A Simulation Study for Emergency/Disaster Management by Applying Complex Networks Theory

Size: px
Start display at page:

Download "A Simulation Study for Emergency/Disaster Management by Applying Complex Networks Theory"

Transcription

1 A Smulaton Study for Emergency/Dsaster Management by Applyng Complex Networks Theory L Jn 1, Wang Jong 2 *, Da Yang 3, Wu Huapng 4 and Dong We 5 1,4 Earthquake Admnstraton of Guangdong Provnce Key Laboratory of Earthquake Montorng and Dsaster Mtgaton Technology, CEAKey Laboratory of Earthquake early Warnng and Safety Dagnoss of Maor Proect, Guangdong, Chna 2 School of Electrcal Engneerng, North Chna Unversty of Water Resources and Electrc Power, ZhengZhou , Chna 3 School of Economcs and Management, Southwest Jaotong Unversty, ChengDu, Chna 5 Deparment of nformaton Systems, USTC-CtyU Jont Advanced Research Centre, Chna * kfwd@ncwu.edu.cn ABSTRACT Earthquakes, hurrcanes, floodng and terrorst attacks pose a severe threat to our socety. What s more, when such a dsaster happens, t can spread n a wde range wth ubqutous presence of a large-scale networked system. Therefore, the emergency/dsaster management faces new challenges that the decson-makers have extra dffcultes n percevng the dsaster dynamc spreadng processes under ths networked envronment. Ths study tres to use the complex networks theory to tackle ths complexty and the result shows the theory s a promsng approach to support dsaster/emergency management by focusng on smulaton experments of small world networks and scale free networks. The theory can be used to capture and descrbe the evoluton mechansm, evoluton dscplne and overall behavor of a networked system. In partcular, the complex networks theory s very strong at analyzng the complexty and dynamcal changes of a networked system, whch can mprove the stuaton awareness after a dsaster has occurred and help perceve ts dynamc process, whch s very mportant for hgh-qualty decson makng. In addton, ths study also shows the use of the complex networks theory can buld a vsualzed process to track the dynamc spreadng of a dsaster n a networked system. Keywords:.Dsaster Management, Emergency Management, Complex Networks Theory, Small World Network, Scale Free Network. 1. Introducton Dsasters have a serous mpact on human socety, and despte the development of scence and technology, they stll cause heavy casualtes. On one hand, dsasters usually occur unexpectedly and effectve emergency/dsaster management s very crtcal needs hgh-qualty decson makng. Ths requres the decson-makers to well perceve the nature of a dsaster, gather relevant nformaton, make the rght udgment, and then generate an approprate acton plan. On the other hand, the real world s a networked one that s composed of many network systems, such as water supply networks, gas supply networks, power supply networks, road networks and communcaton networks. All these network systems are very complex and a so-called domno or avalanche effect feature s commonly shared among dsastrous events. A strong ntal event trggers a falure avalanche, whch spreads n a cascade-lke manner wthn a network and fnally has an mpact on large parts of the system. For example, the maor power blackout on August 14, 2003, whch lasted up to 4 days n varous parts of eastern USA, not only caused severe traffc congestons, but also affected many other crtcal nfrastructures. Ths avalanche effect makes the decson makng process for emergency/dsaster management very complex and dffcult because the decson-makers hardly perceve the phenomenon about how the dsaster spreads n a complex networked system. JournalofAppledResearchandTechnology 223

