Popularity and gain based caching scheme for information-centric networks

Size: px
Start display at page:

Download "Popularity and gain based caching scheme for information-centric networks"

Transcription

1 Research Artcle Internatonal Journal of Advanced Computer Research, Vol 7(30) ISSN (Prnt): ISSN (Onlne): Popularty and gan based cachng scheme for nformaton-centrc networks Zhandong Fan, Qngtao Wu *, Mngchuan Zhang and Rujuan Zheng Informaton Engneerng College, Henan Unversty of Scence and Technology, Chna Receved: 09-February-2017; Revsed: 24-March-2017; Accepted: 27-March ACCENTS Abstract In nformaton-centrc networks (ICN), each node s equpped wth a cache and t can mprove content access and transmsson effcency. However, the bult-n cache capacty s small, and t can t completely store huge amounts of content transmtted. The exstng cachng schemes lack choces n content placement and balanced dstrbuton, thus, leadng to the problem of low cache ht rato and hgh user access tme delay. To solve the problem, ths paper proposes a popularty and gan based cachng scheme (). It refnes the content object from the content fle to the chunk, thus acheves fne-graned cache management. The strategy makes use of the feature of content chunk popularty, and takes the factors that affect the overall cachng gan nto consderaton, and realzes the placement and replacement of content chunks through comprehensve measure. The smulaton results show that compared wth other schemes, ths method can effectvely promote node s cache ht rato, reduce user request delay and further rase network servce qualty. Keywords Informaton-centrc networks, Content chunk, Popularty, Cachng gan. 1.Introducton Wth the rapd development of nternet, several of new applcatons have appeared. The tradtonal centered on host network archtecture has been dffcult to adapt to new applcaton requrements, whch faced wth a seres of challenges n moblty support, network scalablty and securty, etc. Although cachng technology n applcaton of content delvery networks (CDN) and peer to peer (P2P) [1] has allevated the pressure of applcaton requrements to a certan extent. The current cachng strateges are amed at a specfc applcaton and the technology wth shortcomngs of hgh complexty and costs and can t apply to all applcatons. In order to solve these problems, researchers have focused attenton on research of new Internet archtecture [2]. Informaton-centrc networks (ICN) emerges at the rght moment and has receved extensve research and development, among whch; the respectve schemes under ths background nclude the contentcentrc networkng (CCN)/ named-data networkng (NDN) [3], data-orented network archtecture (DONA) [4], NetInf [5], PDX [6], etc. In ICN, each node s equpped wth a bult-n cache, and ts core dea s that storng content through nternal routers of the network, then the user requests forward n the network. *Author for correspondence 71 The caches wll respond drectly f ht along the way, rather than from the content source (server) each tme [7]. Due to cache content closer to users, thus can reduce the consumpton of network bandwdth, server load and user access delay [8]. It s consderng these advantages, ths thought s extended to the entre network and all applcatons n the desgn of the new Internet. Cachng mechansm s the core of the ICN technology, the pros and cons of a cachng system drectly affect the effcency of ICN content dstrbuton, and a reasonable cachng polcy enables users easer to access, to content from the near cache nodes wthout from orgnal content server (OCS) every tme. The content placement and replacement strategy are two mportant aspects of cachng technology research, however, the major problems of current cachng polces nclude low space utlzaton rate, and low cache ht rato and large access latency. In order to solve the above problems, ths paper proposes a Scheme. The man contrbutons of ths paper are as follows. 1) Refnng the level of popularty to content chunk. The exstng cachng strateges are mostly based on content popularty, whch s not the same as

2 Zhandong Fan et al. content chunk popularty. Ths artcle refnes the level of popularty to the chunk and realzes fnegraned cachng management. 2) Based on comprehensve earnngs to fnd the best placement node. Comprehensvely measure factors that nfluence cachng gan, fndng the best node to cache the content chunk, and maxmzng the comprehensve ncome of nodes. 3) The substtuton method based on the comparson of the content chunk value. Comparng the value of the content chunk to be replaced wth the new arrval content chunk and determnng whether t s necessary to cache new content chunk. 2.Related works In ICN, f t s needed to establsh collaboraton doman and nteractve state nformaton of collaboraton between the nodes. ICN cachng strateges can be roughly dvded nto explct collaboraton and mplct cooperaton [9]. In explct collaboraton mechansm, a knd of common way s through the nteracton access mode between nodes n collaboraton doman, the cache state, etc. to mprove the cachng dversty n the cooperatve doman, but the strong dynamc nteracton of ICN cannot bear the huge costs. In mplct cooperatve cachng mechansm, nodes can acheve cache decson-makng wth lttle or less nteracton, at the same tme; have an advantage n terms of executon speed and complexty. The mplct cooperatve cachng mechansm can be dvded nto the followng two categores accordng to whether need to know accurate nformaton about content popularty beforehand. 2.1 Consderng potental content popularty cachng mechansm In [10] authors proposed an RCOne mechansm, whch stores content objects n a node randomly selected along the way transmsson path. ProbCache [11, 12] takes the node poston n the data transmsson path and cache capacty nto account whle makng probablty cachng decsons, makng the content wth greater probablty cached n the node closer to the requester. In [13] authors proposed a WAVE scheme whch provdes cachng advce for the subsequent nodes by settng the mark, and stores content chunks of fle n the exponental growth way along the transmsson path when the number of requests for a unt of the fle ncreases. Cachng decsons accordng to node and mportance n the communty have been suggested [14, 15]. Such decsons are relatvely smple, but lack of accurate 72 nformaton about content access frequency, and exst low speed of copyng the content to the edge, the excessve competton n the edge nodes, the dsorder competton of cache space between dfferent transmsson paths, etc. 2.2Cachng scheme based on content popularty In [16] authors proposed a cachng scheme based cachng age, whch calculates the cachng age of content accordng to the level of content popularty and the locaton of the storage nodes, the hgher the content popularty, the longer the cache resdes. A prob-pd scheme based on the probablty of popularty whch makes decson of probablty cachng accordng to content popularty and the dstance from the content source have been proposed [17]. A cachng mechansm based on ncome percepton, whch uses the flterng effect of request flow on the cache, and acheves collaboraton between nodes and cache dversty whle maxmzng sngle node earnngs have been proposed [18]. A probablstc storage based heurstc cachng method, the content wth hgher popularty and greater placement earnngs can have a greater cachng probablty have been proposed [19]. Badov et al. [20] proposed a congeston percepton and lookup mechansm, whch caches the more helpful content to allevate congeston and consders low bandwdth load of lnks preferentally when forwardng request messages. These schemes have a better performance n the cache ht rato and bandwdth savng, however, most of them, assumng content popularty s a known parameter, besdes, there s no clear descrpton nformaton that how to obtan and mantan content popularty by the router. In ICN cachng systems, the request arrval process s related to the cachng state of upstream nodes [21], so the arrval rate of content requests has a strong dynamc feature, and statc offlne popularty statstcs clearly can t wll meet the needs of cachng decsons. A drect method s to use a hash table to count the vsts of content; however, the storage cost of ths method s unbearable [22]. Some methods through the statstcs of coarse-graned content access frequency to reduce the complexty, the specfc methods nclude dvdng the content nto several levels n accordance wth content popularty [23, 24] and usng the content fle popularty nstead of content chunk popularty [25], etc. But users may show dfferent degrees of nterests towards the content chunks of same content fle; these methods gnore the dfferences whch nfluence the performance of the granular cache management.

