Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network
|
|
- Ashlie Scott
- 5 years ago
- Views:
Transcription
1 Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 Revisiting the notion of Origin-Destintion Trffic Mtrix of the Hosts tht re ttched to Switched Locl Are Network Mondy Eyingho, Smuel Flki nd Anthony Atyero 3 Deprtment of Electricl nd Informtion Engineering, Covennt University, Ot, Nigeri eyimon@yhoo.com Deprtment of Computer Science, Federl University of Technology, Akure, Nigeri swoleflki@yhoo.com 3 Deprtment of Electricl nd Informtion Engineering, Covennt University, Ot, Nigeri tyero@ieee.org ABSTRACT There is widely held notion in the literture tht there is n origin-destintion trffic mtrix for ll the hosts (end nodes) tht re ttched to ny switched locl re network. This is usully in reltion to the need to clculte the end-to-end (or mximum end-to-end) delys between ll the end nodes tht re ttched to the network, for the sole purpose of using these delys vlues to design upper-bounded dely switched locl re networks, in efforts t solving the dely problems of this clss of networks. In this pper, we show tht this notion of origin-destintion trffic mtrix for ll the hosts tht re ttched to switched locl re network does not seem to be correct. KEYWORDS End-To-End Dely, Origin-Destintion Pir, Switched Locl Are Networks. INTRODUCTION It is widely held notion in the literture tht to determine the verge network dely of switched Locl Are Network (switched LAN), the trffic mtrix of the hosts tht re ttched to the LAN hs to be formulted. For exmple, in [], it ws stted tht, let T ij denote the informtion flow in pckets per unit time between end nodes i nd j of the network; we define the trffic mtrix of the network to be the n n mtrix T= (T ij ) where n is the number of end nodes. Moreover, in [], the verge end-to-end dely time of switched locl re network ws defined with respect to the verge trffic between end node i nd end node j for ll end nodes tht re ttched to the LAN nd the verge dely between the end nodes ws defined s the weighted combintion of ll end-to-end dely times. Elbum nd Sidi on the other hnd in [3] defined minimum verge network dely s the verge dely between ll pirs of users in the network. In this pper, we show tht this notion of origin-destintion trffic mtrix for ll hosts tht re ttched to switched locl re network with view to using it to compute end-to-end delys (or verge end-to-end dely) does not seem to be correct. DOI : 0.5/ijdps
2 Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0. ANALYSIS OF SWITCHED LOCAL AREA NETWORKS ORIGIN-DESTINATION TRAFFIC ENUMERATION METHOD USING THE HOSTS THAT ARE ATTACHED TO THE NETWORK For pcket switched [4 p.366], rndom ccess [5], lossless [4, p.366], [5] networks, offered lod = throughput, but, mount of dt trnsferre d throughput = therefore, time tken to effect the trnsfer mount of dt trnsferred offered lod = time tken to effect the trnsfer For ny origin-destintion pir of nodes (hosts), time tken to effect the trnsfer = dely from origin node (host) to destintion node (host) mximum time to effect the trnsfer = mximum dely from origin host to destintion host mximum time to effect the trnsfer from origin host to destintion host = mximum time (dely) through the st switch + mximum time (dely) through the nd switch + + mximum time (dely) through the n th switch on the origin-destintion pth If n externl site presents to the origin-destintion pth (route) Z pckets every second (loding or offered lod), then it presents pcket every Z seconds. Since for lossless system, offered lod = throughput, mximum time to effect the trnsfer of pcket = mximum dely from origin host to destintion host of pcket = mximum time (dely) through st switch + mximum time (dely) through nd switch + + mximum time (dely) through n th switch Z () where n = the number of switches in the origin-destintion pth (route). The inequlity symbol in () implies tht Z seconds is n upper bound on end-to-end dely for the origin-destintion pir of hosts. Above Z seconds, we will hve loss system. Therefore, since we re interested in the mximum (upper bounded) dely, the symbol in () cn be replced by n = symbol nd hence, () becomes n eqution. We cn lso rtionlize the preceding ide in this wy. Consider n origin-destintion pir of hosts tht re involved in communiction session. Let us ssume tht the locl re network (LAN) is switched Ethernet LAN. Assume tht X Megbits/sec (Mbps) = mximum Ethernet port trnsfer rte of host, X = pckets/sec. () (minimum Ethernet pcket length) = Z pckets/sec, sy. Or, it trnsfers pcket every Z seconds. 8