2 ASmulatonStudyforEmergency/DsasterManagementbyApplyngComplexNetworksTheory, LJnetal./ Effectvely understandng and percevng a dsaster s very mportant for emergency/dsaster management. In ths paper, the complex networks theory s appled to help perceve the dsaster spreadng (the avalanche effect) n a networked system by adoptng a smulaton approach. Because of the capacty and capablty to deal wth hgh complexty of systems and execute a wde range of analyses under dfferent envronment, smulaton experments are a useful tool and can be used n many felds. For example, Munoz- Pacheco and Tlelo-Cuautle [1] conducted a smulaton study to show the usefulness of the proposed synthesze 2D chaotc systems, Vargas- Martnez and Garza-Castafnon [2] made a smulaton experments to exam the usefulness of Pattern Search Optmzaton and ANNs on mprovng the performance of the fault-tolerant control (FTC) scheme. The study focuses on some crtcal lfelne systems, such as, water supply networks, gas supply networks, power supply networks, road networks and communcaton networks. The rest of ths paper s organzed as follows: n Secton 2 a bref lterature revew on emergency/dsaster management and complex networks theory s presented. A complex networks theory-based model that s used n ths study s ntroduced n Secton 3 and two smulaton experments and the assocated results are presented and dscussed n Secton 4. Fnally, a summary and a concluson are gven n Secton Lteratures Revew In a real-tme stuaton, the response to a natural dsaster or terrorst attack, creates a very crtcal, threatenng decson-makng context that must be consstently dealt wth n a tmely manner. The characterstcs that make dsaster respondng scenaros very complex nclude: hgh levels of uncertanty [3], compressed tmelnes [4], sgnfcant lack of nformaton [5], dffculty n assessng nformaton qualty [6]. Meanwhle, emergency/dsaster management encounters new challenges under the complex network envronment because of the avalanche effect. It s mportant to note that a large number of systems can be seen as a complex network whose nodes represent system components and whle the lnks ndcate the nteractons between those components. Over the last decade, the study of large-scale networked systems spannng has grown enormously[7], [8]. Network scence, as emergng research feld, has brought an nterdscplnary vew to the study of complex networks. Studes on these large-scale real networks have produced many new concepts and measures attemptng to characterze the structure of networks[9], [10]. A seres of unfyng prncples and statstcal dstrbutons related to dfferent propertes of real networks have been dentfed from those studes. The complex network theory can be used n many felds: nformaton systems[11], marketng[12], and desgn problem[13]. The complex network study can have a good help for the emergency decson makng wth a understandng of the stuaton awareness [14], whch s consdered ndspensable for decson makng n the context of a real-tme, complex and dynamcs envronment. Wth the ubqutous presence of large-scale networked systems and the study of complex networks, the complex networks theory can be well appled n emergency or dsaster management. Three famous network models are wdely used to examne complex systems, random network, small world network and scale free network, and a large amount of real networks have a hgh degree of smlarty wth small world network and scale free network. One of the foremost dscoveres n the complex networks theory s the exstence of smallworld property n many real networks. The Small-world property [9] refers to the fact that despte ther large sze most networks have relatvely short paths between any of ther two nodes. It s ponted out n many cases real networks exhbt a scale free (or power law) degree dstrbuton [15]. Therefore, n ths study, we lmt our smulaton scope to the small world network and scale free network for a better match to the real networked systems. In order to measure the avalanche effect of a complex networked system, a number of mportant models have been dscussed n the lterature and many valuable results have been found. [16] propose a model for cascadng falures n complex networks and ther fndngs showed that the 224 Vol.12,Aprl214

3 ASmulatonStudyforEmergency/DsasterManagementbyApplyngComplexNetworksTheory, LJnetal./ breakdown of a sngle node s suffcent to collapse the effcency of the entre system f the node s among the ones wth the largest load. [17] present a dynamc spreadng of the falures model n networked systems wth the recovery process n the network. [18] and [19] follow ths dea by takng dfferent nodes or strateges nto consderaton. In addton, many cascadng falure models have also been proposed, such as the sand ple model [20], [21], the ORNL-PSerc-Alaska (OPA) model [22] to study blackout dynamcs n the power transmsson grd. In partcular, the CASCADE model [23] s used to examne power transmsson system crtcal loadng and power tals n probablty dstrbutons of blackout sze, etc. 3. The Model In ths study the model s proposed by (Wang, Rong et al. 2008) s adopted to descrbe the complexty of emergency/dsaster management and vsualze the network-specfc spreadng process of a dsaster. Inspred by ths process of cascadng falures, the model s proposed as follow. (1).For smplcty, ntal load L of each node n the network s a functon of ts degree k and defned as: L ak (1) Where a and are tunable parameters n our study, whch control the strength of the ntal load of the node. (2).The load at the broken node s redstrbuted to ts neghborng node, accordng to the preferental probablty: ak ak m m k km m (2) where represents the set of all neghborng nodes of the broken node Accordng to the rule of (2), the addtonal load L receved by the node s proportonal to ts ntal load,.e., L k L km m (3) Meanwhle, each node n the network has a capacty threshold, whch s the maxmum flow that the node can transmt. Snce the node capacty on real-lfe networks s generally lmted by cost, t s natural to assume that the capacty C of the node s proportonal to ts ntal load for smplcty: C T L,,,,..., N. (4) where the constant T (>1) s the tolerance parameter characterzng the tolerance of the network. Because every node has a lmted capacty to handle the load, so for the node, f, L L C then the node wll be broken and nduce further the redstrbuton of the load L L and potentally further other nodes breakng. 4. Smulaton and Results 4.1 Buldng a Networked System In ths study, two networked systems are bult: a small world network and a scale free network. The algorthm for constructng the small world network s as follow: Step 1: Constructng a regular graph that has N nodes and s a nearest-neghbor couplng network. These nodes form a rng and each node connect wth K/2 nodes around ts rght and left, where K s an even number. Step 2: Randomly reconnectng the regular graph s edges wth the probablty P. That s, keepng one node of the target edge, and randomly selectng a node from the network as the other node of the edge, and every two nodes have ust one edge and every node can not be connected wth tself. The algorthm for constructng the scale free network as follow: JournalofAppledResearchandTechnology 225

