Resource Discovery in P2P Networks Using Evolutionary Neural Networks

Size: px
Start display at page:

Download "Resource Discovery in P2P Networks Using Evolutionary Neural Networks"

Transcription

1 > PAPER IDENTIFICATION NUMBER: < Resource Dscovery n P2P Networks Usng Evolutonary Neural Networks Mkko A. VAPA, Nko P. KOTILAINEN, Annemar K. AUVINEN, Hekk M. KAINULAINEN, and Jarkko T. VUORI Abstract-- Resource dscovery s an essental problem n peerto-peer networks snce there s no centralzed ndex n whch to look for nformaton about resources. One soluton for the problem s to use a search algorthm that locates resources based on the local knowledge about the network. Tradtonally, the search algorthms have been based on few smple rules, whch often reduces the performance from optmal. In ths paper, we descrbe the results of a process where evolutonary neural networks are used for fndng an effcent search algorthm from a class of local search algorthms. The ntal test results ndcate that an evolutonary optmzaton process can produce search algorthm canddates that are competent compared to the breadth-frst search algorthm (BFS) used n Gnutella peer-topeer network. Index Terms-- resource dscovery, peer-to-peer networks, mult-layer perceptrons, genetc algorthms. I I. INTRODUCTION N the resource dscovery problem, any node can possess resources and query these resources from other nodes n the network. The problem conssts of graph wth nodes, lnks and resources. Resources are dentfed by unque IDs and nodes may contan any number of resources. One node knows only the resources t s currently hostng. Any node n the graph can start a query, whch means that some of the lnks are traversed based on a local decson n the graph. Whenever the query reaches the node wth the quered ID, the node reples. The goal s to locate a predetermned amount of resource nstances wth a gven ID usng as few query packets as possble. One possble soluton for the resource dscovery problem s the breadth-frst search algorthm (BFS) []. In BFS a node that starts a query passes the query to all ts neghbors. When the neghbors receve the query, they pass t further to all ther neghbors except the one from whch the query was receved. Nodes cache the messages that they have receved and f the query has already been receved from other neghbor then Manuscrpt receved September 2, Ths work was supported n part by the Graduate School n Electroncs, Telecommuncatons and Automaton (GETA) and Innovatons n Busness, Communcaton and Technology (InBCT) proect of Agora Center. M. A. Vapa, A. K. Auvnen, and J. T. Vuor are wth Department of Mathematcal Informaton Technology, Unversty of Jyväskylä, Fnland (emal: frstname.lastname@yu.f). N. P. Kotlanen s wth Agora Center, Unversty of Jyväskylä, Fnland (emal: nko.kotlanen@yu.f). H. M. Kanulanen s wth WTS Networks, Jyväskylä, Fnland (e-mal: hekk.kanulanen@wts.f) query s dropped. Tme-to-Lve (TTL) value s used to lmt the number of hops the query can take by reducng TTL value each tme a query s receved. When TTL decreases to zero the query s dropped. The BFS algorthm ensures that f a resource s located n the network t can be found from the network f TTL s hgh enough. The downsde of the algorthm, however, s that t uses many query packets to fnd the needed resources. Thus, we propose an alternatve algorthm that s more effcent n face of used query packets and evaluate t usng peer-to-peer scenaro wth power-law dstrbuted topology [2]. The rest of ths paper s organzed as follows. The next secton presents the references to related work done n P2P resource dscovery. Secton III descrbes the NeuroSearch algorthm as a soluton for the resource dscovery problem. Secton IV descrbes the optmzaton process and Secton V the test case used n the study. Secton VI analyzes the smulaton results and n Secton VII the paper s concluded. II. RELATED WORK Much research has been done regardng the resource dscovery problem. Adamc et al. [3] and Km et al. [4] propose a search strategy that utlzes the topologcal propertes of a power-law network. The search strategy frst proceeds towards hghest-degree node, e.g. the node that has the hghest number of neghbors, and then gradually moves to lower degree ones. The algorthm locates resources effcently f they can be found from the core of the network, but the performance decreases when the central nodes are revsted n search for lower degree nodes. Lv et al. [5] evaluate BFS, expandng rng and random walk search mechansms wth varyng topologes, ncludng random graphs [2], power-law graphs and a snapshot of the Gnutella network obtaned n October These researchers fnd that BFS s not scalable and n partcular on Gnutella and powerlaw graphs the effects of floodng are dsastrous: the number of messages ncreases drastcally when TTL s ncreased. Expandng rng, where TTL s extended gradually for BFS, s the frst ad to the problem. However, because t forwards duplcate messages to the nodes that the query has already reached, a better soluton to the problem usng random walkers s proposed by the researchers. A search ntates multple walkers and forwards them based on a random selecton of a neghbor. In addton to the TTL as a termnaton condton for the walkers, Lv et al. use checkng, where the random walkers perodcally check from the query orgnator whether the

