Effectiveness of Information Retraction

Size: px
Start display at page:

Download "Effectiveness of Information Retraction"

Transcription

1 Effectveness of Informaton on Cndy Hu, Malk Magdon-Ismal, Mark Goldberg and Wllam A. Wallace Department of Industral and Systems Engneerng Rensselaer Polytechnc Insttute Troy, New York Emal: Department of Computer Scence Rensselaer Polytechnc Insttute Troy, New York Emal: Abstract In ths work, we study the effectveness of nformaton retracton n stuatons where nformaton beng spread requres recpents to make a decson or take an acton. Consder the scenaro where nformaton s ntroduced nto a network, advsng recpents to take an acton. If at a later tme, the nformaton s found to be naccurate and the acton s unnecessary, t becomes a concern to cease the nformaton from spreadng any further and stop people from takng the acton. The spread of naccurate nformaton can lead to confuson and mstrust, and therefore t s mportant to be able to quckly mpede or retract naccurate nformaton, f needed to at a later tme. We nvestgate the dea of ntroducng counter messages nto a network to nterfere wth an ongong dffuson and stop the acton that was prescrbed by the prevous messages. These counter messages are dffusve themselves and may spread through the network based on the recpent s evaluaton of the nformaton. We present an emprcal framework for modelng the spread of actonable nformaton and nformaton retracton. Usng the framework, we perform prelmnary experments to nvestgate strateges for broadcastng the counter message, n partcular, how to dentfy ndvduals that should receve the counter message drectly from the nformaton source. There s a trade off between a fast effectve spread of actonable nformaton and the ablty to retract the nformaton. Fndngs also suggest that alternate strateges wll have to be explored to ncorporate group structures and the dstrbuton of trust n desgnng a useful abort mechansm. Index Terms agent-based smulaton, nformaton dffuson, nformaton retracton, socal networks I. INTRODUCTION Consder the scenaro where nformaton s ntroduced nto a network, advsng recpents to take an acton. If at a later tme, the nformaton s found to be naccurate and the acton s unnecessary, t becomes a concern to cease the nformaton from spreadng any further and stop people from takng the acton. The spread of naccurate nformaton can lead to confuson and mstrust, and therefore t s mportant to be able to quckly mpede or retract naccurate nformaton, f needed to at a later tme. We nvestgate the dea of ntroducng counter messages nto a network to nterfere wth an ongong dffuson and stop the acton that was prescrbed by the prevous messages. These counter messages are dffusve themselves and may spread through the network based on the recpent s evaluaton of the nformaton. The nterest of ths study s to compare the spread of the actonable nformaton wth the spread of the counter messages. We present an emprcal framework for modelng the spread of actonable nformaton and counter messages. The nature n whch peces of nformaton spread and how ndvduals evaluate the nformaton would depend on the characterstcs of the nformaton and the understandng of the context. II. RELATED WORK Whether the case s to prevent dsease spreads, protect computer networks from vruses, or control the spread of bad gossp or nformaton, a common goal s to acheve the best possble mmunzaton effect wth the mnmum amount of necessary resources. The assumpton s that resources, e.g. vaccnaton, ant-vrus software, advertsement target, can be costly and lmted. Much lterature looks at mmunzaton strateges for epdemcs on socal networks as well as vruses on computer networks. In both contexts, there s a vrus or dsease s beng spread n a network and the mmunzaton strategy s mnmze the spread of the vrus or dsease by mmunzng certan nodes n the network. Immunzaton strateges focus on selectng whch nodes to mmune, to prevent the spread of dsease n varous complex network structures. The selecton of nodes to vaccnate are often determned from a statc network structure and s often done before the vrus or dsease spread occurs [], [2], [3]. Some research also consdered the case where the mmunzaton and the vrus or dsease spread through the network concurrently [4], [5]. Related research have also looked at ths problem as the spread of competng nformaton n networks, where there s a good campagn (mmunzaton) and a bad campagn (vrus). Budak et al. [6] nvestgated the problem of lmtng the spread of msnformaton by fndng optmal methods for dssemnatng good nformaton. The authors looked at dentfyng a subset of ndvduals n the network that needs to be convnced to adopt a good nformaton campagn so that the number of ndvduals that adopt the bad nformaton campagn s mnmzed.