4 ASmulatonStudyforEmergency/DsasterManagementbyApplyngComplexNetworksTheory, LJnetal./ Step 1: constructng a network wth m0 nodes, ths network can have no edges or be fully connected or randomly connected. Step 2: Brngng n one new node every tme, and connectng ths node wth m nodes from ths network, where m m0 The probablty for the new node connectng wth an exsted node can be expressed as k k 4.2 Attack Strateges, where k s the degree for node. Albert (2000) took two attack strateges nto consderaton for complex networks: one s falure strategy and the other s selectve attack strategy. To many real networks, such as water supply networks, gas supply networks, power supply networks, road networks and communcaton networks, an abrupt dsaster ncludes falure of nature dsasters and falure of terrorst attacks. A nature dsaster s a falure of operaton and, the destroyed nodes are selected randomly. A terrorst attack s a selectve attack and, the destroyed nodes are selected by the mportance of the node. In our study, we examne the selectve attack strategy and ntend to measure the dynamcs process of a network when t s attacked by destroyng mportant nodes, whch s mportant for emergency or dsaster management to better understand and perceve the dsaster s avalanche effect. A smulaton study s conducted to smulate such a selectve attack strategy and examne ts dynamc process. Two groups of experments are ncluded n ths study. One s to adopt the selectve attack strategy n a small world network and the other one s to adopt t n a scale free network. For these two networks, the fnal node number equals 30, whch s an approprate node number for develop a good vsualzaton effect snce the network becomes more complex and lower vsualze when the number of the node s large. The degree of the node s used to measure the mportance of the node, that s, a node wth hgher degree s more mportant. Ths actually reflects the stuaton of real networks. For example, people always consder a power staton connected wth many wres as an mportant node n the real power supply network. At the same tme, some other researchers also adopt ths rule, such as(tan, WU et al. 2006). Addtonally, the experments also show the changes of some statstcal propertes of a network when t s beng attacked, such as the degree dstrbuton, the probablty of the node degree. 4.3 Smulaton Results Fg.1 s the smulaton result for small world network that has nne sub-fgures to form a 3 by 3 matrx. The three sub-fgures n the frst row provde a dynamcal process of the network evoluton, the frst sub-fgure shows the network stuaton before an attack, the second sub-fgure shows one ntermedate stuaton of the dynamcal process when ths network s beng attacked, and the thrd sub-fgure shows the fnal stuaton of ths network when the dynamcal process has been over. Ths three fgures offer an ntutve effect about the changes of the small world network. As we know ths dynamcal process can mprove dsaster/emergency managers stuaton awareness ablty and, ths stuaton awareness s vtal for better understandng the dsaster and makng hgh-qualty decson, especally n a short tme when a dsaster has happened. The second row and thrd row present the changes of statstcal propertes of ths network. The three sub-fgures n the second row show the changes of node degree dstrbuton of the small world network. The frst sub-fgure shows the node degree dstrbuton before ths network s attacked, the second one shows the dstrbuton at one condton when t s beng attacked, and the last one shows the fnal dstrbuton. The three subfgures n the last row show the changes for node degree probablty before, when and after ths network s attacked. These changes of the statstcal propertes provde some detals of nformaton about the dynamcal process of the network evoluton. One can easly obtan the nformaton about whch node s destroyed at any tme of ths dynamcal process and how many nodes survve and the fnal connecton nformaton the network after ths process s over. 226 Vol.12,Aprl214