3 Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 The minimum Ethernet pcket length should be used in () becuse, this will give us the mximum pckets/sec. (mximum loding) nd hence, it will give us n upper bounded dely sitution. Therefore, for lossless system, ech pcket should cross ll the switches in its pth from origin-to-destintion in Z seconds. This ide ws succinctly expressed by Berseks nd Gllgr in [4, p.5]; where it ws stted tht, strict implementtion of communiction session s rte of r pckets/sec. would be to dmit pcket every r seconds. As n exmple, for hosts (worksttions), X could be 0Mbps (meg bits per second) or the bsic Ethernet rte, 00Mbps (Fst Ethernet rte).for Servers, X could be,000mbps (Gigbit Ethernet rte). Consider network tht hs two () hosts connected by switch s shown in Figure. H H We cn see tht either of the hosts will be sending dt trffic to the other host or receiving dt trffic from it; therefore, we will hve the trffic mtrix shown in (3). (3) is Host sending dt trffic to Host nd Host receiving dt trffic from Host; similrly, is Host sending dt trffic to Host, nd Host receiving the trffic. is Host sending dt trffic to itself (which is not possible); nd is Host sending dt trffic to itself (which is lso not possible). Therefore, the digonl entries re not necessry, but we retin them so tht we cn get correct picture of the network trffic mtrix; the digonl entries re hence, crossed out. But we cn see from Figure nd from (3) tht end-to-end dely in the direction from Host to Host is the sme s the end-to-end dely from Host to Host; so for two () hosts network, we need end-to-end dely, since: end-to-end dely = end-to-end dely. Consider lso, network tht hs three (3) hosts. There re more thn one wys of connecting the hosts. It my be through switch or through multiple switches (this gin cn hve multiple configurtions).we illustrte just two of the configurtions in Figures nd 3. We should emphsize t this point tht, in our illustrtions (Figures.,, nd 3) nd indeed in ny LAN instlltion, one or more of the hosts my be server or servers (for exmple, file server, web server); but for the purpose of our nlysis, we regrd ll connected end devices (computing devices, printing devices nd others) s hosts. 9
4 Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 H H H 3 H H 3 H Wht ever be the configurtion (connection) of the three hosts network does not mtter; wht is importnt in the context of our nlysis is tht, Host cn either be sending trffic to Host or receiving trffic from Host, it cn either be sending trffic to Host3 or receiving trffic from Host3. The sme scenrio holds for Host nd Host3. We therefore, hve the trffic mtrix for three (3) hosts connected through two () switches network s shown in (3) (4) Following our previous explntions, we cross out the digonl entries. Also, since the trffic from Host to Host will cross the sme number of switches from origin to destintion, s the trffic from Host to Host, it follows tht, end-to-end dely = end-to-end dely. Similrly, end-to-end dely 3 = end-to-end dely 3, end-to-end dely 3 = end-to-end dely 3.Therefore, for three (3) hosts network, we need 3 end-to-end delys. By following the preceding explntions, we cn proceed to write out the trffic mtrix for four (4) hosts network s shown in (5). By similr resoning, we cn see tht for four (4) hosts network, we need 6 end-to-end delys. Following the sme logic, we cn show tht for five (5) hosts network, we need 0 end-to-end delys, for six (6) hosts network, we need 5 end-to-end delys. 30
5 Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 origin-destintion origin-destintion origin-destintion (5) We hve been ble to come-up with closed-form reltion for finding the number of end-to-end delys (number of origin-destintion pirs) to be used with inequlity () (in inequlity (), we hve considered only one () origin-destintion pir of two () hosts involved in communiction session) for ny switched LAN. For switched LAN, if, p = the LAN s number of end-to-end delys (with respect to ttched hosts or end nodes), k = number of end nodes (hosts) in the LAN, then, k x= origin-destintion 4 p = ( k x) (6) 3 (3 x= For exmple, if k =3, p = x ) = (3 x ) = (3 -) + (3 ) = + = 3 x = No mtter the number of hosts tht re ttched to the LAN, we cn clculte the number of end-to-end delys (number of origin host to destintion host delys) with respect to () by using (6). Consider the three (3) hosts, two () switches LAN shown in Figure 3. Since the ppliction of (6) gives us three origin-destintion pirs, nd from () the 3 origin-destintion pirs of hosts re -, -3, nd -3. For this network therefore, the three origin-destintion equtions (using () which hs n upper bound of Z ) re: origin-destintion 6 origin-destintion 5 For the - origin-destintion pir of hosts, mximum time to trnsfer pcket from H to H (mximum end-to-end dely) = mx. time (dely) through switch = (7) Z For the -3 origin-destintion pir of hosts, mximum time to trnsfer pcket from H to H 3 (mximum end-to-end dely) = mx. time (dely) through switch +mx. time (dely) through switch = (8) Z For the -3 origin-destintion pir of hosts, mximum time to trnsfer pcket from H to H 3 (mximum end-to-end dely) = mx. time (dely) through switch +mx. time (dely) through switch = (9) Z3 where Z, Z, nd Z 3 re the Ethernet port trnsfer rtes in pckets per second of ny of the two hosts tht re involved in communiction session in (7), (8), nd (9) respectively. We cn write out (7), (8), nd (9) together in mtrix form s: 3