2 III. EXPERIMENTAL FRAMEWORK Frst, we descrbe a dffuson framework for smulatng the spread of actonable nformaton and counter messages through a network. The purpose of the counter message s to nterfere wth an ongong dffuson and to stop the acton that was prescrbed earler. To avod confuson, the message beng dffused wll be referred to as the Acton message. The acton assocated wth the Acton message s to spread the nformaton and leave the network after a perod of tme,.e. ndvdual may remove themselves from the network. The counter message wll be referred to as the Abort message. The acton assocated wth the Abort message s to not leave the network. A. Dffuson model The dffuson model defnes how nformaton flows through the socal network and how ndvdual nodes process the nformaton from ncomng messages and determne ther behavors. The messages are ntroduced through external source nodes. Each message s classfed nto one of two types: Acton or Abort and s characterzed by a source-value par (S, V ), whch specfes the orgnal source and a correspondng nformaton value. The messages are propagated when nodes nteract and the nformaton value of the message may change as t s pass from node to node. When the message s passed from a sender to a recpent, the nformaton value of the message at the recpent s a functon of the socal relatonshp between the sender the recpent. We model ths by placng a trust weght on the edge whch defnes the lkelhood that a message wll be beleved as t s passed from one node to another. ) Informaton propagaton: If (S, V ) s a source-value par at node a whch s propagated to node b then the source-value par at node b s (S, α(a, b) V ), where α(a, b) < s the propagaton loss from a to b, quantfed by the socal relatonshp between nodes a and b. Each node has an Acton set and an Abort set. The Acton set contans the source-value pars (S, V )... for messages relatng to message type Acton whle the Abort set stores the messages (S, V )... relatng to Abort. At the end of each tme step, each node wll merge all of the nformaton they receved and update ther propertes based on the fused nformaton value. The process n whch nformaton s fused s descrbed by the followng steps. 2) Informaton fuson: The frst step s to combne the nformaton values of messages that orgnated from the same source. For each message type, when the same source appears n multple messages, the combned nformaton value for that source at the recever node s at least the maxmum of the nformaton values for the source over all the messages and at most the sum of all the nformaton values of the source. The next step s to combne the fused nformaton value at the node for each type of message,.e. the Acton messages n the Acton set are fused nto one value, Acton fused and the Abort messages n the Abort set are fused nto one value, Abort f used. For each type of message, we combne the nformaton values from each source by takng a weghted convex combnaton of the sum and maxmum of the values accordng to a parameter λ, where λ [, ]. Suppose that node k has source-value pars (S k, V k ), (S k 2, V k 2 ),... for message type Acton and (S k, V k ), (S2 k, V2 k ),... for message type Abort then the fused nformaton value at node k s computed as follows: Acton fused k = λ. Smlarly, V k + ( λ) max V k () Abort fused k = λ (V k ) + ( λ ) max(v k ) (2). The last step s to merge the fused values of the Acton messages wth the fused values of the Abort messages to determne a total fused value. For any node k, we compute the nformaton fused value fused k by takng the dfference between ts Acton message fused value and ts Abort fused value. fused k = Acton fused k Abort fused k, fused k R (3) 3) Node states and behavor: After computng the fused nformaton value, the node wll determne ts state and behavor based on whether the nformaton value exceeds certan thresholds. Intally, all the nodes are Unnformed. When nodes become exposed to nformaton, they can enter nto one of three states: Dsbeleved, Undecded, or Beleved. Each node has two thresholds, a lower bound LB and an upper bound UB such that LB UB (4) Dependng on whch threshold ts fused nformaton value exceeds, the node would undertake a state change: If fused k > UB, then the node wll enter Beleved state. If LB < fused k < UB, then node wll enter Undecded state. If fused k < LB, then node wll enter Dsbeleved state. Each node state has a correspondng behavor as descrbed n Table I. Snce Abort nformaton s also dffusve, t s possble for a Dsbeleved node to take the acton of propagatng Abort nformaton. We ntroduce a σ threshold, where σ <= LB, that determnes whether the Dsbeleved node wll perform such an acton. If Acton fused Abort fused <= σ, then the node wll spread Abort nformaton. Otherwse, the node wll exhbt no acton. If σ =, then the node would requre that ts Abort fused value to be at least as large as the Acton fused value, n order to spread the Abort nformaton. If σ <, then the node wll need more Abort nformaton than Acton nformaton before t s wllng to propagate the nformaton. If < σ <= LB, then the node s more eager to spread the Abort nformaton. In addton to spreadng nformaton, nodes may also seek nformaton. A node n Undecded state wll query ts neghbors n the network for addtonal nformaton. Snce there