3 Internatonal Journal of Advanced Computer Research, Vol 7(30) Dfferent wth the above works, ths paper comprehensvely measures the man factors whch nfluence the cachng gan by means of mplct cooperaton and fndng out the best placement node to cache content chunks through the calculaton of the server or nodes. At the same tme, the regular of rse and fall s consdered n cachng mechansm and usng the value of the content chunk comparson approach to decson new content chunk replacement. Besdes algorthm s smple and has a less cost of computng resources. 3. operaton mechansm In our system model, the network s made up of OCS and some routers equpped wth bult-n cache as well as some users. Among whch, only OCS can produce content, and store content permanently. Let G (V, E) be an undrected network wth V=v 1,...,v n nodes and E the set of lnks. For the sake of smplcty, we assume that v -1 s on the downstream sde of v, whch means v -1 s closer to the user. Ths artcle does not consder the stuaton of the flood routng, whch means the nodes choose the next-hop only accordng to routng protocols and not broadcast to all ports when receve nterest packet. 3.1The basc prncple of In order to make the cache n ICN more effcent, ths paper desgn's content chunk popularty and cachng gan based cachng scheme. The basc dea s based on the value of a content chunk n the cache space s changng dynamcally and decayng exponentally wth tme. At the same tme, n order to ensure that the hgh popularty content chunks have hgh cachng value, the value of content chunks ncreases exponentally wth the requested count, so the value of hgh popularty content chunks can be far hgher than the low popularty content chunks. The occuped space s marked as dle when the content chunks value below the threshold value set, however, the content chunks n the free space are not deleted mmedately, and wll be replaced only when new content chunks arrve, n ths way, the content chunks n the free space can contnue to provde servce for users. When the content chunks of the free space pop up agan, so that the value s hgher than the threshold set, and then cancel ts dle tag of the occuped space. Interest request packets wll forward n the form of labels, and f ht along the way, then the OCS or router wll packet and back to user along Interest path. If there are spare nodes on nterest path, then store the content chunk on the spare node closest to the user; f there are no spare nodes, and then select a 73 node whch can maxmze cachng gan as the best placement node. 3.2The mplementaton of cachng polcy Ths paper ams to desgn an n-network cachng scheme that can obtan hgh gan. Symbols are defned n Table 1. Table 1 Table of notaton Notaton Meanng o Content chunk v The dentfy of node w The average value of content chunks cached n v The occuped space of v S r f C d p D q The space of v expected to take up The free space of v The overall cache space of v The usage rato of v The dstance between v and user The total length of Interest path The rato of d and D Mv ( ) Cachng gan of v w0 m ( o) W ( o) Wt ( o ) The ntal value of content chunk The number of requests for o n v The value of o n v The value of o at tme t 3.2.1Cachng gan measurement In ICN, f the hgh popularty content chunks are stored n nodes closer to users, whch can reduce forwardng paths of nterest packets and data packets, thus can decrease users access tme effectvely and mprove the user s experence. However, not all content chunks wth hgh popularty can be stored on the node closest to the user due to the cache capacty constrants. Takng the nformaton of nodes whch ncludes the value of content chunks, the free space of nodes and the dstance between nodes and users and etc. nto account when searchng the node along the nterest path that can maxmum cachng gan f cache the content chunk. Defnng a measure ndcator M(v ) for a cachng gan of router nodes, the bgger value of M(v ) shows that placng the new content chunk on the node wll make overall nodes gan maxmal on the nterest path. The man factors nfluencng the value of M(v ) are: The smaller the average value w of the content cached by the v, ndcate that the hgher possblty content