6 Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 mx imum dely of origin/ destintion mximum end to ny dt pcket end dely 0 through switch origin/ destintion 3 mximum end to = end dely (0) origin/ destintion 3 mximum end to mx imum dely of ny dt pcket end dely through switch Where n entry in the bit mtrix is if pcket from or to ny of the hosts t either ends in the origin-destintion pth (the mximum end-to-end dely entry of the mximum end-to-end dely column vector) crosses the corresponding switch in trnsiting from origin host to destintion host; the entry is 0, if the pcket does not cross the switch. We cn re-write (0) s in (); where = = = 3 = 3 = nd = 0. Mtrix Eq. () cn be written for ny switched locl re network, with ny rbitrry number of m switches nd k hosts. Let y, y, y 3,,y p-, y p represent origin-destintion pir mximum end-to-end dely, origindestintion pir mximum end-to-end dely, origin-destintion pir3 mximum end-to-end dely,,origin destintion pir p- mximum end-to-end dely nd origin-destintion pir p mximum end-to-end dely respectively. mx imum dely of origin/ destintion mximum end to ny dt pcket end dely through switch origin/ destintion 3 mximum end to = end dely () origin/ destintion 3 mximum end to 3 3 mx imum dely of ny dt pcket end dely through switch Also, let x, x, x 3,, x m-, x m represent the mximum dely of ny dt pcket through switch, the mximum dely of ny dt pcket through switch, the mximum dely of ny dt pcket through switch 3,, the mximum dely of ny dt pcket through switch m-, the mximum dely of ny dt pcket through switch m respectively, then () cn be written for ny switched locl re network s in (). y x y y 3 3 = y p p yp p 3 p p m m 3m p m p m m m 3m p m pm x x 3 x m xm () 3
7 Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 where y = Z, y = Z,,y p = nd x, x, x 3,., x m-, x m re the unknown. Z p m = number of switches in the locl re network; ij = /0, i =,,3,,p; j =,,3,,m re elements of the pth bit mtrix for the whole network.; ij =, if dt pcket tht trnsverses origin-destintion i psses through switch j; ij = 0, if dt pcket tht trnsverses origin-destintion i does not pss through switch j; p = the LAN s number of origin-destintion pirs of hosts, which is given by (6). Put in compct form, () cn be written s: y = AX (3) Where A is the p m mtrix, X = (x, x, x 3,,x m-, x m) is m column vector, nd y = (y, y, y 3,,y p-, y p) is p column vector in () respectively. On the surfce, () seems to support the notion tht there is n origin-destintion pirs trffic mtrix with respect to end-to-end dely computtion for ll the hosts tht re ttched to switched LAN s enuncited (we think, not correctly) in [], [], [6]. We now explin why this notion does not seem to be correct when pplied to switched LANs. If we look t (0), we see tht rows nd 3 of the bit mtrix hve the sme type of entries, indeed = 3 nd = 3 in reltion to (). This will mke the set of vectors resulting from () to be linerly dependent. If () is written out for (), we will hve (4). Crrying out mtrix multipliction on (4) will result in the system of equtions s shown in (5). y y y 3 = 3 3 x x (4) y = x + x y = x + x y 3 = 3 x + 3 x (5) (5b) (5c) The reson for the liner dependence of the system of equtions in (5) is tht, if we look t the network of Figure 3, for host H to communicte with host H 3, nd vice vers, dt pckets will trnsit through switch nd switch ; the sme thing s when host H is to communicte with host H 3 or H 3 with H. Therefore, the mximum delys of dt pcket in switch nd switch for the two communiction sessions re the sme; hence, the similrity of the entries in rows nd 3 of the end-to-end pths bit mtrix in (0). In the words of Kreyzig in [7, p.33], wht is the point of liner independence nd dependence? And he provided the following nswer: well, from linerly dependent set of vectors, we my often omit vectors tht re liner combintion of others until we re finlly left with linerly independent subset of the relly essentil vectors, which cn no longer be expressed linerly in terms of ech other [7, p.33]. Therefore, if we eliminte the linerly dependent set of vectors from (4), some of the y i s will vnish; mening tht the communiction pths of some of the hosts (origin-destintion pirs of hosts) will vnish. This is becuse pckets trvelling between two end hosts will suffer mximum delys in the sme set of switches long their end-to-end pths. This proves the fct (nd we re proposing new theory) tht there is no origin-destintion pirs trffic mtrix with respect to end-to-end dely computtion for ll the hosts tht re ttched to switched locl re network. 33