2 > PAPER IDENTIFICATION NUMBER: < 2 walker should be termnated or not. Whle random walkers ncrease the number of hops and thus latency, they decrease the total traffc because the search proceeds n a depth-frst manner. Kalogerak et al. [6] consder two search algorthms for the resource dscovery problem. The Modfed Random BFS Search behaves lke BFS, but the neghbors select only a random subset of neghbors for forwardng the query. Ths reduces traffc, but adustng the correct sze of the subset for varous networks may be dffcult. The researchers work uses a random graph n whch all the nodes have approxmately smlar degrees. Thus the performance of the algorthm n power-law graphs cannot be drectly determned from the results. In another algorthm they present, called Intellgent Search Mechansm, the nodes keep track of recent query results provded by ther neghbors. When a new query arrves, the neghbors are sorted based on the smlarty of the query to earler reples from the neghbor. Because the nodes keep track of the earler queres, the performance of the algorthm mproves as the network evolves. Yang and Garca-Molna [7] expermented wth many types of drected search strateges based on varous heurstcs. These heurstcs nclude the number of results returned, shortest average tme to satsfacton, smallest average number of hops of receved results, the hghest number of results returned, shortest message queue, shortest latency and hghest degree. Ther work suggests that, to mnmze the tme to satsfacton measure, the best strategy s to pass the query to the neghbor that has had the shortest average tme to satsfacton for last ten queres. Also, when consderng the bandwdth use, the most relable measure s the smallest average number of hops of receved results for last ten queres. The heurstcs used n the study are based on hstory data collected locally n each node. Smlar use of hstory data s found from the work by Tsoumakos and Roussopoulos [8]. In ther proposal, called Adaptve Probablstc Search algorthm, neghbors keep track of the success rates of earler queres and forward random walkers probablstcally, based on the earler success rate. The algorthm s able to adapt to dfferent query patterns and, therefore, performs better than random walkers. There are certan lmtatons n all the approaches descrbed above. Frst, each of these algorthms uses some control parameters (for example tme-to-lve, the number of walkers or the proporton of neghbors to forward the query) that can be used to tune the algorthm. For a search algorthm, the number Fg. : Processng of NeuroSearch resource query and the NeuroSearch neural network

3 > PAPER IDENTIFICATION NUMBER: < 3 of control parameters should be kept to a mnmal to allow zero confgurablty when appled to a real envronment. Second, whle some of these approaches have mechansms to adapt to the envronment, they do not utlze the entre potental of the envronment because they rely only on one strategy (for example the smlarty of the query and earler reples, shortest average tme to satsfacton for last 0 queres or the success rate of earler queres). In general, only one strategy cannot be effcent n all scenaros and therefore an effcent algorthm should be able to utlze many strateges at the same tme. To overcome these lmtatons a neural network based resource dscovery algorthm called NeuroSearch was desgned. NeuroSearch learns by tself the correct behavor n gven network condtons and uses many combnatons of strateges to locate resources. To authors' knowledge ths s the frst tme when neural networks are beng appled to resource dscovery problem. III. NEUROSEARCH RESOURCE DISCOVERY ALGORITHM The proposed algorthm, called as NeuroSearch, makes decson to whom of the node's neghbors the resource request message s forwarded based on the output neuron of threelayer perceptron neural network. The algorthm s located nsde a peer node as shown n Fg. and s the same for all peers n the network. NeuroSearch can be represented as a functon O : I {0,}, where I [ 0,] 7 s a 7-dmensonal nput vector representng the state of a resource dscovery query. The output of O defnes whether n a gven state query should be dropped O = 0 or forwarded to a peer O = and s evaluated for each neghbor peer separately. When a resource request arrves to the algorthm t goes through all the node's neghbors (denoted as recevers) one by one wth the neural network. The nput parameters for the neural network are: Bas s the bas term and has value. Hops s the number of hops the message has travelled. NeghborsOrder ndcates n whch rank ths recever s n terms of number of neghbors compared to other neghbors. The connecton wth hghest rank has the value of 0, second rank has the value of and so on. ToNeghbors s the number of the recever's neghbors. CurrentNeghbors s the number of node's neghbors. Sent has value f the message has already been forwarded to the recever. Otherwse t has value of 0. Receved has value f the message has been receved earler, else t has value of 0. Hops and NeghborsOrder are scaled wth the functon f ( x) = and Neghbors and CurrentNeghbors wth x + f ( x) = before gvng them to the neural network. Scalng s x performed to ensure that all the nputs are between 0 and. There are two hdden layers n the network. In the frst hdden layer there are 5 nodes + bas and n the second hdden layer 3 nodes + bas. Tanh s used as an actvaton functon n the hdden layers: 2 t ( a) =, where a s the 2a + e weghted sum of nputs to a neuron. Actvaton functon n the output node s the threshold functon 0, a < 0 s ( a) =., a 0 Combnng all together, the output O of the neural network can be calculated wth the followng formula: O = s( w2 t( w3 t( + w f ( I )))), k k= = = where I s the value of nput parameter and 7 w the neural xy network weghts on layer x n poston y. Whenever the query locates a quered resource a reply message s sent back to the neghbor, whch forwarded the request to the node. When all the nodes n the query path have forwarded the reply message backward, t s fnally receved by the query ntator. IV. NEURAL NETWORK OPTIMIZATION The weghts w are unknown and therefore they need to be xy adusted to approprate values. For dong ths we use methods of evolutonary computng [9]. The decson, whch neural networks are better than the others s done by countng the query packets traversed n the test network and found resources. The ftness for the neural network s defned n two parts. Each query s scored for the neural network h and the ftness s calculated by summng up all the scores after n queres: n ftness h = score. The score s defned wth the = followng condtons:. If packets > 300 then score = 0 2. If foundresources = 0 then score = packets + 3. If foundresources < avalableresources / 2 and foundresources > 0 then score = 50 foundresources packets 4. If foundresources avalableresources / 2 then score = 50 avalableresources / 2 packets In the equatons avalableresources s the maxmum number of resource ntances that can be located n the query, foundresources s the number of resource nstances that the neural network was able to locate for the query, and packets s the number of query packets the neural network used for the query. The constant value 300 was set as crteron for determnng when the neural network s consdered to forward the query ndefntely and the query can be stopped. Another constant value, 50, was selected to be large enough to gude the tranng process towards neural networks that locate more resources than other neural networks. Now a neural network could spend 49 query packets more n a query to locate one addtonal resource compared to other neural network, whch located one resource less. The frst rule ascertans that an algorthm that eventually