3 State Descrpton Behavor Unnformed Node has not receved any messages No acton Dsbeleved Node has receved an Acton message but does not No acton beleve the message Dsbeleved Node has receved an Abort message and possbly an If fused k < σ then spread Abort message to ts Acton message neghbors, else no acton Undecded Node has receved an Acton message, or receved Query neghbors n the network both Acton and Abort messages, and s uncertan of what to do Beleved Node has receved an Acton message, or receved both Acton and Abort messages, and beleves the Spread the Acton message to ts neghbors and s removed from the network after x tme steps value of the Acton message Removed Node s no longer n the network No acton TABLE I DESCRIPTION OF NODE STATES AND CORRESPONDING BEHAVIORS are two types of messages, t s necessary to defne what nformaton s requested when a node queres ther neghbors and what nformaton ther neghbors wll share. When the Undecded node queres for nformaton, they wll request for any pece of nformaton that s avalable from ther neghbors, regardless of ther own message sets. When the quered node receves a request for nformaton, they wll determne what messages to share based on ther node state and send the message set wth some probablty p. If the quered node s Unnformed, then nothng s sent or receved Dsbeleved, then only Abort set s sent Undecded, then both Acton set and Abort set are sent Beleved, then only the Acton set Removed, then nothng s sent or receved. B. Prelmnary experments The followng experments looks at the the effect of the followng parameters on the effectveness of the abort dffuson. ) Seed selecton for broadcastng Abort nformaton, and 2) Dstrbuton of trust values on the edges n the network. In these set of experments, there are two sources of Acton nformaton and two sources of Abort nformaton. The followng assumptons are made. The ntal broadcast of Acton messages reaches s = 2, seed nodes. The subsequent broadcast of Abort messages also reaches s = 2, seed nodes. The seeds are dvded equally among the sources. The Acton and Abort messages from the sources wll reach all ther recpents wth probablty =..The nodes n the network have the same trust n the sources for both Acton nformaton and Abort nformaton and the nformaton value of Acton nformaton s the same as Abort nformaton,.e. same mportance. Unless otherwse specfed, the node parameters are lsted below. Informaton fuson parameters for Acton set and Abort set: λ =. and λ 2 = Nodes threshold (LB =, UB = ) Edge probablty (p=5) Threshold for spreadng Abort nformaton: sgma =. Tme steps between enterng Beleved state and Removed state (5) Tme steps for spreadng Abort () When a node enters Beleved state, t wll contact ther neghborng nodes and try to spread the Acton nformaton for 5 tme steps. If they reman n Beleved state for the entre duraton, they wll then be removed from the network and enter Removed state. When the node s removed, all the ncomng and outgong edges from the node are removed as well. Note that t s possble for a Beleved node to receve Abort nformaton and change to an Undecded or Dsbeleved state. If ths occurs and the node enters Beleved state at a future tme step, the node wll once agan spread Acton nformaton for 5 tme steps. The experments smulate the dffuson process of Acton and Abort nformaton on a random group model network wth, nodes and densty.4. The random group model conssts of two groups of equal szes, where the edge probablty between nodes from dfferent groups s p d and the edge probablty between nodes from the same group s p s = 2 p d. IV. EXPERIMENTAL RESULTS AND DISCUSSION In analyzng the expermental results, we compare the followng the followng two cases. Frst, we smulate the spread of the Acton messages and record the proporton of nodes that, enter Removed state,.e. depart the network, for each network structure and model confguratons. Next, we smulate the spread of Acton messages followed by Abort messages and record the proporton of nodes that depart the network. We compare the two proportons to evaluate the effectveness of the spread of Abort nformaton. A. Seed selecton for broadcastng Abort nformaton One strategy s to perform a retracton where the Abort messages are delvered to the same set of nodes that ntally receved the Acton messages. In ths case, the Abort nformaton tres to catch up to the Acton nformaton to stop the spread. Another strategy s to select a dfferent set of nodes to propagate the Abort nformaton, ether randomly or targeted, e.g. hghest degree nodes. In these experments, the same number of nodes are selected for broadcastng Acton messages as well as Abort messages. Fgure shows the smulaton results usng varous seedng strateges for Acton and Abort nformaton on the group