8 Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 3. CONCLUSIONS We hve shown in the context of computing the end-to-end (or mximum end-to-end) delys of switched locl re networks tht there is no origin-destintion pir trffic mtrix for ll the hosts tht re ttched to ny of such networks. We hve therefore, proposed the theory tht, there is no origin-destintion pirs trffic mtrix with respect to end-to-end dely computtion for ll the hosts tht re ttched to switched locl re network. How then do we enumerte ll the end-to-end delys of ny switched locl re network, in order to be ble to clculte, for exmple, the network verge of mximum end-to-end delys? This cn be used to design n upper bounded dely switched locl re network. A methodology for enumerting ll the endto-end delys of ny switched locl re network will be reported in nother pper. REFERENCES [] P. Torb & E. Kmen (999) Lod Anlysis of Pcket Switched Networks in Control Systems, Proceedings 5 th Annul Conference of the IEEE Industril Electronics Society, Sn Jose, CA, vol. 3, pp. 7. [] E., Knem, P. Torb, K. Cooper & G. Custodi (999) Design nd Anlysis of Pcket Switched Networks for Control Systems, Proceedings IEEE Conference on Decision nd Control, Phoenix, AZ, pp [3] R. Elbum & M. Sidi (996) Topologicl Design of Locl Are Networks using Genetic Algorithms, IEEE Trnsctions on Networking, vol.4, no.5, pp [4] D. Bertseks & R. Gllger (99) Dt Networks, Prentice-Hll, Englewood Cliffs, USA. [5] M. Reiser (98) Performnce Evlution of Dt Communictions Systems, Proceedings of the 98 IEEE Conference, vol. 70, no., pp [6] N. Krommencker, E. Rondeu, & T. Divoux (00) Study of Algorithms to Define the Cbling Pln of Switched Ethernet for Rel-Time Applictions, Proceedings of the 8 th IEEE Interntionl Conference on Emerging Technologies nd Fctory Communictions, Antibes, pp.3-30 [7] E. Kreyzig (003) Advnced Engineering Mthemtics, 8 th Edition, John Wiley nd Sons, New York, USA. Mondy Ofori Eyingho obtined B. Sc. Degree in Electronic nd Electricl Engineering from the Obfemi Awolowo University, Ile-Ife, Nigeri in 988. He lso holds Post-Grdute Diplom in Computer Science from the University of Lgos, Lgos, Nigeri (99), n MBA (Generl Mngement) Degree from the River Stte University of Science nd Technology, Port-Hrcourt, Nigeri (003), n M.Sc Degree in Computer Engineering, from the Federl University of Technology, Owerri, Nigeri (004), nd Ph. D in Computer Engineering from Covennt University, Ot, Nigeri (0). Dr. Eyingho hs hd extensive industril work experience in number of corporte orgniztions. He is currently Lecturer in the Deprtment of Electricl nd Informtion Engineering, Covennt University, Ot, Nigeri. Dr. Eyingho hs published scholrly ppers in interntionl journls. He is member of The Nigerin Society of Engineers, COREN Registered Electronics Engineer, nd member Nigeri Computer Society. His principl reserches re in the res of developing nd implementing microprocessor-bsed systems nd performnce optimiztion of locl re networks. 34
9 Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 Oluwole Smuel Flki is Professor of Computer Engineering t the Federl University of Technology, Akure, Nigeri. He holds n M. Eng Degree in Electricl Engineering from Leningrd University, n M. Sc Degree in Computer Science from UCLA nd Ph.D in Electricl Engineering from the University of Lgos, Lgos, Nigeri. His reserch interests re in the res of Computer Architecture, Computer Communictions nd Networking, Network Security nd Digitl Signl Processing. He is Fellow of the Nigeri Computer Society, Member of the Nigerin Society of Engineers, Member of IEEE nd Member of ACM. Aderemi A. Atyero is Senior Lecturer in the Deprtment of Electricl nd Informtion Engineering, Covennt University, Ot, Nigeri. He grduted from the Moscow Institute of Technology (MIT) with Bchelor of Science Degree in Rdio Engineering nd Mster of Science Degree in Stellite Communiction Systems in 99 nd 994 respectively. He received Ph.D from the Moscow Stte Technicl University of Civil Avition (MSTUCA) in 000. Dr. Atyero is member of the Institute of Electricl nd Electronic Engineers. He hs published number of scientific ppers in Interntionl peer-reviewed journls nd proceedings. He hs served s the Hed of Deprtment of Electricl nd Informtion Engineering t Covennt University. He is on the editoril bord of the Covennt Journl of Science nd Technology. He is recipient of the 009 Ford Foundtion Teching Innovtion Awrd. His current reserch interests re in Informtion Theory nd Stochstic Self-Similr Processes nd their pplictions in telecommunictions.. 35
Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li
2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min
More informationStep-Voltage Regulator Model Test System
IEEE PES GENERAL MEETING, JULY 5 Step-Voltge Regultor Model Test System Md Rejwnur Rshid Mojumdr, Pblo Arboley, Senior Member, IEEE nd Cristin González-Morán, Member, IEEE Abstrct In this pper, 4-node
More informationUnit #9 : Definite Integral Properties, Fundamental Theorem of Calculus
Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl
More informationEngineer To Engineer Note
Engineer To Engineer Note EE-169 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit
More informationMATH 25 CLASS 5 NOTES, SEP
MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid
More informationA New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method
A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,
More informationMisrepresentation of Preferences
Misrepresenttion of Preferences Gicomo Bonnno Deprtment of Economics, University of Cliforni, Dvis, USA gfbonnno@ucdvis.edu Socil choice functions Arrow s theorem sys tht it is not possible to extrct from
More informationIn the last lecture, we discussed how valid tokens may be specified by regular expressions.
LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.