4 Zhandong Fan et al. chunks n the node wll be replaced and the greater the value of M(v ). The smaller the cache usage rate p of v, shows that the greater the free space of the node, whch can make full use of the cache space f cache the new content chunk on the node, and the greater the value of M(v ). The smaller the dstance rato q of v, shows that the closer dstance between the node and user, whch can reduce the user s access delay f cache the new content chunk on the node, and the greater the value of M(v ). Comprehensve calculate w, p, q and obtan M(v ). Step 1: calculatng the average value of the content chunks cached n v. 1 w n n j 1 Among them, ( o ) content chunks cached n of content chunks cached, and chunk j. j w ndcates the average value of v, n ndcates the number o j ndcates content Step 2: Computng the utlzaton rate of v. S r p C Among them, S ndcates the amount (not ncludng the content chunk n free space) of space occuped of v, r ndcates the amount of space that expected to be occuped, the value of r s equal to the number of Interest packets forwarded across v whch not yet return data packets. The maxmum r equals C S (the sze of the free space of v ), thus t can guarantee 0<P <1. Step 3: The dstance factor. d q D Among them, d ndcates the dstance (the number of hops) between v and user along the nterest path and D ndcates the total length of Interest path. The calculaton formula of v cachng gan ndex Mv ( ) w p q When v has free space, then OCS or router nodes choose the best cache node accordng to f n Interest packet, at ths tme, does not calculate the value of M(v ), so there s no meanngless stuaton that denomnator equals The calculaton of cache value If the Interest packet ht at OCS, then set an ntal value w 0 for the content chunk (the value s greater than the threshold), and f the requested content chunk comes from router node, then the ntal value of the content chunk s the value that cached n the node. Assumng that the dstance between v and OCS s 1, and v 1 located on the downstream sde of v, so the value of content chunk o when t returned v s calculated as follows. to 1 m ( o) 1 w ( o) w0 a m W 1( o) w( o) a 1 ( o) 1 Among them, m (o) ndcates the requested tmes of o n v, and n order to avod repeatng calculaton requests for the frst tme then mnus 1. a(a>1) s the base of the ndex, and the greater ts value shows that the faster the value ncreases of content chunk, we assume that a=2. The value growth rule of the content chunks n node s. W( o) w ( o) a Among them, W(o) s the value of o after request, w (o) s the value of o before request, and the content chunk o wll growth a(a>1) tmes after every request, and the greater a shows that the faster the content chunk value ncreases, we assume that a=2. The value attenuaton rule of content chunks n node s. t t0 W ( o) w ( o) b t Among them, W t (o) s the value of o at tme t, W (o) s the value before attenuaton, t 0 ndcates the last updated attenuaton tme, t-t 0 ndcates the dstance from the last update tme, and s a constant. b(0<b<1) s the base number, the smaller ts value shows that the faster attenuaton of the content chunk, we assume that b=0.5, τ=1. v v 74

5 Internatonal Journal of Advanced Computer Research, Vol 7(30) 3.3The man algorthm cachng polcy s based on sngle Interest packet request, ths paper wll gve the strategy mplementaton wth the process of Interest packet and data packet. When user sends a request, f the Interest packet does not ht and there s no PIT entry for content request at the node, then the 4 group ( v, d, f, M(v )) wll be recorded and forwarded to the next node. If the Interest packet ht at the node, then take out the set of 4 groups and judge whether there s any nodes wth f >0 along Interest path. Fndng out v that closest to the user wth f >0. If exst, then cachng o on the drectly n the process of data packet back to user, and at the same tme replacng the mnmum value of the content chunk; If not exst, then choose v wth the maxmum M(v ) as the best cache node along Interest path. When the data packet back to the node, comparng wth the content chunk wth the mnmum value, f the value of the content chunk not less than the mnmum value, then replacng the mnmum value content chunk; f the value of the content chunk less than the mnmum value whch shows the content chunk has low popularty, then gvng up cache the content chunk. If the Interest packet hts at OCS after forwardng, then OCS wll pack content chunk nto packet and back to user along Interest path. Frst of all, OCS wll assgn an ntal value 0 and the value of o wll ncrease wth the number of request tmes ncreases. Then, the OCS determnes the locaton of the content chunk o, the process s smlar to the above process of when Interest packet ht at the node, so we wll not repeat t here. strategy s only assocated wth the value of f and M(v ) of the node, so the node that Interest packet ht can judge ndependently and there s no addtonal nformaton nteracton between nodes. 75 v w to the content chunk o In order to llustrate the strategy mplementaton process more clearly, the pseudo code of algorthm s gven n Table 2. Table 2 algorthm 1. Intalzaton 2. f exst nodes wth f >0 along Interest path 3. Case1: exst 4. IF (the number of nodes s equal to 1) 5. cachng content chunk o n the node and replacng the content chunk wth the lowest value cached n free space; 6. ELSE 7. cachng content chunk o n the node closest to the user and replacng the content chunk wth the lowest value cached n free space; 8. End IF; 9. Case2: not exst 10. selectng the node wth the largest M(v ) as the best cache node; 11. IF (the value of o not less than the lowest value of content chunk n v ) 12. cachng o n the node and replacng the content chunk wth the lowest value; 13. ELSE 14. dscardng the content chunk o and gvng up cachng; 15. End IF; 4.Experment smulaton and analyss In order to verfy the performance of proposed n ths paper, we carred out the smulaton and performance evaluaton based on ndnsim [26] smulator and used Matlab software draw graphcs wth smulaton data. The man performance parameters consdered nclude cache ht rato, the hop count and content dversty rato. 4.1The setup and method of smulaton Topologcal structure s based on any ntenton structure, as shown n Fgure 1; the expermental network topology conssts of 36 nodes. Fgure 1 Smulaton topology At the same tme, we assume that the number of the content s 10000, each content has the same sze 10 Mbytes, and has been dvded nto k=10 chunks; Each router buffer space s 100 Mbytes, whch can cache 100 content chunks. In addton, each user wll

