of two kinds of self-temporal reuse (i = 0 j = 1). Furtermore, x[i + j] accesses eac instance wit different number of times. x[0] is accessed once for (i = j = 0), wereas, x[9] is accessed 10 times for different value combinations of i and j. Tis example sows tat multiple-index subscripted variable generates self-temporal reuse in a different way from loop invariant reference. Terefore, te self-temporal reuse described in tis paper complements te original concept in [15]. In a more general case like Fig. 1, te situation will be more complicated. Tis requires a systematic approac to detect and exploit multiple-index subscripted variable. III. METHOD Conceptually, te exploitation metod is simple. It tries to minimize memory access by replacing te frequently used multiple-index subscripted variables to temporary scalar variables. Tis data transformation is called scalar replacement [5]. To enable tis transformation, an systematic approac is developed. Te flow of te overall approac is sown in Fig. 3. Te steps in te approac are discussed in te following sub-sections. detection loop intercange unroll-and-jam scalar replacement Fig. 3. variable Te flow of te approac exploiting Multiple-index subscripted A. Detection Process Given a program, te compiler sould find out not only te multiple-index subscripted variables but also teir ability of generating temporal reuses. Tis process starts from te subscript expressions of an array reference. Te subscript expressions can be written in te form of a matrix called access matrix, H (defined in Fig. 1). For a loop invariant reference, te access matrix, H, contains one or more rows of zeros, meaning a loop index is not in any subscript expression of te reference. Tis evidence of temporal reuses is obvious to detect. In contrast, te situation for a more general form of array reference including multiple-index subscripted variable is not tat direct. For a general form of array reference, its ability of generating temporal reuses can be found by comparing te rank of its access matrix wit te dept of te loop nest it resides. For a multipleindex subscripted variable, te rank of its access matrix is computed by applying Ecelon reduction [3]. Tis rank is used to compare wit te loop nest s dept less te number of invariant loops, since a multiple-index subscripted variable can also be a loop invariant reference. Assuming te number of loops invariant to a multipleindex subscripted variable is p, te results of te comparison are sown below. Wen rank(h) = M p, tere is no temporal reuse is generated by te multiple indices. Wen rank(h) > M p, tis situation sould not exist in a correctly written program. Tere is no reuse in tis case. Wen rank(h) < M p, te reference migt generates temporal reuses wit its loop indices. It sould be noticed tat, tese temporal reuses are exploitable only wen tey occur witin te loop bounds b and b. Wen it is found tat a reference as rank(h) < M p, te distance vector sould be computed using Equation 1. Distance vector measures te distance between multiple accesses to a datum in terms of loop iterations. Its principle is tat self-temporal reuse occurs wen any two instances, x[ i)] and x[ j)], of an array reference x[ ] access te same datum at different iterations i and j ( i j). i) = j) and i j ih + c = jh + c ( i j)h = 0 d = i j dh = 0 (1) Te distance vectors for x[i] in Fig. 2(a) and x[i+j] in Fig. 2(b) are [0, 1] and [1, 1] respectively. From te distance vector of x[i + j], it can be seen tat tere is a coupling effect between te values of te two loop indices. Tat is to say, wenever loop index i increases by 1, loop index j sould decrease by 1. Tis coupling effect of te indices generates temporal reuses for exploitation. B. Loop Intercange And Related Tests Loop intercange is a loop transformation tat permutes te loops inside a loop nest [2], [3]. It is performs before unroll-and-jam in te approac. Loop intercange itself is not elpful to reveal reuses from multiple loop indices. Instead, it is performed for loop invariant references. Loop invariant reference is exploitable only wen its invariant loop is te innermost loop. Altoug tis paper is to exploit multiple-index subscripted variable, te occurrence of loop invariant reference makes loop intercange necessary. To determine weter loop intercange is necessary, te metod does te followings. It finds out all te invariant loops, wic are legal to sift to te innermost loop, in a loop nest. Ten it selects one of te invariant loops. By assuming tat loop as te innermost loop, it computes te amount of exploitable reuses. Te invariant loop tat generates maximum number of reuses will be cosen to be te innermost loop if it is not yet te innermost. If invariant loop does not exist in te loop nest, no loop intercange and related tests will be performed. C. Unroll-And-Jam Unroll-and-jam is a kind of loop transformation tecnique tat unrolls a loop body several times [6], [13]. It can be used in conjunction wit scalar replacement to improve register allocation [5], since it reveals te reuses carried by te loop indices. As mention in section III-A, te distance vector of reuse generated by multiplexindex subscripted variables reveals coupling effects between loop indices. Tus, wen applying unroll-and-jam, multiple loops sould be unrolled to expose tis kind of reuses. Altoug unrolling multiple loops does not cause any legality problem, jamming te unrolled loop body into te innermost loop is not always legal. For an outer loop, unroll-and-jam is allowed wen te outer loop can be intercange to te innermost loop. Te most important problem in unroll-and-jam is to determine te unrolling vector of te loop nest. For loop nest wit dept M, te