More information4452 Mathematical Modeling Lecture 4: Lagrange Multipliers
Mth Modeling Lecture 4: Lgrnge Multipliers Pge 4452 Mthemticl Modeling Lecture 4: Lgrnge Multipliers Lgrnge multipliers re high powered mthemticl technique to find the mximum nd minimum of multidimensionl
More informationOn the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis
On the Detection of Step Edges in Algorithms Bsed on Grdient Vector Anlysis A. Lrr6, E. Montseny Computer Engineering Dept. Universitt Rovir i Virgili Crreter de Slou sin 43006 Trrgon, Spin Emil: lrre@etse.urv.es
More informationMA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork
MA1008 Clculus nd Liner Algebr for Engineers Course Notes for Section B Stephen Wills Deprtment of Mthemtics University College Cork s.wills@ucc.ie http://euclid.ucc.ie/pges/stff/wills/teching/m1008/ma1008.html
More informationA Fixed Point Approach of Quadratic Functional Equations
Int. Journl of Mth. Anlysis, Vol. 7, 03, no. 30, 47-477 HIKARI Ltd, www.m-hikri.com http://dx.doi.org/0.988/ijm.03.86 A Fixed Point Approch of Qudrtic Functionl Equtions Mudh Almhlebi Deprtment of Mthemtics,
More informationMATH 2530: WORKSHEET 7. x 2 y dz dy dx =
MATH 253: WORKSHT 7 () Wrm-up: () Review: polr coordintes, integrls involving polr coordintes, triple Riemnn sums, triple integrls, the pplictions of triple integrls (especilly to volume), nd cylindricl
More informationa(e, x) = x. Diagrammatically, this is encoded as the following commutative diagrams / X
4. Mon, Sept. 30 Lst time, we defined the quotient topology coming from continuous surjection q : X! Y. Recll tht q is quotient mp (nd Y hs the quotient topology) if V Y is open precisely when q (V ) X
More informationDigital Design. Chapter 6: Optimizations and Tradeoffs
Digitl Design Chpter 6: Optimiztions nd Trdeoffs Slides to ccompny the tetbook Digitl Design, with RTL Design, VHDL, nd Verilog, 2nd Edition, by Frnk Vhid, John Wiley nd Sons Publishers, 2. http://www.ddvhid.com
More informationParallel Square and Cube Computations
Prllel Squre nd Cube Computtions Albert A. Liddicot nd Michel J. Flynn Computer Systems Lbortory, Deprtment of Electricl Engineering Stnford University Gtes Building 5 Serr Mll, Stnford, CA 945, USA liddicot@stnford.edu
More informationCS 268: IP Multicast Routing
Motivtion CS 268: IP Multicst Routing Ion Stoic April 5, 2004 Mny pplictions requires one-to-mny communiction - E.g., video/udio conferencing, news dissemintion, file updtes, etc. Using unicst to replicte
More informationGENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES
GENEATING OTHOIMAGES FO CLOSE-ANGE OBJECTS BY AUTOMATICALLY DETECTING BEAKLINES Efstrtios Stylinidis 1, Lzros Sechidis 1, Petros Ptis 1, Spiros Sptls 2 Aristotle University of Thessloniki 1 Deprtment of
More informationA Transportation Problem Analysed by a New Ranking Method
(IJIRSE) Interntionl Journl of Innovtive Reserch in Science & Engineering ISSN (Online) 7-07 A Trnsporttion Problem Anlysed by New Rnking Method Dr. A. Shy Sudh P. Chinthiy Associte Professor PG Scholr
More informationAVolumePreservingMapfromCubetoOctahedron
Globl Journl of Science Frontier Reserch: F Mthemtics nd Decision Sciences Volume 18 Issue 1 Version 1.0 er 018 Type: Double Blind Peer Reviewed Interntionl Reserch Journl Publisher: Globl Journls Online
More informationIf you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.
Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online
More informationVulnerability Analysis of Electric Power Communication Network. Yucong Wu
2nd Interntionl Conference on Advnces in Mechnicl Engineering nd Industril Informtics (AMEII 2016 Vulnerbility Anlysis of Electric Power Communiction Network Yucong Wu Deprtment of Telecommunictions Engineering,
More informationEngineer To Engineer Note
Engineer To Engineer Note EE-186 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit
More informationPointwise convergence need not behave well with respect to standard properties such as continuity.
Chpter 3 Uniform Convergence Lecture 9 Sequences of functions re of gret importnce in mny res of pure nd pplied mthemtics, nd their properties cn often be studied in the context of metric spces, s in Exmples
More informationRepresentation of Numbers. Number Representation. Representation of Numbers. 32-bit Unsigned Integers 3/24/2014. Fixed point Integer Representation
Representtion of Numbers Number Representtion Computer represent ll numbers, other thn integers nd some frctions with imprecision. Numbers re stored in some pproximtion which cn be represented by fixed
More informationOSPF WEIGHT SETTING OPTIMIZATION FOR SINGLE LINK FAILURES
OSP WEIGH SEIG OPIMIZAIO OR SIGLE LIK AILURES Mohmmed H. Sqlli, Sdiq M. Sit, nd Syed Asdullh Computer Engineering Deprtment King hd University of Petroleum & Minerls Dhhrn 31261, Sudi Arbi {sqlli,sdiq,ssd}@kfupm.edu.s
More informationSolutions to Math 41 Final Exam December 12, 2011
Solutions to Mth Finl Em December,. ( points) Find ech of the following its, with justifiction. If there is n infinite it, then eplin whether it is or. ( ) / ln() () (5 points) First we compute the it:
More informationTixeo compared to other videoconferencing solutions
compred to other videoconferencing solutions for V171026EN , unique solution on the video conferencing field Adobe Connect Web RTC Vydio for High security level, privcy Zero impct on network security policies
More informationMath 464 Fall 2012 Notes on Marginal and Conditional Densities October 18, 2012
Mth 464 Fll 2012 Notes on Mrginl nd Conditionl Densities klin@mth.rizon.edu October 18, 2012 Mrginl densities. Suppose you hve 3 continuous rndom vribles X, Y, nd Z, with joint density f(x,y,z. The mrginl
More informationTree Structured Symmetrical Systems of Linear Equations and their Graphical Solution
Proceedings of the World Congress on Engineering nd Computer Science 4 Vol I WCECS 4, -4 October, 4, Sn Frncisco, USA Tree Structured Symmetricl Systems of Liner Equtions nd their Grphicl Solution Jime
More information10.5 Graphing Quadratic Functions
0.5 Grphing Qudrtic Functions Now tht we cn solve qudrtic equtions, we wnt to lern how to grph the function ssocited with the qudrtic eqution. We cll this the qudrtic function. Grphs of Qudrtic Functions
More informationsuch that the S i cover S, or equivalently S
MATH 55 Triple Integrls Fll 16 1. Definition Given solid in spce, prtition of consists of finite set of solis = { 1,, n } such tht the i cover, or equivlently n i. Furthermore, for ech i, intersects i
More informationAvailable at ISSN: Vol. 4, Issue 2 (December 2009) pp (Previously Vol. 4, No.
