A Simulation Study for Emergency/Disaster Management by Applying Complex Networks Theory
|
|
- Elvin Gibson
- 5 years ago
- Views:
Transcription
1 A Smulaton Study for Emergency/Dsaster Management by Applyng Complex Networks Theory L Jn 1, Wang Jong 2 *, Da Yang 3, Wu Huapng 4 and Dong We 5 1,4 Earthquake Admnstraton of Guangdong Provnce Key Laboratory of Earthquake Montorng and Dsaster Mtgaton Technology, CEAKey Laboratory of Earthquake early Warnng and Safety Dagnoss of Maor Proect, Guangdong, Chna 2 School of Electrcal Engneerng, North Chna Unversty of Water Resources and Electrc Power, ZhengZhou , Chna 3 School of Economcs and Management, Southwest Jaotong Unversty, ChengDu, Chna 5 Deparment of nformaton Systems, USTC-CtyU Jont Advanced Research Centre, Chna * kfwd@ncwu.edu.cn ABSTRACT Earthquakes, hurrcanes, floodng and terrorst attacks pose a severe threat to our socety. What s more, when such a dsaster happens, t can spread n a wde range wth ubqutous presence of a large-scale networked system. Therefore, the emergency/dsaster management faces new challenges that the decson-makers have extra dffcultes n percevng the dsaster dynamc spreadng processes under ths networked envronment. Ths study tres to use the complex networks theory to tackle ths complexty and the result shows the theory s a promsng approach to support dsaster/emergency management by focusng on smulaton experments of small world networks and scale free networks. The theory can be used to capture and descrbe the evoluton mechansm, evoluton dscplne and overall behavor of a networked system. In partcular, the complex networks theory s very strong at analyzng the complexty and dynamcal changes of a networked system, whch can mprove the stuaton awareness after a dsaster has occurred and help perceve ts dynamc process, whch s very mportant for hgh-qualty decson makng. In addton, ths study also shows the use of the complex networks theory can buld a vsualzed process to track the dynamc spreadng of a dsaster n a networked system. Keywords:.Dsaster Management, Emergency Management, Complex Networks Theory, Small World Network, Scale Free Network. 1. Introducton Dsasters have a serous mpact on human socety, and despte the development of scence and technology, they stll cause heavy casualtes. On one hand, dsasters usually occur unexpectedly and effectve emergency/dsaster management s very crtcal needs hgh-qualty decson makng. Ths requres the decson-makers to well perceve the nature of a dsaster, gather relevant nformaton, make the rght udgment, and then generate an approprate acton plan. On the other hand, the real world s a networked one that s composed of many network systems, such as water supply networks, gas supply networks, power supply networks, road networks and communcaton networks. All these network systems are very complex and a so-called domno or avalanche effect feature s commonly shared among dsastrous events. A strong ntal event trggers a falure avalanche, whch spreads n a cascade-lke manner wthn a network and fnally has an mpact on large parts of the system. For example, the maor power blackout on August 14, 2003, whch lasted up to 4 days n varous parts of eastern USA, not only caused severe traffc congestons, but also affected many other crtcal nfrastructures. Ths avalanche effect makes the decson makng process for emergency/dsaster management very complex and dffcult because the decson-makers hardly perceve the phenomenon about how the dsaster spreads n a complex networked system. JournalofAppledResearchandTechnology 223
2 ASmulatonStudyforEmergency/DsasterManagementbyApplyngComplexNetworksTheory, LJnetal./ Effectvely understandng and percevng a dsaster s very mportant for emergency/dsaster management. In ths paper, the complex networks theory s appled to help perceve the dsaster spreadng (the avalanche effect) n a networked system by adoptng a smulaton approach. Because of the capacty and capablty to deal wth hgh complexty of systems and execute a wde range of analyses under dfferent envronment, smulaton experments are a useful tool and can be used n many felds. For example, Munoz- Pacheco and Tlelo-Cuautle [1] conducted a smulaton study to show the usefulness of the proposed synthesze 2D chaotc systems, Vargas- Martnez and Garza-Castafnon [2] made a smulaton experments to exam the usefulness of Pattern Search Optmzaton and ANNs on mprovng the performance of the fault-tolerant control (FTC) scheme. The study focuses on some crtcal lfelne systems, such as, water supply