4 Proporton of Evacuated Nodes Proporton Proporton of Evacuated of Evacuated Nodes Nodes. Acton_ Acton Tme step Acton_Domnatng Abort message was Set broadcast Acton_Independent Acton Acton Tme step Abort message was broadcast Tme step Abort message was broadcast Proporton of Evacuated Nodes Proporton Proporton of Evacuated of Evacuated Nodes Nodes. Acton_ Acton Tme step Abort Acton_K message center was broadcast Acton_Modfed Acton Acton Tme step Abort message was broadcast Tme step Abort message was broadcast Fg.. Smulaton results Group model network. Average trust of the network s. Trust n source s and the nformaton value of the messages s 5. model network. The red lne dsplays the proporton of evacuated nodes as the result of the dffuson of the Acton nformaton and serves as the benchmark for comparson for the presented seed selecton strateges. The results show that under these confguratons, a retracton s only effectve f the Abort messages are broadcast soon after the Acton nformaton. The trust n the nformaton source s relatvely hgh and the nformaton value of Acton messages s also hgh. Along wth the predefned node thresholds, the fused value of the nformaton at the seed node wll easly exceed the upper bound threshold and the selected seeds nodes would enter Beleved state upon recevng the Acton message broadcast drectly from the source and mmedately propagate the Acton nformaton. The Abort message becomes neffectve f t s delvered at tme step 7 or later. The more effectve the Acton dffuson s the more dffcult t s to retract the spread. In most of the cases, broadcastng the Abort nformaton after 2 tme steps s most effectve n mnmzng the number of evacuated nodes when the messages are sent to the set of nodes wth hghest degrees. However, when the Acton nformaton spreads from hghest degree nodes, sendng Abort nformaton s randomly selected nodes s more effectve n mmunzng the Acton messages. B. Dstrbuton of trust and Effects of Groups The followng experments looks at the effects of the dstrbuton of trust and groups n the model for the varous seedng strateges. The trust values between nodes are assgned dependng on the sender and recever s socal group membershp and the average trust of the network t avg s kept constant. Hgh trust s defned wth the value t hgh = t avg + ɛ and low trust wth value t low = t avg ɛ, where ɛ s the trust dfferental from the average trust t avg. Here, ɛ s equal to.5. The followng two scenaros are compared. In the frst scenaro, nodes have equal trust n each other. There are essentally no groups and no dfferences n trust between nodes,.e. ɛ = and t hgh = t low = t avg. In the second scenaro, edges connectng nodes who belong to the same group have wth a hgher trust value of t hgh and edges between nodes from dfferent groups have a lower trust value of t low. Proporton of Evacuated Nodes. Acton_ Equal trust Tme step of Abort message broadcast Proporton of Evacuated Nodes Hgher trust n same group Tme step of Abort message broadcast Fg. 2. Smulaton results for the Group model network where the Acton messages are broadcast to hghest degree nodes. Average trust of the network was. Trust n source s 5 and the nformaton values of the Acton and Abort messages are 5 Proporton of Evacuated Nodes. Acton_ Equal trust Tme step of Abort message broadcast Proporton of Evacuated Nodes Hgher trust n same group Tme step of Abort message broadcast Fg. 3. Smulaton results for the Group model network where the Acton messages are broadcast to hghest degree nodes. Average trust of the network was 5. Trust n source s and the nformaton values of the Acton and Abort messages are 5. We look at the effects of the dstrbuton of trust and groups n the model for two contexts. In the frst context, when the Acton message s propagated from the nformaton source, the fused value of the nformaton just about exceeds the node s upper bound threshold. The seed nodes wll enter Beleved state upon recevng the Acton nformaton drectly from the nformaton source. In the second context, seed nodes wll entered Undecded state upon recevng the Acton nformaton drectly from the nformaton sources. Smulaton results for the two contexts are shown n Fgures 2 and 3. The Acton nformaton s broadcast to the set of nodes wth hghest degrees. The green lne dsplays the results of the retracton, where Abort messages are broadcast to the same hghest degree nodes. The blue lne dsplays the case where Abort messages are broadcast to a random set of nodes. An nterestng observaton s that n these settngs, the retracton strategy for spreadng Abort nformaton s effectve n the equal trust scenaro but not as effectve n the hgher trust n same group scenaro. V. CONCLUSION AND FUTURE WORK The prelmnary experments presented some nterestng observatons. The Abort message should be sent out as soon as possble after the Acton message n order for the Abort nformaton to have any effect n the network. In addton, the Abort message must have characterstcs so that t wll dffuse more rapdly than the Acton message, e.g. hgh nformaton value. However, ths mples that there s a tradeoff between a

