Resource Discovery in P2P Networks Using Evolutionary Neural Networks
|
|
- Laureen Douglas
- 5 years ago
- Views:
Transcription
1 > PAPER IDENTIFICATION NUMBER: < Resource Dscovery n P2P Networks Usng Evolutonary Neural Networks Mkko A. VAPA, Nko P. KOTILAINEN, Annemar K. AUVINEN, Hekk M. KAINULAINEN, and Jarkko T. VUORI Abstract-- Resource dscovery s an essental problem n peerto-peer networks snce there s no centralzed ndex n whch to look for nformaton about resources. One soluton for the problem s to use a search algorthm that locates resources based on the local knowledge about the network. Tradtonally, the search algorthms have been based on few smple rules, whch often reduces the performance from optmal. In ths paper, we descrbe the results of a process where evolutonary neural networks are used for fndng an effcent search algorthm from a class of local search algorthms. The ntal test results ndcate that an evolutonary optmzaton process can produce search algorthm canddates that are competent compared to the breadth-frst search algorthm (BFS) used n Gnutella peer-topeer network. Index Terms-- resource dscovery, peer-to-peer networks, mult-layer perceptrons, genetc algorthms. I I. INTRODUCTION N the resource dscovery problem, any node can possess resources and query these resources from other nodes n the network. The problem conssts of graph wth nodes, lnks and resources. Resources are dentfed by unque IDs and nodes may contan any number of resources. One node knows only the resources t s currently hostng. Any node n the graph can start a query, whch means that some of the lnks are traversed based on a local decson n the graph. Whenever the query reaches the node wth the quered ID, the node reples. The goal s to locate a predetermned amount of resource nstances wth a gven ID usng as few query packets as possble. One possble soluton for the resource dscovery problem s the breadth-frst search algorthm (BFS) []. In BFS a node that starts a query passes the query to all ts neghbors. When the neghbors receve the query, they pass t further to all ther neghbors except the one from whch the query was receved. Nodes cache the messages that they have receved and f the query has already been receved from other neghbor then Manuscrpt receved September 2, Ths work was supported n part by the Graduate School n Electroncs, Telecommuncatons and Automaton (GETA) and Innovatons n Busness, Communcaton and Technology (InBCT) proect of Agora Center. M. A. Vapa, A. K. Auvnen, and J. T. Vuor are wth Department of Mathematcal Informaton Technology, Unversty of Jyväskylä, Fnland (emal: frstname.lastname@yu.f). N. P. Kotlanen s wth Agora Center, Unversty of Jyväskylä, Fnland (emal: nko.kotlanen@yu.f). H. M. Kanulanen s wth WTS Networks, Jyväskylä, Fnland (e-mal: hekk.kanulanen@wts.f) query s dropped. Tme-to-Lve (TTL) value s used to lmt the number of hops the query can take by reducng TTL value each tme a query s receved. When TTL decreases to zero the query s dropped. The BFS algorthm ensures that f a resource s located n the network t can be found from the network f TTL s hgh enough. The downsde of the algorthm, however, s that t uses many query packets to fnd the needed resources. Thus, we propose an alternatve algorthm that s more effcent n face of used query packets and evaluate t usng peer-to-peer scenaro wth power-law dstrbuted topology [2]. The rest of ths paper s organzed as follows. The next secton presents the references to related work done n P2P resource dscovery. Secton III descrbes the NeuroSearch algorthm as a soluton for the resource dscovery problem. Secton IV descrbes the optmzaton process and Secton V the test case used n the study. Secton VI analyzes the smulaton results and n Secton VII the paper s concluded. II. RELATED WORK Much research has been done regardng the resource dscovery problem. Adamc et al. [3] and Km et al. [4] propose a search strategy that utlzes the topologcal propertes of a power-law network. The search strategy frst proceeds towards hghest-degree node, e.g. the node that has the hghest number of neghbors, and then gradually moves to lower degree ones. The algorthm locates resources effcently f they can be found from the core of the network, but the performance decreases when the central nodes are revsted n search for lower degree nodes. Lv et al. [5] evaluate BFS, expandng rng and random walk search mechansms wth varyng topologes, ncludng random graphs [2], power-law graphs and a snapshot of the Gnutella network obtaned n October These researchers fnd that BFS s not scalable and n partcular on Gnutella and powerlaw graphs the effects of floodng are dsastrous: the number of messages ncreases drastcally when TTL s ncreased. Expandng rng, where TTL s extended gradually for BFS, s the frst ad to the problem. However, because t forwards duplcate messages to the nodes that the query has already reached, a better soluton to the problem usng random walkers s proposed by the researchers. A search ntates multple walkers and forwards them based on a random selecton of a neghbor. In addton to the TTL as a termnaton condton for the walkers, Lv et al. use checkng, where the random walkers perodcally check from the query orgnator whether the