6 Content dversty rato Hop count Ht Rato Zhandong Fan et al. send 1000 requests for content to connect routers n the smulaton process, besdes the arrval of the requests accord wth Posson dstrbuton and the user requests for content accord wth Zpf dstrbuton [27], n whch, we assume 0.5 α 1 and α=0.7. We selected representatve strategy as performance comparson objects: one s the tradtonal leave copy everywhere () strategy, another s the strategy based on the betweenness strategy. Ths paper used multple performance parameters that compared wth and, whch ncludes cache ht rato, hop count and content dversty rato. In addton, we also studed the effect of varous network parameters on the performance, such as cache sze, the number of content and Zpf parameters. The man parameters and default values of ths paper are gven n Table Cache space(m) (a) Ht rato changes over the cache sze Table 3 Expermental parameters Parameter Default value Range Number of nodes 36 Number of users 1000 Number of content ~20000 Content sze (MB) An average of 10 Node cache sze (MB) ~200 Access pattern Zpf: = ~ The result of the experment The experment results are gven n ths secton, n order to observe the network performance s affected by some parameters, we only make one parameter change and other parameters reman unchanged, ts default value s shown n Table The nfluence of the cache sze In ths secton, we frst observed the effect of cache sze on system performance. Fgure 2 shows the system performance changes over the cache sze, among them, cache sze have been ncreased from 50MB to 200MB. As expected, from Fgure 2 (a) you can see that the cache ht rato of these three mechansms ncreases wth the ncrease of the cache sze, and n ths process, the performance of has been always better than and. Fgure 2 (b) shows that the hops user access to the content of these three mechansms decreases wth the ncrease of the cache sze. Because of the ht rato has mproved the hop count also fell naturally. However, the hop count of s always lower than and. As s shown n Fgure 2 (c) that the CDR of these three mechansms ncreases wth the ncrease of the cache sze, and s always hgher than and Cache space(m) (b) Hop count changes over the cache sze Cache space(m) (c) Content dversty rato changes over the cache sze Fgure 2 The nfluence of the cache sze 76

7 Hop count Ht Rato Ht Rato Content dversty rato Internatonal Journal of Advanced Computer Research, Vol 7(30) 4.2.2The nfluence of content quantty Fgure 3 shows the stuaton that system performance changes over content quantty, the number of content changes from 5000 to n a wde range. As shown n Fgure 3(a) that the cache ht rato of these three mechansms reduces sgnfcantly wth the ncrease of content amount. Ths s manly because the cache sze hasn t changed but the content quantty ncreased, thus, the cache wll become ncreasngly scare and the probablty of Interest packet be responded s reduced naturally. However, compared wth and, always shows an obvous advantage. In Fgure 3(b), as expected, the hop count of these three mechansms ncreases wth content amount ncreases, but s always lower than and. As shown n Fgure 3(c) that the CDR of these three mechansms decreases wth the content amount ncreases and s always better than and n varous cases. However, the relatve advantage of s gradually shrnkng wth the ncrease of content amount Number of content x 10 4 (c) Content dversty rato changes over content quantty Fgure 3 The nfluence of content quantty The nfluence of Zpf parameters (α) Now, everybody has a wdespread belef that user preferences (.e., access mode) for the content follows Zpf dstrbuton. Dfferent applcatons has dfferent dstrbuted parameters, the greater Zpf parameter ( ) the more concentrated the user preferences. In ths secton, we study the nfluence of user preference on cachng mechansm performance, more accurately; we d lke to know the cachng mechansm performance for dfferent applcatons. Fgure 4 shows the results of the experment, n whch, α vares from 0.5 to Number of content x 10 4 (a) Ht rato changes over content quantty Number of content x 10 4 (b) Hop count changes over content quantty Alpha (a) Ht rato changes over parameter α 77

8 Content dversty rato Hop count Zhandong Fan et al Ths s because these three mechansms take advantage of the local tme of content n place or replacement strategy, whch s further proved that the mportance of usng local tme n desgnng cachng mechansm. Fgure 4(b) shows that the hop count of these three mechansms decreases wth the ncrease of α, but s better than and. Fgure 4(c) shows that the CDR of and decreases slowly wth the ncrease of α, whle the CDR of almost kept unchanged, but s always hgher than and. The above expermental results show that performance s better than and under varous expermental condtons whch nclude cache ht rato, hop count and content dversty rato Alpha (b) Hop count changes over parameter α Alpha (c) Content dversty changes over parameter α Fgure 4 The nfluence of Zpf parameter (α) Fgure 4(a) clearly shows that the cache ht rato of these three mechansms ncreases wth the ncrease of α, the performance mproves wth the strengthen of local tme. 5.Concluson In ths paper, we propose a content chunk popularty and gan based cachng scheme. It refnes content object to the chunk, and realzes fne-graned cachng decsons. The strategy makes full use of content chunk popularty, and takes the access frequency of content chunk as a measure of popularty. The popularty of a content chunk ncreases exponentally wth the requested count, at the same tme, t decays exponentally over tme. also takes node s overall cachng gan nto account, the new arrval content chunk s cached n the node whch can maxmze the overall cachng gan. The smulaton results show that the scheme can mprove the cache ht rato of routng nodes and reduce users requests tme delay. In the future, we wll study the correlaton between dfferent content chunks of a same content object, and apply t to the to mprove the performance of our algorthm. Acknowledgment Ths work s partally supported by the Natonal Natural Scence Foundaton of Chna (NSFC) under Grants no. U , no. U , and no , n part by the Program for Scence & Technology Innovaton Talents n the Unversty of Henan Provnce under Grants no. 16HASTIT035 and no. 14HASTIT045, n part by Program for Scence & Technology Innovatve Research Team n Unversty of Henan Provnce under Grant no. 14IRTSTHN021, and n part by Henan Scence and Technology Innovaton Outstandng Talent under Grant no Conflcts of nterest The authors have no conflcts of nterest to declare. 78