5 rapd spread of the Acton message and the possble need to Abort because of new nformaton. If the Acton nformaton spreads so effectvely through the network and changes the structure of the network,.e. large proportons of nodes are removed from the network, t would make an Abort stuaton very dffcult and possbly neffectve. The experments also showed that for the case of spreadng hgh valued nformaton from hgh trusted sources, retracton s only effectve f Abort messages are broadcast soon after the Acton nformaton. Afterwards, an alternatve strategy s needed for sendng Abort nformaton. Under other crcumstances, when the fused value of the nformaton only slghtly exceeds the node s threshold to act, retracton s stll a possble strategy n a network wth homogeneous trust. However, when we ntroduce trust dfferentals and groups, retracton s no longer a useful mechansm. Ths suggests that alternate strateges wll have to be explored to ncorporate trust varants and the dstrbuton of trust n desgnng a useful mechansm for spreadng Abort messages. ACKNOWLEDGMENT Ths materal s based upon work sponsored by the Army Research Laboratory and was accomplshed under Cooperatve Agreement Number W9NF The vews and conclusons contaned n ths document are those of the authors and should not be nterpreted as representng the offcal polces, ether expressed or mpled, of the Army Research Laboratory or the U.S. Government. The U.S. Government s authorzed to reproduce and dstrbute reprnts for Government purposes notwthstandng any copyrght notaton here on. REFERENCES [] R. Cohen, S. Havln, and D. ben Avraham, Effcent mmunaton strateges for computer networks and populatons, Physcal Revew Letters, vol. 9, no. 24, 23. [2] Z. Dezső and A.-L. Barabás, Haltng vruses n scale-free networks, Phys. Rev. E, vol. 65, no. 5, p. 553, May 22. [3] R. Pastor-Satorras and A. Vespgnan, Immunzaton of complex networks, Phys. Rev. E, vol. 65, no. 3, p. 364, Feb 22. [4] L. Chen and K. Carley, The mpact of countermeasure propagaton on the prevalence of computer vruses, IEEE Trans. on Systems, Man, and Cybernetcs - Part B: Cybernetcs, vol. 34, no. 2, pp , 24. [5] H.-H. Jo, H.-T. Moon, and S. K. Baek, Immunzaton dynamcs on a 2-layer network model, Physca A: Statstcal Mechancs and ts Applcatons, vol. 36, no. 2, pp , March 26. [6] C. Budak, D. Agrawal, and A. E. Abbad, Lmtng the spread of msnformaton n socal networks, Department of Computer. Scence, UCSB, Tech. Rep., 2.