networks, gas supply networks, power supply networks, road networks and communcaton networks. The rest of ths paper s organzed as follows: n Secton 2 a bref lterature revew on emergency/dsaster management and complex networks theory s presented. A complex networks theory-based model that s used n ths study s ntroduced n Secton 3 and two smulaton experments and the assocated results are presented and dscussed n Secton 4. Fnally, a summary and a concluson are gven n Secton Lteratures Revew In a real-tme stuaton, the response to a natural dsaster or terrorst attack, creates a very crtcal, threatenng decson-makng context that must be consstently dealt wth n a tmely manner. The characterstcs that make dsaster respondng scenaros very complex nclude: hgh levels of uncertanty [3], compressed tmelnes [4], sgnfcant lack of nformaton [5], dffculty n assessng nformaton qualty [6]. Meanwhle, emergency/dsaster management encounters new challenges under the complex network envronment because of the avalanche effect. It s mportant to note that a large number of systems can be seen as a complex network whose nodes represent system components and whle the lnks ndcate the nteractons between those components. Over the last decade, the study of large-scale networked systems spannng has grown enormously[7], [8]. Network scence, as emergng research feld, has brought an nterdscplnary vew to the study of complex networks. Studes on these large-scale real networks have produced many new concepts and measures attemptng to characterze the structure of networks[9], [10]. A seres of unfyng prncples and statstcal dstrbutons related to dfferent propertes of real networks have been dentfed from those studes. The complex network theory can be used n many felds: nformaton systems[11], marketng[12], and desgn problem[13]. The complex network study can have a good help for the emergency decson makng wth a understandng of the stuaton awareness [14], whch s consdered ndspensable for decson makng n the context of a real-tme, complex and dynamcs envronment. Wth the ubqutous presence of large-scale networked systems and the study of complex networks, the complex networks theory can be well appled n emergency or dsaster management. Three famous network models are wdely used to examne complex systems, random network, small world network and scale free network, and a large amount of real networks have a hgh degree of smlarty wth small world network and scale free network. One of the foremost dscoveres n the complex networks theory s the exstence of smallworld property n many real networks. The Small-world property [9] refers to the fact that despte ther large sze most networks have relatvely short paths between any of ther two nodes. It s ponted out n many cases real networks exhbt a scale free (or power law) degree dstrbuton [15]. Therefore, n ths study, we lmt our smulaton scope to the small world network and scale free network for a better match to the real networked systems. In order to measure the avalanche effect of a complex networked system, a number of mportant models have been dscussed n the lterature and many valuable results have been found. [16] propose a model for cascadng falures n complex networks and ther fndngs showed that the 224 Vol.12,Aprl214
3 ASmulatonStudyforEmergency/DsasterManagementbyApplyngComplexNetworksTheory, LJnetal./ breakdown of a sngle node s suffcent to collapse the effcency of the entre system f the node s among the ones wth the largest load. [17] present a dynamc spreadng of the falures model n networked systems wth the recovery process n the network. [18] and [19] follow ths dea by takng dfferent nodes or strateges nto consderaton. In addton, many cascadng falure models have also been proposed, such as the sand ple model [20], [21], the ORNL-PSerc-Alaska (OPA) model [22] to study blackout dynamcs n the power transmsson grd. In partcular, the CASCADE model [23] s used to examne power transmsson system crtcal loadng and power tals n probablty dstrbutons of blackout sze, etc. 3. The Model In ths study the model s proposed by (Wang, Rong et al. 2008) s adopted to descrbe the complexty of emergency/dsaster management and vsualze the network-specfc spreadng process of a dsaster. Inspred by ths process of cascadng falures, the model s proposed as follow. (1).For smplcty, ntal load L of each node n the network s a functon of ts degree k and defned as: L ak (1) Where a and are tunable parameters n our study, whch control the strength of the ntal load of the node. (2).The