9 Internatonal Journal of Advanced Computer Research, Vol 7(30) References [1] Rhea S, Godfrey B, Karp B, Kubatowcz J, Ratnasamy S, Shenker S, et al. Open DHT: a publc DHT servce and ts uses. In ACM SIGCOMM computer communcaton revew 2005 (pp ). ACM. [2] Rexford J, Dovrols C. Future nternet archtecture: clean-slate versus evolutonary research. Communcatons of the ACM. 2010; 53(9): [3] Jacobson V, Smetters DK, Thornton JD, Plass MF, Brggs NH, Braynard RL. Networkng named content. In proceedngs of the 5th nternatonal conference on emergng networkng experments and technologes 2009 (pp. 1-12). ACM. [4] Koponen T, Chawla M, Chun BG, Ermolnsky A, Km KH, Shenker S, et al. A data-orented (and beyond) network archtecture. ACM SIGCOMM Computer Communcaton Revew. 2007; 37(4): [5] Dannewtz C, Golc J, Ohlman B, Ahlgren B. Secure namng for a network of nformaton. In INFOCOM IEEE conference on computer communcatons workshops 2010 (pp. 1-6). IEEE. [6] Fotou N, Nkander P, Trossen D, Polyzos GC. Developng nformaton networkng further: from PSIRP to PURSUIT. In nternatonal conference on broadband communcatons, networks and systems 2010 (pp. 1-13). Sprnger Berln Hedelberg. [7] Amble MM, Parag P, Shakkotta S, Yng L. Contentaware cachng and traffc management n content dstrbuton networks 2011(pp ). IEEE. [8] Wang J. A survey of web cachng schemes for the nternet. ACM SIGCOMM Computer Communcaton Revew. 1999; 29(5): [9] Guo-qang Z, Yang L, Tao L, Hu T. Survey of nnetwork cachng technques n nformaton-centrc networks. Ruan Jan Xue Bao/Journal of Software. 2014; 25: [10] Eum S, Nakauch K, Murata M, Shoj Y, Nshnaga N. CATT: potental based routng wth content cachng for ICN. In proceedngs of the second edton of the ICN workshop on nformaton-centrc networkng 2012 (pp ). ACM. [11] Psaras I, Cha WK, Pavlou G. Probablstc n-network cachng for nformaton-centrc networks. In proceedngs of the second edton of the ICN workshop on nformaton-centrc networkng 2012 (pp ). ACM. [12] Psaras I, Cha WK, Pavlou G. In-network cache management and resource allocaton for nformatoncentrc networks. IEEE Transactons on Parallel and Dstrbuted Systems. 2014; 25(11): [13] Cho K, Lee M, Park K, Kwon TT, Cho Y, Pack S. Wave: popularty-based and collaboratve n-network cachng for content-orented networks. In IEEE conference on computer communcatons workshops 2012 (pp ). IEEE. [14] Cha WK, He D, Psaras I, Pavlou G. Cache less for more n nformaton-centrc networks (extended verson). Computer Communcatons. 2013; 36(7): [15] Ca J, Yu SZ, Lu WX. Cachng strategy based on node s mportance to communty n nformatoncentrc networks. Sūrkasekkenkyūsho Kōkyūroku [16] Mng Z, Xu M, Wang D. Age-based cooperatve cachng n nformaton-centrc networkng. In nternatonal conference on computer communcaton and networks 2014 (pp. 1-8). IEEE. [17] Ioannou A, Weber S. Towards on-path cachng alternatves n nformaton-centrc networks. In IEEE conference on local computer networks 2014 (pp ). IEEE. [18] Long CH, Hongbo TA, Xngguo LU, Y BA, Zhang Z. Gan-aware cachng scheme based on popularty montorng n nformaton-centrc networkng. IEICE Transactons on Communcatons. 2016; 99(11): [19] Wu HB, L J, Zh J. Probablty-based heurstc content placement method for ICN cachng. Journal on Communcatons. 2016; 37(5): [20] Badov M, Seetharam A, Kurose J, Frou V, Nanda S. Congeston-aware cachng and search n nformatoncentrc networks. In proceedngs of the nternatonal conference on nformaton-centrc networkng 2014 (pp ). ACM. [21] Melazz NB, Banch G, Capon A, Dett A. A general, tractable and accurate model for a cascade of LRU caches. IEEE Communcatons Letters. 2014; 18(5): [22] Da H, Wang Y, Wu H, Lu J, Lu B. Towards lnespeed and accurate on-lne popularty montorng on NDN routers. In IEEE nternatonal symposum of qualty of servce 2014 (pp ). IEEE. [23] Km Y, Yeom I. Performance analyss of n-network cachng for content-centrc networkng. Computer Networks. 2013; 57(13): [24] Zeng Y, Jn M, Luo H. LICA: A segment-popularty based cachng scheme n ICN. Acta Electronca Snca. 2016; 44(2): [25] Lanlan R, Hao P, Haoqu H, Xuesong Q, Ruchang S. Popularty and centralty based selectve cachng scheme for nformaton-centrc networks. Journal of Electroncs & Informaton Technology. 2016; 38(2): [26] Afanasyev A, Moseenko I, Zhang L. ndnsim: NDN smulator for NS-3. Unversty of Calforna, Los Angeles, Techncal Report [27] Breslau L, Cao P, Fan L, Phllps G, Shenker S. Web cachng and Zpf-lke dstrbutons: evdence and mplcatons. In annual jont conference of the IEEE computer and communcatons socetes 1999 (pp ). IEEE. 79