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

SAO: A Stream Index for Answering Linear Optimization Queries

SAO: A Stream Index for Answering Linear Optimization Queries SAO: A Stream Index for Answerng near Optmzaton Queres Gang uo Kun-ung Wu Phlp S. Yu IBM T.J. Watson Research Center {luog, klwu, psyu}@us.bm.com Abstract near optmzaton queres retreve the top-k tuples

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Avoiding congestion through dynamic load control

Avoiding congestion through dynamic load control Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

A Topology-aware Random Walk

A Topology-aware Random Walk A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble

More information

Application of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling

Application of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling , pp.40-45 http://dx.do.org/10.14257/astl.2017.143.08 Applcaton of Improved Fsh Swarm Algorthm n Cloud Computng Resource Schedulng Yu Lu, Fangtao Lu School of Informaton Engneerng, Chongqng Vocatonal Insttute

More information

Future Generation Computer Systems

Future Generation Computer Systems Future Generaton Computer Systems 29 (2013) 1631 1644 Contents lsts avalable at ScVerse ScenceDrect Future Generaton Computer Systems journal homepage: www.elsever.com/locate/fgcs Gosspng for resource

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT 3. - 5. 5., Brno, Czech Republc, EU APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT Abstract Josef TOŠENOVSKÝ ) Lenka MONSPORTOVÁ ) Flp TOŠENOVSKÝ

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Fusion Performance Model for Distributed Tracking and Classification

Fusion Performance Model for Distributed Tracking and Classification Fuson Performance Model for Dstrbuted rackng and Classfcaton K.C. Chang and Yng Song Dept. of SEOR, School of I&E George Mason Unversty FAIRFAX, VA kchang@gmu.edu Martn Lggns Verdan Systems Dvson, Inc.

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Backpropagation: In Search of Performance Parameters

Backpropagation: In Search of Performance Parameters Bacpropagaton: In Search of Performance Parameters ANIL KUMAR ENUMULAPALLY, LINGGUO BU, and KHOSROW KAIKHAH, Ph.D. Computer Scence Department Texas State Unversty-San Marcos San Marcos, TX-78666 USA ae049@txstate.edu,

More information

Parameter estimation for incomplete bivariate longitudinal data in clinical trials

Parameter estimation for incomplete bivariate longitudinal data in clinical trials Parameter estmaton for ncomplete bvarate longtudnal data n clncal trals Naum M. Khutoryansky Novo Nordsk Pharmaceutcals, Inc., Prnceton, NJ ABSTRACT Bvarate models are useful when analyzng longtudnal data

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

UB at GeoCLEF Department of Geography Abstract

UB at GeoCLEF Department of Geography   Abstract UB at GeoCLEF 2006 Mguel E. Ruz (1), Stuart Shapro (2), June Abbas (1), Slva B. Southwck (1) and Davd Mark (3) State Unversty of New York at Buffalo (1) Department of Lbrary and Informaton Studes (2) Department

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

DYNAMIC NETWORK OF CONCEPTS FROM WEB-PUBLICATIONS

DYNAMIC NETWORK OF CONCEPTS FROM WEB-PUBLICATIONS DYNAMIC NETWORK OF CONCEPTS FROM WEB-PUBLICATIONS Lande D.V. (dwl@vst.net), IC «ELVISTI», NTUU «KPI» Snarsk A.A. (asnarsk@gmal.com), NTUU «KPI» The network, the nodes of whch are concepts (people's names,

More information

EVALUATION OF THE PERFORMANCES OF ARTIFICIAL BEE COLONY AND INVASIVE WEED OPTIMIZATION ALGORITHMS ON THE MODIFIED BENCHMARK FUNCTIONS

EVALUATION OF THE PERFORMANCES OF ARTIFICIAL BEE COLONY AND INVASIVE WEED OPTIMIZATION ALGORITHMS ON THE MODIFIED BENCHMARK FUNCTIONS Academc Research Internatonal ISS-L: 3-9553, ISS: 3-9944 Vol., o. 3, May 0 EVALUATIO OF THE PERFORMACES OF ARTIFICIAL BEE COLOY AD IVASIVE WEED OPTIMIZATIO ALGORITHMS O THE MODIFIED BECHMARK FUCTIOS Dlay