2 > PAPER IDENTIFICATION NUMBER: < 2 walker should be termnated or not. Whle random walkers ncrease the number of hops and thus latency, they decrease the total traffc because the search proceeds n a depth-frst manner. Kalogerak et al. [6] consder two search algorthms for the resource dscovery problem. The Modfed Random BFS Search behaves lke BFS, but the neghbors select only a random subset of neghbors for forwardng the query. Ths reduces traffc, but adustng the correct sze of the subset for varous networks may be dffcult. The researchers work uses a random graph n whch all the nodes have approxmately smlar degrees. Thus the performance of the algorthm n power-law graphs cannot be drectly determned from the results. In another algorthm they present, called Intellgent Search Mechansm, the nodes keep track of recent query results provded by ther neghbors. When a new query arrves, the neghbors are sorted based on the smlarty of the query to earler reples from the neghbor. Because the nodes keep track of the earler queres, the performance of the algorthm mproves as the network evolves. Yang and Garca-Molna [7] expermented wth many types of drected search strateges based on varous heurstcs. These heurstcs nclude the number of results returned, shortest average tme to satsfacton, smallest average number of hops of receved results, the hghest number of results returned, shortest message queue, shortest latency and hghest degree. Ther work suggests that, to mnmze the tme to satsfacton measure, the best strategy s to pass the query to the neghbor that has had the shortest average tme to satsfacton for last ten queres. Also, when consderng the bandwdth use, the most relable measure s the smallest average number of hops of receved results for last ten queres. The heurstcs used n the study are based on hstory data collected locally n each node. Smlar use of hstory data s found from the work by Tsoumakos and Roussopoulos [8]. In ther proposal, called Adaptve Probablstc Search algorthm, neghbors keep track of the success rates of earler queres and forward random walkers probablstcally, based on the earler success rate. The algorthm s able to adapt to dfferent query patterns and, therefore, performs better than random walkers. There are certan lmtatons n all the approaches descrbed above. Frst, each of these algorthms uses some control parameters (for example tme-to-lve, the number of walkers or the proporton of neghbors to forward the query) that can be used to tune the algorthm. For a search algorthm, the number Fg. : Processng of NeuroSearch resource query and the NeuroSearch neural network
3 > PAPER IDENTIFICATION NUMBER: < 3 of control parameters should be kept to a mnmal to allow zero confgurablty when appled to a real envronment. Second, whle some of these approaches have mechansms to adapt to the envronment, they do not utlze the entre potental of the envronment because they rely only on one strategy (for example the smlarty of the query and earler reples, shortest average tme to satsfacton for last 0 queres or the success rate of earler queres). In general, only one strategy cannot be effcent n all scenaros and therefore an effcent algorthm should be able to utlze many strateges at the same tme. To overcome these lmtatons a neural network based resource dscovery algorthm called NeuroSearch was desgned. NeuroSearch learns by tself the correct behavor n gven network condtons and uses many combnatons of strateges to locate resources. To authors' knowledge ths s the frst tme when neural networks are beng appled to resource dscovery problem. III. NEUROSEARCH RESOURCE DISCOVERY ALGORITHM The proposed algorthm, called as NeuroSearch, makes decson to whom of the node's neghbors the resource request message s forwarded based on the output neuron of threelayer perceptron neural network. The algorthm s located nsde a peer node as shown n Fg. and s the same for all peers n the network. NeuroSearch can be represented as a functon O : I {0,}, where I [ 0,] 7 s a 7-dmensonal nput vector representng the state of a resource dscovery query. The output of O defnes whether n a gven state query should be dropped O = 0 or forwarded to a peer O = and s evaluated for each neghbor peer separately. When a resource request arrves to the algorthm t goes through all the node's neghbors (denoted as recevers) one by one wth the neural network. The nput parameters for the neural network are: Bas s the bas term and has value. Hops s the number of hops the message has travelled. NeghborsOrder ndcates n whch rank ths recever s n terms of number of neghbors compared to other neghbors. The connecton wth hghest rank has the value of 0, second rank has the value of and so on. ToNeghbors s the number of the recever's neghbors. CurrentNeghbors s the number of node's neghbors. Sent has value f the message has already been forwarded to the recever. Otherwse t has value of 0. Receved has value f the message has been receved earler, else t has value of 0. Hops and NeghborsOrder are scaled wth the functon f ( x) = and Neghbors and CurrentNeghbors