4 > PAPER IDENTIFICATION NUMBER: < 4 stops s always better than algorthm that does not. The goal of fndng half of the avalable resource nstances was set to demonstrate the algorthm s ablty to balance on a predetermned qualty of servce level and not ust on locatng all resource nstances or one resource nstance. The second rule makes sure that f none of the resources are found then the neural network should ncrease the number of query packets sent to the network. The thrd rule states that f the number of found resources s not enough then the neural network develops only by locatng more resources. Fnally the last rule ensures that when half of the avalable resource nstances are found from the network the ftness grows f neural network uses fewer query packets. The optmzaton process had an ntal populaton of 30 neural networks whose weghts were randomly defned from nterval [-0.2, 0.2]. Next, every neural network was tested n the peer-to-peer smulaton envronment and ftness value calculated. When all neural networks had been tested 5 best were chosen for mutaton and used to breed the new generaton of neural networks. As a result, 30 neural networks were avalable for testng the new generaton. Mutaton was based on the Gaussan random varaton and used weghted mutaton parameter to mprove the adaptablty of the evolutonary search. The random varaton functon was smlar to the one used by Fogel and Chellaplla n ther research [0] and s gven as: ' σ ( ) = σ ( )exp( τn (0,)), =,..., N, ' w ( ) = w ( ) + σ ( ) N (0,), =,..., N where N w = s the total number of weghts and bas terms n the neural network,, N (0,) τ = s a standard 2 N w Gaussan random varable resampled for every, σ s the selfadaptve parameter vector for defnng the step sze for fndng ' the new weght, w ( ) s the new weght value and ndex 85 denotes the number of neuron enumerated over all layers. V. SIMULATION ENVIRONMENT As a peer-to-peer smulaton envronment, we used Peer-to- Peer Realm (P2PRealm) network smulator [] that we have developed. The smulator can be used to smulate the behavor of a statc peer-to-peer network and to tran neural networks usng Gaussan random varaton. P2PRealm has been mplemented usng Java. In the test case we used power-law graphs generated usng the Barabás-Albert model [2]. A power-law network s neghbor dstrbuton follows the power-curve P( k) =, γ k where γ = 3 for Barabás-Albert graph. Therefore n powerlaw networks there exst few hubs n the network that have many neghbors as well as many nodes that have only few neghbors. A power-law graph was selected because exstng w w, P2P networks have shown to express power-law dependences [3]. The graphs tested contaned 00 nodes wth the hghest degree node havng 25 neghbors. Small network sze was selected to allow vsualsaton of query paths n the network. Dynamc changes e.g., node falures were not taken nto account to smplfy the analyss. However, the approach can be appled n dynamc scenaros also as shown n [4]. The test case data was dvded nto three dstnct data sets as descrbed n [5]: a tranng set, a generalzaton set and a valdaton set. Tranng set s used for tranng the neural network. Generalzaton set s used to measure how well the traned neural network performs wth a new data set ndcatng neural network s ablty to generalze. When performance starts to decrease n generalzaton set the tranng can be stopped, because the neural network adapts only to the tranng set f tranng process s contnued. Valdaton set s used as an obectve measure to verfy how well the algorthm performs wth arbtrarly chosen new data set and ensures that the true generalzaton ablty of the neural network s beng measured. The tranng set contaned two power-law topologes wth both beng quered n = 50 tmes per generaton for each neural network. Two topologes were used to have neural networks adapt to a wder range of stuatons than one topology would have provded. The generalzaton set conssted of two powerlaw topologes wth 50 queres. When the performance started to decrease n the generalzaton set the neural network havng hghest ftness was selected and, as a valdaton set, one topology wth 00 queres was used to produce the fnal smulaton results. For each topology, resource nstances were allocated based on the number of neghbors each node has. There were 25 dfferent resources n the test case and the number of dfferent resources n a node was the same as the number of neghbors the node had. Ths means that the largest hub had one nstance of all resources and the lower degree nodes only some of these, randomly chosen from unform dstrbuton. The queryng nodes and quered resources were selected also randomly from a unform dstrbuton for each query. As stoppng crtera for the optmzaton process, 00,000 generatons were set. Ths seemed to take approxmately two Fg. 2: Evoluton of the best neural networks n each generaton for tranng and generalzaton sets

