Method of controlling access to intellectual switching nodes of telecommunication networks and systems

Size: px
Start display at page:

Download "Method of controlling access to intellectual switching nodes of telecommunication networks and systems"

Transcription

1 ISSN (e): Volume 05 Issue 05 ay 2015 Intenational Jounal of Computational Engineeing eseach (IJCE) ethod of contolling access to intellectual switching nodes of telecommunication netwoks and systems Alexey Sminov 1 ohamad Abou Taam 2 Segey Sminov 2 1 The head of the Depatment of Softwae Kiovohad National Technical Univesity Kiovohad Ukaine 2 Gaduate student in the Depatment of Softwae Kiovohad National Technical Univesity Kiovohad Ukaine ABSTACT: The developed method of contolling access to intellectual switching nodes includes a mathematical model of intellectual switching nodes with sevice infomation packets of diffeent pioity and an impoved algoithm to contol access to the cloud "of telecommunications esouces. Based on multichannel model (CO) as well as developed GET model of intellectual switching V K nodes caied out the study of functioning infomation and telecommunication netwok. The Equivalent Wfunction distibution function and density distibution of sevice time infomation packets of metadata in intelligent switching nodes when they ae tansfeed to the cloud antivius systems it is detemined that an additional citeion fo attibution infomation packet "efeence" pioity can be the value of the pobability of assigning pioity. KEYWODS: Infomation and Telecommunications Netwok GETmodel access contol intellectual switching nodes. I. DEFINITION OF POBLE In cuent conditions of dynamic development of vaious appoaches of the analysis and synthesis of the telecommunication netwoks integated into infomation and telecommunication technology [15] thee ae questions of elaboation and application of the geneal methods of ensuing sevice quality based on allocation of sepaate classes of quality and ealization of managing algoithms such as pioitization of infomation packages esevation of telecommunication esouces oganization of queuing in switching nodes etc. The manifestation of new destabilizing factos associated with the influence of the malicious softwae on the pocess of the functioning of infomation and telecommunication netwoks obliges to evise the geneal capabilities of the existing mechanisms fo managing the sevice quality and putting suggestions (algoithms) and adapting them with possible wongful action of paticipants of telecommunications exchange. Thus thee is a need to develop netwoking and communications technologies and to elaboate the methods of managing netwok esouces that could povide: sevice quality and infomation secuity at the joint tansfe of heteogeneous taffic taking into account the constaint of netwok esouces the eal eliability of telecommunications equipment and possible extenal influence malicious o othe chaacte ; Safety of functioning of individual nodes of infomation and telecommunication system fom the effect of malicious softwae; Stability (eliability suvivability functional safety) is functioning unde the above conditions etc. One of effective mechanisms that face malicious softwae is the use of antivius esouces cloud. Studies of main pocedues of data exchange in infomationtelecommunication systems have shown that one of key oles at ensuing delivey timeliness of metadata (signatues) in "cloud" antivius systems plays a ole of tansmission contol mechanism. Thus thei basic algoithms ae ealized specifically in switching nodes. The given fact has allowed coming to the conclusion about the need to develop a method fo managing netwok esouces taking into account the advanced pocedues of the oganization and queue scheduling. Open Access Jounal Page 1

2 ethod of contolling access to intellectual switching nodes of II. GENEAL DEFINITION OF POBLE AND DESCIPTION OF SWITCHING NODES FUNCTIONING Accoding to data mentioned in [15] stuctual and functional stuctue ITS of next geneation netwok (NGN) is heteogeneous. This facto is especially mentioned in the ealy stages of ITS stuctue. It should be noted that only when combining low speed taffic thee ae peconditions fo the use of models of simplest packets [1]. This is because the lage numbe of small independent odinay stationay (nonstationay) steams with diffeent afteeffect (Khinchin's theoem) [1.2] as well as the tansfomation of steams in netwok (summation sceening) [1.2] in limit gives the steam that is close to the simplest packet: а а ( t ) 1 e ( t ) 0 t 0 (1) the paamete of steam tansfeed to paametes of tansmission by using this equation: с ) q ( ) ( c q ( ) t сегм L ( ) прд ( ) L пак intensity of eceived messages; 1 c ( ) t сегм ( ) the aveage numbe of packets in the message го pioity; L ( ) ( ) ( ) прд the aveage time of packet segmentation го pioity; the length of the infomation potion of packet го pioity; L пак ( ) speed of sending(pocessing) infomation го pioity; L ( ) ( ) ovehead on packet convesion ; the length of the packet го pioity; Pioity packets fom diffeent classes as soon as they access to ITs ae divided into packets of diffeent length while limiting thei maximum size. This assumption allows dawing a conclusion on the possibility of use while ceating such netwoks in the appopiate calculations and a demonstation law of distibution of the andom vaiable duation of thei sevice in switching nodes [13]. In this case the duation of sevice packet pioities 1 of the andom vaiable with distibution function [1.2] is: B t 1 e t (2) b t 0 b 0 And the end of the fist two moments is: b tdb b 0 0 t 1 t ср ( 2 ) 2 2 t 1 db v L прд пак (3) 2 ср (4) (5) aveage intensity of sevice packets ср Open Access Jounal Page 2