wth x + f ( x) = before gvng them to the neural network. Scalng s x performed to ensure that all the nputs are between 0 and. There are two hdden layers n the network. In the frst hdden layer there are 5 nodes + bas and n the second hdden layer 3 nodes + bas. Tanh s used as an actvaton functon n the hdden layers: 2 t ( a) =, where a s the 2a + e weghted sum of nputs to a neuron. Actvaton functon n the output node s the threshold functon 0, a < 0 s ( a) =., a 0 Combnng all together, the output O of the neural network can be calculated wth the followng formula: O = s( w2 t( w3 t( + w f ( I )))), k k= = = where I s the value of nput parameter and 7 w the neural xy network weghts on layer x n poston y. Whenever the query locates a quered resource a reply message s sent back to the neghbor, whch forwarded the request to the node. When all the nodes n the query path have forwarded the reply message backward, t s fnally receved by the query ntator. IV. NEURAL NETWORK OPTIMIZATION The weghts w are unknown and therefore they need to be xy adusted to approprate values. For dong ths we use methods of evolutonary computng [9]. The decson, whch neural networks are better than the others s done by countng the query packets traversed n the test network and found resources. The ftness for the neural network s defned n two parts. Each query s scored for the neural network h and the ftness s calculated by summng up all the scores after n queres: n ftness h = score. The score s defned wth the = followng condtons:. If packets > 300 then score = 0 2. If foundresources = 0 then score = packets + 3. If foundresources < avalableresources / 2 and foundresources > 0 then score = 50 foundresources packets 4. If foundresources avalableresources / 2 then score = 50 avalableresources / 2 packets In the equatons avalableresources s the maxmum number of resource ntances that can be located n the query, foundresources s the number of resource nstances that the neural network was able to locate for the query, and packets s the number of query packets the neural network used for the query. The constant value 300 was set as crteron for determnng when the neural network s consdered to forward the query ndefntely and the query can be stopped. Another constant value, 50, was selected to be large enough to gude the tranng process towards neural networks that locate more resources than other neural networks. Now a neural network could spend 49 query packets more n a query to locate one addtonal resource compared to other neural network, whch located one resource less. The frst rule ascertans that an algorthm that eventually
4 > PAPER IDENTIFICATION NUMBER: < 4 stops s always better than algorthm that does not. The goal of fndng half of the avalable resource nstances was set to demonstrate the algorthm s ablty to balance on a predetermned qualty of servce level and not ust on locatng all resource nstances or one resource nstance. The second rule makes sure that f none of the resources are found then the neural network should ncrease the number of query packets sent to the network. The thrd rule states that f the number of found resources s not enough then the neural network develops only by locatng more resources. Fnally the last rule ensures that when half of the avalable resource nstances are found from the network the ftness grows f neural network uses fewer query packets. The optmzaton process had an ntal populaton of 30 neural networks whose weghts were randomly defned from nterval [-0.2, 0.2]. Next, every neural network was tested n the peer-to-peer smulaton envronment and ftness value calculated. When all neural networks had been tested 5 best were chosen for mutaton and used to breed the new generaton of neural networks. As a result, 30 neural networks were avalable for testng the new generaton. Mutaton was based on the Gaussan random varaton and used weghted mutaton parameter to mprove the adaptablty of the evolutonary search. The random varaton functon was smlar to the one used by Fogel and Chellaplla n ther research [0] and s gven as: ' σ ( ) = σ ( )exp( τn (0,)), =,..., N, ' w ( ) = w ( ) + σ ( ) N (0,), =,..., N where N w = s the total number of weghts and bas terms n the neural network,, N (0,) τ = s a standard 2 N w Gaussan random varable resampled for every, σ s the selfadaptve parameter vector for defnng the step sze for fndng ' the new weght, w ( ) s the new weght value and ndex 85 denotes the number of neuron enumerated over all layers. V. SIMULATION ENVIRONMENT As a peer-to-peer smulaton envronment, we used Peer-to- Peer Realm (P2PRealm) network smulator [] that we have developed. The smulator can be used to smulate the behavor of a statc peer-to-peer network and to tran neural networks usng Gaussan random varaton. P2PRealm has been mplemented usng Java. In the test case we used power-law graphs generated usng the Barabás-Albert model [2]. A power-law network s neghbor dstrbuton follows the power-curve P( k) =, γ k where γ = 3 for Barabás-Albert graph. Therefore n powerlaw networks there exst few hubs n the network that have many neghbors as well as many nodes that have only few neghbors. A power-law