3 For every loop carrying legal temporal reuses, its unrolling factor v is initialized to te corresponding t m. Te minimal ratio R min is initialized to 1. Te optimum unrolling factor v opt is initialized to tm. Assuming tere are L loops carrying legal temporal reuses, form=1, to L for v t to max endfor m endfor m v m compute te number of reuses, e. compute te number of registers, r. if (r < te number of registers available) break; endif. compute te total number of memory accesses,a. compute te number of memory access ratio R. if (R < R opt ((R==R opt opt opt opt opt ) && (( v1 v2 vm vl) ( v1 v2 vm vl ) ))) R opt = R. endif Optimal unrolling vector is assigned wit te current unrolling vector. for (i = 0; i < 9; i += 3) for (j = 0; j < 9; j += 3) = x[i + j] ; = x[i + j + 1] ; = x[i + j + 1] ; = x[i + j + 3] ; = x[i + j + 3] ; = x[i + j + 4] ; = x[i + 9] ; = x[i + 10] ; = x[i + 11] ; for(j = 0; j < 10; j++) = x[9+j] ; (a) Unroll-and-jam for (i = 0; i < 9; i += 3) x3 = x[i]; x4 = x[i + 1]; for (j = 0; j < 9; j += 3) x0 = x3; x1 = x4; x2 = x[i + j + 2]; x3 = x[i + j + 3]; x4 = x[i + j + 4]; = x0 ; = x1 ; = x1 ; = x3 ; = x3 ; = x4 ; = x[i + 9] ; = x[i + 10] ; = x[i + 11] ; for(j = 0; j < 10; j++) = x[9+j] ; (b)scalar replacement Fig. 4. Iterative algoritm of searcing optimal unrolling vector Fig. 5. Scalar replacement in round robin fasion after unroll-and-jam unrolling vector is defined as v = [v 1 v 2... v m... v M ]. Wit te understandings of te multiple-index subscripted variables, we develop a parameter estimation model to determine te unrolling vector for loop nests containing multiple-index subscripted variables. Tis estimation model as taken into account te distance vectors of te reuses, te boundaries and te incremental step size of te loop nest, and te number of available registers. In our model te extended code size from unroll-and-jam is not considered, since tis is not purpose of tis paper. However, furter consideration on extended code size sould be incorporable into our metod witout muc modification. 1) Parameters To Estimate: Te optimal unrolling vector not only reveals a significant amount of reduction in memory access but also avoids register spilling. To find suc an optimal unrolling vector for a given loop nest, measurements are needed. Te measurements take bot te effect of scalar replacement and te effect of unroll-and-jam into account. Te details are listed below. Te total number of reuses exposed by unroll-and-jam, e. Reuse is te read after te first access. Te number of scalar variables required by scalar replacement, r. Te number of registers required cannot be greater tan te number of available registers. Tis is a condition to prevent register spilling. Te total number of memory accesses after te optimization, a. Tis computes te total number of memory accesses after scalar replacement in round robin fasion. Te ratio of te memory accesses after and before te optimization, R. Tis parameter reflects te effect of optimization. Tis is te objective to minimize. 2) Unrolling Vector: Te algoritm for selecting an optimized unrolling vector based on te parameter estimations is presented in Fig. 4. In Fig. 4, te first step is to do some initialization work for te iterative searcing of te optimal unrolling vector. It initializes bot te temporary unrolling vector (for searcing) and te default optimal unrolling vector to te original incremental step size vector t. During te searc, it performs te parameters estimation for every possible unrolling vector. Te unrolling vector leading to minimal memory accesses under te register restriction will be cosen. If tere is more tan one suc unrolling vector, te one wit smaller code size will win. If no unrolling vector satisfies te register restriction, te original incremental step size is te optimal unrolling vector. D. Scalar Replacement Scalar replacement replaces subscripted variables (array references) by temporary scalar variables to effect reuse [5]. Scalar replacement is te last transformation in te metod, wic is performed after unroll-and-jam. Tis transformation increases te register usage for most normal compiler wit coloring-based register allocators and is te most effective way of reducing memory operands [14]. Register operand also as sorter running times due to elimination of potential stalls and cace misses. Wen applying scalar replacement, tere are few tings to consider. Firstly, legality sould always be taken into account. Scalar replacement is performed on variables aving true dependence (readafter-write) or input dependence (read-after-read). Wen te reuse is true dependence, it sould be ensure tat tere is no data update between te write and te read of te datum. Wen te reuse is input dependence, scalar replacement will not cause any legality problem. For multiple-index subscripted variables, te reuse generated by multiple loop indices is self-temporal reuse, wic is always input dependence. Hence, tere is no legality problem during scalar replacement. Secondly, wen performing scalar replacement after unroll-and-jam, te temporary scalar variables are used in round robin fasion. For example, te code in Fig. 2(b) is optimized and sown in Fig. 5. In Fig. 5(a) unroll-and-jam is performed to expose te temporal reuses generated by te multiple-index subscripted array reference x[i+j]. Bot loop i and loop j are unrolled by an unrolling factor of 3. Te temporal reuses are te references aving te same subscripts, wic are ten reduced by scalar replacement as sown in Fig. 5(b). Scalar replacement is applied in round robin fasion by introducing temporary variables x0, x1, x3 and x4. Te assignments of x3 to x0 and x4 to x1 clear te data in x3 and x4, tus x3 and x4 can be loaded wit new values. To enable te round robin fasion, x3 and x4 are initialized in te outer loop. In te outer loop, tere is no data passing between x3 and x4, since te distance of two array references carried by loop i is 1, wic is less tan te incremental step size 3. Hence, te round robin fasion is not applied in te outer loop. Tis example sows tat scalar replacement in te round robin fasion greatly reduces te number of array references. Tis is because te data wit lifetime across iterations are passed troug scalar variables.

