Split Restoration with Wavelength Conversion in WDM Networks*

Size: px
Start display at page:

Download "Split Restoration with Wavelength Conversion in WDM Networks*"

Transcription

1 Spit Reoration with aveength Conversion in DM Networks* Yuanqiu Luo and Nirwan Ansari Advanced Networking Laborator Department of Eectrica and Computer Engineering New Jerse Initute of Technoog Universit Heights Newark NJ 070 Abract- In this paper we propose a path reoration agorithm for a singe fiber faut in the DM network equipped with waveength conversion. The Integer Linear rogramming (IL) formuas for minimizing the path recover co can ied the optimum soution but it is N-compete. Our heuriic agorithm reaxes the compexit b two eps. In the off-ine ep the node-ink topoog is repaced b the node-waveength topoog the aternate paths for source-deination node pairs are ied and the waveengths in each ink are assigned b maximum matching. In the on-ine ep traffics going through the faied ink are spit into subtraffics and are reored according to their priorities. The performance anasis and the simuation resuts indicate that our heuriic agorithm is practica for DM networks reoration. I. INTRODUCTION The exposive growth of data traffic imposes important emerging bandwidth requirements on toda's networks. ith the potentia of tens of terabits per second aveength Division Mutipexing (DM) is paing a major roe in the expansion of our networks. However more bandwidth in each optica channe of DM means more serious oss each time a faut occurs. A singe fiber cut coud significant downgrade the services to the wor extent. This is the reason wh the survivabiit of optica DM networks is a critica research issue. Two main approaches ensure network survivabiit: protection and reoration. rotection is pre-reserving spare resources (e.g. bandwidth) for a connection. Reoration is using the spare resources after the faut occurs to recover the disrupted traffic. In this paper we propose a spit reoration agorithm to maximize the traffic recover of a singe fiber faut in DM networks. Reoration tpica means that connections affected b a faiure are routed aong aternate paths that are determined and set up at the time of the faut detection. A number of research resuts on reoration have been reported in the iterature. Gere and Ramaswami [] reviewed the survivabiit issues of the optica aer from the point of services perspective. The frameworks of off-ine protection and on-ine reoration were proposed in []. The faut management issue in I-over-DM networks was udied in reference [3]. It recovers the singe ink faiure b ink-based or path-based reoration. Research resuts reported in the iterature thus far have addressed man important issues and difficut probems of reoration in DM networks. However none of them consider the issue of waveength conversion in the recover scheme. The reason is that waveength conversion and the * This work has been supported in part b the New Jerse Commission on Higher Education via the NJI-TOER project. reevant technoog has not been mature and has been quite expensive. ith the deveopment of waveength converters especia the ate deveopment on a-optica waveength converters [4] waveength conversion is being conceived as a necessar function for a-optica networks. ithout waveength conversion a connection can be bocked even if a intermediate inks have free waveengths. ith waveength conversion a connection can be set up as ong as a waveength is free on each intermediate ink [5]. Therefore waveength conversion reaxes the requirements on the waveength management throughout the network b aowing waveengths to be assigned on a ink-to-ink basis [6]. In this paper we formuate the reoration probem with waveength conversion in DM networks. e focus on the singe fiber fauts which are the predominant fauts in DM networks. This reoration probem is formuated as an IL optimization probem and a heuriic agorithm is proposed for fa recover. In Section II we derive the IL formuation to minimize the reoration co. Section III describes the heuriic agorithm for computing the reoration paths. Section IV anazes our simuation resuts. Concusions are given in Section V. II. ROBLEM DESCRITION Consider a DM network with n nodes. The fiber ink between each pair of nodes can support up to waveengths. Each node supports two functions: aveength Add-Drop Mutipexing (ADM) and aveength Conversion (C). ith ADM the node adds oca traffic into the outgoing inks and drops traffic from the incoming inks. ith C the node optica converts one waveength from the incoming inks into another avaiabe waveength to its outgoing inks. Reoration focuses on rerouting the disrupted traffic caused b a singe ink faiure whie minimizing the network co used for recover. Two factors contribute to the recover co: the transmission co which incudes the co to propagate the signa aong the fiber and the co for the signa regeneration; the conversion co which incudes the co to overcome the insertion osses b waveength converters and the co of optica power insertion to achieve good waveength conversion. Here we assume that the nodes in the DM network are far enough to approximate path ength with path hops and thus the transmission co is proportiona to the number of hops of the reoration path. The conversion co is proportiona to the number of waveength conversions aong the reoration path. A. Notations Given a directed graph G(NE) where N is the set of network nodes and E is the set of directed inks of a DM network G define: /03/$ IEEE 43