Avilble t http://pvmu.edu.edu/pges/398.sp ISSN: 93-9466 Vol. 4, Issue December 009 pp. 434 444 Previously Vol. 4, No. Applictions nd Applied Mthemtics: An Interntionl Journl AAM On -ry Subdivision for
More informationGeometric transformations
Geometric trnsformtions Computer Grphics Some slides re bsed on Shy Shlom slides from TAU mn n n m m T A,,,,,, 2 1 2 22 12 1 21 11 Rows become columns nd columns become rows nm n n m m A,,,,,, 1 1 2 22
More informationBefore We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):
Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters
More informationIntroduction to Computer Engineering EECS 203 dickrp/eecs203/ CMOS transmission gate (TG) TG example
Introduction to Computer Engineering EECS 23 http://ziyng.eecs.northwestern.edu/ dickrp/eecs23/ CMOS trnsmission gte TG Instructor: Robert Dick Office: L477 Tech Emil: dickrp@northwestern.edu Phone: 847
More informationDuality in linear interval equations
Aville online t http://ijim.sriu..ir Int. J. Industril Mthemtis Vol. 1, No. 1 (2009) 41-45 Dulity in liner intervl equtions M. Movhedin, S. Slhshour, S. Hji Ghsemi, S. Khezerloo, M. Khezerloo, S. M. Khorsny
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationChapter Spline Method of Interpolation More Examples Electrical Engineering
Chpter. Spline Method of Interpoltion More Exmples Electricl Engineering Exmple Thermistors re used to mesure the temperture of bodies. Thermistors re bsed on mterils chnge in resistnce with temperture.
More informationControl-Flow Analysis and Loop Detection
! Control-Flow Anlysis nd Loop Detection!Lst time! PRE!Tody! Control-flow nlysis! Loops! Identifying loops using domintors! Reducibility! Using loop identifiction to identify induction vribles CS553 Lecture
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationThe Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center
Resource Overview Quntile Mesure: Skill or Concept: 80Q Multiply two frctions or frction nd whole numer. (QT N ) Excerpted from: The Mth Lerning Center PO Box 99, Slem, Oregon 9709 099 www.mthlerningcenter.org
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationMidterm 2 Sample solution
Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the
More informationUNIT 11. Query Optimization
UNIT Query Optimiztion Contents Introduction to Query Optimiztion 2 The Optimiztion Process: An Overview 3 Optimiztion in System R 4 Optimiztion in INGRES 5 Implementing the Join Opertors Wei-Png Yng,
More information12-B FRACTIONS AND DECIMALS
-B Frctions nd Decimls. () If ll four integers were negtive, their product would be positive, nd so could not equl one of them. If ll four integers were positive, their product would be much greter thn
More informationMobile IP route optimization method for a carrier-scale IP network
Moile IP route optimiztion method for crrier-scle IP network Tkeshi Ihr, Hiroyuki Ohnishi, nd Ysushi Tkgi NTT Network Service Systems Lortories 3-9-11 Midori-cho, Musshino-shi, Tokyo 180-8585, Jpn Phone:
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationAbout the Finite Element Analysis for Beam-Hinged Frame. Duan Jin1,a, Li Yun-gui1
Advnces in Engineering Reserch (AER), volume 143 6th Interntionl Conference on Energy nd Environmentl Protection (ICEEP 2017) About the Finite Element Anlysis for Bem-Hinged Frme Dun Jin1,, Li Yun-gui1
More informationFig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1.