4 TABLE I BECHMARK FROM HLSYTH95/MEMORY Bencmark Compression Laplace LowPass SOR Wavelet E. Complexity Description An image compression sceme A Laplace algoritm to perform edge enancement A low-pass filter to an image A Successive Over-Relaxation (SOR) algoritm Te Daubecies 4-Coefficient Wavelet filter Te algoritm as to first detect te distance vectors in a loop nest. Specifically, te process of searcing multiple-index subscripted variable is found in O(n) time, n is te number of subscripted array references. After te detection process, te algoritm performs te test for loop intercange. Tis test is usually fast and requires O(M) time, M is te dept of te loop nest. Following loop intercange, te algoritm searces te loop index space for optimal unrolling vector based on te parameter estimations. Tis process requires time O(MK), M is te dept of a loop nest, and K is te number of iterations in a loop. In practice, te algoritm runs surprisingly fast. Tis migt be due to te acceptable complexity of practical applications. IV. PERFORMACE EVALUATIO Our proposed metod is applied to five bencmark programs taken from te Hig-level Syntesis Design Repository ((HLSynt95/memory) [1] listed in Table I. All te programs involve array accesses inside nested loops. Performance of our metod is measured in terms of 1) te accuracy of te measurements. Tis ensures tat te optimal unrolling vector is found correctly. 2) te percentage of temporal reuses exploited. A. Accuracy Accuracy refers to te reliability of te measurements for an unrolling vector. Measurements provide an estimation of te practical situation. Accurate measurements sould be close enoug to te practical situation during unroll-and-jam. To see ow close our measurements are to te practical situation, we compare te estimated access ratio R wit te practical access ratio R from te execution of te transformed program in a simulator [4]. Te estimation is restricted by te number of available registers. For te sake of evaluation, te number of registers is arbitrarily set to 10. However, te principle can be applied to oter values depending on te number of registers in a particular processor. For eac program, we follow te procedure in section III to perform loop intercange (if any), unroll-and-jam and scalar replacement. For te unroll-andjam, te program is transformed for eac possible unrolling vector. By executing te transformed program in te simulator, we ave te practical access ratio. Experiments sow tat estimated access ratio matces te practical access ratio wit a ig accuracy. For example, Table II sows te experimental results of te bencmark Compression. Tis proves tat te measurements in section III-C accurately estimate te effect of te transforms. B. Exploitation Rate Te effectiveness and flexibility of te procedure are now examined. Tis is done by computing te percentage of temporal reuse TABLE II COMPARISO OF ACCESS RATIOS FOR COMPRESSIO UDER 10-REGISTER RESTRICTIO [v1 v2] Estimated R Practical R [2 2] [2 3] [3 2] TABLE III EXPLOITATIO RATE UDER 10-REGISTER RESTRICTIO Prog. Opt. v Reg. Used R ideal R P rac Expl. Rate (%) Comp. [2 3] Lapl. [1 3] LowP. [1 3] SOR [2 3] Wave exploited in a program using (2). ExploitationRate = 1 Rprac 1 R ideal 100% (2) were R prac is te practical memory access ratio after and before te optimization. R ideal is te ideal memory access ratio. Te ideal case appens wen tere are sufficient registers to store all te data aving temporal reuses. Te ideal access ratio is inerent to computations and does not depend on te way a program written. Evaluation is performed on te bencmarks under te 10-register restriction. Te results are sown in Table III. Te second column in te table is te optimal unrolling vector selected by te procedure. Te tird column is te number of registers actually used during te optimization. Te results in te last column sow tat te exploitation rate varies from 49% to 87% for different bencmarks. Tis is because te exploitation rate is determined by te data dependences in a particular program and te number of available registers. Low exploitation rate can be due to data dependences preventing transformations and/or limited number of registers. Te last two columns in Table III sow tat significant improvements to data intensive applications ave been acieved by our metod. V. COCLUSIO An automated metod for reducing te number of memory access by transforming te source code of a data intensive program is proposed in tis paper. Tis metod as te advantage tat te exploration space is broadened compared wit previous works by considering temporal reuse generated by multi-index subscripts. Second, tis approac performs a sequence of ig-level compiler tecniques to exploit maximum amount of temporal reuses under register restriction. Tird, te measurements designed in our approac give an accurate estimation of te practical effect. Experimental results on a number of bencmarks confirm tat significant improvements can be acieved for data intensive programs using our metod. REFERECES [1] 1995 ig-level syntesis design repository. ttp://ftp.ics.uci.edu/pub/lsynt/hlsynt95/, [2] J. R. Allen and K. Kennedy. Automatic loop intercange. In Proceedings of te ACM SIGPLA 84 Symposium on Compiler Construction, pages ACM, June [3] U. Banerjee. Loop Transformations for Restructuring Compilers: Te Foundations. Kluwer Academic Publisers, Boston/Dordrect/London, 1993.

5 [4] D. Burger and T. M. Austin. Te simplescalar tool set, version 2.0. June [5] D. Callaan, S. Carr, and K. Kennedy. Improving register allocation for subscripted variables. In Proceedings of te ACM SIGPLA 1990 conference on Programming language design and implementation, pages ACM, June [6] S. Carr and Y. Guan. Unroll-and-jam using uniformly generated sets. In Proceedings of te 30t annual ACM/IEEE international symposium on Microarcitecture, pages , December [7] S. Carr and K. Kennedy. Improving te ratio of memory operations to floating-point operations in loops. ACM Transactions on Programming Languages and Systems, 16(6): , ovember [8] F. Cattoor, K. Danckaert, S. Wuytack, and. Dutt. Code transformations for data transfer and storage exploration preprocessing in multimedia processors. IEEE Journal on Design and Test of Computers, 18(3):70 82, May-June [9] F. Cattoor, S. Wuytack, E. D. Greef, F. Balasa, L. actergaele, and A. Vandecappelle. Custom Memory Management Metodology: Exploration of Memory Organization for Embedded Multimedia System Design. Kluwer Academic Publisers, Boston/Dordrect/London, [10] R. Gonzales and M. Horowitz. Energy dissipation in general-purpose microprocessors. IEEE Journal of Solid-state Circuit, SC-31(9): , September [11] M. Kandemir,. Vijaykrisnan, M. J. Irwin, and W. Ye. Influence of compiler optimizations on system power. In Proceedings of te 37t Design Automation Conference, pages ACM, June [12] A. Koseki, H. Komastu, and Y. Fukazawa. A metod for estimating optimal unrolling times for nested loops. Information Processing Society of Japan Journal, 37(06): , [13] V. Sarkar. Optimized unrolling of nested loops. In Proceedings of te 14t international conference on Supercomputing, pages ACM, June [14] V. Tiwari, S. Malik, and A. Wolfe. Power analysis of embedded software: a first step towards software power minimization. In Proceedings of te IEEE Conference on Computer Aided Design, pages IEEE, ovember [15] M. E. Wolf and M. S. Lam. A data locality optimizing algoritm. In Proceedings of te ACM SIGPLA 91 Conference on Programming Language Design and Implementation, pages 30 44, June 1991.