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

A Background Subtraction for a Vision-based User Interface *

A Background Subtraction for a Vision-based User Interface * A Background Subtracton for a Vson-based User Interface * Dongpyo Hong and Woontack Woo KJIST U-VR Lab. {dhon wwoo}@kjst.ac.kr Abstract In ths paper, we propose a robust and effcent background subtracton

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Learning-Based Top-N Selection Query Evaluation over Relational Databases

Learning-Based Top-N Selection Query Evaluation over Relational Databases Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,

More information

Identifying Top-k Most Influential Nodes by using the Topological Diffusion Models in the Complex Networks

Identifying Top-k Most Influential Nodes by using the Topological Diffusion Models in the Complex Networks (IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, Vol. 8, No., 07 Identfyng Top-k Most Influental Nodes by usng the Topologcal Dffuson Models n the Complex Networks Maryam Padar,

More information

Optimal Workload-based Weighted Wavelet Synopses

Optimal Workload-based Weighted Wavelet Synopses Optmal Workload-based Weghted Wavelet Synopses Yoss Matas School of Computer Scence Tel Avv Unversty Tel Avv 69978, Israel matas@tau.ac.l Danel Urel School of Computer Scence Tel Avv Unversty Tel Avv 69978,

More information

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated.

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated. Some Advanced SP Tools 1. umulatve Sum ontrol (usum) hart For the data shown n Table 9-1, the x chart can be generated. However, the shft taken place at sample #21 s not apparent. 92 For ths set samples,

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors Optmal Fault-Tolerant Routng n Hypercubes Usng Extended Safety Vectors Je Wu Department of Computer Scence and Engneerng Florda Atlantc Unversty Boca Raton, FL 3343 Feng Gao, Zhongcheng L, and Ynghua Mn

More information

3D vector computer graphics

3D vector computer graphics 3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres

More information

Growth model for complex networks with hierarchical and modular structures

Growth model for complex networks with hierarchical and modular structures Growth model for complex networks wth herarchcal and modular structures Q Xuan, Yanjun L,* and Te-Jun Wu Natonal Laboratory of Industral Control Technology, Insttute of Intellgent Systems & Decson Makng,

More information

Application of Maximum Entropy Markov Models on the Protein Secondary Structure Predictions

Application of Maximum Entropy Markov Models on the Protein Secondary Structure Predictions Applcaton of Maxmum Entropy Markov Models on the Proten Secondary Structure Predctons Yohan Km Department of Chemstry and Bochemstry Unversty of Calforna, San Dego La Jolla, CA 92093 ykm@ucsd.edu Abstract

More information

Hierarchical clustering for gene expression data analysis

Hierarchical clustering for gene expression data analysis Herarchcal clusterng for gene expresson data analyss Gorgo Valentn e-mal: valentn@ds.unm.t Clusterng of Mcroarray Data. Clusterng of gene expresson profles (rows) => dscovery of co-regulated and functonally

More information

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Biostatistics 615/815

Biostatistics 615/815 The E-M Algorthm Bostatstcs 615/815 Lecture 17 Last Lecture: The Smplex Method General method for optmzaton Makes few assumptons about functon Crawls towards mnmum Some recommendatons Multple startng ponts

More information

Network Topologies: Analysis And Simulations

Network Topologies: Analysis And Simulations Networ Topologes: Analyss And Smulatons MARJAN STERJEV and LJUPCO KOCAREV Insttute for Nonlnear Scence Unversty of Calforna San Dego, 95 Glman Drve, La Jolla, CA 993-4 USA Abstract:-In ths paper we present

More information

Comparison of Heuristics for Scheduling Independent Tasks on Heterogeneous Distributed Environments

Comparison of Heuristics for Scheduling Independent Tasks on Heterogeneous Distributed Environments Comparson of Heurstcs for Schedulng Independent Tasks on Heterogeneous Dstrbuted Envronments Hesam Izakan¹, Ath Abraham², Senor Member, IEEE, Václav Snášel³ ¹ Islamc Azad Unversty, Ramsar Branch, Ramsar,