2 N: the node set in the DM network numbered from to n e : the directed optica ink from node i to node j : the number of waveengths in ink e : the maximum number of waveengths per ink among a inks i.e. max{ } a inks { λ λ }: waveengths supported in the network C T ( ): the transmission co for the reoration path C C ( ): the waveength conversion co for the reoration path C( ): the co for the reoration path { m }: the working paths in the network before ink T fais k : the traffic in the working path k { x }: the working paths which go through ink T; when ink T fais these paths need to be recovered x m C ( n C i ) C T ( e ) : the waveength conversion co in node i from waveength s to t : the transmission co for using ink e Furthermore we introduce the foowing indicators: sk Q e s Z e I n i ink e uses waveength s for working path k ink e uses waveength s for reoration path reoration path converts waveength s to t at node ni Given the above we need to sove for the reoration paths {... } for the faut at ink T. B. IL Formuation Using IL the above probem can be formuated as to find the reoration paths which minimize the reoration co: min C( ) () where the path reoration co: C( ) CC ( ) + CT ( ) {... } () the waveength conversion co: C ( ) C n CC ( ni ) In i t s i (3) the transmission co: C ( ) T { {... } i... n n s CT ( e ) Ze s j i (4) } subject to the foowing conraints: the waveength conversion conraint in a node: n s In Z i e s t s j (5) s I {... { n i... } i {... i (6) t I { n i... } i {... t {... } (7) the waveength conraint in a ink: i {... } i {... s {... } x sk s ( Qe + Z ) e pk s (8) j {... i and the traffic reoration conraint: x k. (9) k As indicated in () minimizing the sum of the recover co C( ) to recover a singe faiure in the DM network is the objective of the IL. The co has two factors: the waveength conversion co C C ( ) and the transmission co C T ( ). The conversion co for a specific path equas the sum of the conversion co in each node of this path (3). The transmission co for a specific path equas the sum of the transmission co in each ink of this path (4). The minimization is subject to severa conraints: fir the waveength conversion conraint in a node (5); second in a node n i a specific waveength s on appears at mo once in the incoming inks for reoration path (6) and at mo once in the outgoing inks for reoration path (7); third the waveengths in a ink are no more than the maximum number of waveengths in the whoe DM network (8). If the reoration scheme meets equation (9) it is a compete reoration a traffics in the faut ink are recovered; otherwise it is a maximum reoration which on reores as much traffics as possibe. The above IL formuation has O ( n + n ) variabes where n is the tota number of nodes in the network and is the maximum number of waveengths in the network. The conraint is in the order of O ( n + n ) where is the number of recover paths when a singe component fais. For a network with n4 and 6 the variabes to be soved are more than 44

3 s 336 Z e and more than 3584 I n v and the number of equations are more than 670. III. HEURISTIC ALGORITHM The probem formuated in Section II is a routing and waveength assignment (RA) probem. The RA probem has been shown to be N-compete and the number of variabes and equations increase rapid with the size of the DM network. So the IL formuation is not practica for on-ine arge network reoration. e empo the foowing heuriic agorithm for rapid rea-time soutions. The heuriic spit reoration (HSR) agorithm assumes that we are given: the network topoog; the traffic matrix of working paths in the DM network; the set of aternate paths between an pair of nodes; the transmission co of a inks and the conversion co of a nodes; the faied ink. The purpose of the HSR is to find the reoration paths for a singe ink faut T whie minimizing the recover co. The HSR agorithm addresses this probem in two eps. In the off-ine ep the node-ink topoog is converted into the node-waveength topoog; the aternate paths of a node pairs are ied in the order of increasing co. In the on-ine ep the traffics going through the faied ink are spit into severa subtraffics and are reored one b one according to their priorities. A. Off-Line Step λ λ λ λ λ λ λ (a) λ (b) Fig.. (a) Node-ink topoog (b) Node-waveength topoog The off-ine preprocessing contains severa subeps. Fir the node-ink topoog is converted into node-waveength topoog. Fig.. iurates an exampe: Fig. (a) is the nodeink topoog the connection between a node pair represents the actua fiber that connects the nodes and in Fig. (b) the connections are the waveengths supported b the corresponding fiber. e route the reoration paths in the node-waveength topoog because each fiber in the DM network can support the tota number of traffics that equa to λ λ : fiber : waveengths the number of waveengths. Here we assume that individua traffic demands are comparabe to the waveength bandwidth. Second the aternate paths for each node pair are rericted b the hop imit and path number imit to reduce the compexit. The waveength assignment in each node is done b maximum matching to reduce the waveength conversion co. Assume an aternate path of working path x goes through node n with incoming waveength λ a if the same waveength λ a is avaiabe in the outgoing port assign it to this path and no waveength conversion co is incurred in node n for this path; if λ a is unavaiabe in the outgoing port assign the fir avaiabe outgoing waveengths and then the waveength conversion co is added. Third cacuate the path co b summing the conversion co and transmission co of each path. The aternate paths for each node pair are sorted in the order of increasing co. The pseudo-code of the off-ine ep is given in Tabe I. In this ep the aternate paths of node pair (n i n j ) are sorted in terms of the path co. Aternate path hop imit h and aternate path number imit k shoud be set based on the atiics of reoration paths. Appropriate vaues of h and k can decrease the computationa and spatia compexit whie ensures that the reasonabe and co-effective reoration paths can be obtained. B. On-Line Step TABLE I: SEUDO-CODE OF OFF-LINE STE Input: G(NE) { m} Cc( n i ) CT( e ) aternate paths of node pair (n in j) athset aternate path hop imit h aternate path number imit k Output: i of aternate path set athset Begin G w(n we w)net_topo_conversion(g(ne)); // topoog conversion for a node pair(n in j) athset imit_path_hops(athset hk); if(athset is not empt) maximun_matching(athset ); waveength_assign(athset E wn w); avecowc_co(athset CC( n i ) ); //waveength conversion co TranCotr_co(athSet CT( e ) ); // transmission co TotaCoaveCo+TranCo; // tota co athseti(athset athset TotaCo); // i paths according to their tota co end if end for End The on-ine ep can be simp described as: hen a singe ink faut is detected spit the tota traffics going through the faied ink into severa subtraffics based on their priorities; reease the network resource aong the subtraffic paths; from the aternate path i of the off-ine cacuation seect the fir faut-ink-disjoint path as the reoration one. This ep consis of the foowing major phases and the pseudocode is ied in Tabe II. Spitting traffics: after detecting the faut in ink e spit the traffics into sub ones; sort subtraffics according to their priorities; if mutipe subtraffics have the same priorit the tie is arbitrari broken. 45