3 ethod of contolling access to intellectual switching nodes of In the example mentioned above switching node is ealized in the next sevice discipline. If at the time of access of packet with any pioity 0 i V 1 ) so it (packet) immediately access to the sevice. 1 thee ae fee channels (switching node status b) in the case of occupancy of all channels (switching node status V i V K ) the eceived packet го pioity is queued and it is accepted fo sevice befoe the packet of j го pioity if j : If at the time of access of the packet of pioity in queues thee wee K packets (the buffe is filled completely) so the eceived packet is : Accepted in queue unde conditions that thee ae packets with lowpioity j the latte packet with low pioity is ousted fom the system and late does not have any impact on it (system); The packet Is Lost given that in a queue thee ae only packets with highe o equal j м pioity. b) Fo packets (equal) pioities that ae in the queue FIFO system is ealized As shown in the discipline of sevice in switching node when packets set in the queue and queue is managed the absolute pioity functions while in the sevice the elative pioity functions. The use of absolute pioity queue management only povides sevice packets without inteuption but at the same time the losses and the aveage waiting time pioity packet ae minimized. At the same time this discipline mentioned above has a numbe of disadvantages associated with the lack of malicious factos o othe extenal influences on ITS. Theefoe in the conditions of destuctive extenal influences and the fequent failue of telecommunications equipment using this model in the ceation of ITS influence negatively on the pocess of ensuing the quality of sevice indicatos such as infomation and functional secuity eliability. Studies have shown that in ode to eliminate these disadvantages it is advisable to use a mathematical model of switching node type with elative pioities esouce esevation and taking into consideation the eal eliability of seving devices. V K odel of switching node and its elative pioities esevations esouces and eal eliability of seving devices. The assumptions listed above (concening: appoximation of packet steam class : 1 ; with the chaacteistics of a Poisson distibution law; sevice with elative pioities 1 class of sevice quality taking into account the categoies of uses and the subsystems; pesence of V seving devices with the ultimate eliability of the vaiablelength packets; chaacteized by the exponential distibution function (2) with paamete defined by equation (5)) aim at managing taffic and ensuing the specified quality of sevice indicatos (including infomational and functional safety)unde conditions of limited esouces ITS possible malicious o othe effects a discipline sevice and thei elative pioities of patial switching channel 1 V and a joint (sepaate) use of dives K could be applied. This will ensue the backup of telecommunication esouces fo highpioity taffic (especially metadata in cloud antivius systems) [3.5]. The analysis of basic algoithms management queue in ITS communications equipment showed that cuently thee ae seveal types of disciplines (ways) of sevice queues that ealize the esevation of esouces: (Fai Queuing FQ); (Pioity Queuing (PQ)); (Custom Queuing CQ); (WFQ Fai Queuing Weighted); (Class Based Weighted Fai Queuing CBWFQ) etc. [35]. Open Access Jounal Page 3