load at the broken node s redstrbuted to ts neghborng node, accordng to the preferental probablty: ak ak m m k km m (2) where represents the set of all neghborng nodes of the broken node Accordng to the rule of (2), the addtonal load L receved by the node s proportonal to ts ntal load,.e., L k L km m (3) Meanwhle, each node n the network has a capacty threshold, whch s the maxmum flow that the node can transmt. Snce the node capacty on real-lfe networks s generally lmted by cost, t s natural to assume that the capacty C of the node s proportonal to ts ntal load for smplcty: C T L,,,,..., N. (4) where the constant T (>1) s the tolerance parameter characterzng the tolerance of the network. Because every node has a lmted capacty to handle the load, so for the node, f, L L C then the node wll be broken and nduce further the redstrbuton of the load L L and potentally further other nodes breakng. 4. Smulaton and Results 4.1 Buldng a Networked System In ths study, two networked systems are bult: a small world network and a scale free network. The algorthm for constructng the small world network s as follow: Step 1: Constructng a regular graph that has N nodes and s a nearest-neghbor couplng network. These nodes form a rng and each node connect wth K/2 nodes around ts rght and left, where K s an even number. Step 2: Randomly reconnectng the regular graph s edges wth the probablty P. That s, keepng one node of the target edge, and randomly selectng a node from the network as the other node of the edge, and every two nodes have ust one edge and every node can not be connected wth tself. The algorthm for constructng the scale free network as follow: JournalofAppledResearchandTechnology 225
4 ASmulatonStudyforEmergency/DsasterManagementbyApplyngComplexNetworksTheory, LJnetal./ Step 1: constructng a network wth m0 nodes, ths network can have no edges or be fully connected or randomly connected. Step 2: Brngng n one new node every tme, and connectng ths node wth m nodes from ths network, where m m0 The probablty for the new node connectng wth an exsted node can be expressed as k k 4.2 Attack Strateges, where k s the degree for node. Albert (2000) took two attack strateges nto consderaton for complex networks: one s falure strategy and the other s selectve attack strategy. To many real networks, such as water supply networks, gas supply networks, power supply networks, road networks and communcaton networks, an abrupt dsaster ncludes falure of nature dsasters and falure of terrorst attacks. A nature dsaster s a falure of operaton and, the destroyed nodes are selected randomly. A terrorst attack s a selectve attack and, the destroyed nodes are selected by the mportance of the node. In our study, we examne the selectve attack strategy and ntend to measure the dynamcs process of a network when t s attacked by destroyng mportant nodes, whch s mportant for emergency or dsaster management to better understand and perceve the dsaster s avalanche effect. A smulaton study s conducted to smulate such a selectve attack strategy and examne ts dynamc process. Two groups of experments are ncluded n ths study. One s to adopt the selectve attack strategy n a small world network and the other one s to adopt t n a scale free network. For these two networks, the fnal node number equals 30, whch s an approprate node number for develop a good vsualzaton effect snce the network becomes more complex and lower vsualze when the number of the node s large. The degree of the node s used to measure the mportance of the node, that s, a node wth hgher degree s more mportant. Ths actually reflects the stuaton of real networks. For example, people always consder a power staton connected wth many wres as an mportant node n the real power supply network. At the same tme, some other researchers also adopt ths rule, such as(tan, WU et al. 2006). Addtonally, the experments also show the changes of some statstcal propertes of a network when t s beng attacked, such as the degree dstrbuton, the probablty of the node degree. 