4 Notifing ink faut: forward and backward the faut notification message from the faied ink and reease the corresponding waveengths. Seecting reoration paths: for the highe priorit subtraffic seect from athset the fir aternate path with no ink on e as the reoration path and reserve the intermediate waveengths. Iteration: iterate through a other subtraffics seect the fir aternate path with disjoint waveengths from athset and reserve the intermediate waveengths. TABLE II: SEUDO-CODE OF ON-LINE STE Input: athset faied ink T { m} G w(n we w) Output: reoration path set Resath Begin Trafget_traffics(G w(n we w)t); // get traffics going through ink T TrafLispit_traffics(Traf G w(n we w)t); // spit traffics SpiLii_traffics(TrafLi); // i traffics according to their priorities if SpiLiis not empt for a subtraffics SubTraf in SpiLi Ateathget_aternate_path(athSetSubTrafT); // get the aternate path for a subtraffic Resathadd_to_set(Ateath Resath); // add the path to the Resath athsetmark_path(ateath athset); // deete the path from the athset end for end if switch_traffic(resath); // switch traffics to the recover paths End Our HSR agorithm is a reaxed inear programming [7]. The L reaxation technique reduces the computation compexit b reaxing some conrains in the IL formuation. e reax the minimum transmission co conraint (4) b bounding the hops in the reoration paths and reax the minimum conversion co conraint (3) b maximum matching. The traffic conraint in (9) is reaxed b maximum recover and some ower priorit traffics coud be bocked if necessar. IV. SIMULATIONS AND ERFORMANCE ANALYSIS The simuation runs on the NSFNET topoog with 4 nodes and inks (Fig. ). Each ink is treated as a fiber in the DM network. There are 8 waveengths in a fiber and a nodes are configured with a-optica converters. Initia 5 working paths are setup using the ea co path scheme. The traffic in each working path is one waveength bandwidth. The average number of hops of the working paths is.3 and we imit the hops of the recover paths to 5. Our HSR agorithm is compared with the dedicated path protection (D) and the shared path protection (S) in terms of the survivabiit performance. The D is aso caed + protection; it precomputes an a-ink-disjoint protection path for each working path and the protection path is reserved on for a specific working path not shared with others. The S is simiar to the D except that severa working paths ma share one protection path if possibe. In the foowing the protection path in the D or the S and the reoration path in our HSR are both caed recover path in the sense that the are both recover aternate paths in each scheme after the occurrence of a ink faut. Severa performance criteria are the indicators of the DM network survivabiit: recover co additive atenc and recover coverage. Our simuations are designed to compare these criteria Fig.. NSFNET topoog Recover co is the sum of the transmission co and conversion co of a reoration paths for a ink faut. e assume that the transmission co through a ink and the conversion co in a node are both equa to unit co in the simuation. Tabe III is severa scenarios in the simuation. Six working paths go through ink 6 and the tota co of these paths is units; five working paths go through ink 7 with the tota co of 5 units; etc. e aso incude the D scheme without waveength conversion (ND) and the S scheme without waveength conversion (NS) to compare the recover co. As showed in Tabe IV the recover co of ink 6 faut is units for the NS; 37 units for the D scheme; 34 units for the S scheme; 3 units for the HSR scheme; the ND cannot find the recover path because the same waveength is unavaiabe in an of its candidate recover paths and thus the corresponding recover co is infinite. hen ink 9 and ink 0 fai even the D scheme cannot find the recover paths within the imited hops the recover co is infinite. The HSR seects the faied-inkdisjoint reoration paths whie the D and the S seect the a-ink-disjoint paths so the HS cos ess in terms of the recover co. TABLE III: SCENARIOS scenario ink id Number of working paths tota co in the ink (unit) scenario 6 6 scenario scenario scenario scenario 5 4 scenario TABLE IV: RECOVERY COST (unit) scenario ink faut ND NS D S HSR scenario ink scenario ink scenario 3 ink scenario 4 ink scenario 5 ink scenario 6 ink average