4 ethod of contolling access to intellectual switching nodes of Compaative studies of these algoithms have shown that the most effective in tems of ensuing quality of sevice is the algoithms of WFQ CBWFQ deived algoithms CQ. Theefoe futhe eseach is based on the management of WFQ and CBWFQ queue. Let s pesent a telecommunication system in which the sevices ae divided into seveal classes quality of sevice (QoS) with appopiate pioities fo latency and packet loss (fo example tansfe of infomation and measuement of monitoing data telephony postal infomation tansfe video confeencing etc.). The total numbe of pioities fo the types of sevices uses and subsystems is Let s conside that at the entance intellectual switching node eceives the simplest packets steam s pioity classes { } which ae numbeed in ode of pioity. Each pioity class is chaacteized by the а 1... а... a intensity of packets : 0 In the paticula case pioities ae gouped in thee goups 1 sevices: J J taffic of metadata fo tansmission in the cloud antivius system; 3 coesponding to the 2 2 J taffic of eal time citical to netwok delays (telephony videoconfeencing data objective contol etc.); 3 J 1 Taffic of data citical to losses and not citical to netwok delays including steam of taffic (audio video on demand etc..) and elastic taffic ( webapplications etc..). In this case the highest pioity is using metadata fo tansmission to the cloud antivius system. Theefoe In the switching nodes of infomation and telecommunication systems pesented diffeent smat devices (contolles gateways switches outes gateways etc.) tanspot netwok uses of diffeent categoies and subsystems steam eceived message of diffeent classes. The intensity of eceived and sevice messages is chaacteized by paametes c и c 1 and in accodance with the speed of eceived message (tansfe ). The eceived messages in the switching nodes ae conveted into a packet fom and fom an v прд independent packet steam а... а... with intensities... 1 a The intellectual switching nodes ITS consists of 0 V seving devices with identical tacticaltechnical chaacteistics depending on capabilities of manufactues of telecommunication equipment and the buffe memoy capacity 0 К. In switching nodes estictions ae imposed on seving devices esouces V V and memoy buffe size К К packet of diffeent pioity classes. In this case the packet with pioity accesses to all seving devices and allocates a potion of buffe of the total volume of the buffe detemines in accodance with the advanced algoithm to contol access to "cloud" telecommunications esouces descibed below. Fo packet of pioities 2 2 J the available pat V V of the device sevice is not in use at the moment of metadata packet pioity detemines the impoved algoithm to contol access to cloud telecommunications esouces and allocates a pat of buffe К К fom total capacity of the buffe K Fo packets of emaining pioities 3 J 1 thee ae a estictive theshold only one pat of the oveall sevice devices V V is available and a pat of the total capacity of the buffe is allocated К К so 1 К classes. К. Within each pioity class J J 1 3 allocated buffe shaed data packets pioity Open Access Jounal Page 4

5 ethod of contolling access to intellectual switching nodes of It should be noted that the oganization of distibution of esouces of switching nodes in a memoy buffe infomation packet pioity class 1 pactically is zeo ( P 0 )). Similaly thee is pobability of losing P 2 infomation packet pioity class 2 P 0. 2 In intellectual switching nodes ITS sevice packet is subject to the following discipline [35]. a) If at the time of access of the infomation packets with pioity J J 1 3 they ae fee fom the pioity class fo the devices so it s in accodance with an algoithm to contol the access to cloud telecommunications esouces entes at the sevice. b) in case of occupancy of all available sevices devices (intellectual switching nodes status V i V K ) sepaate queues ae oganized fo packets with the pioities J and 3 J 1. In this case in each one the following discipline is ealized: when setting the packet in the queue the absolute pioities ae acting and when selecting packets fo sevice elative pioities ae acting in accodance with advanced algoithms to contol access to "cloud" telecommunications esouces. The use of the absolute pioities fo queued educes the aveage waiting time of pioity packets fom the goups and J allows to impove secuity infomation ITS (impoving antivius) and ensues the quality of data sevice As a esult in each queue packet го pioity is accepted fo sevice befoe the packet j гo pioity if Futhemoe if at the time of packet aival го pioity in queues 1 packets so the aival packet is pocessed as follows: 2 2 J o J 1 3 j. К thee was Eithe Accepted in queue unde conditions that thee ae packets with lowpioity j the latte packet with low pioity is ousted fom the system and late does not have any impact on it (system); O Is Lost given that in a queue thee is only packets with highe o equal j м pioity. b) Fo packets го (equal) pioities that ae in the queue J o J 1 3 o seviced in accodance with an advanced algoithm to contol access to the cloud telecommunication esouces. The sevice discipline of infomation packets in intellectual switching node implements edundancy of netwok esouces that is based on the stategy of moving bounday. III. AN IPOVED ALGOITH TO CONTOL ACCESS TO CLOUD TELECOUNICATIONS ESOUCES To study the functional indicatos of intellectual switching nodes quality of type we use the method of the stuctuallogical GETmodel. Let s take a look at its distinctive featues. Accoding to switching nodes ITS model with elative pioities and esouce esevation changes in the states of the node let s pesent GETnetwok. Each banch J 3 J 1 of communication netwok conditionally descibes a sepaate multitheaded sevice system V with dedicated and shaed esouces V. It should be noted that pesenting the stuctuallogic model GET takes into consideation the factos of extenal influences (loss of infomation packet) and the eal eliability (possible equipment failues) though intoducing banches of invese connection with appopiate chaacteistics (example W 42 W 52 W etc.). 74 The pesentation of GETstuctuallogic model as well as an analysis of seveal studies [1 3 5] devoted to the study of pocesses of peventive and final management of infomation steam to intellectual switching nodes sevice allows foming banches chaacteistics and distibution paamete. It should be noted that the studies allow finding a numbe of egulaities in the pocess of intellectual switching nodes functioning elated to pactical identical indicatos accodingly poducing function moment at sepaate stages and in seies mode of opeation. Final esult is the eduction of poducing functions moment. K V K Open Access Jounal Page 5