Answer on Question #5692, Physics, Optics Stte slient fetures of single slit Frunhofer diffrction pttern. The slit is verticl nd illuminted by point source. Also, obtin n expression for intensity distribution
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-204 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-295 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-245 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our
More informationSection 10.4 Hyperbolas
66 Section 10.4 Hyperbols Objective : Definition of hyperbol & hyperbols centered t (0, 0). The third type of conic we will study is the hyperbol. It is defined in the sme mnner tht we defined the prbol
More informationA Heuristic Approach for Discovering Reference Models by Mining Process Model Variants
A Heuristic Approch for Discovering Reference Models by Mining Process Model Vrints Chen Li 1, Mnfred Reichert 2, nd Andres Wombcher 3 1 Informtion System Group, University of Twente, The Netherlnds lic@cs.utwente.nl
More informationPerformance analysis of QoS mechanisms in IP networks
University of Wollongong Reserch Online Fculty of Informtics - Ppers (Archive) Fculty of Engineering nd Informtion Sciences 2000 Performnce nlysis of QoS mechnisms in IP networks D. Ji University of Wollongong
More informationFunctor (1A) Young Won Lim 8/2/17
Copyright (c) 2016-2017 Young W. Lim. Permission is grnted to copy, distribute nd/or modify this document under the terms of the GNU Free Documenttion License, Version 1.2 or ny lter version published
More information4-1 NAME DATE PERIOD. Study Guide. Parallel Lines and Planes P Q, O Q. Sample answers: A J, A F, and D E
4-1 NAME DATE PERIOD Pges 142 147 Prllel Lines nd Plnes When plnes do not intersect, they re sid to e prllel. Also, when lines in the sme plne do not intersect, they re prllel. But when lines re not in
More informationEfficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc
4th Ntionl Conference on Electricl, Electronics nd Computer Engineering (NCEECE 2015) Efficient Regulr Expression Grouping Algorithm Bsed on Lbel Propgtion Xi Chen, Shuqio Chenb nd Ming Moc Ntionl Digitl
More informationImproving the Connectivity of Heterogeneous Multi-Hop Wireless Networks
1569363897 1 Improving the Connectivity of Heterogeneous Multi-Hop Wireless Networks Te-Hoon Kim, Dvid Tipper, nd Prshnt Krishnmurthy Grdute Networking nd Telecommunictions Progrm University of Pittsburgh,
More informationx )Scales are the reciprocal of each other. e
9. Reciprocls A Complete Slide Rule Mnul - eville W Young Chpter 9 Further Applictions of the LL scles The LL (e x ) scles nd the corresponding LL 0 (e -x or Exmple : 0.244 4.. Set the hir line over 4.
More information1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)
Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric
More informationDefinition of Regular Expression
Definition of Regulr Expression After the definition of the string nd lnguges, we re redy to descrie regulr expressions, the nottion we shll use to define the clss of lnguges known s regulr sets. Recll
More informationStained Glass Design. Teaching Goals:
Stined Glss Design Time required 45-90 minutes Teching Gols: 1. Students pply grphic methods to design vrious shpes on the plne.. Students pply geometric trnsformtions of grphs of functions in order to
More information2 Computing all Intersections of a Set of Segments Line Segment Intersection
15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design
More informationFunctor (1A) Young Won Lim 10/5/17
Copyright (c) 2016-2017 Young W. Lim. Permission is grnted to copy, distribute nd/or modify this document under the terms of the GNU Free Documenttion License, Version 1.2 or ny lter version published
More informationA REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS
A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS Ji-Eun Roh (), Te-Eog Lee (b) (),(b) Deprtment of Industril nd Systems Engineering, Kore Advnced Institute
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationSection 3.1: Sequences and Series
Section.: Sequences d Series Sequences Let s strt out with the definition of sequence: sequence: ordered list of numbers, often with definite pttern Recll tht in set, order doesn t mtter so this is one
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationIMAGE QUALITY OPTIMIZATION BASED ON WAVELET FILTER DESIGN AND WAVELET DECOMPOSITION IN JPEG2000. Do Quan and Yo-Sung Ho
IMAGE QUALITY OPTIMIZATIO BASED O WAVELET FILTER DESIG AD WAVELET DECOMPOSITIO I JPEG2000 Do Qun nd Yo-Sung Ho School of Informtion & Mechtronics Gwngju Institute of Science nd Technology (GIST) 26 Cheomdn-gwgiro
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationLETKF compared to 4DVAR for assimilation of surface pressure observations in IFS
LETKF compred to 4DVAR for ssimiltion of surfce pressure oservtions in IFS Pu Escrià, Mssimo Bonvit, Mts Hmrud, Lrs Isksen nd Pul Poli Interntionl Conference on Ensemle Methods in Geophysicl Sciences Toulouse,
More informationIntegration. October 25, 2016
Integrtion October 5, 6 Introduction We hve lerned in previous chpter on how to do the differentition. It is conventionl in mthemtics tht we re supposed to lern bout the integrtion s well. As you my hve
More informationSOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES
SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES MARCELLO DELGADO Abstrct. The purpose of this pper is to build up the bsic conceptul frmework nd underlying motivtions tht will llow us to understnd ctegoricl
More informationRay surface intersections
Ry surfce intersections Some primitives Finite primitives: polygons spheres, cylinders, cones prts of generl qudrics Infinite primitives: plnes infinite cylinders nd cones generl qudrics A finite primitive
More informationEECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining
EECS150 - Digitl Design Lecture 23 - High-level Design nd Optimiztion 3, Prllelism nd Pipelining Nov 12, 2002 John Wwrzynek Fll 2002 EECS150 - Lec23-HL3 Pge 1 Prllelism Prllelism is the ct of doing more
More informationInternational Journal of Mechanical Engineering and Applications
Interntionl Journl of Mechnicl Engineering nd Applictions 203; (2) : 28-33 Published online My 30, 203 (http://www.sciencepublishinggroup.com/j/ijme) doi: 0.648/j.ijme.203002. Evlution of intensity of
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-232 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our
More informationINTRODUCTION TO SIMPLICIAL COMPLEXES
INTRODUCTION TO SIMPLICIAL COMPLEXES CASEY KELLEHER AND ALESSANDRA PANTANO 0.1. Introduction. In this ctivity set we re going to introduce notion from Algebric Topology clled simplicil homology. The min
More informationClass-XI Mathematics Conic Sections Chapter-11 Chapter Notes Key Concepts
Clss-XI Mthemtics Conic Sections Chpter-11 Chpter Notes Key Concepts 1. Let be fixed verticl line nd m be nother line intersecting it t fixed point V nd inclined to it t nd ngle On rotting the line m round
More informationSIMPLIFYING ALGEBRA PASSPORT.