5 Because of additiona hops and waveength conversions the recover paths ma incur additive atenc. The additive transmission atenc is due to more hops in the recover paths compared with the origina working paths. The additive conversion atenc is generated b more waveength conversions in the recover paths. Tabe V shows the additive transmission hops in these three methods. The HSR adds the ea hops to the recover paths the D adds the mo and the S is the midde one. Tabe VI iurates the additive conversions of each method. The HS has the be performance whie the D causes the mo additive waveength conversions. Due to the imit of hops and ow network degree there ma not exi recover paths for each ink faut. Tabe VII shows that the HSR and the S have 00% coverage i.e. the compete recover the traffics disconnected b the teed ink fauts whie the D on recovers 67% of the ink fauts. TABLE V: ADDITIVE TRANSMISSION HOS scenario ink faut D S HSR scenario ink scenario ink scenario 3 ink scenario 4 ink 0 -- scenario 5 ink scenario 6 ink average TABLE VI: ADDITIVE AVELENGTH CONVERSIONS scenario ink faut D S HSR scenario ink scenario ink scenario 3 ink scenario 4 ink scenario 5 ink scenario 6 ink average TABLE VII: RECOVERY COVERAGE D S HSR 67% 00% 00% V. CONCLUSIONS e have inveigated the survivabiit issue of DM networks. Our mathematica formuation and performance anasis revea severa new insights in DM networks reoration: aveength conversion: ith the impementation of waveength converters the IL formuation for the reoration issue is different from an other formuations. The waveength conversion co is one main factor of the tota recover co and waveength conversion conraints in each node add more equations and variabes. Our simuations revea that the waveength conversion functionait reaxes the waveength management in the DM networks and the waveength can be assigned on a ink-to-ink basis inead of the end-to-end basis. DM networks with waveength conversion have higher recover coverage and ess recover co. Traffic spit reoration: Disconnected traffics in the faied ink are divided into subtraffics and sorted according to their priorit. This idea is based on the observation that not a traffics in a ink have the same parameters. Even the have the same source and deination different appications ma generate different traffic parameters. Athough expicit priorit criteria are not anazed our HSR agorithm provides a framework for traffic spit reoration schemes. Heuriic reoration agorithm: Due to the arge number of equations and variabes our heuriic reoration agorithm is a practica soution for ink faut recover. aveength assignment and aternate path seection are two ke issues for effective recover. The maximum matching simpifies the N-compete probem. The imit on aternate path number and hops decreases the compexit of reoration. Mo important of a separating the computation into off-ine initiaization significant reduces the on-ine reoration time. ith this simpified on-ine processing and higher resource utiization the reoration scheme is more attractive than atic ones such as the D and the S. These points represent an important underanding in the survivabe issue of DM networks with waveength converters. The heuriic reoration agorithm can be adapted to other variations such as bi-directiona inks mutipe ink fauts and mutipe inks between one node pair. Our research in this area has expoited the impact of waveength conversion and priorit-based traffic spit reoration in the survivabe DM network operation. REFERENCES [] O. Gere and R. Ramaswami Optica aer survivabiit: a services perspective IEEE Communications Magazine vo. 38 no. 3 pp March 000. [] S. Sengupta and R. Ramamurth From network design to dnamic provisioning and reoration in optica crossconnect mesh networks: an architectura and agorithmic overview IEEE Network vo. 5 no. 4 pp Ju-Aug. 00. [3] L. Sahasrabuddhe S. Ramamurth and B. Mukherjee Faut management in I-over-DM networks: DM protection versus I reoration IEEE Journa on Seected Areas in Communications vo. 0 no. pp. -33 Jan. 00. [4] D. ofson T. Fjede and A. Koch Technoogies for a-optica waveength conversion in DDM networks The 4th acific Rim Conference on Lasers and Eectro- Optics vo. pp [5] M. Fre and T. Ndousse aveength conversion and ca connection probabiit in DM networks IEEE Transactions on Communications vo. 49 no. 0 pp Oct. 00. [6] Y. Luo and N. Ansari Reoration with waveength conversion in DM networks IEE Eectronics Letters Vo. 38 No. 6 pp Aug. 00. [7] M. Sridharan M.V. Saapaka and A. K. Somani A practica approach to operating survivabe DM networks IEEE Journa on Seected Areas in Communications vo. 0 no. pp Jan

Path-Based Protection for Surviving Double-Link Failures in Mesh-Restorable Optical Networks

Path-Based Protection for Surviving Double-Link Failures in Mesh-Restorable Optical Networks Path-Based Protection for Surviving Doube-Link Faiures in Mesh-Restorabe Optica Networks Wensheng He and Arun K. Somani Dependabe Computing and Networking Laboratory Department of Eectrica and Computer

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) botton@poms.uc.ac.be Bernard

More information

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah Journa of Lightwave Technoogy Page of CFP: Cooperative Fast Protection Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapocai and Hussein T. Mouftah Abstract We introduce a nove protection scheme, caed Cooperative

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

On Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture

On Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture On inding the est Partia Muticast Protection Tree under ua-homing rchitecture Mei Yang, Jianping Wang, Xiangtong Qi, Yingtao Jiang epartment of ectrica and omputer ngineering, University of Nevada Las

More information

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction

More information

Fast and effective dimensioning algorithm for end-toend optical burst switching networks with ON-OFF traffic model

Fast and effective dimensioning algorithm for end-toend optical burst switching networks with ON-OFF traffic model Fast and effective dimensioning agorithm for end-toend optica burst switching networks with ON-OFF traffic mode Reinado Vaejos 1, Aejandra Zapata 1, Marco Aravena 2,1 1 Teematics Group, Eectronic Engineering

More information

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line American J. of Engineering and Appied Sciences 3 (): 5-24, 200 ISSN 94-7020 200 Science Pubications Appication of Inteigence Based Genetic Agorithm for Job Sequencing Probem on Parae Mixed-Mode Assemby

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations Formuation of Loss minimization Probem Using Genetic Agorithm and Line-Fow-based Equations Sharanya Jaganathan, Student Member, IEEE, Arun Sekar, Senior Member, IEEE, and Wenzhong Gao, Senior member, IEEE

More information

Alternate Paths for Multiple Fault Tolerance on Dynamic WDM Optical Networks

Alternate Paths for Multiple Fault Tolerance on Dynamic WDM Optical Networks Aternate Paths for Mutipe Faut Toerance on Dynamic WDM Optica Networks Nicoas Jara, Reinado Vaejos, Gerardo Rubino To cite this version: Nicoas Jara, Reinado Vaejos, Gerardo Rubino. Aternate Paths for