5 > PAPER IDENTIFICATION NUMBER: < 5 weeks on our desktop PC equpped wth an AMD Athlon XP 800 processor. The evoluton of the best neural network n each generaton s shown n Fg. 2. VI. SIMULATION RESULTS To evaluate the dfference between BFS and NeuroSearch, we selected the best algorthm at the 85,736 th generaton and calculated the number of packets used and found resources for 00 dfferent queres usng valdaton set. The 85,736 th generaton was selected because between the 80,000 and 90,000 generatons the neural networks had acheved steadly good results and, n partcular, n the 85,736 th generaton, neural network had the best ftness. The results are presented n Fg. 3 and Fg. 4. The results of Fg. 3 show that the performance of NeuroSearch regardng the number of packets s nearer to BFS wth a tme-to-lve value 2 (BFS-2), rather than BFS wth a tme-to-lve value 3 (BFS-3). In average NeuroSearch consumes 47.2 packets per query whereas BFS-2 consumes 30.0 and BFS packets. The reason why there s some varaton n the number of packets for successve BFS queres s that the number of delvered packets depends on whch node s queryng. If the query starts from a central node (nodes 0-0), t wll produce more packets than the same query started from an edge node (nodes 90-99) because the edge query has fewer connectons where BFS can spread. In case of NeuroSearch, the performance s stable and does not depend on whch node s queryng. Fg. 4: Number of resources found by the algorthms used query packets we can determne the effcency of the algorthms. These values are shown n Table I. The results show that NeuroSearch s effcency s at the same level as BFS-2 s locatng a new resource every ffth packet. BFS-3 locates a new resource approxmately every nnth packet. Effcency s easer to keep hgh when locatng only few resources because usually those can be found from the central nodes alone. When the number of needed resources ncreases, query has to spread more to the edges to locate the addtonal resources. Therefore the effcency of BFS-3 decreases sgnfcantly. BFS-2 and NeuroSearch acheve near smlar effcency ndcatng that NeuroSearch s able to sustan a good effcency even though t needs to locate more resources than BFS-2. TABLE I EFFICIENCY OF THE ALGORITHMS Algorthm Packets Resources Effcency BFS BFS NeuroSearch For each query, NeuroSearch locates approxmately half of the resources or more, whch can be seen n Fg. 5. There are sx queres n whch NeuroSearch msses the target to locate half of the resources. Ths varaton results from the dfference Fg. 3: Number of packets used by the algorthms Fg. 4 shows how many resources the algorthms were able to locate. NeuroSearch s performance n terms of located resources s qute smlar to BFS-2 at central nodes, but better n the edge nodes. Compared to BFS-3 NeuroSearch s performance s constantly lower, reachng the same performance level only at some edge nodes. The reason why NeuroSearch s satsfed wth ths level of performance s that t has already reached the goal of fndng half of the avalable resources as defned n the ftness functon and locatng more resources s not needed. By calculatng the rato between the located resources and Fg. 5: Dfference of located resources to half of resources