4.3 Smulaton Results Fg.1 s the smulaton result for small world network that has nne sub-fgures to form a 3 by 3 matrx. The three sub-fgures n the frst row provde a dynamcal process of the network evoluton, the frst sub-fgure shows the network stuaton before an attack, the second sub-fgure shows one ntermedate stuaton of the dynamcal process when ths network s beng attacked, and the thrd sub-fgure shows the fnal stuaton of ths network when the dynamcal process has been over. Ths three fgures offer an ntutve effect about the changes of the small world network. As we know ths dynamcal process can mprove dsaster/emergency managers stuaton awareness ablty and, ths stuaton awareness s vtal for better understandng the dsaster and makng hgh-qualty decson, especally n a short tme when a dsaster has happened. The second row and thrd row present the changes of statstcal propertes of ths network. The three sub-fgures n the second row show the changes of node degree dstrbuton of the small world network. The frst sub-fgure shows the node degree dstrbuton before ths network s attacked, the second one shows the dstrbuton at one condton when t s beng attacked, and the last one shows the fnal dstrbuton. The three subfgures n the last row show the changes for node degree probablty before, when and after ths network s attacked. These changes of the statstcal propertes provde some detals of nformaton about the dynamcal process of the network evoluton. One can easly obtan the nformaton about whch node s destroyed at any tme of ths dynamcal process and how many nodes survve and the fnal connecton nformaton the network after ths process s over. 226 Vol.12,Aprl214
5 ASmulatonStudyforEmergency/DsasterManagementbyApplyngComplexNetworksTheory, LJnetal./ Fgure 1. The smulaton result for small world network. For example, t can be seen that the node 1, 2, 3, 4, 5, 8, 10 and 11 are destroyed and the node 15, 16 and 28 have the same maxmum degree and the value s 5 from the second sub-fgure of the second row. One also get the nformaton that there are ust eght nodes and the degree are 3, 2, 2, 2, 3, 4, 2 and 2 for ths eght nodes, respectvely. Fg.2 presents the smulaton results for the scale free network. It s constructed based on the same prncples adopted for Fg. 1. The frst row shows the dynamcal process of the scale free network evoluton, the second row provdes changes of node degree dstrbuton, and the thrd row offers the changes for probablty of node degree. The scale free network has the power law property for degree dstrbuton, and the frst sub-fgure n the second row shows ths property. One can get one mportant result from second row: the network always shows the power law property at any tme when ths network s attacked. Ths smulaton also can offer useful nformaton when the avalanche effect occurred whch can ncrease the effectveness of dsaster/emergency decson makng. Ths smulaton fts partcularly the stuaton when real networks own the power law property. JournalofAppledResearchandTechnology 227
6 ASmulatonStudyforEmergency/DsasterManagementbyApplyngComplexNetworksTheory, LJnetal./ Fgure 2. The smulaton results for scale free network 5. Conclusons In ths study we nvestgate the effect of complex networks theory to be used n dsaster/emergency management, especally for graspng and percevng some key characterstcs of a dsaster, whch s very mportant for decson makng n a short tme. Ths work s a novel attempt for enhancement of dsaster/emergency management. Based on the smulaton, one can conclude that the complex networks theory can help understand the dsaster by offerng vsualzed dynamcal process for the avalanche effect when a target network s beng attacked by destroyng the mportant nodes. One can obtan the useful nformaton such as whch node s destroyed at any tme of the dynamcal process, the degree dstrbuton and node degree probablty changes at any tme. One can also conclude that t s possble to apply complex networks theory to dsaster/emergency management, because complex networks theory can be used to capture and descrbe the evoluton mechansm, evoluton dscplne and overall behavor of the networks. Addtonally, we dscovery an mportant result from the smulaton: the scale free network always shows the power law property at any tme when the network s attacked. To summarze, the smulaton results shows that the complex networks theory s a powerful tool for formng stuaton awareness and percevng the spreadng of a dsaster. However, more experments should be conducted n the future study n order to further understand the complexty and other key features of a dsaster. References [1]-Munoz-Pacheco, J.M. and E. Tlelo-Cuautle, Automatc synthess of 2D-n-scrolls chaotc systems by behavoral modelng. Journal of Appled Research and Technology, (1): p Vol.12,Aprl214