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-7435 Voume 10 Issue 16 BioTechnoogy 014 An Indian Journa FULL PAPER BTAIJ, 10(16), 014 [999-9307] Study on prediction of type- fuzzy ogic power system based

More information

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:

More information

Design of IP Networks with End-to. to- End Performance Guarantees

Design of IP Networks with End-to. to- End Performance Guarantees Design of IP Networks with End-to to- End Performance Guarantees Irena Atov and Richard J. Harris* ( Swinburne University of Technoogy & *Massey University) Presentation Outine Introduction Mutiservice

More information

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed

More information

International Journal of Electronics and Communications (AEÜ)

International Journal of Electronics and Communications (AEÜ) Int. J. Eectron. Commun. (AEÜ) 67 (2013) 470 478 Contents ists avaiabe at SciVerse ScienceDirect Internationa Journa of Eectronics and Communications (AEÜ) journa h o me pa ge: www.esevier.com/ocate/aeue

More information

A Discriminative Global Training Algorithm for Statistical MT

A Discriminative Global Training Algorithm for Statistical MT Discriminative Goba Training gorithm for Statistica MT Christoph Timann IBM T.J. Watson Research Center Yorktown Heights, N.Y. 10598 cti@us.ibm.com Tong Zhang Yahoo! Research New York Cit, N.Y. 10011 tzhang@ahoo-inc.com

More information

Response Surface Model Updating for Nonlinear Structures

Response Surface Model Updating for Nonlinear Structures Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Attention The materias beow are

More information

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints *

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

A Petrel Plugin for Surface Modeling

A Petrel Plugin for Surface Modeling A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica

More information

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University Arithmetic Coding Prof. Ja-Ling Wu Department of Computer Science and Information Engineering Nationa Taiwan University F(X) Shannon-Fano-Eias Coding W..o.g. we can take X={,,,m}. Assume p()>0 for a. The

More information

Delay Budget Partitioning to Maximize Network Resource Usage Efficiency

Delay Budget Partitioning to Maximize Network Resource Usage Efficiency Deay Budget Partitioning to Maximize Network Resource Usage Efficiency Kartik Gopaan Tzi-cker Chiueh Yow-Jian Lin Forida State University Stony Brook University Tecordia Technoogies kartik@cs.fsu.edu chiueh@cs.sunysb.edu

More information

A Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks

A Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks Sensors 2013, 13, 16424-16450; doi:10.3390/s131216424 Artice OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journa/sensors A Near-Optima Distributed QoS Constrained Routing Agorithm for Mutichanne Wireess

More information

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing Rea-Time Image Generation with Simutaneous Video Memory Read/rite Access and Fast Physica Addressing Mountassar Maamoun 1, Bouaem Laichi 2, Abdehaim Benbekacem 3, Daoud Berkani 4 1 Department of Eectronic,

More information

Discrete elastica model for shape design of grid shells

Discrete elastica model for shape design of grid shells Abstracts for IASS Annua Symposium 017 5 8th September, 017, Hamburg, Germany Annette Böge, Manfred Grohmann (eds.) Discrete eastica mode for shape design of grid shes Yusuke SAKAI* and Makoto OHSAKI a

More information

On-Chip CNN Accelerator for Image Super-Resolution

On-Chip CNN Accelerator for Image Super-Resolution On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement

More information

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network Service Chain (SC) Mapping with Mutipe SC Instances in a Wide Area Network This is a preprint eectronic version of the artice submitted to IEEE GobeCom 2017 Abhishek Gupta, Brigitte Jaumard, Massimo Tornatore,

More information

A Local Optimal Method on DSA Guiding Template Assignment with Redundant/Dummy Via Insertion

A Local Optimal Method on DSA Guiding Template Assignment with Redundant/Dummy Via Insertion A Loca Optima Method on DSA Guiding Tempate Assignment with Redundant/Dummy Via Insertion Xingquan Li 1, Bei Yu 2, Jiani Chen 1, Wenxing Zhu 1, 24th Asia and South Pacific Design T h e p i c Automation

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

Genetic Algorithms for Parallel Code Optimization

Genetic Algorithms for Parallel Code Optimization Genetic Agorithms for Parae Code Optimization Ender Özcan Dept. of Computer Engineering Yeditepe University Kayışdağı, İstanbu, Turkey Emai: eozcan@cse.yeditepe.edu.tr Abstract- Determining the optimum

More information

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802.

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802. A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irreguar LDPC Codes in the IEEE 82.16e Standards Yeong-Luh Ueng and Chung-Chao Cheng Dept. of Eectrica Engineering,

More information

Timing-Driven Hierarchical Global Routing with Wire-Sizing and Buffer-Insertion for VLSI with Multi-Routing-Layer

Timing-Driven Hierarchical Global Routing with Wire-Sizing and Buffer-Insertion for VLSI with Multi-Routing-Layer Timing-Driven Hierarchica Goba Routing with Wire-Sizing and Buffer-Insertion for VLSI with Muti-Routing-Layer Takahiro DEGUCHI y Tetsushi KOIDE z Shin ichi WAKABAYASHI y yfacuty of Engineering, Hiroshima