6 ethod of contolling access to intellectual switching nodes of To solve the above optimization poblem of acceleating the pocess of infomation packet in intellectual switching nodes when it is tansfeed to the cloud antivius system is poposed to optimize the algoithm contol access to the cloud "telecommunications esouces. The basis of the algoithm is put pocedue fo calculating the vitual time pocessing of infomation packet which diffes fom the known facto poviding an additional level of pioitization fo infomation packet metadata [15]. these infomation packets eceive highest pioity pocessing in intellectual switching nodes class 1. Table 1 shows the valid values of aveage time and Jitte of pocessing time and infomation packet fo diffeent level of pioity in intellectual switching nodes The valid values fo the aveage time jitte of pocessing time of infomation packets fom diffeent levels of pioity Let s look at the stuctual scheme of algoithm of contolling access to cloud telecommunication esouces. Level pioity [ i ] T доп мс [ i ] J доп мс 3 J J The fist step: stuctual scheme is checking the access of packet to intellectual switching nodes if thee is no packet; the algoithm goes into waiting mode of eceived packets. In case When at the entance of the intellectual switching node infomation packet is eceived (all levels pioitization o only selected) it is necessaily to select of each queue buffe memoy of each intellectual switching node accoding to the fist packet and the level of pioity to detemine the "efeence"of infomation packet with the appopiate level of pioity. This will educe the pocessing time of the metadata packet of infomation while ensuing indicatos of efficiency of pocessing infomation packets of othe pioity levels. The fouth step of the algoithm is detemined by the value of the VST and VFT. Next we stat with the accomplishment of pocedues to identify the infomation packet fo pocessing in opeating unit of intellectual switching nodes. This includes the following: while eceiving buffe device N packets could ente (N is the numbe of queues in the system) and pioity levels may ente. If the value of the VST is enteed then in step 6 of the steam of infomation the fist ("efeence") packet is selected as well as the value of vitual sevice time in queues. Next in step 9 of stuctual scheme thee is a compaison between "standad of infomation packet with othe enteing at the same moment. The decision about efeence of pioity of the infomation packet was adopted by the following citeia: 1) The minimum value of vitual sevice time in the queue (( VFT min ) ; 2) Belonging of infomation packet to the queue with the highest pioity ( 1 > 2 > 3 ). It should be noted that the condition of assignment efeence" pioity setting in step 14 is not complete and with some exceptions detemined by the pevious indicato fo example an indicatothe pobability of assigning pioity [3]. This indicato can be detemined expeimentally in this case the contol pocedue using this indicato is a distinctive featue of the algoithm to contol access to the "cloud" telecommunication esouces. These exclusions ae necessay to ensue the quality of sevice infomation packet of othe (lowe) pioities. The Infomation packets can be compaed in pais at the initial time; the fist selected infomation packet conditionally has the highest level of pioity. If the condition mentioned in step 5 then in step 7 the algoithm updates infomation about VST and VFT. In step 10 a tansition happens diectly to the packet infomation pocessing pocedues. In step 12 infomation packets assigned the values of the VST and VFT in ode to accompany the infomation packet to the destination. Next in step 13 infomation packet is added to the output queue and ends its pocess of its pocessing in intellectual switching node. Thus algoithm is developed to contol the access to cloud telecommunications esouces whose distinctive featue is the intoduction of nonstandad conditions decide on the attibution of the "efeence" pioity infomation packet based on the additional indicatothe pobability of assigning pioity. This allows solving the poblem of minimizing the pocessing time of the metadata packet of infomation duing the tansmission to the cloud antivius systems while ensuing quality of sevice infomation and othe telecommunication sevices. Open Access Jounal Page 6