6 > PAPER IDENTIFICATION NUMBER: < 6 between the tranng set and the valdaton set. Nonetheless, the results ndcate that the optmzaton process has found an algorthm that s able to locate nearly half of the resources from the network wth hgh probablty. We analyzed the behavor of the best-evolved neural network by trackng the path used by the queres. NeuroSearch seems to prefer central nodes early n the query and uses multple paths for dong ths. After reachng central nodes or one hop later the spreadng s stopped. The maxmum number of hops s 5. As verfcaton for ths the behavor of a typcal NeuroSearch query started from an edge node s llustrated n Fg. 5. In the fgure the query travels through the connectons denoted wth a black lne startng from node 99 wth queston mark (?). Nodes marked wth an exclamaton mark (!) contan the quered resource. In total the query uses 49 packets and locates resources. Sx connectons are traversed from both drectons, whch s not shown n the fgure. VII. CONCLUSION In ths paper, a new resource dscovery algorthm has been proposed. NeuroSearch algorthm takes nto account the specal characterstcs of ts envronment and can be adusted to dfferent knd of P2P networks. The algorthm s performance s also stable and compettve compared to the BFS algorthm. Whle NeuroSearch performs well compared to BFS t s by no means yet desgned to be optmal. For example, NeuroSearch does not yet nclude hstory-based nputs even though they would sgnfcantly mprove the performance. Therefore, the results obtaned n [3]-[8] wll be consdered n forthcomng research on NeuroSearch. There are also other drectons that were left out of ths research. Frst, we are studyng what mprovements to the performance would be ganed by varyng the neural network s nternal structure. Second, we are amng to fnd out what are the scalablty factors of NeuroSearch when the network sze grows, and thrd we are developng an optmal resource dscovery algorthm usng global knowledge to be able to measure the best effcency a resource dscovery algorthm can acheve. Also, we are workng on a soluton to speed up the optmzaton process by parallelzng the evolutonary algorthm usng dstrbuted computng. Ths helps us to more accurately determne the performance maxmum of NeuroSearch. ACKNOWLEDGMENT The authors would lke to thank the co-desgners of NeuroSearch Jon Töyrylä, Yevgeny Ivanchenko, Mattheu Weber and Hermann Hyytälä. Also we thank Tomm Kärkkänen for gvng useful hnts how to develop the algorthm further and Barbara Crawford for proofreadng the artcle. Fg. 5: Typcal NeuroSearch resource query

7 > PAPER IDENTIFICATION NUMBER: < 7 REFERENCES [] N. A. Lynch, Dstrbuted Algorthms, Morgan Kauffmann Publshers, 996. [2] A. Barabás, Lnked, Perseus Publshng, [3] L. A. Adamc, R. M. Lukose, and B. A. Huberman, Local Search n Unstructured Networks, n Handbook of Graphs and Networks: From the Genome to the Internet, Wley-VCH, 2003, pp [4] B. J. Km, C. N. Yoon, S. K. Han, and H. Jeong, Path fndng strateges n scale-free networks, Physcal Revew E 65, [5] Q. Lv, P. Cao, E. Cohen, K. L, and S. Shenker, Search and Replcaton n Unstructured Peer-to-Peer Networks, n Proceedngs of the 6 th Internatonal Conference on Supercomputng, ACM Press, 2002, pp [6] V. Kalogerak, D. Gunopulos, and D. Zenalpour-Yatz, A Local Search Mechansm for Peer-to-Peer Networks, n Proceedngs of the th Internatonal Conference on Informaton and Knowledge Management, ACM Press, 2002, pp [7] B. Yang and H. Garca-Molna, Improvng search n peer-to-peer networks, n Proceedngs of the 22 nd IEEE Internatonal Conference on Dstrbuted Computng Systems (ICDCS 02), [8] D. Tsoumakos and N. Roussopoulos, Adaptve Probablstc Search for Peer-to-Peer Networks, n Proceedngs of the Thrd IEEE Internatonal Conference on P2P Computng (P2P2003), IEEE Press, 2003, pp [9] K. Mettnen, M. Mäkelä, and P. Nettaanmäk and J. Péraux (eds.), Evolutonary algorthms n engneerng and computer scence, John Wley & Sons, 999. [0] K. Chellaplla and D. Fogel, Evolvng neural networks to play checkers wthout relyng on expert knowledge, IEEE Trans. on Neural Networks, 0 (6), pp , 999. [] J. Töyrylä, Buldng NeuroSearch Intellgent Evolutonary Search Algorthm For Peer-to-Peer Envronment, Master s Thess, Unversty of Jyväskylä, [2] A.-L. Barabás and R. Albert, Emergence of Scalng n Random Networks, Scence 286 (999) [3] M. A. Jovanovc, F. S. Annexsten, and K. A. Berman, Scalablty Issues n Large Peer-to-Peer Networks A Case Study of Gnutella, Techncal report, Unversty of Cncnnat, 200. [4] Y. Ivanchenko, Adaptaton of Neural Nets For Resource Dscovery Problem n Dynamc And Dstrbuted P2P Envronment, Master s Thess, Unversty of Jyväskylä, [5] A. P. Engelbrecht, Computatonal Intellgence: An Introducton, John Wley & Sons Ltd, 2002.