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various

More information

Haar Transform CS 430 Denbigh Starkey

Haar Transform CS 430 Denbigh Starkey Haar Transform CS Denbig Starkey. Background. Computing te transform. Restoring te original image from te transform 7. Producing te transform matrix 8 5. Using Haar for lossless compression 6. Using Haar

More information

Redundancy Awareness in SQL Queries

Redundancy Awareness in SQL Queries Redundancy Awareness in QL Queries Bin ao and Antonio Badia omputer Engineering and omputer cience Department University of Louisville bin.cao,abadia @louisville.edu Abstract In tis paper, we study QL

More information

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method International Journal of Statistics and Applications 0, (): -0 DOI: 0.9/j.statistics.000.0 Comparison of te Efficiency of te Various Algoritms in Stratified Sampling wen te Initial Solutions are Determined

More information

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation P R E P R N T CPWS XV Berlin, September 8, 008 Fast Calculation of Termodynamic Properties of Water and Steam in Process Modelling using Spline nterpolation Mattias Kunick a, Hans-Joacim Kretzscmar a,

More information

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically 2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use

More information

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall Has-Based Indexes Capter 11 Comp 521 Files and Databases Fall 2012 1 Introduction Hasing maps a searc key directly to te pid of te containing page/page-overflow cain Doesn t require intermediate page fetces

More information

Vector Processing Contours

Vector Processing Contours Vector Processing Contours Andrey Kirsanov Department of Automation and Control Processes MAMI Moscow State Tecnical University Moscow, Russia AndKirsanov@yandex.ru A.Vavilin and K-H. Jo Department of

More information

4.1 Tangent Lines. y 2 y 1 = y 2 y 1

4.1 Tangent Lines. y 2 y 1 = y 2 y 1 41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange

More information

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring Has-Based Indexes Capter 11 Comp 521 Files and Databases Spring 2010 1 Introduction As for any index, 3 alternatives for data entries k*: Data record wit key value k

More information

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method Engineering, 2013, 5, 522-526 ttp://dx.doi.org/10.4236/eng.2013.510b107 Publised Online October 2013 (ttp://www.scirp.org/journal/eng) Two Modifications of Weigt Calculation of te Non-Local Means Denoising

More information

Multi-Stack Boundary Labeling Problems

Multi-Stack Boundary Labeling Problems Multi-Stack Boundary Labeling Problems Micael A. Bekos 1, Micael Kaufmann 2, Katerina Potika 1 Antonios Symvonis 1 1 National Tecnical University of Atens, Scool of Applied Matematical & Pysical Sciences,

More information

Unsupervised Learning for Hierarchical Clustering Using Statistical Information

Unsupervised Learning for Hierarchical Clustering Using Statistical Information Unsupervised Learning for Hierarcical Clustering Using Statistical Information Masaru Okamoto, Nan Bu, and Tosio Tsuji Department of Artificial Complex System Engineering Hirosima University Kagamiyama

More information

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry Our Calibrated Model as No Predictive Value: An Example from te Petroleum Industry J.N. Carter a, P.J. Ballester a, Z. Tavassoli a and P.R. King a a Department of Eart Sciences and Engineering, Imperial

More information

Investigating an automated method for the sensitivity analysis of functions

Investigating an automated method for the sensitivity analysis of functions Investigating an automated metod for te sensitivity analysis of functions Sibel EKER s.eker@student.tudelft.nl Jill SLINGER j..slinger@tudelft.nl Delft University of Tecnology 2628 BX, Delft, te Neterlands

More information

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science A Cost Model for Distributed Sared Memory Using Competitive Update Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, Texas, 77843-3112, USA E-mail: fjkim,vaidyag@cs.tamu.edu

More information

Section 2.3: Calculating Limits using the Limit Laws

Section 2.3: Calculating Limits using the Limit Laws Section 2.3: Calculating Limits using te Limit Laws In previous sections, we used graps and numerics to approimate te value of a it if it eists. Te problem wit tis owever is tat it does not always give

More information

Piecewise Polynomial Interpolation, cont d

Piecewise Polynomial Interpolation, cont d Jim Lambers MAT 460/560 Fall Semester 2009-0 Lecture 2 Notes Tese notes correspond to Section 4 in te text Piecewise Polynomial Interpolation, cont d Constructing Cubic Splines, cont d Having determined

More information

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks An Algoritm for Loopless Deflection in Potonic Packet-Switced Networks Jason P. Jue Center for Advanced Telecommunications Systems and Services Te University of Texas at Dallas Ricardson, TX 75083-0688

More information

More on Functions and Their Graphs

More on Functions and Their Graphs More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in

More information

Symmetric Tree Replication Protocol for Efficient Distributed Storage System*

Symmetric Tree Replication Protocol for Efficient Distributed Storage System* ymmetric Tree Replication Protocol for Efficient Distributed torage ystem* ung Cune Coi 1, Hee Yong Youn 1, and Joong up Coi 2 1 cool of Information and Communications Engineering ungkyunkwan University

More information

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks Downloaded from vbn.aau.dk on: April 7, 09 Aalborg Universitet etwork Coding to Enance Standard Routing Protocols in Wireless Mes etworks Palevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank;

More information

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness 1 Optimal In-etwork Packet Aggregation Policy for Maimum Information Fresness Alper Sinan Akyurek, Tajana Simunic Rosing Electrical and Computer Engineering, University of California, San Diego aakyurek@ucsd.edu,

More information

Linear Interpolating Splines

Linear Interpolating Splines Jim Lambers MAT 772 Fall Semester 2010-11 Lecture 17 Notes Tese notes correspond to Sections 112, 11, and 114 in te text Linear Interpolating Splines We ave seen tat ig-degree polynomial interpolation

More information

4.2 The Derivative. f(x + h) f(x) lim

4.2 The Derivative. f(x + h) f(x) lim 4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially

More information

An Anchor Chain Scheme for IP Mobility Management

An Anchor Chain Scheme for IP Mobility Management An Ancor Cain Sceme for IP Mobility Management Yigal Bejerano and Israel Cidon Department of Electrical Engineering Tecnion - Israel Institute of Tecnology Haifa 32000, Israel E-mail: bej@tx.tecnion.ac.il.

More information

2.8 The derivative as a function

2.8 The derivative as a function CHAPTER 2. LIMITS 56 2.8 Te derivative as a function Definition. Te derivative of f(x) istefunction f (x) defined as follows f f(x + ) f(x) (x). 0 Note: tis differs from te definition in section 2.7 in

More information

PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION

PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION Martin Kraus Computer Grapics and Visualization Group, Tecnisce Universität Müncen, Germany krausma@in.tum.de Magnus Strengert Visualization and Interactive

More information

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer

More information

On the Use of Radio Resource Tests in Wireless ad hoc Networks

On the Use of Radio Resource Tests in Wireless ad hoc Networks Tecnical Report RT/29/2009 On te Use of Radio Resource Tests in Wireless ad oc Networks Diogo Mónica diogo.monica@gsd.inesc-id.pt João Leitão jleitao@gsd.inesc-id.pt Luis Rodrigues ler@ist.utl.pt Carlos

More information

Asynchronous Power Flow on Graphic Processing Units

Asynchronous Power Flow on Graphic Processing Units 1 Asyncronous Power Flow on Grapic Processing Units Manuel Marin, Student Member, IEEE, David Defour, and Federico Milano, Senior Member, IEEE Abstract Asyncronous iterations can be used to implement fixed-point

More information

Notes: Dimensional Analysis / Conversions

Notes: Dimensional Analysis / Conversions Wat is a unit system? A unit system is a metod of taking a measurement. Simple as tat. We ave units for distance, time, temperature, pressure, energy, mass, and many more. Wy is it important to ave a standard?