5 ASmulatonStudyforEmergency/DsasterManagementbyApplyngComplexNetworksTheory, LJnetal./ Fgure 1. The smulaton result for small world network. For example, t can be seen that the node 1, 2, 3, 4, 5, 8, 10 and 11 are destroyed and the node 15, 16 and 28 have the same maxmum degree and the value s 5 from the second sub-fgure of the second row. One also get the nformaton that there are ust eght nodes and the degree are 3, 2, 2, 2, 3, 4, 2 and 2 for ths eght nodes, respectvely. Fg.2 presents the smulaton results for the scale free network. It s constructed based on the same prncples adopted for Fg. 1. The frst row shows the dynamcal process of the scale free network evoluton, the second row provdes changes of node degree dstrbuton, and the thrd row offers the changes for probablty of node degree. The scale free network has the power law property for degree dstrbuton, and the frst sub-fgure n the second row shows ths property. One can get one mportant result from second row: the network always shows the power law property at any tme when ths network s attacked. Ths smulaton also can offer useful nformaton when the avalanche effect occurred whch can ncrease the effectveness of dsaster/emergency decson makng. Ths smulaton fts partcularly the stuaton when real networks own the power law property. JournalofAppledResearchandTechnology 227

6 ASmulatonStudyforEmergency/DsasterManagementbyApplyngComplexNetworksTheory, LJnetal./ Fgure 2. The smulaton results for scale free network 5. Conclusons In ths study we nvestgate the effect of complex networks theory to be used n dsaster/emergency management, especally for graspng and percevng some key characterstcs of a dsaster, whch s very mportant for decson makng n a short tme. Ths work s a novel attempt for enhancement of dsaster/emergency management. Based on the smulaton, one can conclude that the complex networks theory can help understand the dsaster by offerng vsualzed dynamcal process for the avalanche effect when a target network s beng attacked by destroyng the mportant nodes. One can obtan the useful nformaton such as whch node s destroyed at any tme of the dynamcal process, the degree dstrbuton and node degree probablty changes at any tme. One can also conclude that t s possble to apply complex networks theory to dsaster/emergency management, because complex networks theory can be used to capture and descrbe the evoluton mechansm, evoluton dscplne and overall behavor of the networks. Addtonally, we dscovery an mportant result from the smulaton: the scale free network always shows the power law property at any tme when the network s attacked. To summarze, the smulaton results shows that the complex networks theory s a powerful tool for formng stuaton awareness and percevng the spreadng of a dsaster. However, more experments should be conducted n the future study n order to further understand the complexty and other key features of a dsaster. References [1]-Munoz-Pacheco, J.M. and E. Tlelo-Cuautle, Automatc synthess of 2D-n-scrolls chaotc systems by behavoral modelng. Journal of Appled Research and Technology, (1): p Vol.12,Aprl214