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Future Generation Computer Systems

Future Generation Computer Systems Future Generaton Computer Systems 29 (2013) 1631 1644 Contents lsts avalable at ScVerse ScenceDrect Future Generaton Computer Systems journal homepage: www.elsever.com/locate/fgcs Gosspng for resource

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

THE PATH PLANNING ALGORITHM AND SIMULATION FOR MOBILE ROBOT

THE PATH PLANNING ALGORITHM AND SIMULATION FOR MOBILE ROBOT Journal of Theoretcal and Appled Informaton Technology 30 th Aprl 013. Vol. 50 No.3 005-013 JATIT & LLS. All rghts reserved. ISSN: 199-8645 www.jatt.org E-ISSN: 1817-3195 THE PATH PLANNING ALGORITHM AND

More information

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like:

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like: Self-Organzng Maps (SOM) Turgay İBRİKÇİ, PhD. Outlne Introducton Structures of SOM SOM Archtecture Neghborhoods SOM Algorthm Examples Summary 1 2 Unsupervsed Hebban Learnng US Hebban Learnng, Cntd 3 A

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

GA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks

GA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks Seventh Internatonal Conference on Intellgent Systems Desgn and Applcatons GA-Based Learnng Algorthms to Identfy Fuzzy Rules for Fuzzy Neural Networks K Almejall, K Dahal, Member IEEE, and A Hossan, Member

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Classifying Acoustic Transient Signals Using Artificial Intelligence

Classifying Acoustic Transient Signals Using Artificial Intelligence Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics A Hybrd Genetc Algorthm for Routng Optmzaton n IP Networks Utlzng Bandwdth and Delay Metrcs Anton Redl Insttute of Communcaton Networks, Munch Unversty of Technology, Arcsstr. 21, 80290 Munch, Germany

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Cost-efficient deployment of distributed software services

Cost-efficient deployment of distributed software services 1/30 Cost-effcent deployment of dstrbuted software servces csorba@tem.ntnu.no 2/30 Short ntroducton & contents Cost-effcent deployment of dstrbuted software servces Cost functons Bo-nspred decentralzed

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

Selective Flooding Based on Relevant Nearest-Neighbor using Query Feedback and Similarity across Unstructured Peer-to-Peer Networks

Selective Flooding Based on Relevant Nearest-Neighbor using Query Feedback and Similarity across Unstructured Peer-to-Peer Networks Journal of Computer Scence 5 (3):184-190, 009 ISSN 1549-3636 009 Scence Publcatons Selectve Floodng Based on Relevant Nearest-Neghbor usng Query Feedback and Smlarty across Unstructured Peer-to-Peer Networks

More information

Cracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm

Cracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm Crackng of the Merkle Hellman Cryptosystem Usng Genetc Algorthm Zurab Kochladze 1 * & Lal Besela 2 1 Ivane Javakhshvl Tbls State Unversty, 1, I.Chavchavadze av 1, 0128, Tbls, Georga 2 Sokhum State Unversty,

More information

Chinese Word Segmentation based on the Improved Particle Swarm Optimization Neural Networks

Chinese Word Segmentation based on the Improved Particle Swarm Optimization Neural Networks Chnese Word Segmentaton based on the Improved Partcle Swarm Optmzaton Neural Networks Ja He Computatonal Intellgence Laboratory School of Computer Scence and Engneerng, UESTC Chengdu, Chna Department of

More information

Application of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling

Application of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling , pp.40-45 http://dx.do.org/10.14257/astl.2017.143.08 Applcaton of Improved Fsh Swarm Algorthm n Cloud Computng Resource Schedulng Yu Lu, Fangtao Lu School of Informaton Engneerng, Chongqng Vocatonal Insttute

More information

Topology Design using LS-TaSC Version 2 and LS-DYNA

Topology Design using LS-TaSC Version 2 and LS-DYNA Topology Desgn usng LS-TaSC Verson 2 and LS-DYNA Wllem Roux Lvermore Software Technology Corporaton, Lvermore, CA, USA Abstract Ths paper gves an overvew of LS-TaSC verson 2, a topology optmzaton tool