7 ASmulatonStudyforEmergency/DsasterManagementbyApplyngComplexNetworksTheory, LJnetal./ [2] Vargas-Martnez, A. and L.E. Garza-Castafnon, Combnng Artfcal Intellgence and Advanced Technques n Fault-Tolerant Control. Journal of Appled Research and Technology, (2): p [3]_Argote, L., INPUT UNCERTAINTY AND ORGANIZATIONAL COORDINATION IN HOSPITAL EMERGENCY UNITS. Admnstratve Scence Quarterly, (3): p [4] Yates, D. and S. Paquette, Emergency knowledge management and socal meda technologes: A case study of the 2010 Hatan earthquake. Internatonal Journal of Informaton Management, (1): p [5]_Mano, B.S. and A.H. Baker, Communcaton challenges n emergency response. Commun. ACM, (3): p [6] Lu, Y. and D. Yang, Informaton exchange n vrtual communtes under extreme dsaster condtons. Decson Support Systems, (2): p [7] Newman, M.E.J., The Structure and Functon of Complex Networks. SIAM Revew, (2): p. 167 [8] Boccalett, S., et al., Complex networks: Structure and dynamcs. Physcs Reports-Revew Secton of Physcs Letters, (4-5): p [9] Watts, D.J. and S.H. Strogatz, Collectve dynamcs of 'small-world' networks. Nature, (6684): p [10] Albert, R. and A.L. Barabas, Statstcal mechancs of complex networks. Revews of Modern Physcs, (1): p [11] Chang, R.M., et al., A Network Perspectve of Dgtal Competton n Onlne Advertsng Industres: A Smulaton-Based Approach. Informaton Systems Research, (3): p [12] Cho, H., S.-H. Km, and J. Lee, Role of network structure and network effects n dffuson of nnovatons. Industral Marketng Management, (1): p [13] Ochoa, A., B. Bernabe, and O. Ochoa, TOWARDS A PARALLEL SYSTEM FOR DEMOGRAPHIC ZONIFICATION BASED ON COMPLEX NETWORKS. Journal of Appled Research and Technology, (2): p [14]_Randel, J.M., H.L. Pugh, and S.K. Reed, Dfferences n expert and novce stuaton awareness n naturalstc decson makng. Internatonal Journal of Human-Computer Studes, (5): p [15] Barabás, A.-L. and R. Albert, Emergence of Scalng n Random Networks. Scence, (5439): p [16] Cructt, P., V. Latora, and M. Marchor, Model for cascadng falures n complex networks. Physcal Revew E, (4): p [17] Buzna, L., K. Peters, and D. Helbng, Modellng the dynamcs of dsaster spreadng n networks. Physca A: Statstcal Mechancs and ts Applcatons, (1): p [18]_Weng, W.G., et al., Modelng the dynamcs of dsaster spreadng from key nodes n complex networks. Internatonal Journal of Modern Physcs C, (5): p [19] Ouyang, M., et al., Emergency response to dsasterstruck scale-free network wth redundant systems. Physca A: Statstcal Mechancs and ts Applcatons, (18): p [20] Olam, Z., H.J.S. Feder, and K. Chrstensen, Selforganzed crtcalty n a contnuous, nonconservatve cellular automaton modelng earthquakes. Physcal Revew Letters, (8): p [21] Goh, K.I., et al., Sandple on Scale-Free Networks. Physcal Revew Letters, (14): p [22] Carreras, B.A., et al., Crtcal ponts and transtons n an electrc power transmsson model for cascadng falure blackouts. Chaos, (4): p [23] Dobson, I., B.A. Carreras, and D.E. Newman, A LOADING-DEPENDENT MODEL OF PROBABILISTIC CASCADING FAILURE. Probablty n the Engneerng and Informatonal Scences, (01): p [24] Wang, J., et al., Attack vulnerablty of scale-free networks due to cascadng falures. Physca A: Statstcal Mechancs and ts Applcatons, (26): p [25] Albert, R.J.A.-L., Error and attack tolerance of complex networks. (cover story). Nature, (6794): p [26] TAN, Y.-., J. WU, and H.-z. DENG, Evaluaton method for node mportance based on node contracton n complex networks. Systems Engneerng-Theory & Practce, : p JournalofAppledResearchandTechnology 229
Virtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationStructure Formation of Social Network
Structure Formaton of Socal Network DU Nan 1, FENG Hu 2, HUANG Zgang 3, Sally MAKI 4, WANG Ru(Ruby) 5, and ZHAO Hongxa (Melssa) 6 1 Bejng Unversty of Posts and Telecommuncatons, Chna 2 Fudan Unversty,
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationConstructing Minimum Connected Dominating Set: Algorithmic approach
Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected
More informationA New Approach For the Ranking of Fuzzy Sets With Different Heights
New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays
More informationX- Chart Using ANOM Approach
ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationAvailable online at Available online at Advanced in Control Engineering and Information Science
Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced
More informationTECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.
TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationMathematics 256 a course in differential equations for engineering students
Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the
More informationWishing you all a Total Quality New Year!
Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma
More informationPerformance Evaluation of Information Retrieval Systems
Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence
More informationA Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI
216 Jont Internatonal Conference on Artfcal Intellgence and Computer Engneerng (AICE 216) and Internatonal Conference on etwork and Communcaton Securty (CS 216) ISB: 978-1-6595-362-5 A Model Based on Mult-agent
More informationThe Research of Support Vector Machine in Agricultural Data Classification
The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou
More informationResource and Virtual Function Status Monitoring in Network Function Virtualization Environment
Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087
More informationClassifier Selection Based on Data Complexity Measures *
Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.
More informationBioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.
[Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented
More informationType-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data
Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES
More informationEffectiveness of Information Retraction
Effectveness of Informaton on Cndy Hu, Malk Magdon-Ismal, Mark Goldberg and Wllam A. Wallace Department of Industral and Systems Engneerng Rensselaer Polytechnc Insttute Troy, New York Emal: huc@rp.edu,
More informationNetwork Topologies: Analysis And Simulations
Networ Topologes: Analyss And Smulatons MARJAN STERJEV and LJUPCO KOCAREV Insttute for Nonlnear Scence Unversty of Calforna San Dego, 95 Glman Drve, La Jolla, CA 993-4 USA Abstract:-In ths paper we present
More informationScheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research
Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research
More informationUsing centrality measures to rank the importance of the components of a complex network infrastructure
Usng centralty measures to rank the mportance of the components of a complex network nfrastructure F. adn, E. Zo and. A. Petrescu Poltecnco d Mlano, partmento d Energa, Va Ponzo 34/3, -20133 Mlano, taly
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationModule Management Tool in Software Development Organizations
Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,
More informationFast Computation of Shortest Path for Visiting Segments in the Plane
Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang
More informationSubspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;
Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features
More informationDesign of Structure Optimization with APDL
Desgn of Structure Optmzaton wth APDL Yanyun School of Cvl Engneerng and Archtecture, East Chna Jaotong Unversty Nanchang 330013 Chna Abstract In ths paper, the desgn process of structure optmzaton wth
More informationCOMPARISON OF TWO MODELS FOR HUMAN EVACUATING SIMULATION IN LARGE BUILDING SPACES. University, Beijing , China
COMPARISON OF TWO MODELS FOR HUMAN EVACUATING SIMULATION IN LARGE BUILDING SPACES Bn Zhao 1, 2, He Xao 1, Yue Wang 1, Yuebao Wang 1 1 Department of Buldng Scence and Technology, Tsnghua Unversty, Bejng
More informationHelsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)
Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute
More informationAn Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed
More informationFinite Element Analysis of Rubber Sealing Ring Resilience Behavior Qu Jia 1,a, Chen Geng 1,b and Yang Yuwei 2,c
Advanced Materals Research Onlne: 03-06-3 ISSN: 66-8985, Vol. 705, pp 40-44 do:0.408/www.scentfc.net/amr.705.40 03 Trans Tech Publcatons, Swtzerland Fnte Element Analyss of Rubber Sealng Rng Reslence Behavor
More informationEfficient Distributed File System (EDFS)
Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationA Growing Network Model with High Hub Connectivity and Tunable Clustering Coefficient
Manuscrpt receved Aug. 23, 2007; revsed ov. 29, 2007 A Growng etwork Model wth Hgh Hub Connectvty and Tunable Clusterng Coeffcent YIHJIA TSAI, PIG-A HSIAO Department of Computer Scence and Informaton Engneerng
More informationElectrical analysis of light-weight, triangular weave reflector antennas
Electrcal analyss of lght-weght, trangular weave reflector antennas Knud Pontoppdan TICRA Laederstraede 34 DK-121 Copenhagen K Denmark Emal: kp@tcra.com INTRODUCTION The new lght-weght reflector antenna
More informationAn Improved Image Segmentation Algorithm Based on the Otsu Method
3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,
More informationCascaded failures in weighted networks
Cascaded falures n weghted networks aharan Mrzasoleman, Mahmoudreza abae, Mahd Jall *, and MohammadAl Safar Abstract Many technologcal networks mght experence random and/or systematc falures n ther components.