7 ASmulatonStudyforEmergency/DsasterManagementbyApplyngComplexNetworksTheory, LJnetal./ [2] Vargas-Martnez, A. and L.E. Garza-Castafnon, Combnng Artfcal Intellgence and Advanced Technques n Fault-Tolerant Control. Journal of Appled Research and Technology, (2): p [3]_Argote, L., INPUT UNCERTAINTY AND ORGANIZATIONAL COORDINATION IN HOSPITAL EMERGENCY UNITS. Admnstratve Scence Quarterly, (3): p [4] Yates, D. and S. Paquette, Emergency knowledge management and socal meda technologes: A case study of the 2010 Hatan earthquake. Internatonal Journal of Informaton Management, (1): p [5]_Mano, B.S. and A.H. Baker, Communcaton challenges n emergency response. Commun. ACM, (3): p [6] Lu, Y. and D. Yang, Informaton exchange n vrtual communtes under extreme dsaster condtons. Decson Support Systems, (2): p [7] Newman, M.E.J., The Structure and Functon of Complex Networks. SIAM Revew, (2): p. 167 [8] Boccalett, S., et al., Complex networks: Structure and dynamcs. Physcs Reports-Revew Secton of Physcs Letters, (4-5): p [9] Watts, D.J. and S.H. Strogatz, Collectve dynamcs of 'small-world' networks. Nature, (6684): p [10] Albert, R. and A.L. Barabas, Statstcal mechancs of complex networks. Revews of Modern Physcs, (1): p [11] Chang, R.M., et al., A Network Perspectve of Dgtal Competton n Onlne Advertsng Industres: A Smulaton-Based Approach. Informaton Systems Research, (3): p [12] Cho, H., S.-H. Km, and J. Lee, Role of network structure and network effects n dffuson of nnovatons. Industral Marketng Management, (1): p [13] Ochoa, A., B. Bernabe, and O. Ochoa, TOWARDS A PARALLEL SYSTEM FOR DEMOGRAPHIC ZONIFICATION BASED ON COMPLEX NETWORKS. Journal of Appled Research and Technology, (2): p [14]_Randel, J.M., H.L. Pugh, and S.K. Reed, Dfferences n expert and novce stuaton awareness n naturalstc decson makng. Internatonal Journal of Human-Computer Studes, (5): p [15] Barabás, A.-L. and R. Albert, Emergence of Scalng n Random Networks. Scence, (5439): p [16] Cructt, P., V. Latora, and M. Marchor, Model for cascadng falures n complex networks. Physcal Revew E, (4): p [17] Buzna, L., K. Peters, and D. Helbng, Modellng the dynamcs of dsaster spreadng n networks. Physca A: Statstcal Mechancs and ts Applcatons, (1): p [18]_Weng, W.G., et al., Modelng the dynamcs of dsaster spreadng from key nodes n complex networks. Internatonal Journal of Modern Physcs C, (5): p [19] Ouyang, M., et al., Emergency response to dsasterstruck scale-free network wth redundant systems. Physca A: Statstcal Mechancs and ts Applcatons, (18): p [20] Olam, Z., H.J.S. Feder, and K. Chrstensen, Selforganzed crtcalty n a contnuous, nonconservatve cellular automaton modelng earthquakes. Physcal Revew Letters, (8): p [21] Goh, K.I., et al., Sandple on Scale-Free Networks. Physcal Revew Letters, (14): p [22] Carreras, B.A., et al., Crtcal ponts and transtons n an electrc power transmsson model for cascadng falure blackouts. Chaos, (4): p [23] Dobson, I., B.A. Carreras, and D.E. Newman, A LOADING-DEPENDENT MODEL OF PROBABILISTIC CASCADING FAILURE. Probablty n the Engneerng and Informatonal Scences, (01): p [24] Wang, J., et al., Attack vulnerablty of scale-free networks due to cascadng falures. Physca A: Statstcal Mechancs and ts Applcatons, (26): p [25] Albert, R.J.A.-L., Error and attack tolerance of complex networks. (cover story). Nature, (6794): p [26] TAN, Y.-., J. WU, and H.-z. DENG, Evaluaton method for node mportance based on node contracton n complex networks. Systems Engneerng-Theory & Practce, : p JournalofAppledResearchandTechnology 229

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Structure Formation of Social Network

Structure Formation of Social Network Structure Formaton of Socal Network DU Nan 1, FENG Hu 2, HUANG Zgang 3, Sally MAKI 4, WANG Ru(Ruby) 5, and ZHAO Hongxa (Melssa) 6 1 Bejng Unversty of Posts and Telecommuncatons, Chna 2 Fudan Unversty,

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

A Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI

A Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI 216 Jont Internatonal Conference on Artfcal Intellgence and Computer Engneerng (AICE 216) and Internatonal Conference on etwork and Communcaton Securty (CS 216) ISB: 978-1-6595-362-5 A Model Based on Mult-agent

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented

More information

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES

More information

Effectiveness of Information Retraction

Effectiveness of Information Retraction Effectveness of Informaton on Cndy Hu, Malk Magdon-Ismal, Mark Goldberg and Wllam A. Wallace Department of Industral and Systems Engneerng Rensselaer Polytechnc Insttute Troy, New York Emal: huc@rp.edu,