graph was selected because exstng w w, P2P networks have shown to express power-law dependences [3]. The graphs tested contaned 00 nodes wth the hghest degree node havng 25 neghbors. Small network sze was selected to allow vsualsaton of query paths n the network. Dynamc changes e.g., node falures were not taken nto account to smplfy the analyss. However, the approach can be appled n dynamc scenaros also as shown n [4]. The test case data was dvded nto three dstnct data sets as descrbed n [5]: a tranng set, a generalzaton set and a valdaton set. Tranng set s used for tranng the neural network. Generalzaton set s used to measure how well the traned neural network performs wth a new data set ndcatng neural network s ablty to generalze. When performance starts to decrease n generalzaton set the tranng can be stopped, because the neural network adapts only to the tranng set f tranng process s contnued. Valdaton set s used as an obectve measure to verfy how well the algorthm performs wth arbtrarly chosen new data set and ensures that the true generalzaton ablty of the neural network s beng measured. The tranng set contaned two power-law topologes wth both beng quered n = 50 tmes per generaton for each neural network. Two topologes were used to have neural networks adapt to a wder range of stuatons than one topology would have provded. The generalzaton set conssted of two powerlaw topologes wth 50 queres. When the performance started to decrease n the generalzaton set the neural network havng hghest ftness was selected and, as a valdaton set, one topology wth 00 queres was used to produce the fnal smulaton results. For each topology, resource nstances were allocated based on the number of neghbors each node has. There were 25 dfferent resources n the test case and the number of dfferent resources n a node was the same as the number of neghbors the node had. Ths means that the largest hub had one nstance of all resources and the lower degree nodes only some of these, randomly chosen from unform dstrbuton. The queryng nodes and quered resources were selected also randomly from a unform dstrbuton for each query. As stoppng crtera for the optmzaton process, 00,000 generatons were set. Ths seemed to take approxmately two Fg. 2: Evoluton of the best neural networks n each generaton for tranng and generalzaton sets
5 > PAPER IDENTIFICATION NUMBER: < 5 weeks on our desktop PC equpped wth an AMD Athlon XP 800 processor. The evoluton of the best neural network n each generaton s shown n Fg. 2. VI. SIMULATION RESULTS To evaluate the dfference between BFS and NeuroSearch, we selected the best algorthm at the 85,736 th generaton and calculated the number of packets used and found resources for 00 dfferent queres usng valdaton set. The 85,736 th generaton was selected because between the 80,000 and 90,000 generatons the neural networks had acheved steadly good results and, n partcular, n the 85,736 th generaton, neural network had the best ftness. The results are presented n Fg. 3 and Fg. 4. The results of Fg. 3 show that the performance of NeuroSearch regardng the number of packets s nearer to BFS wth a tme-to-lve value 2 (BFS-2), rather than BFS wth a tme-to-lve value 3 (BFS-3). In average NeuroSearch consumes 47.2 packets per query whereas BFS-2 consumes 30.0 and BFS packets. The reason why there s some varaton n the number of packets for successve BFS queres s that the number of delvered packets depends on whch node s queryng. If the query starts from a central node (nodes 0-0), t wll produce more packets than the same query started from an edge node (nodes 90-99) because the edge query has fewer connectons where BFS can spread. In case of NeuroSearch, the performance s stable and does not depend on whch node s queryng. Fg. 4: Number of resources found by the algorthms used query packets we can determne the effcency of the algorthms. These values are shown n Table I. The results show that NeuroSearch s effcency s at the same level as BFS-2 s locatng a new resource every ffth packet. BFS-3 locates a new resource approxmately every nnth packet. Effcency s easer to keep hgh when locatng only few resources because usually those can be found from the central nodes alone. When the number of needed resources ncreases, query has to spread more to the edges to locate the addtonal resources. Therefore the effcency of BFS-3 decreases sgnfcantly. BFS-2 and NeuroSearch acheve near smlar effcency ndcatng that NeuroSearch s able to sustan a good effcency even though t needs to locate more resources than BFS-2. TABLE I EFFICIENCY OF THE ALGORITHMS Algorthm Packets Resources Effcency BFS BFS NeuroSearch For each query, NeuroSearch locates approxmately half of the resources or more, whch can be seen n Fg. 5. There are sx queres n whch NeuroSearch msses the target to locate half of the resources. Ths varaton results from the dfference Fg. 3: Number of packets used by the algorthms Fg. 4 shows how many resources the algorthms were able to locate. NeuroSearch s performance n terms of located resources s qute smlar to BFS-2 at central nodes, but better n the edge nodes. Compared to BFS-3 NeuroSearch s performance s constantly lower, reachng the same performance level only at some edge nodes. The reason why NeuroSearch s satsfed wth ths level of performance s that t has already reached the goal of fndng half of the avalable resources as defned n the ftness functon and locatng more resources s not needed. By calculatng the rato between the located resources and Fg. 5: Dfference of located resources to half of resources