More information

Pneumo-Mechanical Simulation of a 2 Dof Planar Manipulator

Pneumo-Mechanical Simulation of a 2 Dof Planar Manipulator Pneumo-Mechanica Simuation of a 2 Dof Panar Manipuator Hermes GIBERTI, Simone CINQUEMANI Mechanica Engineering Department, Poitecnico di Miano, Campus Bovisa Sud, via La Masa 34, 2156, Miano, Itay ABSTRACT

More information

Traffic Engineering for Provisioning Restorable Hose-Model VPNs

Traffic Engineering for Provisioning Restorable Hose-Model VPNs Traffic Engineering for Provisioning Restorabe Hose-Mode VPNs Yu-Liang Liu, Nonmember, Yeai S. Sun a) and Meng Chang Chen b), Member Summary Virtua Private Networks (VPNs) are overay networks estabished

More information

1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation

1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation 1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER 2014 Bacward Fuzzy Rue Interpoation Shangzhu Jin, Ren Diao, Chai Que, Senior Member, IEEE, and Qiang Shen Abstract Fuzzy rue interpoation

More information

Multiple Plane Phase Retrieval Based On Inverse Regularized Imaging and Discrete Diffraction Transform

Multiple Plane Phase Retrieval Based On Inverse Regularized Imaging and Discrete Diffraction Transform Mutipe Pane Phase Retrieva Based On Inverse Reguaried Imaging and Discrete Diffraction Transform Artem Migukin, Vadimir Katkovnik, and Jaakko Astoa Department of Signa Processing, Tampere University of

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Scheduing Announcement Homework 2 due on October 25th Project 1 due on October 26th 2 CSE 120 Scheduing and Deadock Scheduing Overview In discussing

More information

Service Scheduling for General Packet Radio Service Classes

Service Scheduling for General Packet Radio Service Classes Service Scheduing for Genera Packet Radio Service Casses Qixiang Pang, Amir Bigoo, Victor C. M. Leung, Chris Schoefied Department of Eectrica and Computer Engineering, University of British Coumbia, Vancouver,

More information

Cross-layer Design for Efficient Resource Utilization in WiMedia UWB-based WPANs

Cross-layer Design for Efficient Resource Utilization in WiMedia UWB-based WPANs Cross-ayer Design for Efficient Resource Utiization in WiMedia UWB-based WPANs RAED AL-ZUBI and MARWAN KRUNZ Department of Eectrica and Computer Engineering. University of Arizona. Utra-wideband (UWB)

More information

Optimized Base-Station Cache Allocation for Cloud Radio Access Network with Multicast Backhaul

Optimized Base-Station Cache Allocation for Cloud Radio Access Network with Multicast Backhaul Optimized Base-Station Cache Aocation for Coud Radio Access Network with Muticast Backhau Binbin Dai, Student Member, IEEE, Ya-Feng Liu, Member, IEEE, and Wei Yu, Feow, IEEE arxiv:804.0730v [cs.it] 28

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

Reference trajectory tracking for a multi-dof robot arm

Reference trajectory tracking for a multi-dof robot arm Archives of Contro Sciences Voume 5LXI, 5 No. 4, pages 53 57 Reference trajectory tracking for a muti-dof robot arm RÓBERT KRASŇANSKÝ, PETER VALACH, DÁVID SOÓS, JAVAD ZARBAKHSH This paper presents the

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism Backing-up Fuzzy Contro of a Truck-traier Equipped with a Kingpin Siding Mechanism G. Siamantas and S. Manesis Eectrica & Computer Engineering Dept., University of Patras, Patras, Greece gsiama@upatras.gr;stam.manesis@ece.upatras.gr

More information

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models On Upper Bounds for Assortment Optimization under the Mixture of Mutinomia Logit Modes Sumit Kunnumka September 30, 2014 Abstract The assortment optimization probem under the mixture of mutinomia ogit

More information

Chapter Multidimensional Direct Search Method

Chapter Multidimensional Direct Search Method Chapter 09.03 Mutidimensiona Direct Search Method After reading this chapter, you shoud be abe to:. Understand the fundamentas of the mutidimensiona direct search methods. Understand how the coordinate

More information

Navigating and searching theweb

Navigating and searching theweb Navigating and searching theweb Contents Introduction 3 1 The Word Wide Web 3 2 Navigating the web 4 3 Hyperinks 5 4 Searching the web 7 5 Improving your searches 8 6 Activities 9 6.1 Navigating the web

More information

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162 oward Efficient Spatia Variation Decomposition via Sparse Regression Wangyang Zhang, Karthik Baakrishnan, Xin Li, Duane Boning and Rob Rutenbar 3 Carnegie Meon University, Pittsburgh, PA 53, wangyan@ece.cmu.edu,

More information

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method 297 Rea-Time Feature escriptor Matching via a Muti-Resoution Ehaustive Search Method Chi-Yi Tsai, An-Hung Tsao, and Chuan-Wei Wang epartment of Eectrica Engineering, Tamang University, New Taipei City,

More information

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department

More information

Peer-Assisted Computation Offloading in Wireless Networks, Student Member, IEEE, and Guohong Cao, Fellow, IEEE

Peer-Assisted Computation Offloading in Wireless Networks, Student Member, IEEE, and Guohong Cao, Fellow, IEEE IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 17, NO. 7, JULY 2018 4565 Peer-Assisted Computation Offoading in Wireess Networks Yei Geng, Student Member, IEEE, and Guohong Cao, Feow, IEEE Abstract

More information

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters Optimization and Appication of Support Vector Machine Based on SVM Agorithm Parameters YAN Hui-feng 1, WANG Wei-feng 1, LIU Jie 2 1 ChongQing University of Posts and Teecom 400065, China 2 Schoo Of Civi

More information

ABSTRACT WU, KEHANG. Flow Aggregation based Lagrangian Relaxation with. (Under the direction of Professor Douglas S. Reeves)

ABSTRACT WU, KEHANG. Flow Aggregation based Lagrangian Relaxation with. (Under the direction of Professor Douglas S. Reeves) ABSTRACT WU, KEHANG Fow Aggregation based Lagrangian Reaxation with Appications to Capacity Panning of IP Networks with Mutipe Casses of Service (Under the direction of Professor Dougas S. Reeves) Noninear

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

BGP ingress-to-egress route configuration in a capacityconstrained Asia-Pacific Conference On Communications, 2005, v. 2005, p.