More information

Intra- and Inter-Session Network Coding in Wireless Networks

Intra- and Inter-Session Network Coding in Wireless Networks Intra- and Inter-Session Network Coding in Wireless Networks Hulya Seferoglu, Member, IEEE, Atina Markopoulou, Member, IEEE, K K Ramakrisnan, Fellow, IEEE arxiv:857v [csni] 3 Feb Abstract In tis paper,

More information

An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng

An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng An ffective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Ciming Huang and ei-heng Ceng 5 De c e mbe r0 International Journal of Advanced Information Tecnologies (IJAIT),

More information

Alternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method

Alternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method Te Open Plasma Pysics Journal, 2010, 3, 29-35 29 Open Access Alternating Direction Implicit Metods for FDTD Using te Dey-Mittra Embedded Boundary Metod T.M. Austin *, J.R. Cary, D.N. Smite C. Nieter Tec-X

More information

Proceedings of the 8th WSEAS International Conference on Neural Networks, Vancouver, British Columbia, Canada, June 19-21,

Proceedings of the 8th WSEAS International Conference on Neural Networks, Vancouver, British Columbia, Canada, June 19-21, Proceedings of te 8t WSEAS International Conference on Neural Networks, Vancouver, Britis Columbia, Canada, June 9-2, 2007 3 Neural Network Structures wit Constant Weigts to Implement Dis-Jointly Removed

More information

Economic design of x control charts considering process shift distributions

Economic design of x control charts considering process shift distributions J Ind Eng Int (2014) 10:163 171 DOI 10.1007/s40092-014-0086-2 ORIGINAL RESEARCH Economic design of x control carts considering process sift distributions Vijayababu Vommi Rukmini V. Kasarapu Received:

More information

Asynchronous Power Flow on Graphic Processing Units

Asynchronous Power Flow on Graphic Processing Units Asyncronous Power Flow on Grapic Processing Units Manuel Marin, David Defour, Federico Milano To cite tis version: Manuel Marin, David Defour, Federico Milano. Asyncronous Power Flow on Grapic Processing

More information

Laser Radar based Vehicle Localization in GPS Signal Blocked Areas

Laser Radar based Vehicle Localization in GPS Signal Blocked Areas International Journal of Computational Intelligence Systems, Vol. 4, No. 6 (December, 20), 00-09 Laser Radar based Veicle Localization in GPS Signal Bloced Areas Ming Yang Department of Automation, Sangai

More information

A Novel QC-LDPC Code with Flexible Construction and Low Error Floor

A Novel QC-LDPC Code with Flexible Construction and Low Error Floor A Novel QC-LDPC Code wit Flexile Construction and Low Error Floor Hanxin WANG,2, Saoping CHEN,2,CuitaoZHU,2 and Kaiyou SU Department of Electronics and Information Engineering, Sout-Central University

More information

Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes

Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganograpic Scemes Jessica Fridric Dept. of Electrical Engineering, SUNY Bingamton, Bingamton, NY 3902-6000, USA fridric@bingamton.edu

More information

Computing geodesic paths on manifolds

Computing geodesic paths on manifolds Proc. Natl. Acad. Sci. USA Vol. 95, pp. 8431 8435, July 1998 Applied Matematics Computing geodesic pats on manifolds R. Kimmel* and J. A. Setian Department of Matematics and Lawrence Berkeley National

More information

The Euler and trapezoidal stencils to solve d d x y x = f x, y x

The Euler and trapezoidal stencils to solve d d x y x = f x, y x restart; Te Euler and trapezoidal stencils to solve d d x y x = y x Te purpose of tis workseet is to derive te tree simplest numerical stencils to solve te first order d equation y x d x = y x, and study

More information

Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks

Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Okan Yilmaz and Ing-Ray Cen Computer Science Department Virginia Tec {oyilmaz, ircen}@vt.edu

More information

Real-Time Wireless Routing for Industrial Internet of Things

Real-Time Wireless Routing for Industrial Internet of Things Real-Time Wireless Routing for Industrial Internet of Tings Cengjie Wu, Dolvara Gunatilaka, Mo Sa, Cenyang Lu Cyber-Pysical Systems Laboratory, Wasington University in St. Louis Department of Computer

More information

Traffic Sign Classification Using Ring Partitioned Method

Traffic Sign Classification Using Ring Partitioned Method Traffic Sign Classification Using Ring Partitioned Metod Aryuanto Soetedjo and Koici Yamada Laboratory for Management and Information Systems Science, Nagaoa University of Tecnology 603- Kamitomioamaci,

More information

A UPnP-based Decentralized Service Discovery Improved Algorithm

A UPnP-based Decentralized Service Discovery Improved Algorithm Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol.1, No.1, Marc 2013, pp. 21~26 ISSN: 2089-3272 21 A UPnP-based Decentralized Service Discovery Improved Algoritm Yu Si-cai*, Wu Yan-zi,

More information

H-Adaptive Multiscale Schemes for the Compressible Navier-Stokes Equations Polyhedral Discretization, Data Compression and Mesh Generation

H-Adaptive Multiscale Schemes for the Compressible Navier-Stokes Equations Polyhedral Discretization, Data Compression and Mesh Generation H-Adaptive Multiscale Scemes for te Compressible Navier-Stokes Equations Polyedral Discretization, Data Compression and Mes Generation F. Bramkamp 1, B. Gottsclic-Müller 2, M. Hesse 1, P. Lamby 2, S. Müller

More information

When a BST becomes badly unbalanced, the search behavior can degenerate to that of a sorted linked list, O(N).