10 Zhandong Fan et al. ZhanDong Fan receved the bachelor degree n computer scence and technology from Henan Unversty of Scence and Technology, Luoyang, Henan provnce, Chna, n 2014, and he s currently pursung the master s degree n the computer applcaton technology, Henan Unversty of Scence and Technology, Luoyang, Henan provnce, Chna. Hs research nterests nclude cloud computng, Internet of thngs and nformaton-centrc Network. Emal: @qq.com Qngtao Wu was born n Jangsu Provnce, PRC n March Qngtao Wu studed n East Chna Unversty of Scence and Technology (Shangha, PRC) from March 2003 to March 2006, majored n computer applcaton and earned a Doctor of Engneerng Degree n three years tme. He works as a Professor n Henan Unversty of Scence and Technology. Hs research nterests nclude component technology, computer securty and future Internet securty. Mngchuan Zhang was born n Henan Provnce, PRC on May Mngchuan Zhang studed at Bejng Unversty of Posts and Telecommuncatons (Bejng, PRC) from September 2011 to July 2014, majored n Communcaton and nformaton system and earned a Doctor of Engneerng Degree n three years tme. He works as an Assocate Professor at Henan Unversty of Scence and Technology. Hs research nterests nclude bonspred networks, Internet of Thngs, future Internet and computer securty. Rujuan Zheng was born n Henan Provnce, PRC n March Rujuan Zheng studed n Harbn Engneerng Unversty Technology (Harbn, PRC) from March 2005 to March 2008, majored n computer applcaton and earned a Doctor of Engneerng Degree n three years tme. She works as an Assocate Professor at Henan Unversty of Scence and Technology from March Her research nterests nclude bo-nspred networks, Internet of Thngs, and computer securty. 80

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

A Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI

A Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI 216 Jont Internatonal Conference on Artfcal Intellgence and Computer Engneerng (AICE 216) and Internatonal Conference on etwork and Communcaton Securty (CS 216) ISB: 978-1-6595-362-5 A Model Based on Mult-agent

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Study of Data Stream Clustering Based on Bio-inspired Model

Study of Data Stream Clustering Based on Bio-inspired Model , pp.412-418 http://dx.do.org/10.14257/astl.2014.53.86 Study of Data Stream lusterng Based on Bo-nspred Model Yngme L, Mn L, Jngbo Shao, Gaoyang Wang ollege of omputer Scence and Informaton Engneerng,

More information

Research Article Information Transmission Probability and Cache Management Method in Opportunistic Networks

Research Article Information Transmission Probability and Cache Management Method in Opportunistic Networks Wreless Communcatons and Moble Computng Volume 2018, Artcle ID 1571974, 9 pages https://do.org/10.1155/2018/1571974 Research Artcle Informaton Transmsson Probablty and Cache Management Method n Opportunstc

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Journal of Chemical and Pharmaceutical Research, 2014, 6(10): Research Article. Study on the original page oriented load balancing strategy

Journal of Chemical and Pharmaceutical Research, 2014, 6(10): Research Article. Study on the original page oriented load balancing strategy Avalable onlne www.jocpr.com Journal of hemcal and Pharmaceutcal Research, 2014, 6(10):274-280 Research Artcle IN : 0975-7384 ODEN(UA) : JPR5 tudy on the orgnal page orented load balancng strategy Kunpeng

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

An Improved Image Segmentation Algorithm Based on the Otsu Method

An Improved Image Segmentation Algorithm Based on the Otsu Method 3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,

More information

A Traffic Aware Routing Protocol for Congestion Avoidance in Content-Centric Network

A Traffic Aware Routing Protocol for Congestion Avoidance in Content-Centric Network , pp.69-80 http://dx.do.org/10.14257/jmue.2014.9.9.08 A Traffc Aware Routng Protocol for Congeston Avodance n Content-Centrc Network Jung-Jae Km 1, Mn-Woo Ryu 2*, S-Ho Cha 3 and Kuk-Hyun Cho 1 1 Dept.

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm , pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,

More information

Avoiding congestion through dynamic load control

Avoiding congestion through dynamic load control Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach

More information

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,

More information

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks 2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

BIN XIA et al: AN IMPROVED K-MEANS ALGORITHM BASED ON CLOUD PLATFORM FOR DATA MINING

BIN XIA et al: AN IMPROVED K-MEANS ALGORITHM BASED ON CLOUD PLATFORM FOR DATA MINING An Improved K-means Algorthm based on Cloud Platform for Data Mnng Bn Xa *, Yan Lu 2. School of nformaton and management scence, Henan Agrcultural Unversty, Zhengzhou, Henan 450002, P.R. Chna 2. College

More information

Finite Element Analysis of Rubber Sealing Ring Resilience Behavior Qu Jia 1,a, Chen Geng 1,b and Yang Yuwei 2,c

Finite Element Analysis of Rubber Sealing Ring Resilience Behavior Qu Jia 1,a, Chen Geng 1,b and Yang Yuwei 2,c Advanced Materals Research Onlne: 03-06-3 ISSN: 66-8985, Vol. 705, pp 40-44 do:0.408/www.scentfc.net/amr.705.40 03 Trans Tech Publcatons, Swtzerland Fnte Element Analyss of Rubber Sealng Rng Reslence Behavor