BGP ingress-to-egress route configuration in a capacityconstrained Asia-Pacific Conference On Communications, 2005, v. 2005, p. Tite BGP -to- route configuration in a capacityconstrained AS Author(s) Chim, TW; Yeung, KL; Lu KS Citation 2005 Asia-Pacific Conference On Communications, 2005, v. 2005, p. 386-390 Issued Date 2005 URL

More information

A Scalable Approach for Service Chain (SC) Mapping with Multiple SC Instances in a Wide-Area Network

A Scalable Approach for Service Chain (SC) Mapping with Multiple SC Instances in a Wide-Area Network JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 A Scaabe Approach for Service Chain (SC) Mapping with Mutipe SC Instances in a Wide-Area Network This is a preprint eectronic version of the

More information

Complex Human Activity Searching in a Video Employing Negative Space Analysis

Complex Human Activity Searching in a Video Employing Negative Space Analysis Compex Human Activity Searching in a Video Empoying Negative Space Anaysis Shah Atiqur Rahman, Siu-Yeung Cho, M.K.H. Leung 3, Schoo of Computer Engineering, Nanyang Technoogica University, Singapore 639798

More information

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Register Aocation Consider the foowing assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Assume that two registers are avaiabe. Starting from the eft a compier woud generate

More information

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Nattawut Thepayasuwan, Member, IEEE and Aex Doboi, Member, IEEE Abstract

More information

A Novel Symbolic Algorithm for Maximum Weighted Matching in Bipartite Graphs *

A Novel Symbolic Algorithm for Maximum Weighted Matching in Bipartite Graphs * Int. J. Communications, Networ and Sstem Sciences, 011, 4, 111-11 doi:10.436/ijcns.011.4014 Pubished Onine Februar 011 (http://www.scirp.org/journa/ijcns) A Nove Smboic Agorithm for Maximum Weighted Matching

More information

PAPER Delay Constrained Routing and Link Capacity Assignment in Virtual Circuit Networks

PAPER Delay Constrained Routing and Link Capacity Assignment in Virtual Circuit Networks 2004 PAPER Deay Constrained Routing and Link Capacity Assignment in Virtua Circuit Networks Hong-Hsu YEN a), Member and FrankYeong-Sung LIN b), Nonmember SUMMARY An essentia issue in designing, operating

More information

EE 122 Final Exam - Solution Date: December 14, 2002

EE 122 Final Exam - Solution Date: December 14, 2002 Name: SID: ee ogin: Day/Time of section you atten: EE Fina Exam - Soution Date: December 4, 00 Probem Points /0 /0 3 /0 4 /0 5 /0 6 /0 7 /0 8 /0 9 /0 0 /0 Tota /00 . Question (0 pt) (a) (5 pt) Expain briefy

More information

Meeting Exchange 4.1 Service Pack 2 Release Notes for the S6200/S6800 Servers

Meeting Exchange 4.1 Service Pack 2 Release Notes for the S6200/S6800 Servers Meeting Exchange 4.1 Service Pack 2 Reease Notes for the S6200/S6800 Servers The Meeting Exchange S6200/S6800 Media Servers are SIP-based voice and web conferencing soutions that extend Avaya s conferencing

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing 100039, China shentao@casm.ac.cn Xu Dehe Institute of resources and environment, North

More information

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER!

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER! [1,2] have, in theory, revoutionized cryptography. Unfortunatey, athough offer many advantages over conventiona and authentication), such cock synchronization in this appication due to the arge operand

More information

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing An Adaptive Two-Copy Deayed SR-ARQ for Sateite Channes with Shadowing Jing Zhu, Sumit Roy zhuj@ee.washington.edu Department of Eectrica Engineering, University of Washington Abstract- The paper focuses

More information

Quality Driven Web Services Composition

Quality Driven Web Services Composition Quaity Driven Web Services Composition Liangzhao Zeng University of New South Waes Sydney, Austraia zzhao@cseunsweduau Jayant Kaagnanam IBM TJ Watson Research Center New York, USA ayant@usibmcom Bouaem

More information

Chapter 5 Combinational ATPG

Chapter 5 Combinational ATPG Chapter 5 Combinationa ATPG 2 Outine Introduction to ATPG ATPG for Combinationa Circuits Advanced ATPG Techniques 3 Input and Output of an ATPG ATPG (Automatic Test Pattern Generation) Generate a set of

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002*

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002* RDF Objects 1 Aex Barne Information Infrastructure Laboratory HP Laboratories Bristo HPL-2002-315 November 27 th, 2002* E-mai: Andy_Seaborne@hp.hp.com RDF, semantic web, ontoogy, object-oriented datastructures