More information

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol 2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

A Topology-aware Random Walk

A Topology-aware Random Walk A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Programming in Fortran 90 : 2017/2018

Programming in Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

Imperialist Competitive Algorithm with Variable Parameters to Determine the Global Minimum of Functions with Several Arguments

Imperialist Competitive Algorithm with Variable Parameters to Determine the Global Minimum of Functions with Several Arguments Fourth Internatonal Conference Modellng and Development of Intellgent Systems October 8 - November, 05 Lucan Blaga Unversty Sbu - Romana Imperalst Compettve Algorthm wth Varable Parameters to Determne

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated.

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated. Some Advanced SP Tools 1. umulatve Sum ontrol (usum) hart For the data shown n Table 9-1, the x chart can be generated. However, the shft taken place at sample #21 s not apparent. 92 For ths set samples,

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

A Clustering Algorithm for Chinese Adjectives and Nouns 1

A Clustering Algorithm for Chinese Adjectives and Nouns 1 Clusterng lgorthm for Chnese dectves and ouns Yang Wen, Chunfa Yuan, Changnng Huang 2 State Key aboratory of Intellgent Technology and System Deptartment of Computer Scence & Technology, Tsnghua Unversty,

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT 3. - 5. 5., Brno, Czech Republc, EU APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT Abstract Josef TOŠENOVSKÝ ) Lenka MONSPORTOVÁ ) Flp TOŠENOVSKÝ

More information

Distributed Middlebox Placement Based on Potential Game

Distributed Middlebox Placement Based on Potential Game Int. J. Communcatons, Network and System Scences, 2017, 10, 264-273 http://www.scrp.org/ournal/cns ISSN Onlne: 1913-3723 ISSN Prnt: 1913-3715 Dstrbuted Mddlebox Placement Based on Potental Game Yongwen

More information

A Notable Swarm Approach to Evolve Neural Network for Classification in Data Mining

A Notable Swarm Approach to Evolve Neural Network for Classification in Data Mining A Notable Swarm Approach to Evolve Neural Network for Classfcaton n Data Mnng Satchdananda Dehur 1, Bjan Bhar Mshra 2 and Sung-Bae Cho 1 1 Soft Computng Laboratory, Department of Computer Scence, Yonse

More information

Complexity Analysis of Problem-Dimension Using PSO

Complexity Analysis of Problem-Dimension Using PSO Proceedngs of the 7th WSEAS Internatonal Conference on Evolutonary Computng, Cavtat, Croata, June -4, 6 (pp45-5) Complexty Analyss of Problem-Dmenson Usng PSO BUTHAINAH S. AL-KAZEMI AND SAMI J. HABIB,

More information

An Efficient Genetic Algorithm Based Approach for the Minimum Graph Bisection Problem

An Efficient Genetic Algorithm Based Approach for the Minimum Graph Bisection Problem 118 An Effcent Genetc Algorthm Based Approach for the Mnmum Graph Bsecton Problem Zh-Qang Chen, Rong-Long WAG and Kozo OKAZAKI Faculty of Engneerng, Unversty of Fuku, Bunkyo 3-9-1,Fuku-sh, Japan 910-8507

More information

Improving Low Density Parity Check Codes Over the Erasure Channel. The Nelder Mead Downhill Simplex Method. Scott Stransky

Improving Low Density Parity Check Codes Over the Erasure Channel. The Nelder Mead Downhill Simplex Method. Scott Stransky Improvng Low Densty Party Check Codes Over the Erasure Channel The Nelder Mead Downhll Smplex Method Scott Stransky Programmng n conjuncton wth: Bors Cukalovc 18.413 Fnal Project Sprng 2004 Page 1 Abstract

More information

Learning-Based Top-N Selection Query Evaluation over Relational Databases

Learning-Based Top-N Selection Query Evaluation over Relational Databases Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **

More information

EVALUATION OF THE PERFORMANCES OF ARTIFICIAL BEE COLONY AND INVASIVE WEED OPTIMIZATION ALGORITHMS ON THE MODIFIED BENCHMARK FUNCTIONS

EVALUATION OF THE PERFORMANCES OF ARTIFICIAL BEE COLONY AND INVASIVE WEED OPTIMIZATION ALGORITHMS ON THE MODIFIED BENCHMARK FUNCTIONS Academc Research Internatonal ISS-L: 3-9553, ISS: 3-9944 Vol., o. 3, May 0 EVALUATIO OF THE PERFORMACES OF ARTIFICIAL BEE COLOY AD IVASIVE WEED OPTIMIZATIO ALGORITHMS O THE MODIFIED BECHMARK FUCTIOS Dlay