More informationPrivate Information Retrieval (PIR)
2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market
More informationGrowth model for complex networks with hierarchical and modular structures
Growth model for complex networks wth herarchcal and modular structures Q Xuan, Yanjun L,* and Te-Jun Wu Natonal Laboratory of Industral Control Technology, Insttute of Intellgent Systems & Decson Makng,
More informationA KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE
A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationVideo Proxy System for a Large-scale VOD System (DINA)
Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,
More informationQuery Clustering Using a Hybrid Query Similarity Measure
Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationPriority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks
Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,
More informationDetermining the Optimal Bandwidth Based on Multi-criterion Fusion
Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn
More informationFINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK
FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationFEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur
FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents
More informationResource Discovery in P2P Networks Using Evolutionary Neural Networks
> PAPER IDENTIFICATION NUMBER: 067-04 < Resource Dscovery n P2P Networks Usng Evolutonary Neural Networks Mkko A. VAPA, Nko P. KOTILAINEN, Annemar K. AUVINEN, Hekk M. KAINULAINEN, and Jarkko T. VUORI Abstract--
More informationProfessional competences training path for an e-commerce major, based on the ISM method
World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng
More informationStudy on Properties of Traffic Flow on Bus Transport Networks
Study on Propertes of Traffc Flow on Bus Transport Networks XU-HUA YANG, JIU-QIANG ZHAO, GUANG CHEN, AND YOU-YU DONG College of Computer Scence and Technology Zhejang Unversty of Technology Hangzhou, 310023,
More informationAPPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT
3. - 5. 5., Brno, Czech Republc, EU APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT Abstract Josef TOŠENOVSKÝ ) Lenka MONSPORTOVÁ ) Flp TOŠENOVSKÝ
More informationA fair buffer allocation scheme
A far buffer allocaton scheme Juha Henanen and Kalev Klkk Telecom Fnland P.O. Box 228, SF-330 Tampere, Fnland E-mal: juha.henanen@tele.f Abstract An approprate servce for data traffc n ATM networks requres
More informationOverview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION
Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup
More informationAnalysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD
Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,
More informationEvaluation of an Enhanced Scheme for High-level Nested Network Mobility
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.
More informationUser Authentication Based On Behavioral Mouse Dynamics Biometrics
User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA
More informationTsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance
Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationImperialist Competitive Algorithm with Variable Parameters to Determine the Global Minimum of Functions with Several Arguments
Fourth Internatonal Conference Modellng and Development of Intellgent Systems October 8 - November, 05 Lucan Blaga Unversty Sbu - Romana Imperalst Compettve Algorthm wth Varable Parameters to Determne
More informationPositive Semi-definite Programming Localization in Wireless Sensor Networks
Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer
More informationFAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks
2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng
More informationA Low Energy Algorithm of Wireless Sensor Networks Based on Fractal Dimension
Sensors & Transducers 2014 by IFSA Publshng, S. L. http://www.sensorsportal.com A Low Energy Algorthm of Wreless Sensor Networks ased on Fractal Dmenson Tng Dong, Chunxao Fan, Zhgang Wen School of Electronc
More informationResearch of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm
, pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,
More informationStudy of Data Stream Clustering Based on Bio-inspired Model
, pp.412-418 http://dx.do.org/10.14257/astl.2014.53.86 Study of Data Stream lusterng Based on Bo-nspred Model Yngme L, Mn L, Jngbo Shao, Gaoyang Wang ollege of omputer Scence and Informaton Engneerng,
More informationLearning-Based Top-N Selection Query Evaluation over Relational Databases
Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **
More informationDESIGN OF A HAPTIC DEVICE FOR EXCAVATOR EQUIPPED WITH CRUSHER
DESIGN OF A HAPTIC DEVICE FOR EXCAVATOR EQUIPPED WITH CRUSHER Kyeong Won Oh, Dongnam Km Korea Unversty, Graduate School 5Ga-1, Anam-Dong, Sungbuk-Gu, Seoul, Korea {locosk, smleast}@korea.ac.kr Jong-Hyup