More information

A Method for Calculating Term Similarity on Large Document Collections

A Method for Calculating Term Similarity on Large Document Collections $ A Method for Cacuating Term Simiarity on Large Document Coections Wofgang W Bein Schoo of Computer Science University of Nevada Las Vegas, NV 915-019 bein@csunvedu Jeffrey S Coombs and Kazem Taghva Information

More information

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y. FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four

More information

Alternative Decompositions for Distributed Maximization of Network Utility: Framework and Applications

Alternative Decompositions for Distributed Maximization of Network Utility: Framework and Applications Aternative Decompositions for Distributed Maximization of Network Utiity: Framework and Appications Danie P. Paomar and Mung Chiang Eectrica Engineering Department, Princeton University, NJ 08544, USA

More information

Modelling and Performance Evaluation of Router Transparent Web cache Mode

Modelling and Performance Evaluation of Router Transparent Web cache Mode Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7,1316-1320 Modeing and Performance Evauation of Transparent cache Mode Emad Hassan A-Hemiary Network Engineering Department, Coege of Information Engineering,

More information

Fuzzy Perceptual Watermarking For Ownership Verification

Fuzzy Perceptual Watermarking For Ownership Verification Fuzzy Perceptua Watermarking For Ownership Verification Mukesh Motwani 1 and Frederick C. Harris, Jr. 1 1 Computer Science & Engineering Department, University of Nevada, Reno, NV, USA Abstract - An adaptive

More information

Multi-Parametric Online RWA based on Impairment Generating Sources

Multi-Parametric Online RWA based on Impairment Generating Sources Muti-Parametric Onine RWA based on Imairment Generating Sources P. Kokkinos, K. Christodouoouos, K. Manousakis, E. A. Varvarigos Comuter Engineering and Informatics Deartment, University of Patras, Greece,

More information

Endoscopic Motion Compensation of High Speed Videoendoscopy

Endoscopic Motion Compensation of High Speed Videoendoscopy Endoscopic Motion Compensation of High Speed Videoendoscopy Bharath avuri Department of Computer Science and Engineering, University of South Caroina, Coumbia, SC - 901. ravuri@cse.sc.edu Abstract. High

More information

Revisions for VISRAD

Revisions for VISRAD Revisions for VISRAD 16.0.0 Support has been added for the SLAC MEC target chamber: 4 beams have been added to the Laser System: X-ray beam (fixed in Port P 90-180), 2 movabe Nd:Gass (ong-puse) beams,

More information

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM JOINT IMAGE REGISTRATION AND AMPLE-BASED SUPER-RESOLUTION ALGORITHM Hyo-Song Kim, Jeyong Shin, and Rae-Hong Park Department of Eectronic Engineering, Schoo of Engineering, Sogang University 35 Baekbeom-ro,

More information

Further Concepts in Geometry

Further Concepts in Geometry ppendix F Further oncepts in Geometry F. Exporing ongruence and Simiarity Identifying ongruent Figures Identifying Simiar Figures Reading and Using Definitions ongruent Trianges assifying Trianges Identifying

More information

MULTITASK MULTIVARIATE COMMON SPARSE REPRESENTATIONS FOR ROBUST MULTIMODAL BIOMETRICS RECOGNITION. Heng Zhang, Vishal M. Patel and Rama Chellappa

MULTITASK MULTIVARIATE COMMON SPARSE REPRESENTATIONS FOR ROBUST MULTIMODAL BIOMETRICS RECOGNITION. Heng Zhang, Vishal M. Patel and Rama Chellappa MULTITASK MULTIVARIATE COMMON SPARSE REPRESENTATIONS FOR ROBUST MULTIMODAL BIOMETRICS RECOGNITION Heng Zhang, Visha M. Pate and Rama Cheappa Center for Automation Research University of Maryand, Coage

More information

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae

More information

No connection establishment Do not perform Flow control Error control Retransmission Suitable for small request/response scenario E.g.

No connection establishment Do not perform Flow control Error control Retransmission Suitable for small request/response scenario E.g. UDP & TCP 2018/3/26 UDP Header Characteristics of UDP No connection estabishment Do not perform Fow contro Error contro Retransmission Suitabe for sma request/response scenario E.g., DNS Remote Procedure

More information

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs Repication of Virtua Network Functions: Optimizing Link Utiization and Resource Costs Francisco Carpio, Wogang Bziuk and Admea Jukan Technische Universität Braunschweig, Germany Emai:{f.carpio, w.bziuk,

More information

Research on UAV Fixed Area Inspection based on Image Reconstruction

Research on UAV Fixed Area Inspection based on Image Reconstruction Research on UAV Fixed Area Inspection based on Image Reconstruction Kun Cao a, Fei Wu b Schoo of Eectronic and Eectrica Engineering, Shanghai University of Engineering Science, Abstract Shanghai 20600,

More information

IrDA IrLAP Throughput Optimisation with Physical Layer Consideration

IrDA IrLAP Throughput Optimisation with Physical Layer Consideration IrDA IrLAP Throughput Optimisation with Physica Layer onsideration Abstract Barker, P. & Boucouvaas, A.. Mutimedia ommunications Research Group Schoo of Design, Engineering & omputing Bournemouth University,

More information

Archive Software with value add services:

Archive Software with value add services: E-Mai Archive Software with vaue add services: Protect your emais from data oss through reasonabe and secure backup features. Increase the productivity of your team by using the integrated search engine

More information

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong

More information