6 > PAPER IDENTIFICATION NUMBER: < 6 between the tranng set and the valdaton set. Nonetheless, the results ndcate that the optmzaton process has found an algorthm that s able to locate nearly half of the resources from the network wth hgh probablty. We analyzed the behavor of the best-evolved neural network by trackng the path used by the queres. NeuroSearch seems to prefer central nodes early n the query and uses multple paths for dong ths. After reachng central nodes or one hop later the spreadng s stopped. The maxmum number of hops s 5. As verfcaton for ths the behavor of a typcal NeuroSearch query started from an edge node s llustrated n Fg. 5. In the fgure the query travels through the connectons denoted wth a black lne startng from node 99 wth queston mark (?). Nodes marked wth an exclamaton mark (!) contan the quered resource. In total the query uses 49 packets and locates resources. Sx connectons are traversed from both drectons, whch s not shown n the fgure. VII. CONCLUSION In ths paper, a new resource dscovery algorthm has been proposed. NeuroSearch algorthm takes nto account the specal characterstcs of ts envronment and can be adusted to dfferent knd of P2P networks. The algorthm s performance s also stable and compettve compared to the BFS algorthm. Whle NeuroSearch performs well compared to BFS t s by no means yet desgned to be optmal. For example, NeuroSearch does not yet nclude hstory-based nputs even though they would sgnfcantly mprove the performance. Therefore, the results obtaned n [3]-[8] wll be consdered n forthcomng research on NeuroSearch. There are also other drectons that were left out of ths research. Frst, we are studyng what mprovements to the performance would be ganed by varyng the neural network s nternal structure. Second, we are amng to fnd out what are the scalablty factors of NeuroSearch when the network sze grows, and thrd we are developng an optmal resource dscovery algorthm usng global knowledge to be able to measure the best effcency a resource dscovery algorthm can acheve. Also, we are workng on a soluton to speed up the optmzaton process by parallelzng the evolutonary algorthm usng dstrbuted computng. Ths helps us to more accurately determne the performance maxmum of NeuroSearch. ACKNOWLEDGMENT The authors would lke to thank the co-desgners of NeuroSearch Jon Töyrylä, Yevgeny Ivanchenko, Mattheu Weber and Hermann Hyytälä. Also we thank Tomm Kärkkänen for gvng useful hnts how to develop the algorthm further and Barbara Crawford for proofreadng the artcle. Fg. 5: Typcal NeuroSearch resource query
7 > PAPER IDENTIFICATION NUMBER: < 7 REFERENCES [] N. A. Lynch, Dstrbuted Algorthms, Morgan Kauffmann Publshers, 996. [2] A. Barabás, Lnked, Perseus Publshng, [3] L. A. Adamc, R. M. Lukose, and B. A. Huberman, Local Search n Unstructured Networks, n Handbook of Graphs and Networks: From the Genome to the Internet, Wley-VCH, 2003, pp [4] B. J. Km, C. N. Yoon, S. K. Han, and H. Jeong, Path fndng strateges n scale-free networks, Physcal Revew E 65, [5] Q. Lv, P. Cao, E. Cohen, K. L, and S. Shenker, Search and Replcaton n Unstructured Peer-to-Peer Networks, n Proceedngs of the 6 th Internatonal Conference on Supercomputng, ACM Press, 2002, pp [6] V. Kalogerak, D. Gunopulos, and D. Zenalpour-Yatz, A Local Search Mechansm for Peer-to-Peer Networks, n Proceedngs of the th Internatonal Conference on Informaton and Knowledge Management, ACM Press, 2002, pp [7] B. Yang and H. Garca-Molna, Improvng search n peer-to-peer networks, n Proceedngs of the 22 nd IEEE Internatonal Conference on Dstrbuted Computng Systems (ICDCS 02), [8] D. Tsoumakos and N. Roussopoulos, Adaptve Probablstc Search for Peer-to-Peer Networks, n Proceedngs of the Thrd IEEE Internatonal Conference on P2P Computng (P2P2003), IEEE Press, 2003, pp [9] K. Mettnen, M. Mäkelä, and P. Nettaanmäk and J. Péraux (eds.), Evolutonary algorthms n engneerng and computer scence, John Wley & Sons, 999. [0] K. Chellaplla and D. Fogel, Evolvng neural networks to play checkers wthout relyng on expert knowledge, IEEE Trans. on Neural Networks, 0 (6), pp , 999. [] J. Töyrylä, Buldng NeuroSearch Intellgent Evolutonary Search Algorthm For Peer-to-Peer Envronment, Master s Thess, Unversty of Jyväskylä, [2] A.-L. Barabás and R. Albert, Emergence of Scalng n Random Networks, Scence 286 (999) [3] M. A. Jovanovc, F. S. Annexsten, and K. A. Berman, Scalablty Issues n Large Peer-to-Peer Networks A Case Study of Gnutella, Techncal report, Unversty of Cncnnat, 200. [4] Y. Ivanchenko, Adaptaton of Neural Nets For Resource Dscovery Problem n Dynamc And Dstrbuted P2P Envronment, Master s Thess, Unversty of Jyväskylä, [5] A. P. Engelbrecht, Computatonal Intellgence: An Introducton, John Wley & Sons Ltd, 2002.