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Smoothing Spline ANOVA for variable screening

Smoothing Spline ANOVA for variable screening Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory

More information

Optimal Workload-based Weighted Wavelet Synopses

Optimal Workload-based Weighted Wavelet Synopses Optmal Workload-based Weghted Wavelet Synopses Yoss Matas School of Computer Scence Tel Avv Unversty Tel Avv 69978, Israel matas@tau.ac.l Danel Urel School of Computer Scence Tel Avv Unversty Tel Avv 69978,

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Synthesizer 1.0. User s Guide. A Varying Coefficient Meta. nalytic Tool. Z. Krizan Employing Microsoft Excel 2007

Synthesizer 1.0. User s Guide. A Varying Coefficient Meta. nalytic Tool. Z. Krizan Employing Microsoft Excel 2007 Syntheszer 1.0 A Varyng Coeffcent Meta Meta-Analytc nalytc Tool Employng Mcrosoft Excel 007.38.17.5 User s Gude Z. Krzan 009 Table of Contents 1. Introducton and Acknowledgments 3. Operatonal Functons

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks 2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng

More information

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach Dstrbuted Resource Schedulng n Grd Computng Usng Fuzzy Approach Shahram Amn, Mohammad Ahmad Computer Engneerng Department Islamc Azad Unversty branch Mahallat, Iran Islamc Azad Unversty branch khomen,

More information

LS-TaSC Version 2.1. Willem Roux Livermore Software Technology Corporation, Livermore, CA, USA. Abstract

LS-TaSC Version 2.1. Willem Roux Livermore Software Technology Corporation, Livermore, CA, USA. Abstract 12 th Internatonal LS-DYNA Users Conference Optmzaton(1) LS-TaSC Verson 2.1 Wllem Roux Lvermore Software Technology Corporaton, Lvermore, CA, USA Abstract Ths paper gves an overvew of LS-TaSC verson 2.1,

More information

Research of Modeling Complex Topology on Internet MIFUBA BABA SERGE 1 and Ye XU 1,a,*

Research of Modeling Complex Topology on Internet MIFUBA BABA SERGE 1 and Ye XU 1,a,* 2017 Internatonal Conference on Electronc and Informaton Technology (ICEIT 2017) ISBN: 978-1-60595-526-1 Research of Modelng Complex Topology on Internet MIFUBA BABA SERGE 1 and Ye XU 1,a,* 1 College of

More information

An Evolvable Clustering Based Algorithm to Learn Distance Function for Supervised Environment

An Evolvable Clustering Based Algorithm to Learn Distance Function for Supervised Environment IJCSI Internatonal Journal of Computer Scence Issues, Vol. 7, Issue 5, September 2010 ISSN (Onlne): 1694-0814 www.ijcsi.org 374 An Evolvable Clusterng Based Algorthm to Learn Dstance Functon for Supervsed

More information

Reliable and Efficient Routing Using Adaptive Genetic Algorithm in Packet Switched Networks

Reliable and Efficient Routing Using Adaptive Genetic Algorithm in Packet Switched Networks IJCSI Internatonal Journal of Computer Scence Issues, Vol. 9, Issue 1, No 3, January 2012 ISSN (Onlne): 1694-0814 www.ijcsi.org 168 Relable and Effcent Routng Usng Adaptve Genetc Algorthm n Packet Swtched

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

An Improved Neural Network Algorithm for Classifying the Transmission Line Faults

An Improved Neural Network Algorithm for Classifying the Transmission Line Faults 1 An Improved Neural Network Algorthm for Classfyng the Transmsson Lne Faults S. Vaslc, Student Member, IEEE, M. Kezunovc, Fellow, IEEE Abstract--Ths study ntroduces a new concept of artfcal ntellgence

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

NGPM -- A NSGA-II Program in Matlab

NGPM -- A NSGA-II Program in Matlab Verson 1.4 LIN Song Aerospace Structural Dynamcs Research Laboratory College of Astronautcs, Northwestern Polytechncal Unversty, Chna Emal: lsssswc@163.com 2011-07-26 Contents Contents... 1. Introducton...

More information

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION 24 CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION The present chapter proposes an IPSO approach for multprocessor task schedulng problem wth two classfcatons, namely, statc ndependent tasks and

More information

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1 4/14/011 Outlne Dscrmnatve classfers for mage recognton Wednesday, Aprl 13 Krsten Grauman UT-Austn Last tme: wndow-based generc obect detecton basc ppelne face detecton wth boostng as case study Today:

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information