7 ethod of contolling access to intellectual switching nodes of IV. CONCLUSION Thus the access contol method in intellectual switching nodes includes a mathematical model of intellectual switching with infomation packet of diffeent pioity and impoved algoithm to contol access to cloud telecommunication esouces. A distinctive featue of the method is the integated use of standad citeia fo infomation management in intellectual switching nodes with additional possibility of sevice packet metadata infomation as it tansfes to the cloud antivius systems. The main esults ae: Based on GETmathematical model of netwok intellectual switching node with infomation packet of diffeent pioities diffes fom the known taking into consideation the maximum pioitizing infomation metadata packets duing thei tansmission to the cloud antivius systems. This helps to detemine the equivalent Wfunction distibution function and density distibution of sevice time infomation packet of metadata in intellectual switching nodes when they ae tansfeed in the cloud antivius systems. The esult of studies indicates that maximum distibution density of the pocessing time infomation in metadata packets in intellectual switching nodes epesent an inteval fom 1 to 2 s. The developed algoithm of contol access to cloud telecommunication esouces distinguished fom the known intoduction of nonstandad conditions a decision on assigning the "standad" pioity infomation packets based on the additional indicatothe pobability of assigning pioity. This makes it possible to solve the poblem of minimizing the pocessing time of the metadata packet of infomation tansmission to the cloud antivius systems while ensuing quality of sevice infomation and othe telecommunication sevices. EFEENCES [1] Semenov S.G. A mathematical model of the spead of compute viuses in heteogeneous compute netwoks of automated pocess contol systems / S.G. Semenov V.V. Davydov // Poceedings of the National Technical Univesity "KhPI". Scientific Papes. Seies: Infomation and simulation. Khakov: NTU "KhPI" 2012 Volume 38 P [2] ohamad Abu Taam. The mathematical model of GETtansmission technology metadata cloud antivius system / ohamad Abu Taam V.V. Bosko A.A. Sminov I.A. Beezyuk // Collected Woks "Infomation pocessing systems". Issue 1 (117). Khakov: KhUAF P [3] ohamad Abu Taam. Stuctual logic GETmodel technology spead of compute viuses / ohamad Abu Taam A.A. Sminov I.A. Beezyuk // anagement systems navigation and communication. Issue 1 (29). Poltava: PNTU P [4] Sminov A.A. Expeimental studies of the statistical popeties of netwok taffic based on the BDSstatistics / A.A. Sminov D.A. Danilenko // Intenational Jounal of Computational Engineeing eseach (IJCE). Volume 4 Issue 5. India. Delhi P [5] AA Sminov Dispesion analysis of netwok taffic fo intusion detection and pevention in telecommunication systems and netwoks / A.A. Kuznetsov A.A. Sminov D.A. Danilenko // Collected Woks "Infomation pocessing systems". Issue 2 (118). Khakov: KhUAF P Open Access Jounal Page 7

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE 1 YAROSLAVTSEV A.F., 2 Al-THUNEIBAT S.A., 3 AL TAWALBEH N.A 1 Depatment of Netwoking, SSUTI, Novosibisk, Russia

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

Configuring RSVP-ATM QoS Interworking

Configuring RSVP-ATM QoS Interworking Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP

More information

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300

More information

Modeling a shared medium access node with QoS distinction

Modeling a shared medium access node with QoS distinction Modeling a shaed medium access node with QoS distinction Matthias Gies, Jonas Geutet Compute Engineeing and Netwoks Laboatoy (TIK) Swiss Fedeal Institute of Technology Züich CH-8092 Züich, Switzeland email:

More information

Annales UMCS Informatica AI 2 (2004) UMCS

Annales UMCS Informatica AI 2 (2004) UMCS Pobane z czasopisma Annales AI- Infomatica http://ai.annales.umcs.pl Annales Infomatica AI 2 (2004) 33-340 Annales Infomatica Lublin-Polonia Sectio AI http://www.annales.umcs.lublin.pl/ Embedding as a

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

MULTI-AGENT SYSTEM FOR NETWORK ATTACK DETECTION

MULTI-AGENT SYSTEM FOR NETWORK ATTACK DETECTION Intenational Jounal of Civil Engineeing and Technology (IJCIET) Volume 9, Issue 6, June 2018, pp. 279 286, Aticle ID: IJCIET_09_06_032 Available online at http://www.iaeme.com/ijciet/issues.asp?jtype=ijciet&vtype=9&itype=6

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced

More information

The Dual Round Robin Matching Switch with Exhaustive Service

The Dual Round Robin Matching Switch with Exhaustive Service The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

Any modern computer system will incorporate (at least) two levels of storage:

Any modern computer system will incorporate (at least) two levels of storage: 1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE 5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai

More information

Clustering Interval-valued Data Using an Overlapped Interval Divergence

Clustering Interval-valued Data Using an Overlapped Interval Divergence Poc. of the 8th Austalasian Data Mining Confeence (AusDM'9) Clusteing Inteval-valued Data Using an Ovelapped Inteval Divegence Yongli Ren Yu-Hsn Liu Jia Rong Robet Dew School of Infomation Engineeing,

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

Positioning of a robot based on binocular vision for hand / foot fusion Long Han

Positioning of a robot based on binocular vision for hand / foot fusion Long Han 2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