Problem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationMeta-heuristics for Multidimensional Knapsack Problems
2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationA KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE
A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationX- Chart Using ANOM Approach
ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are
More informationCourse Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms
Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques
More informationFuture Generation Computer Systems
Future Generaton Computer Systems 29 (2013) 1631 1644 Contents lsts avalable at ScVerse ScenceDrect Future Generaton Computer Systems journal homepage: www.elsever.com/locate/fgcs Gosspng for resource
More informationPerformance Evaluation of Information Retrieval Systems
Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationAdaptive Energy and Location Aware Routing in Wireless Sensor Network
Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More information3. CR parameters and Multi-Objective Fitness Function
3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft
More informationDetermining the Optimal Bandwidth Based on Multi-criterion Fusion
Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn
More informationModule Management Tool in Software Development Organizations
Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,
More informationConcurrent Apriori Data Mining Algorithms
Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng
More informationFeature Reduction and Selection
Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components
More informationReducing Frame Rate for Object Tracking
Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg
More informationSum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints
Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan
More informationTHE PATH PLANNING ALGORITHM AND SIMULATION FOR MOBILE ROBOT
Journal of Theoretcal and Appled Informaton Technology 30 th Aprl 013. Vol. 50 No.3 005-013 JATIT & LLS. All rghts reserved. ISSN: 199-8645 www.jatt.org E-ISSN: 1817-3195 THE PATH PLANNING ALGORITHM AND
More informationOutline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like:
Self-Organzng Maps (SOM) Turgay İBRİKÇİ, PhD. Outlne Introducton Structures of SOM SOM Archtecture Neghborhoods SOM Algorthm Examples Summary 1 2 Unsupervsed Hebban Learnng US Hebban Learnng, Cntd 3 A
More informationEfficient Distributed File System (EDFS)
Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate
More informationSequential search. Building Java Programs Chapter 13. Sequential search. Sequential search
Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to
More informationHelsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)
Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute
More informationA New Token Allocation Algorithm for TCP Traffic in Diffserv Network
A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,
More informationRouting in Degree-constrained FSO Mesh Networks
Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng
More informationGA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks
Seventh Internatonal Conference on Intellgent Systems Desgn and Applcatons GA-Based Learnng Algorthms to Identfy Fuzzy Rules for Fuzzy Neural Networks K Almejall, K Dahal, Member IEEE, and A Hossan, Member
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationClassifying Acoustic Transient Signals Using Artificial Intelligence
Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationAn Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices
Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal
More informationA Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics
A Hybrd Genetc Algorthm for Routng Optmzaton n IP Networks Utlzng Bandwdth and Delay Metrcs Anton Redl Insttute of Communcaton Networks, Munch Unversty of Technology, Arcsstr. 21, 80290 Munch, Germany
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More informationDESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT
DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,
More informationThe Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique
//00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy
More informationS1 Note. Basis functions.