SIMPLIFYING ALGEBRA PASSPORT www.mthletics.com.u This booklet is ll bout turning complex problems into something simple. You will be ble to do something like this! ( 9- # + 4 ' ) ' ( 9- + 7-) ' ' Give
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationImproper Integrals. October 4, 2017
Improper Integrls October 4, 7 Introduction We hve seen how to clculte definite integrl when the it is rel number. However, there re times when we re interested to compute the integrl sy for emple 3. Here
More informationSystems I. Logic Design I. Topics Digital logic Logic gates Simple combinational logic circuits
Systems I Logic Design I Topics Digitl logic Logic gtes Simple comintionl logic circuits Simple C sttement.. C = + ; Wht pieces of hrdwre do you think you might need? Storge - for vlues,, C Computtion
More informationECE 468/573 Midterm 1 September 28, 2012
ECE 468/573 Midterm 1 September 28, 2012 Nme:! Purdue emil:! Plese sign the following: I ffirm tht the nswers given on this test re mine nd mine lone. I did not receive help from ny person or mteril (other
More information3.5.1 Single slit diffraction
3.5.1 Single slit diffrction Wves pssing through single slit will lso diffrct nd produce n interference pttern. The reson for this is to do with the finite width of the slit. We will consider this lter.
More informationApproximation by NURBS with free knots
pproximtion by NURBS with free knots M Rndrinrivony G Brunnett echnicl University of Chemnitz Fculty of Computer Science Computer Grphics nd Visuliztion Strße der Ntionen 6 97 Chemnitz Germny Emil: mhrvo@informtiktu-chemnitzde
More informationTool Vendor Perspectives SysML Thus Far
Frontiers 2008 Pnel Georgi Tec, 05-13-08 Tool Vendor Perspectives SysML Thus Fr Hns-Peter Hoffmnn, Ph.D Chief Systems Methodologist Telelogic, Systems & Softwre Modeling Business Unit Peter.Hoffmnn@telelogic.com
More informationMa/CS 6b Class 1: Graph Recap
M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Instructor: Adm Sheffer. TA: Cosmin Pohot. 1pm Mondys, Wednesdys, nd Fridys. http://mth.cltech.edu/~2015-16/2term/m006/ Min ook: Introduction to Grph
More informationLily Yen and Mogens Hansen
SKOLID / SKOLID No. 8 Lily Yen nd Mogens Hnsen Skolid hs joined Mthemticl Myhem which is eing reformtted s stnd-lone mthemtics journl for high school students. Solutions to prolems tht ppered in the lst
More informationChapter 7. Routing with Frame Relay, X.25, and SNA. 7.1 Routing. This chapter discusses Frame Relay, X.25, and SNA Routing. Also see the following:
Chpter 7 Routing with Frme Rely, X.25, nd SNA This chpter discusses Frme Rely, X.25, nd SNA Routing. Also see the following: Section 4.2, Identifying the BANDIT in the Network Section 4.3, Defining Globl
More information9 Graph Cutting Procedures
9 Grph Cutting Procedures Lst clss we begn looking t how to embed rbitrry metrics into distributions of trees, nd proved the following theorem due to Brtl (1996): Theorem 9.1 (Brtl (1996)) Given metric
More informationExam #1 for Computer Simulation Spring 2005
Exm # for Computer Simultion Spring 005 >>> SOLUTION
More informationStatistical classification of spatial relationships among mathematical symbols
2009 10th Interntionl Conference on Document Anlysis nd Recognition Sttisticl clssifiction of sptil reltionships mong mthemticl symbols Wl Aly, Seiichi Uchid Deprtment of Intelligent Systems, Kyushu University
More informationMa/CS 6b Class 1: Graph Recap
M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Adm Sheffer. Office hour: Tuesdys 4pm. dmsh@cltech.edu TA: Victor Kstkin. Office hour: Tuesdys 7pm. 1:00 Mondy, Wednesdy, nd Fridy. http://www.mth.cltech.edu/~2014-15/2term/m006/
More informationTransparent neutral-element elimination in MPI reduction operations
Trnsprent neutrl-element elimintion in MPI reduction opertions Jesper Lrsson Träff Deprtment of Scientific Computing University of Vienn Disclimer Exploiting repetition nd sprsity in input for reducing
More informationEnginner To Engineer Note
Technicl Notes on using Anlog Devices DSP components nd development tools from the DSP Division Phone: (800) ANALOG-D, FAX: (781) 461-3010, EMAIL: dsp_pplictions@nlog.com, FTP: ftp.nlog.com Using n ADSP-2181
More informationIf f(x, y) is a surface that lies above r(t), we can think about the area between the surface and the curve.
Line Integrls The ide of line integrl is very similr to tht of single integrls. If the function f(x) is bove the x-xis on the intervl [, b], then the integrl of f(x) over [, b] is the re under f over the
More information