On Adaptive Bandwidth Sharing with Rate Guarantees

On Adaptive Bandwidth Sharing with Rate Guarantees On Adaptive Bandwidth Shaing with Rate Guaantees N.G. Duffield y T. V. Lakshman D. Stiliadis y AT&T Laboatoies Bell Labs Rm A175, 180 Pak Avenue Lucent Technologies Floham Pak, 101 Cawfods Cone Road NJ

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1 Impovement of Fist-ode Takagi-Sugeno Models Using Local Unifom B-splines Felipe Fenández, Julio Gutiéez, Gacián Tiviño and Juan Calos Cespo Dep. Tecnología Fotónica, Facultad de Infomática Univesidad Politécnica

More information

Parallel processing model for XML parsing

Parallel processing model for XML parsing Recent Reseaches in Communications, Signals and nfomation Technology Paallel pocessing model fo XML pasing ADRANA GEORGEVA Fac. Applied Mathematics and nfomatics Technical Univesity of Sofia, TU-Sofia

More information

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers XFVHDL: A Tool fo the Synthesis of Fuzzy Logic Contolles E. Lago, C. J. Jiménez, D. R. López, S. Sánchez-Solano and A. Baiga Instituto de Micoelectónica de Sevilla. Cento Nacional de Micoelectónica, Edificio

More information

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

Multidimensional Testing

Multidimensional Testing Multidimensional Testing QA appoach fo Stoage netwoking Yohay Lasi Visuality Systems 1 Intoduction Who I am Yohay Lasi, QA Manage at Visuality Systems Visuality Systems the leading commecial povide of

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes On the Convesion between Binay Code and BinayReflected Gay Code on Boolean Cubes The Havad community has made this aticle openly available. Please shae how this access benefits you. You stoy mattes Citation

More information

Keith Dalbey, PhD. Sandia National Labs, Dept 1441 Optimization & Uncertainty Quantification

Keith Dalbey, PhD. Sandia National Labs, Dept 1441 Optimization & Uncertainty Quantification SAND 0-50 C Effective & Efficient Handling of Ill - Conditioned Coelation atices in Kiging & adient Enhanced Kiging Emulatos hough Pivoted Cholesky Factoization Keith Dalbey, PhD Sandia National Labs,

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

Experimental and numerical simulation of the flow over a spillway

Experimental and numerical simulation of the flow over a spillway Euopean Wate 57: 253-260, 2017. 2017 E.W. Publications Expeimental and numeical simulation of the flow ove a spillway A. Seafeim *, L. Avgeis, V. Hissanthou and K. Bellos Depatment of Civil Engineeing,

More information

Efficient Execution Path Exploration for Detecting Races in Concurrent Programs

Efficient Execution Path Exploration for Detecting Races in Concurrent Programs IAENG Intenational Jounal of Compute Science, 403, IJCS_40_3_02 Efficient Execution Path Exploation fo Detecting Races in Concuent Pogams Theodous E. Setiadi, Akihiko Ohsuga, and Mamou Maekaa Abstact Concuent

More information

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences Ameican Jounal of ata ining and Knowledge iscovey 27; 2(4): 2-8 http://www.sciencepublishinggoup.com//admkd doi:.648/.admkd.2724.2 Genealized Gey Taget ecision ethod Based on ecision akes Indiffeence Attibute

More information

Concomitants of Upper Record Statistics for Bivariate Pseudo Weibull Distribution

Concomitants of Upper Record Statistics for Bivariate Pseudo Weibull Distribution Available at http://pvamuedu/aam Appl Appl Math ISSN: 93-9466 Vol 5, Issue (Decembe ), pp 8 9 (Peviously, Vol 5, Issue, pp 379 388) Applications and Applied Mathematics: An Intenational Jounal (AAM) Concomitants

More information

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology, (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Efficient Candidacy Reduction Fo Fequent Patten Mining M.H Nadimi-Shahaki 1, Nowati Mustapha 2, Md Nasi B Sulaiman 2, Ali B Mamat

More information

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing IEEE TRANSACTIONS ON COMPUTERS, VOL. 50, NO. 9, SEPTEMBER 200 949 Dynamic Multiple Paity (DMP) Disk Aay fo Seial Tansaction Pocessing K.H. Yeung, Membe, IEEE, and T.S. Yum, Senio Membe, IEEE AbstactÐThe

More information

On using circuit-switched networks for file transfers

On using circuit-switched networks for file transfers On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity

More information

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Decentalized Tust Management fo Ad-Hoc Pee-to-Pee Netwoks Thomas Repantis Vana Kalogeaki Depatment of Compute Science & Engineeing Univesity of Califonia, Riveside Riveside, CA 92521 {tep,vana}@cs.uc.edu

More information

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver 1 RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Dive Amit Jain Daji Qiao Kang G. Shin The Univesity of Michigan Ann Abo, MI 4819, USA {amitj,dqiao,kgshin@eecs.umich.edu Abstact The cuent

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1)

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1) 1 Multi Path PERT Ankit Singh and A. L. Naasimha Reddy Electical and Compute Engineeing Depatment, Texas A&M Univesity; email: eddy@ece.tamu.edu. Abstact This pape pesents a new multipath delay based algoithm,

More information

Journal of Network and Computer Applications

Journal of Network and Computer Applications Jounal of Netwok and Compute Applications 34 (211) 135 142 Contents lists available at ScienceDiect Jounal of Netwok and Compute Applications jounal homepage: www.elsevie.com/locate/jnca Optimization of

More information

INDEXATION OF WEB PAGES BASED ON THEIR VISUAL RENDERING

INDEXATION OF WEB PAGES BASED ON THEIR VISUAL RENDERING INDEXATION OF WEB PAGES BASED ON THEIR VISUAL RENDERING Emmanuel Buno Univesité du Sud Toulon-Va / LSIS CNRS BP 20132, F-83957 La Gade buno@univ-tln.f Nicolas Faessel LSIS CNRS Domaine Univesitaie de Saint-Jéôme

More information

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network An Efficient andove Mechanism Using the Geneal Switch Management Potocol on a Multi-Potocol abel Switching Netwok Seong Gon hoi, yun Joo Kang, and Jun Kyun hoi Using the geneal switch management potocol

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks Numbe of Paths and Neighbous Effect on Multipath Routing in Mobile Ad Hoc Netwoks Oday Jeew School of Infomation Systems and Accounting Univesity of Canbea Canbea ACT 2617, Austalia oday.jeew@canbea.edu.au

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

Signal integrity analysis and physically based circuit extraction of a mounted

Signal integrity analysis and physically based circuit extraction of a mounted emc design & softwae Signal integity analysis and physically based cicuit extaction of a mounted SMA connecto A poposed geneal appoach is given fo the definition of an equivalent cicuit with SMAs mounted

More information

Dynamic Topology Control to Reduce Interference in MANETs

Dynamic Topology Control to Reduce Interference in MANETs Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity

More information

TCBAC: An Access Control Model for Remote Calibration System

TCBAC: An Access Control Model for Remote Calibration System JOURNAL OF SOFTWARE, VOL. 8, NO., DECEMBER 03 339 TCBAC: An Access Contol Model fo Remote Calibation System Zhuokui Wu School of Mechanical & Automotive Engineeing, South China Univesity of Technology,

More information

An Extension to the Local Binary Patterns for Image Retrieval

An Extension to the Local Binary Patterns for Image Retrieval , pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science

More information

MAC Protocol for Supporting QoS in All-IP HiperLAN2

MAC Protocol for Supporting QoS in All-IP HiperLAN2 MAC Potocol fo Suppoting QoS in All-IP HipeLAN Chistos E. Politis, Rahim Tafazolli Univesity of Suey Cente fo Communication Systems Reseach Guildfod, GU 7XH, Suey, UK Tel.: +44 483 683463, FAX: +44 483

More information

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer Using the Gow-And-Pune Netwok to Solve Poblems of Lage Dimensionality B.J. Biedis and T.D. Gedeon School of Compute Science & Engineeing The Univesity of New South Wales Sydney NSW 2052 AUSTRALIA bbiedis@cse.unsw.edu.au

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,

More information

Automatically Testing Interacting Software Components

Automatically Testing Interacting Software Components Automatically Testing Inteacting Softwae Components Leonad Gallaghe Infomation Technology Laboatoy National Institute of Standads and Technology Gaithesbug, MD 20899, USA lgallaghe@nist.gov Jeff Offutt

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

High performance CUDA based CNN image processor

High performance CUDA based CNN image processor High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu

More information

Time-Constrained Big Data Transfer for SDN-Enabled Smart City

Time-Constrained Big Data Transfer for SDN-Enabled Smart City Emeging Tends, Issues, and Challenges in Big Data and Its Implementation towad Futue Smat Cities Time-Constained Big Data Tansfe fo SDN-Enabled Smat City Yuanguo Bi, Chuan Lin, Haibo Zhou, Peng Yang, Xuemin