More information

Distributed Middlebox Placement Based on Potential Game

Distributed Middlebox Placement Based on Potential Game Int. J. Communcatons, Network and System Scences, 2017, 10, 264-273 http://www.scrp.org/ournal/cns ISSN Onlne: 1913-3723 ISSN Prnt: 1913-3715 Dstrbuted Mddlebox Placement Based on Potental Game Yongwen

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment JOURNAL OF COMPUTERS, VOL. 4, NO. 9, SEPTEMBER 2009 873 Improved Resource Allocaton Algorthms for Practcal Image Encodng n a Ubqutous Computng Envronment Manxong Dong, Long Zheng, Kaoru Ota, Song Guo School

More information

A Low Energy Algorithm of Wireless Sensor Networks Based on Fractal Dimension

A Low Energy Algorithm of Wireless Sensor Networks Based on Fractal Dimension Sensors & Transducers 2014 by IFSA Publshng, S. L. http://www.sensorsportal.com A Low Energy Algorthm of Wreless Sensor Networks ased on Fractal Dmenson Tng Dong, Chunxao Fan, Zhgang Wen School of Electronc

More information

Application of VCG in Replica Placement Strategy of Cloud Storage

Application of VCG in Replica Placement Strategy of Cloud Storage Internatonal Journal of Grd and Dstrbuted Computng, pp.27-40 http://dx.do.org/10.14257/jgdc.2016.9.4.03 Applcaton of VCG n Replca Placement Strategy of Cloud Storage Wang Hongxa Computer Department, Bejng

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Cracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm

Cracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm Crackng of the Merkle Hellman Cryptosystem Usng Genetc Algorthm Zurab Kochladze 1 * & Lal Besela 2 1 Ivane Javakhshvl Tbls State Unversty, 1, I.Chavchavadze av 1, 0128, Tbls, Georga 2 Sokhum State Unversty,

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

Support Strong Consistency for Mobile Dynamic Contents Delivery Network

Support Strong Consistency for Mobile Dynamic Contents Delivery Network Nnth IEEE Internatonal Symposum on Multmeda 27 Support Strong Consstency for Moble Dynamc Contents Delvery Networ Zhou Su, Jro Katto and Yasuho Yasuda Graduate School of Scence and Engneerng, Waseda Unversty,

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Remote Sensing Image Retrieval Algorithm based on MapReduce and Characteristic Information

Remote Sensing Image Retrieval Algorithm based on MapReduce and Characteristic Information Remote Sensng Image Retreval Algorthm based on MapReduce and Characterstc Informaton Zhang Meng 1, 1 Computer School, Wuhan Unversty Hube, Wuhan430097 Informaton Center, Wuhan Unversty Hube, Wuhan430097

More information

SRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions

SRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions SRB: Shared Runnng Buffers n Proxy to Explot Memory Localty of Multple Streamng Meda Sessons Songqng Chen,BoShen, Yong Yan, Sujoy Basu, and Xaodong Zhang Department of Computer Scence Moble and Meda System

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

SURFACE PROFILE EVALUATION BY FRACTAL DIMENSION AND STATISTIC TOOLS USING MATLAB

SURFACE PROFILE EVALUATION BY FRACTAL DIMENSION AND STATISTIC TOOLS USING MATLAB SURFACE PROFILE EVALUATION BY FRACTAL DIMENSION AND STATISTIC TOOLS USING MATLAB V. Hotař, A. Hotař Techncal Unversty of Lberec, Department of Glass Producng Machnes and Robotcs, Department of Materal

More information

Research Article A Game-Based Secure Localization Algorithm for Mobile Wireless Sensor Networks

Research Article A Game-Based Secure Localization Algorithm for Mobile Wireless Sensor Networks Internatonal Dstrbuted Sensor Networks Volume 205, Artcle ID 64207, 8 pages http://dxdoorg/055/205/64207 Research Artcle A Game-Based Secure Localzaton Algorthm for Moble Wreless Sensor Networks Tanyue

More information

A Distributed Dynamic Bandwidth Allocation Algorithm in EPON

A Distributed Dynamic Bandwidth Allocation Algorithm in EPON www.ccsenet.org/mas Modern Appled Scence Vol. 4, o. 7; July 2010 A Dstrbuted Dynamc Bandwdth Allocaton Algorthm n EPO Feng Cao, Demng Lu, Mnmng Zhang, Kang Yang & Ynbo Qan School of Optoelectronc Scence

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems S. J and D. Shn: An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems 2355 An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems Seunggu J and Dongkun Shn, Member,

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Association Rule Mining with Parallel Frequent Pattern Growth Algorithm on Hadoop

Association Rule Mining with Parallel Frequent Pattern Growth Algorithm on Hadoop Assocaton Rule Mnng wth Parallel Frequent Pattern Growth Algorthm on Hadoop Zhgang Wang 1,2, Guqong Luo 3,*,Yong Hu 1,2, ZhenZhen Wang 1 1 School of Software Engneerng Jnlng Insttute of Technology Nanng,

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems Real-tme Fault-tolerant Schedulng Algorthm for Dstrbuted Computng Systems Yun Lng, Y Ouyang College of Computer Scence and Informaton Engneerng Zheang Gongshang Unversty Postal code: 310018 P.R.CHINA {ylng,