When a BST becomes badly unbalanced, the search behavior can degenerate to that of a sorted linked list, O(N). Balanced Binary Trees Binary searc trees provide O(log N) searc times provided tat te nodes are distributed in a reasonably balanced manner. Unfortunately, tat is not always te case and performing a sequence

More information

Generalizing Timing Predictions to Set-Associative Caches. Frank Mueller. Humboldt-Universitat zu Berlin. Institut fur Informatik

Generalizing Timing Predictions to Set-Associative Caches. Frank Mueller. Humboldt-Universitat zu Berlin. Institut fur Informatik Generalizing Timing Predictions to Set-Associative Caces Frank Mueller Humboldt-Universitat zu Berlin Institut fur Informatik 10099 Berlin (Germany) e-mail: mueller@informatik.u-berlin.de pone: (+49) (30)

More information

Software Fault Prediction using Machine Learning Algorithm Pooja Garg 1 Mr. Bhushan Dua 2

Software Fault Prediction using Machine Learning Algorithm Pooja Garg 1 Mr. Bhushan Dua 2 IJSRD - International Journal for Scientific Researc & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Software Fault Prediction using Macine Learning Algoritm Pooja Garg 1 Mr. Busan Dua 2

More information

Soft sensor modelling by time difference, recursive partial least squares and adaptive model updating

Soft sensor modelling by time difference, recursive partial least squares and adaptive model updating Soft sensor modelling by time difference, recursive partial least squares adaptive model updating Y Fu 1, 2, W Yang 2, O Xu 1, L Zou 3, J Wang 4 1 Zijiang College, Zejiang University of ecnology, Hangzou

More information

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 Note: Tere will be a very sort online reading quiz (WebWork) on eac reading assignment due one our before class on its due date. Due dates can be found

More information

Numerical Derivatives

Numerical Derivatives Lab 15 Numerical Derivatives Lab Objective: Understand and implement finite difference approximations of te derivative in single and multiple dimensions. Evaluate te accuracy of tese approximations. Ten

More information

CE 221 Data Structures and Algorithms

CE 221 Data Structures and Algorithms CE Data Structures and Algoritms Capter 4: Trees (AVL Trees) Text: Read Weiss, 4.4 Izmir University of Economics AVL Trees An AVL (Adelson-Velskii and Landis) tree is a binary searc tree wit a balance

More information

UUV DEPTH MEASUREMENT USING CAMERA IMAGES

UUV DEPTH MEASUREMENT USING CAMERA IMAGES ABCM Symposium Series in Mecatronics - Vol. 3 - pp.292-299 Copyrigt c 2008 by ABCM UUV DEPTH MEASUREMENT USING CAMERA IMAGES Rogerio Yugo Takimoto Graduate Scool of Engineering Yokoama National University

More information

Overcomplete Steerable Pyramid Filters and Rotation Invariance

Overcomplete Steerable Pyramid Filters and Rotation Invariance vercomplete Steerable Pyramid Filters and Rotation Invariance H. Greenspan, S. Belongie R. Goodman and P. Perona S. Raksit and C. H. Anderson Department of Electrical Engineering Department of Anatomy

More information

Multi-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art

Multi-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art Multi-Objective Particle Swarm Optimizers: A Survey of te State-of-te-Art Margarita Reyes-Sierra and Carlos A. Coello Coello CINVESTAV-IPN (Evolutionary Computation Group) Electrical Engineering Department,

More information

Communicator for Mac Quick Start Guide

Communicator for Mac Quick Start Guide Communicator for Mac Quick Start Guide 503-968-8908 sterling.net training@sterling.net Pone Support 503.968.8908, option 2 pone-support@sterling.net For te most effective support, please provide your main

More information

The navigability variable is binary either a cell is navigable or not. Thus, we can invert the entire reasoning by substituting x i for x i : (4)

The navigability variable is binary either a cell is navigable or not. Thus, we can invert the entire reasoning by substituting x i for x i : (4) A Multi-Resolution Pyramid for Outdoor Robot Terrain Perception Micael Montemerlo and Sebastian Trun AI Lab, Stanford University 353 Serra Mall Stanford, CA 94305-9010 {mmde,trun}@stanford.edu Abstract

More information

Density Estimation Over Data Stream

Density Estimation Over Data Stream Density Estimation Over Data Stream Aoying Zou Dept. of Computer Science, Fudan University 22 Handan Rd. Sangai, 2433, P.R. Cina ayzou@fudan.edu.cn Ziyuan Cai Dept. of Computer Science, Fudan University

More information

MAPI Computer Vision

MAPI Computer Vision MAPI Computer Vision Multiple View Geometry In tis module we intend to present several tecniques in te domain of te 3D vision Manuel Joao University of Mino Dep Industrial Electronics - Applications -

More information

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes Coarticulation: An Approac for Generating Concurrent Plans in Markov Decision Processes Kasayar Roanimanes kas@cs.umass.edu Sridar Maadevan maadeva@cs.umass.edu Department of Computer Science, University

More information

HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS

HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS N.G.Bardis Researc Associate Hellenic Ministry of te Interior, Public Administration and Decentralization 8, Dragatsaniou str., Klatmonos S. 0559, Greece

More information

Experimental Studies on SMT-based Debugging

Experimental Studies on SMT-based Debugging Experimental Studies on SMT-based Debugging Andre Sülflow Görscwin Fey Rolf Drecsler Institute of Computer Science University of Bremen 28359 Bremen, Germany {suelflow,fey,drecsle}@informatik.uni-bremen.de

More information

An Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks

An Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks Tis paper was presented as part of te main tecnical program at IEEE INFOCOM 20 An Analytical Approac to Real-Time Misbeavior Detection in IEEE 802. Based Wireless Networks Jin Tang, Yu Ceng Electrical

More information

ReVAMP : ReRAM based VLIW Architecture for in-memory computing

ReVAMP : ReRAM based VLIW Architecture for in-memory computing ReVAMP : ReRAM based VLIW Arcitecture for in-memory computing Debjyoti Battacarjee, Rajeswari Devadoss and Anupam Cattopadyay Scool of Computer Science and Engineering, Nanyang Tecnological University,