More information

Network Topologies: Analysis And Simulations

Network Topologies: Analysis And Simulations Networ Topologes: Analyss And Smulatons MARJAN STERJEV and LJUPCO KOCAREV Insttute for Nonlnear Scence Unversty of Calforna San Dego, 95 Glman Drve, La Jolla, CA 993-4 USA Abstract:-In ths paper we present

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

Using centrality measures to rank the importance of the components of a complex network infrastructure

Using centrality measures to rank the importance of the components of a complex network infrastructure Usng centralty measures to rank the mportance of the components of a complex network nfrastructure F. adn, E. Zo and. A. Petrescu Poltecnco d Mlano, partmento d Energa, Va Ponzo 34/3, -20133 Mlano, taly

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Design of Structure Optimization with APDL

Design of Structure Optimization with APDL Desgn of Structure Optmzaton wth APDL Yanyun School of Cvl Engneerng and Archtecture, East Chna Jaotong Unversty Nanchang 330013 Chna Abstract In ths paper, the desgn process of structure optmzaton wth

More information

COMPARISON OF TWO MODELS FOR HUMAN EVACUATING SIMULATION IN LARGE BUILDING SPACES. University, Beijing , China

COMPARISON OF TWO MODELS FOR HUMAN EVACUATING SIMULATION IN LARGE BUILDING SPACES. University, Beijing , China COMPARISON OF TWO MODELS FOR HUMAN EVACUATING SIMULATION IN LARGE BUILDING SPACES Bn Zhao 1, 2, He Xao 1, Yue Wang 1, Yuebao Wang 1 1 Department of Buldng Scence and Technology, Tsnghua Unversty, Bejng

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

Finite Element Analysis of Rubber Sealing Ring Resilience Behavior Qu Jia 1,a, Chen Geng 1,b and Yang Yuwei 2,c

Finite Element Analysis of Rubber Sealing Ring Resilience Behavior Qu Jia 1,a, Chen Geng 1,b and Yang Yuwei 2,c Advanced Materals Research Onlne: 03-06-3 ISSN: 66-8985, Vol. 705, pp 40-44 do:0.408/www.scentfc.net/amr.705.40 03 Trans Tech Publcatons, Swtzerland Fnte Element Analyss of Rubber Sealng Rng Reslence Behavor

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

A Growing Network Model with High Hub Connectivity and Tunable Clustering Coefficient

A Growing Network Model with High Hub Connectivity and Tunable Clustering Coefficient Manuscrpt receved Aug. 23, 2007; revsed ov. 29, 2007 A Growng etwork Model wth Hgh Hub Connectvty and Tunable Clusterng Coeffcent YIHJIA TSAI, PIG-A HSIAO Department of Computer Scence and Informaton Engneerng

More information

Electrical analysis of light-weight, triangular weave reflector antennas

Electrical analysis of light-weight, triangular weave reflector antennas Electrcal analyss of lght-weght, trangular weave reflector antennas Knud Pontoppdan TICRA Laederstraede 34 DK-121 Copenhagen K Denmark Emal: kp@tcra.com INTRODUCTION The new lght-weght reflector antenna

More information

An Improved Image Segmentation Algorithm Based on the Otsu Method

An Improved Image Segmentation Algorithm Based on the Otsu Method 3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,

More information

Cascaded failures in weighted networks

Cascaded failures in weighted networks Cascaded falures n weghted networks aharan Mrzasoleman, Mahmoudreza abae, Mahd Jall *, and MohammadAl Safar Abstract Many technologcal networks mght experence random and/or systematc falures n ther components.

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Growth model for complex networks with hierarchical and modular structures

Growth model for complex networks with hierarchical and modular structures Growth model for complex networks wth herarchcal and modular structures Q Xuan, Yanjun L,* and Te-Jun Wu Natonal Laboratory of Industral Control Technology, Insttute of Intellgent Systems & Decson Makng,

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Resource Discovery in P2P Networks Using Evolutionary Neural Networks

Resource Discovery in P2P Networks Using Evolutionary Neural Networks > PAPER IDENTIFICATION NUMBER: 067-04 < Resource Dscovery n P2P Networks Usng Evolutonary Neural Networks Mkko A. VAPA, Nko P. KOTILAINEN, Annemar K. AUVINEN, Hekk M. KAINULAINEN, and Jarkko T. VUORI Abstract--