S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type
More informationCost-efficient deployment of distributed software services
1/30 Cost-effcent deployment of dstrbuted software servces csorba@tem.ntnu.no 2/30 Short ntroducton & contents Cost-effcent deployment of dstrbuted software servces Cost functons Bo-nspred decentralzed
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationLecture 5: Multilayer Perceptrons
Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented
More informationQuality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation
Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on
More informationSelective Flooding Based on Relevant Nearest-Neighbor using Query Feedback and Similarity across Unstructured Peer-to-Peer Networks
Journal of Computer Scence 5 (3):184-190, 009 ISSN 1549-3636 009 Scence Publcatons Selectve Floodng Based on Relevant Nearest-Neghbor usng Query Feedback and Smlarty across Unstructured Peer-to-Peer Networks
More informationCracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm
Crackng of the Merkle Hellman Cryptosystem Usng Genetc Algorthm Zurab Kochladze 1 * & Lal Besela 2 1 Ivane Javakhshvl Tbls State Unversty, 1, I.Chavchavadze av 1, 0128, Tbls, Georga 2 Sokhum State Unversty,
More informationChinese Word Segmentation based on the Improved Particle Swarm Optimization Neural Networks
Chnese Word Segmentaton based on the Improved Partcle Swarm Optmzaton Neural Networks Ja He Computatonal Intellgence Laboratory School of Computer Scence and Engneerng, UESTC Chengdu, Chna Department of
More informationApplication of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling
, pp.40-45 http://dx.do.org/10.14257/astl.2017.143.08 Applcaton of Improved Fsh Swarm Algorthm n Cloud Computng Resource Schedulng Yu Lu, Fangtao Lu School of Informaton Engneerng, Chongqng Vocatonal Insttute
More informationTopology Design using LS-TaSC Version 2 and LS-DYNA
Topology Desgn usng LS-TaSC Verson 2 and LS-DYNA Wllem Roux Lvermore Software Technology Corporaton, Lvermore, CA, USA Abstract Ths paper gves an overvew of LS-TaSC verson 2, a topology optmzaton tool
More informationUsing Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol
2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen
More informationPositive Semi-definite Programming Localization in Wireless Sensor Networks
Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer
More informationA Topology-aware Random Walk
A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationProgramming in Fortran 90 : 2017/2018
Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values
More informationQuery Clustering Using a Hybrid Query Similarity Measure
Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan
More information6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour
6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the
More informationA Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks
A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationAn Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed
More informationImperialist Competitive Algorithm with Variable Parameters to Determine the Global Minimum of Functions with Several Arguments
Fourth Internatonal Conference Modellng and Development of Intellgent Systems October 8 - November, 05 Lucan Blaga Unversty Sbu - Romana Imperalst Compettve Algorthm wth Varable Parameters to Determne
More informationThe Research of Support Vector Machine in Agricultural Data Classification
The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou
More informationVideo Proxy System for a Large-scale VOD System (DINA)
Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,
More informationA MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS
Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationSome Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated.
Some Advanced SP Tools 1. umulatve Sum ontrol (usum) hart For the data shown n Table 9-1, the x chart can be generated. However, the shft taken place at sample #21 s not apparent. 92 For ths set samples,
More informationA New Approach For the Ranking of Fuzzy Sets With Different Heights
New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays
More informationA Clustering Algorithm for Chinese Adjectives and Nouns 1
Clusterng lgorthm for Chnese dectves and ouns Yang Wen, Chunfa Yuan, Changnng Huang 2 State Key aboratory of Intellgent Technology and System Deptartment of Computer Scence & Technology, Tsnghua Unversty,
More informationAdvanced Computer Networks
Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans
More informationAPPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT
3. - 5. 5., Brno, Czech Republc, EU APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT Abstract Josef TOŠENOVSKÝ ) Lenka MONSPORTOVÁ ) Flp TOŠENOVSKÝ
More informationDistributed Middlebox Placement Based on Potential Game
Int. J. Communcatons, Network and System Scences, 2017, 10, 264-273 http://www.scrp.org/ournal/cns ISSN Onlne: 1913-3723 ISSN Prnt: 1913-3715 Dstrbuted Mddlebox Placement Based on Potental Game Yongwen
More informationA Notable Swarm Approach to Evolve Neural Network for Classification in Data Mining
A Notable Swarm Approach to Evolve Neural Network for Classfcaton n Data Mnng Satchdananda Dehur 1, Bjan Bhar Mshra 2 and Sung-Bae Cho 1 1 Soft Computng Laboratory, Department of Computer Scence, Yonse
More informationComplexity Analysis of Problem-Dimension Using PSO
Proceedngs of the 7th WSEAS Internatonal Conference on Evolutonary Computng, Cavtat, Croata, June -4, 6 (pp45-5) Complexty Analyss of Problem-Dmenson Usng PSO BUTHAINAH S. AL-KAZEMI AND SAMI J. HABIB,