More information

Section 1.2 The Slope of a Tangent

Section 1.2 The Slope of a Tangent Section 1.2 Te Slope of a Tangent You are familiar wit te concept of a tangent to a curve. Wat geometric interpretation can be given to a tangent to te grap of a function at a point? A tangent is te straigt

More information

Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks

Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks Peyman Faizian, Md Safayat Raman, Md Atiqul Molla, Xin Yuan Department of Computer Science Florida State University

More information

CHAPTER 7: TRANSCENDENTAL FUNCTIONS

CHAPTER 7: TRANSCENDENTAL FUNCTIONS 7.0 Introduction and One to one Functions Contemporary Calculus 1 CHAPTER 7: TRANSCENDENTAL FUNCTIONS Introduction In te previous capters we saw ow to calculate and use te derivatives and integrals of

More information

Search-aware Conditions for Probably Approximately Correct Heuristic Search

Search-aware Conditions for Probably Approximately Correct Heuristic Search Searc-aware Conditions for Probably Approximately Correct Heuristic Searc Roni Stern Ariel Felner Information Systems Engineering Ben Gurion University Beer-Seva, Israel 85104 roni.stern@gmail.com, felner@bgu.ac.il

More information

15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes

15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes 15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes William Lovas (wlovas@cs) Karl Naden Out: Tuesday, Friday, June 10, 2011 Due: Monday, June 13, 2011 (Written

More information

Solutions Manual for Fundamentals of Fluid Mechanics 7th edition by Munson Rothmayer Okiishi and Huebsch

Solutions Manual for Fundamentals of Fluid Mechanics 7th edition by Munson Rothmayer Okiishi and Huebsch Solutions Manual for Fundamentals of Fluid Mecanics 7t edition by Munson Rotmayer Okiisi and Huebsc Link full download : ttps://digitalcontentmarket.org/download/solutions-manual-forfundamentals-of-fluid-mecanics-7t-edition-by-munson-rotmayer-okiisi-and-uebsc/

More information

REVERSIBLE DATA HIDING USING IMPROVED INTERPOLATION TECHNIQUE

REVERSIBLE DATA HIDING USING IMPROVED INTERPOLATION TECHNIQUE International Researc Journal of Engineering and Tecnology (IRJET) e-issn: 2395-0056 REVERSIBLE DATA HIDING USING IMPROVED INTERPOLATION TECHNIQUE Devendra Kumar 1, Dr. Krisna Raj 2 (Professor in ECE Department

More information

Design of PSO-based Fuzzy Classification Systems

Design of PSO-based Fuzzy Classification Systems Tamkang Journal of Science and Engineering, Vol. 9, No 1, pp. 6370 (006) 63 Design of PSO-based Fuzzy Classification Systems Cia-Cong Cen Department of Electronics Engineering, Wufeng Institute of Tecnology,

More information

Cubic smoothing spline

Cubic smoothing spline Cubic smooting spline Menu: QCExpert Regression Cubic spline e module Cubic Spline is used to fit any functional regression curve troug data wit one independent variable x and one dependent random variable

More information

Grid Adaptation for Functional Outputs: Application to Two-Dimensional Inviscid Flows

Grid Adaptation for Functional Outputs: Application to Two-Dimensional Inviscid Flows Journal of Computational Pysics 176, 40 69 (2002) doi:10.1006/jcp.2001.6967, available online at ttp://www.idealibrary.com on Grid Adaptation for Functional Outputs: Application to Two-Dimensional Inviscid

More information

Tuning MAX MIN Ant System with off-line and on-line methods

Tuning MAX MIN Ant System with off-line and on-line methods Université Libre de Bruxelles Institut de Recerces Interdisciplinaires et de Développements en Intelligence Artificielle Tuning MAX MIN Ant System wit off-line and on-line metods Paola Pellegrini, Tomas

More information

Efficient Content-Based Indexing of Large Image Databases

Efficient Content-Based Indexing of Large Image Databases Efficient Content-Based Indexing of Large Image Databases ESSAM A. EL-KWAE University of Nort Carolina at Carlotte and MANSUR R. KABUKA University of Miami Large image databases ave emerged in various

More information

Classification of Osteoporosis using Fractal Texture Features

Classification of Osteoporosis using Fractal Texture Features Classification of Osteoporosis using Fractal Texture Features V.Srikant, C.Dines Kumar and A.Tobin Department of Electronics and Communication Engineering Panimalar Engineering College Cennai, Tamil Nadu,

More information

wrobot k wwrobot hrobot (a) Observation area Horopter h(θ) (Virtual) horopters h(θ+ θ lim) U r U l h(θ+ θ) Base line Left camera Optical axis

wrobot k wwrobot hrobot (a) Observation area Horopter h(θ) (Virtual) horopters h(θ+ θ lim) U r U l h(θ+ θ) Base line Left camera Optical axis Selective Acquisition of 3-D Information Enoug for Finding Passable Free Spaces Using an Active Stereo Vision System Atsusi Nisikawa, Atsusi Okubo, and Fumio Miyazaki Department of Systems and Human Science

More information

Distributed and Optimal Rate Allocation in Application-Layer Multicast

Distributed and Optimal Rate Allocation in Application-Layer Multicast Distributed and Optimal Rate Allocation in Application-Layer Multicast Jinyao Yan, Martin May, Bernard Plattner, Wolfgang Mülbauer Computer Engineering and Networks Laboratory, ETH Zuric, CH-8092, Switzerland

More information

3.6 Directional Derivatives and the Gradient Vector

3.6 Directional Derivatives and the Gradient Vector 288 CHAPTER 3. FUNCTIONS OF SEVERAL VARIABLES 3.6 Directional Derivatives and te Gradient Vector 3.6.1 Functions of two Variables Directional Derivatives Let us first quickly review, one more time, te

More information

CSCE476/876 Spring Homework 5

CSCE476/876 Spring Homework 5 CSCE476/876 Spring 2016 Assigned on: Friday, Marc 11, 2016 Due: Monday, Marc 28, 2016 Homework 5 Programming assignment sould be submitted wit andin Te report can eiter be submitted wit andin as a PDF,

More information

Author's personal copy

Author's personal copy Autor's personal copy Information Processing Letters 09 (009) 868 875 Contents lists available at ScienceDirect Information Processing Letters www.elsevier.com/locate/ipl Elastic tresold-based admission