More information

Professional competences training path for an e-commerce major, based on the ISM method

Professional competences training path for an e-commerce major, based on the ISM method World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng

More information

Study on Properties of Traffic Flow on Bus Transport Networks

Study on Properties of Traffic Flow on Bus Transport Networks Study on Propertes of Traffc Flow on Bus Transport Networks XU-HUA YANG, JIU-QIANG ZHAO, GUANG CHEN, AND YOU-YU DONG College of Computer Scence and Technology Zhejang Unversty of Technology Hangzhou, 310023,

More information

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT 3. - 5. 5., Brno, Czech Republc, EU APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT Abstract Josef TOŠENOVSKÝ ) Lenka MONSPORTOVÁ ) Flp TOŠENOVSKÝ

More information

A fair buffer allocation scheme

A fair buffer allocation scheme A far buffer allocaton scheme Juha Henanen and Kalev Klkk Telecom Fnland P.O. Box 228, SF-330 Tampere, Fnland E-mal: juha.henanen@tele.f Abstract An approprate servce for data traffc n ATM networks requres

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Imperialist Competitive Algorithm with Variable Parameters to Determine the Global Minimum of Functions with Several Arguments

Imperialist Competitive Algorithm with Variable Parameters to Determine the Global Minimum of Functions with Several Arguments Fourth Internatonal Conference Modellng and Development of Intellgent Systems October 8 - November, 05 Lucan Blaga Unversty Sbu - Romana Imperalst Compettve Algorthm wth Varable Parameters to Determne

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks 2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng

More information

A Low Energy Algorithm of Wireless Sensor Networks Based on Fractal Dimension

A Low Energy Algorithm of Wireless Sensor Networks Based on Fractal Dimension Sensors & Transducers 2014 by IFSA Publshng, S. L. http://www.sensorsportal.com A Low Energy Algorthm of Wreless Sensor Networks ased on Fractal Dmenson Tng Dong, Chunxao Fan, Zhgang Wen School of Electronc

More information

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm , pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,

More information

Study of Data Stream Clustering Based on Bio-inspired Model

Study of Data Stream Clustering Based on Bio-inspired Model , pp.412-418 http://dx.do.org/10.14257/astl.2014.53.86 Study of Data Stream lusterng Based on Bo-nspred Model Yngme L, Mn L, Jngbo Shao, Gaoyang Wang ollege of omputer Scence and Informaton Engneerng,

More information

Learning-Based Top-N Selection Query Evaluation over Relational Databases

Learning-Based Top-N Selection Query Evaluation over Relational Databases Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **

More information

DESIGN OF A HAPTIC DEVICE FOR EXCAVATOR EQUIPPED WITH CRUSHER

DESIGN OF A HAPTIC DEVICE FOR EXCAVATOR EQUIPPED WITH CRUSHER DESIGN OF A HAPTIC DEVICE FOR EXCAVATOR EQUIPPED WITH CRUSHER Kyeong Won Oh, Dongnam Km Korea Unversty, Graduate School 5Ga-1, Anam-Dong, Sungbuk-Gu, Seoul, Korea {locosk, smleast}@korea.ac.kr Jong-Hyup

More information

Optimal connection strategies in one- and two-dimensional associative memory models

Optimal connection strategies in one- and two-dimensional associative memory models Optmal connecton strateges n one- and two-dmensonal assocatve memory models Lee Calcraft, Rod Adams, and Nel Davey School of Computer Scence, Unversty of Hertfordshre College lane, Hatfeld, Hertfordshre

More information

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School

More information

3D Virtual Eyeglass Frames Modeling from Multiple Camera Image Data Based on the GFFD Deformation Method

3D Virtual Eyeglass Frames Modeling from Multiple Camera Image Data Based on the GFFD Deformation Method NICOGRAPH Internatonal 2012, pp. 114-119 3D Vrtual Eyeglass Frames Modelng from Multple Camera Image Data Based on the GFFD Deformaton Method Norak Tamura, Somsangouane Sngthemphone and Katsuhro Ktama

More information

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor

More information

A new segmentation algorithm for medical volume image based on K-means clustering

A new segmentation algorithm for medical volume image based on K-means clustering Avalable onlne www.jocpr.com Journal of Chemcal and harmaceutcal Research, 2013, 5(12):113-117 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCRC5 A new segmentaton algorthm for medcal volume mage based