More information

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,

More information

Design of Structure Optimization with APDL

Design of Structure Optimization with APDL Desgn of Structure Optmzaton wth APDL Yanyun School of Cvl Engneerng and Archtecture, East Chna Jaotong Unversty Nanchang 330013 Chna Abstract In ths paper, the desgn process of structure optmzaton wth

More information

Wireless Sensor Network Localization Research

Wireless Sensor Network Localization Research Sensors & Transducers 014 by IFSA Publshng, S L http://wwwsensorsportalcom Wreless Sensor Network Localzaton Research Lang Xn School of Informaton Scence and Engneerng, Hunan Internatonal Economcs Unversty,

More information

Clustered Multimedia NOD : Popularity-Based Article Prefetching and Placement

Clustered Multimedia NOD : Popularity-Based Article Prefetching and Placement Clustered Multmeda NOD : Popularty-Based Artcle Prefetchng and Placement Y.J.Km, T.U.Cho, K.O.Jung, Y.K.Kang, S.H.Park, K-Dong Chung Department of Computer Scence, Pusan Natonal Unversty, Korea Abstract

More information

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol 2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

A Frame Packing Mechanism Using PDO Communication Service within CANopen

A Frame Packing Mechanism Using PDO Communication Service within CANopen 28 A Frame Packng Mechansm Usng PDO Communcaton Servce wthn CANopen Mnkoo Kang and Kejn Park Dvson of Industral & Informaton Systems Engneerng, Ajou Unversty, Suwon, Gyeongg-do, South Korea Summary The

More information

A Topology-aware Random Walk

A Topology-aware Random Walk A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

An Algorithm for Web Firewall Packet Scheduling Based on Delay Prediction

An Algorithm for Web Firewall Packet Scheduling Based on Delay Prediction An Algorthm for Web Frewall Pacet Schedulng Based on Delay Predcton Shchang XUAN, Kage AN, Wu YANG* Informaton Securty Research Center, Harbn Engneerng Unversty, Harbn, Helongjang, 5000, Chna Abstract

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

Risk-Based Packet Routing for Privacy and Compliance-Preserving SDN

Risk-Based Packet Routing for Privacy and Compliance-Preserving SDN Rsk-Based Packet Routng for Prvacy and Complance-Preservng SDN Karan K. Budhraja Abhshek Malvankar Mehd Bahram Chnmay Kundu Ashsh Kundu Mukesh Snghal, Unversty of Maryland, Baltmore County, MD, USA Emal:

More information

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture Goals and Approach CS 194: Dstrbuted Systems Resource Allocaton Goal: acheve predcable performances Three steps: 1) Estmate applcaton s resource needs (not n ths lecture) 2) Admsson control 3) Resource

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Research Article Energy Efficient Interest Forwarding in NDN-Based Wireless Sensor Networks

Research Article Energy Efficient Interest Forwarding in NDN-Based Wireless Sensor Networks Moble Informaton Systems Volume 2016, Artcle ID 3127029, 15 pages http://dx.do.org/10.1155/2016/3127029 Research Artcle Energy Effcent Interest Forwardng n NDN-Based Wreless Sensor Networks Shua Gao, 1

More information

Shared Running Buffer Based Proxy Caching of Streaming Sessions

Shared Running Buffer Based Proxy Caching of Streaming Sessions Shared Runnng Buffer Based Proxy Cachng of Streamng Sessons Songqng Chen, Bo Shen, Yong Yan, Sujoy Basu Moble and Meda Systems Laboratory HP Laboratores Palo Alto HPL-23-47 March th, 23* E-mal: sqchen@cs.wm.edu,

More information

Mining User Similarity Using Spatial-temporal Intersection

Mining User Similarity Using Spatial-temporal Intersection www.ijcsi.org 215 Mnng User Smlarty Usng Spatal-temporal Intersecton Ymn Wang 1, Rumn Hu 1, Wenhua Huang 1 and Jun Chen 1 1 Natonal Engneerng Research Center for Multmeda Software, School of Computer,

More information

A fair buffer allocation scheme

A fair buffer allocation scheme A far buffer allocaton scheme Juha Henanen and Kalev Klkk Telecom Fnland P.O. Box 228, SF-330 Tampere, Fnland E-mal: juha.henanen@tele.f Abstract An approprate servce for data traffc n ATM networks requres

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Research on Categorization of Animation Effect Based on Data Mining

Research on Categorization of Animation Effect Based on Data Mining MATEC Web of Conferences 22, 0102 0 ( 2015) DOI: 10.1051/ matecconf/ 2015220102 0 C Owned by the authors, publshed by EDP Scences, 2015 Research on Categorzaton of Anmaton Effect Based on Data Mnng Na

More information

Simulation and Exploration of RCP in the networks

Simulation and Exploration of RCP in the networks EE384Y Smulaton and Exploraton of P n the networks Sprng, 003 Smulaton and Exploraton of P n the networks hanghua He changhua@stanford.edu June 06, 003 Abstract P (ate ontrol Protocol) s a rate-based congeston

More information

Quantifying Performance Models

Quantifying Performance Models Quantfyng Performance Models Prof. Danel A. Menascé Department of Computer Scence George Mason Unversty www.cs.gmu.edu/faculty/menasce.html 1 Copyrght Notce Most of the fgures n ths set of sldes come from

More information

Bandwidth Allocation for Service Level Agreement Aware Ethernet Passive Optical Networks

Bandwidth Allocation for Service Level Agreement Aware Ethernet Passive Optical Networks Bandwdth Allocaton for Servce Level Agreement Aware Ethernet Passve Optcal Networks Dawd Nowak Performance Engneerng Laboratory School of Electronc Engneerng Dubln Cty Unversty Emal: nowakd@eengdcue Phlp

More information