More informationOptimal connection strategies in one- and two-dimensional associative memory models
Optmal connecton strateges n one- and two-dmensonal assocatve memory models Lee Calcraft, Rod Adams, and Nel Davey School of Computer Scence, Unversty of Hertfordshre College lane, Hatfeld, Hertfordshre
More informationA Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures
A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School
More information3D Virtual Eyeglass Frames Modeling from Multiple Camera Image Data Based on the GFFD Deformation Method
NICOGRAPH Internatonal 2012, pp. 114-119 3D Vrtual Eyeglass Frames Modelng from Multple Camera Image Data Based on the GFFD Deformaton Method Norak Tamura, Somsangouane Sngthemphone and Katsuhro Ktama
More informationOPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET
OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor
More informationA new segmentation algorithm for medical volume image based on K-means clustering
Avalable onlne www.jocpr.com Journal of Chemcal and harmaceutcal Research, 2013, 5(12):113-117 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCRC5 A new segmentaton algorthm for medcal volume mage based
More informationA MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS
Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung
More informationDYNAMIC NETWORK OF CONCEPTS FROM WEB-PUBLICATIONS
DYNAMIC NETWORK OF CONCEPTS FROM WEB-PUBLICATIONS Lande D.V. (dwl@vst.net), IC «ELVISTI», NTUU «KPI» Snarsk A.A. (asnarsk@gmal.com), NTUU «KPI» The network, the nodes of whch are concepts (people's names,
More informationFuture Generation Computer Systems
Future Generaton Computer Systems 29 (2013) 1631 1644 Contents lsts avalable at ScVerse ScenceDrect Future Generaton Computer Systems journal homepage: www.elsever.com/locate/fgcs Gosspng for resource
More informationAn Internal Clustering Validation Index for Boolean Data
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 16, No 6 Specal ssue wth selecton of extended papers from 6th Internatonal Conference on Logstc, Informatcs and Servce Scence
More informationA Distributed Dynamic Bandwidth Allocation Algorithm in EPON
www.ccsenet.org/mas Modern Appled Scence Vol. 4, o. 7; July 2010 A Dstrbuted Dynamc Bandwdth Allocaton Algorthm n EPO Feng Cao, Demng Lu, Mnmng Zhang, Kang Yang & Ynbo Qan School of Optoelectronc Scence
More informationResearch of Modeling Complex Topology on Internet MIFUBA BABA SERGE 1 and Ye XU 1,a,*
2017 Internatonal Conference on Electronc and Informaton Technology (ICEIT 2017) ISBN: 978-1-60595-526-1 Research of Modelng Complex Topology on Internet MIFUBA BABA SERGE 1 and Ye XU 1,a,* 1 College of
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationThe Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique
//00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy
More informationBoundary Condition Simulation for Structural Local Refined Modeling Using Genetic Algorithm
2016 Internatonal Conference on Artfcal Intellgence: Technques and Applcatons (AITA 2016) ISBN: 978-1-60595-389-2 Boundary Condton Smulaton for Structural Local Refned Modelng Usng Genetc Algorthm Zhong
More informationS1 Note. Basis functions.
S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type
More informationAnalysis of Continuous Beams in General
Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,
More informationVISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES
UbCC 2011, Volume 6, 5002981-x manuscrpts OPEN ACCES UbCC Journal ISSN 1992-8424 www.ubcc.org VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES
More informationMeta-heuristics for Multidimensional Knapsack Problems
2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,
More informationAn Algorithm for Weighted Positive Influence Dominating Set Based on Learning Automata
4 th Internatonal Conference on Knowledge-Based Engneerng and Innovaton (KBEI-2017) Dec. 22 th, 2017 (Iran Unversty of Scence and Technology) Tehran, Iran An Algorthm for Weghted Postve Influence Domnatng
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More informationAADL : about scheduling analysis
AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng
More informationDEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS
DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261
More informationMODULE DESIGN BASED ON INTERFACE INTEGRATION TO MAXIMIZE PRODUCT VARIETY AND MINIMIZE FAMILY COST
INTERNATIONAL CONFERENCE ON ENGINEERING DESIGN, ICED 07 28-31 AUGUST 2007, CITE DES SCIENCES ET DE L'INDUSTRIE, PARIS, FRANCE MODULE DESIGN BASED ON INTERFACE INTEGRATION TO MAIMIZE PRODUCT VARIETY AND
More informationGateway Algorithm for Fair Bandwidth Sharing
Algorm for Far Bandwd Sharng We Y, Rupnder Makkar, Ioanns Lambadars Department of System and Computer Engneerng Carleton Unversty 5 Colonel By Dr., Ottawa, ON KS 5B6, Canada {wy, rup, oanns}@sce.carleton.ca
More information