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

DYNAMIC NETWORK OF CONCEPTS FROM WEB-PUBLICATIONS

DYNAMIC NETWORK OF CONCEPTS FROM WEB-PUBLICATIONS DYNAMIC NETWORK OF CONCEPTS FROM WEB-PUBLICATIONS Lande D.V. (dwl@vst.net), IC «ELVISTI», NTUU «KPI» Snarsk A.A. (asnarsk@gmal.com), NTUU «KPI» The network, the nodes of whch are concepts (people's names,

More information

Future Generation Computer Systems

Future Generation Computer Systems Future Generaton Computer Systems 29 (2013) 1631 1644 Contents lsts avalable at ScVerse ScenceDrect Future Generaton Computer Systems journal homepage: www.elsever.com/locate/fgcs Gosspng for resource

More information

An Internal Clustering Validation Index for Boolean Data

An Internal Clustering Validation Index for Boolean Data BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 16, No 6 Specal ssue wth selecton of extended papers from 6th Internatonal Conference on Logstc, Informatcs and Servce Scence

More information

A Distributed Dynamic Bandwidth Allocation Algorithm in EPON

A Distributed Dynamic Bandwidth Allocation Algorithm in EPON www.ccsenet.org/mas Modern Appled Scence Vol. 4, o. 7; July 2010 A Dstrbuted Dynamc Bandwdth Allocaton Algorthm n EPO Feng Cao, Demng Lu, Mnmng Zhang, Kang Yang & Ynbo Qan School of Optoelectronc Scence

More information

Research of Modeling Complex Topology on Internet MIFUBA BABA SERGE 1 and Ye XU 1,a,*

Research of Modeling Complex Topology on Internet MIFUBA BABA SERGE 1 and Ye XU 1,a,* 2017 Internatonal Conference on Electronc and Informaton Technology (ICEIT 2017) ISBN: 978-1-60595-526-1 Research of Modelng Complex Topology on Internet MIFUBA BABA SERGE 1 and Ye XU 1,a,* 1 College of

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Boundary Condition Simulation for Structural Local Refined Modeling Using Genetic Algorithm

Boundary Condition Simulation for Structural Local Refined Modeling Using Genetic Algorithm 2016 Internatonal Conference on Artfcal Intellgence: Technques and Applcatons (AITA 2016) ISBN: 978-1-60595-389-2 Boundary Condton Smulaton for Structural Local Refned Modelng Usng Genetc Algorthm Zhong

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES

VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES UbCC 2011, Volume 6, 5002981-x manuscrpts OPEN ACCES UbCC Journal ISSN 1992-8424 www.ubcc.org VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

An Algorithm for Weighted Positive Influence Dominating Set Based on Learning Automata

An Algorithm for Weighted Positive Influence Dominating Set Based on Learning Automata 4 th Internatonal Conference on Knowledge-Based Engneerng and Innovaton (KBEI-2017) Dec. 22 th, 2017 (Iran Unversty of Scence and Technology) Tehran, Iran An Algorthm for Weghted Postve Influence Domnatng

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

MODULE DESIGN BASED ON INTERFACE INTEGRATION TO MAXIMIZE PRODUCT VARIETY AND MINIMIZE FAMILY COST

MODULE DESIGN BASED ON INTERFACE INTEGRATION TO MAXIMIZE PRODUCT VARIETY AND MINIMIZE FAMILY COST INTERNATIONAL CONFERENCE ON ENGINEERING DESIGN, ICED 07 28-31 AUGUST 2007, CITE DES SCIENCES ET DE L'INDUSTRIE, PARIS, FRANCE MODULE DESIGN BASED ON INTERFACE INTEGRATION TO MAIMIZE PRODUCT VARIETY AND

More information

Gateway Algorithm for Fair Bandwidth Sharing

Gateway Algorithm for Fair Bandwidth Sharing Algorm for Far Bandwd Sharng We Y, Rupnder Makkar, Ioanns Lambadars Department of System and Computer Engneerng Carleton Unversty 5 Colonel By Dr., Ottawa, ON KS 5B6, Canada {wy, rup, oanns}@sce.carleton.ca

More information