More information

George Xylomenos and George C. Polyzos. with existing protocols and their eæciency in terms of

George Xylomenos and George C. Polyzos. with existing protocols and their eæciency in terms of IP MULTICASTING FOR WIRELESS MOBILE OSTS George Xylomenos and George C. Polyzos fxgeorge,polyzosg@cs.ucsd.edu Computer Systems Laboratory Department of Computer Science and Engineering University of California,

More information

Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs

Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs Per Ostlund Department of Computer and Information Science Linkoping University SE-58183 Linkoping, Sweden per.ostlund@liu.se Kristian

More information

SUPER OBLIQUE INCIDENCE INTERFEROMETER USING SWS PRISM

SUPER OBLIQUE INCIDENCE INTERFEROMETER USING SWS PRISM SUPER OBLIQUE INCIDENCE INTERFEROMETER USING SWS PRISM Yukitosi OTANI 1,2), Yasuiro MIZUTANI 2), Noriiro UMEDA 2) 1) Optical Sciences Center, University of Arizona, Arizona 85721 2) Dept, of Mec. Sys.

More information

MAP MOSAICKING WITH DISSIMILAR PROJECTIONS, SPATIAL RESOLUTIONS, DATA TYPES AND NUMBER OF BANDS 1. INTRODUCTION

MAP MOSAICKING WITH DISSIMILAR PROJECTIONS, SPATIAL RESOLUTIONS, DATA TYPES AND NUMBER OF BANDS 1. INTRODUCTION MP MOSICKING WITH DISSIMILR PROJECTIONS, SPTIL RESOLUTIONS, DT TYPES ND NUMBER OF BNDS Tyler J. lumbaug and Peter Bajcsy National Center for Supercomputing pplications 605 East Springfield venue, Campaign,

More information

AVL Trees Outline and Required Reading: AVL Trees ( 11.2) CSE 2011, Winter 2017 Instructor: N. Vlajic

AVL Trees Outline and Required Reading: AVL Trees ( 11.2) CSE 2011, Winter 2017 Instructor: N. Vlajic 1 AVL Trees Outline and Required Reading: AVL Trees ( 11.2) CSE 2011, Winter 2017 Instructor: N. Vlajic AVL Trees 2 Binary Searc Trees better tan linear dictionaries; owever, te worst case performance

More information

You Try: A. Dilate the following figure using a scale factor of 2 with center of dilation at the origin.

You Try: A. Dilate the following figure using a scale factor of 2 with center of dilation at the origin. 1 G.SRT.1-Some Tings To Know Dilations affect te size of te pre-image. Te pre-image will enlarge or reduce by te ratio given by te scale factor. A dilation wit a scale factor of 1> x >1enlarges it. A dilation

More information

CORDIC-Based LMMSE Equalizer for Software Defined Radio

CORDIC-Based LMMSE Equalizer for Software Defined Radio CORDIC-Based LMMSE Equalizer for Software Defined Radio Murugappan SENTHILVELAN, Javier HORMIGO, Joon Hwa CHUN, Miai SIMA *, Daniel IANCU, Micael SCHULTE, Jon GLOSSNER Optimum Semiconductor Tecnologies,

More information

CS 234. Module 6. October 16, CS 234 Module 6 ADT Dictionary 1 / 33

CS 234. Module 6. October 16, CS 234 Module 6 ADT Dictionary 1 / 33 CS 234 Module 6 October 16, 2018 CS 234 Module 6 ADT Dictionary 1 / 33 Idea for an ADT Te ADT Dictionary stores pairs (key, element), were keys are distinct and elements can be any data. Notes: Tis is

More information

Capacity on Demand User s Guide

Capacity on Demand User s Guide System z Capacity on Demand User s Guide SC28-6846-02 Level 02c, October 2009 System z Capacity on Demand User s Guide SC28-6846-02 Level 02c, October 2009 Note Before using tis information and te product

More information

Mean Shifting Gradient Vector Flow: An Improved External Force Field for Active Surfaces in Widefield Microscopy.

Mean Shifting Gradient Vector Flow: An Improved External Force Field for Active Surfaces in Widefield Microscopy. Mean Sifting Gradient Vector Flow: An Improved External Force Field for Active Surfaces in Widefield Microscopy. Margret Keuper Cair of Pattern Recognition and Image Processing Computer Science Department

More information

Announcements. Lilian s office hours rescheduled: Fri 2-4pm HW2 out tomorrow, due Thursday, 7/7. CSE373: Data Structures & Algorithms

Announcements. Lilian s office hours rescheduled: Fri 2-4pm HW2 out tomorrow, due Thursday, 7/7. CSE373: Data Structures & Algorithms Announcements Lilian s office ours resceduled: Fri 2-4pm HW2 out tomorrow, due Tursday, 7/7 CSE373: Data Structures & Algoritms Deletion in BST 2 5 5 2 9 20 7 0 7 30 Wy migt deletion be arder tan insertion?

More information

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result RT. Complex Fractions Wen working wit algebraic expressions, sometimes we come across needing to simplify expressions like tese: xx 9 xx +, xx + xx + xx, yy xx + xx + +, aa Simplifying Complex Fractions

More information

An experimental framework to investigate context-aware schemes for content delivery

An experimental framework to investigate context-aware schemes for content delivery An experimental framework to investigate context-aware scemes for content delivery Pietro Lungaro +, Cristobal Viedma +, Zary Segall + and Pavan Kumar + Mobile Service Lab, Royal Institute of Tecnology

More information

12.2 TECHNIQUES FOR EVALUATING LIMITS

12.2 TECHNIQUES FOR EVALUATING LIMITS Section Tecniques for Evaluating Limits 86 TECHNIQUES FOR EVALUATING LIMITS Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing tecnique to evaluate its of

More information

SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS. Hewlett-Packard Company East Mission Avenue. Bogazici University

SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS. Hewlett-Packard Company East Mission Avenue. Bogazici University SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS Sanuj V. Sarin 1, Hakan Delic 2 and Jung H. Kim 3 1 Hewlett-Packard Company 24001 East Mission Avenue Spokane, Wasington 99109, USA 2 Signal

More information