More information

CLOUD based storage systems are emerging to gain significant

CLOUD based storage systems are emerging to gain significant IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 5, NO. 2, APRIL-JUNE 2017 221 On the Latency and Enegy Efficiency of Distibuted Stoage Systems Akshay Kuma, Student Membe, IEEE, Ravi Tandon, Membe, IEEE, and

More information

Root Cause Analysis for Long-Lived TCP Connections

Root Cause Analysis for Long-Lived TCP Connections Root Cause Analysis fo Long-Lived TCP Connections M. Siekkinen, G. Uvoy-Kelle, E. W. Biesack, T. En-Najjay Institut Euécom BP 93, 694 Sophia-Antipolis Cedex, Fance Email: {siekkine,uvoy,ebi,ennajja}@euecom.f

More information

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:

More information

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,

More information

Loss-Cognizant Pricing in Feed-Forward Networks with Greedy Users

Loss-Cognizant Pricing in Feed-Forward Networks with Greedy Users Loss-Cognizant Picing in Feed-Fowad Netwoks with Geedy Uses Ashaf Al Daoud and Muat Alanyali Depatment of Electical and Compute Engineeing Boston Univesity, Boston, MA 02215 Email: {ashaf, alanyali}@bu.edu

More information

Switching and Fault Transients of Unit Transformers of a Combined-Cycle Gas Turbine Generator

Switching and Fault Transients of Unit Transformers of a Combined-Cycle Gas Turbine Generator Switching and Fault Tansients of Unit Tansfomes of a Combined-Cycle Gas Tubine Geneato M. Kizilcay, S. Demmig Abstact A new combined-cycle powe plant is to be connected to a 110-kV gid though a powe cable

More information

ANN Models for Coplanar Strip Line Analysis and Synthesis

ANN Models for Coplanar Strip Line Analysis and Synthesis 200 IJCSNS Intenational Jounal of Compute Science and Netwok Secuity, VOL.8 No.10, Octobe 2008 Models fo Coplana Stip Line Analysis and J.Lakshmi Naayana D.K.Si Rama Kishna D.L.Patap Reddy Chalapathi Institute

More information

Desired Attitude Angles Design Based on Optimization for Side Window Detection of Kinetic Interceptor *

Desired Attitude Angles Design Based on Optimization for Side Window Detection of Kinetic Interceptor * Poceedings of the 7 th Chinese Contol Confeence July 6-8, 008, Kunming,Yunnan, China Desied Attitude Angles Design Based on Optimization fo Side Window Detection of Kinetic Intecepto * Zhu Bo, Quan Quan,

More information

3D VISUALIZATION OF A CASE-BASED DISTANCE MODEL

3D VISUALIZATION OF A CASE-BASED DISTANCE MODEL 8 D VISUALIZATION OF A CASE-BASED DISTANCE MODEL Péte Volf Zoltán Kovács István Szalkai Univesity of Pannonia Veszpém Hungay Email: volfpete@gtk.uni-pannon.hu kovacsz@gtk.uni-pannon.hu szalkai@almos.uni-pannon.hu

More information

On Error Estimation in Runge-Kutta Methods

On Error Estimation in Runge-Kutta Methods Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment

More information

Adaptation of Motion Capture Data of Human Arms to a Humanoid Robot Using Optimization

Adaptation of Motion Capture Data of Human Arms to a Humanoid Robot Using Optimization ICCAS25 June 2-5, KINTEX, Gyeonggi-Do, Koea Adaptation of Motion Captue Data of Human Ams to a Humanoid Robot Using Optimization ChangHwan Kim and Doik Kim Intelligent Robotics Reseach Cente, Koea Institute

More information

The concept of PARPS - Packet And Resource Plan Scheduling

The concept of PARPS - Packet And Resource Plan Scheduling The concept of PARPS - Packet And Resouce Plan Scheduling Magnus Eiksson 1 and Håkan Sätebeg 2 1) Dept. of Signals, Sensos and Systems, Royal Inst. of Technology, Sweden. E-mail: magnus.eiksson@ite.mh.se.

More information

Topic -3 Image Enhancement

Topic -3 Image Enhancement Topic -3 Image Enhancement (Pat 1) DIP: Details Digital Image Pocessing Digital Image Chaacteistics Spatial Spectal Gay-level Histogam DFT DCT Pe-Pocessing Enhancement Restoation Point Pocessing Masking

More information

A Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces

A Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces A Family of Distibuted Deadlock Avoidance Potocols and thei Reachable State Spaces Césa Sánchez, Henny B. Sipma, and Zoha Manna Compute Science Depatment Stanfod Univesity, Stanfod, CA 94305-9025 {cesa,sipma,manna}@cs.stanfod.edu

More information