More informationAn Efficient Genetic Algorithm Based Approach for the Minimum Graph Bisection Problem
118 An Effcent Genetc Algorthm Based Approach for the Mnmum Graph Bsecton Problem Zh-Qang Chen, Rong-Long WAG and Kozo OKAZAKI Faculty of Engneerng, Unversty of Fuku, Bunkyo 3-9-1,Fuku-sh, Japan 910-8507
More informationImproving Low Density Parity Check Codes Over the Erasure Channel. The Nelder Mead Downhill Simplex Method. Scott Stransky
Improvng Low Densty Party Check Codes Over the Erasure Channel The Nelder Mead Downhll Smplex Method Scott Stransky Programmng n conjuncton wth: Bors Cukalovc 18.413 Fnal Project Sprng 2004 Page 1 Abstract
More informationLearning-Based Top-N Selection Query Evaluation over Relational Databases
Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **
More informationEVALUATION OF THE PERFORMANCES OF ARTIFICIAL BEE COLONY AND INVASIVE WEED OPTIMIZATION ALGORITHMS ON THE MODIFIED BENCHMARK FUNCTIONS
Academc Research Internatonal ISS-L: 3-9553, ISS: 3-9944 Vol., o. 3, May 0 EVALUATIO OF THE PERFORMACES OF ARTIFICIAL BEE COLOY AD IVASIVE WEED OPTIMIZATIO ALGORITHMS O THE MODIFIED BECHMARK FUCTIOS Dlay
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationSmoothing Spline ANOVA for variable screening
Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory
More informationOptimal Workload-based Weighted Wavelet Synopses
Optmal Workload-based Weghted Wavelet Synopses Yoss Matas School of Computer Scence Tel Avv Unversty Tel Avv 69978, Israel matas@tau.ac.l Danel Urel School of Computer Scence Tel Avv Unversty Tel Avv 69978,
More informationSteps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices
Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between
More informationTsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance
Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for
More informationSynthesizer 1.0. User s Guide. A Varying Coefficient Meta. nalytic Tool. Z. Krizan Employing Microsoft Excel 2007
Syntheszer 1.0 A Varyng Coeffcent Meta Meta-Analytc nalytc Tool Employng Mcrosoft Excel 007.38.17.5 User s Gude Z. Krzan 009 Table of Contents 1. Introducton and Acknowledgments 3. Operatonal Functons
More informationEvaluation of an Enhanced Scheme for High-level Nested Network Mobility
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.
More informationFAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks
2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng
More informationDistributed Resource Scheduling in Grid Computing Using Fuzzy Approach
Dstrbuted Resource Schedulng n Grd Computng Usng Fuzzy Approach Shahram Amn, Mohammad Ahmad Computer Engneerng Department Islamc Azad Unversty branch Mahallat, Iran Islamc Azad Unversty branch khomen,
More informationLS-TaSC Version 2.1. Willem Roux Livermore Software Technology Corporation, Livermore, CA, USA. Abstract
12 th Internatonal LS-DYNA Users Conference Optmzaton(1) LS-TaSC Verson 2.1 Wllem Roux Lvermore Software Technology Corporaton, Lvermore, CA, USA Abstract Ths paper gves an overvew of LS-TaSC verson 2.1,
More informationResearch of Modeling Complex Topology on Internet MIFUBA BABA SERGE 1 and Ye XU 1,a,*
2017 Internatonal Conference on Electronc and Informaton Technology (ICEIT 2017) ISBN: 978-1-60595-526-1 Research of Modelng Complex Topology on Internet MIFUBA BABA SERGE 1 and Ye XU 1,a,* 1 College of
More informationAn Evolvable Clustering Based Algorithm to Learn Distance Function for Supervised Environment
IJCSI Internatonal Journal of Computer Scence Issues, Vol. 7, Issue 5, September 2010 ISSN (Onlne): 1694-0814 www.ijcsi.org 374 An Evolvable Clusterng Based Algorthm to Learn Dstance Functon for Supervsed
More informationReliable and Efficient Routing Using Adaptive Genetic Algorithm in Packet Switched Networks
IJCSI Internatonal Journal of Computer Scence Issues, Vol. 9, Issue 1, No 3, January 2012 ISSN (Onlne): 1694-0814 www.ijcsi.org 168 Relable and Effcent Routng Usng Adaptve Genetc Algorthm n Packet Swtched
More informationSkew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach
Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research
More informationAn Improved Neural Network Algorithm for Classifying the Transmission Line Faults
1 An Improved Neural Network Algorthm for Classfyng the Transmsson Lne Faults S. Vaslc, Student Member, IEEE, M. Kezunovc, Fellow, IEEE Abstract--Ths study ntroduces a new concept of artfcal ntellgence
More informationClassifier Selection Based on Data Complexity Measures *
Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.
More informationNGPM -- A NSGA-II Program in Matlab
Verson 1.4 LIN Song Aerospace Structural Dynamcs Research Laboratory College of Astronautcs, Northwestern Polytechncal Unversty, Chna Emal: lsssswc@163.com 2011-07-26 Contents Contents... 1. Introducton...
More informationCHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION
24 CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION The present chapter proposes an IPSO approach for multprocessor task schedulng problem wth two classfcatons, namely, statc ndependent tasks and
More informationOutline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1
4/14/011 Outlne Dscrmnatve classfers for mage recognton Wednesday, Aprl 13 Krsten Grauman UT-Austn Last tme: wndow-based generc obect detecton basc ppelne face detecton wth boostng as case study Today:
More informationOverview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION
Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup
More information