More information

Heterogeneity in Vulnerable Hosts Slows Down Worm Propagation

Heterogeneity in Vulnerable Hosts Slows Down Worm Propagation Heterogenety n Vulnerable Hosts Slows Down Worm Propagaton Zesheng Chen and Chao Chen Department of Engneerng Indana Unversty - Purdue Unversty Fort Wayne, Indana 4685 Emal: {zchen, chen}@engr.pfw.edu

More information

Quantifying Responsiveness of TCP Aggregates by Using Direct Sequence Spread Spectrum CDMA and Its Application in Congestion Control

Quantifying Responsiveness of TCP Aggregates by Using Direct Sequence Spread Spectrum CDMA and Its Application in Congestion Control Quantfyng Responsveness of TCP Aggregates by Usng Drect Sequence Spread Spectrum CDMA and Its Applcaton n Congeston Control Mehd Kalantar Department of Electrcal and Computer Engneerng Unversty of Maryland,

More information

Report on On-line Graph Coloring

Report on On-line Graph Coloring 2003 Fall Semester Comp 670K Onlne Algorthm Report on LO Yuet Me (00086365) cndylo@ust.hk Abstract Onlne algorthm deals wth data that has no future nformaton. Lots of examples demonstrate that onlne algorthm

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

EECS 730 Introduction to Bioinformatics Sequence Alignment. Luke Huan Electrical Engineering and Computer Science

EECS 730 Introduction to Bioinformatics Sequence Alignment. Luke Huan Electrical Engineering and Computer Science EECS 730 Introducton to Bonformatcs Sequence Algnment Luke Huan Electrcal Engneerng and Computer Scence http://people.eecs.ku.edu/~huan/ HMM Π s a set of states Transton Probabltes a kl Pr( l 1 k Probablty

More information

F Geometric Mean Graphs

F Geometric Mean Graphs Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 2 (December 2015), pp. 937-952 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) F Geometrc Mean Graphs A.

More information

A Simulation Study for Emergency/Disaster Management by Applying Complex Networks Theory

A Simulation Study for Emergency/Disaster Management by Applying Complex Networks Theory A Smulaton Study for Emergency/Dsaster Management by Applyng Complex Networks Theory L Jn 1, Wang Jong 2 *, Da Yang 3, Wu Huapng 4 and Dong We 5 1,4 Earthquake Admnstraton of Guangdong Provnce Key Laboratory

More information

Simulation: Solving Dynamic Models ABE 5646 Week 11 Chapter 2, Spring 2010

Simulation: Solving Dynamic Models ABE 5646 Week 11 Chapter 2, Spring 2010 Smulaton: Solvng Dynamc Models ABE 5646 Week Chapter 2, Sprng 200 Week Descrpton Readng Materal Mar 5- Mar 9 Evaluatng [Crop] Models Comparng a model wth data - Graphcal, errors - Measures of agreement

More information

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087

More information

11. HARMS How To: CSV Import

11. HARMS How To: CSV Import and Rsk System 11. How To: CSV Import Preparng the spreadsheet for CSV Import Refer to the spreadsheet template to ad algnng spreadsheet columns wth Data Felds. The spreadsheet s shown n the Appendx, an

More information

Dynamic Camera Assignment and Handoff

Dynamic Camera Assignment and Handoff 12 Dynamc Camera Assgnment and Handoff Br Bhanu and Ymng L 12.1 Introducton...338 12.2 Techncal Approach...339 12.2.1 Motvaton and Problem Formulaton...339 12.2.2 Game Theoretc Framework...339 12.2.2.1

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

OPTIMIZATION OF FUZZY RULE BASES USING CONTINUOUS ANT COLONY SYSTEM

OPTIMIZATION OF FUZZY RULE BASES USING CONTINUOUS ANT COLONY SYSTEM Proceedng of the Frst Internatonal Conference on Modelng, Smulaton and Appled Optmzaton, Sharah, U.A.E. February -3, 005 OPTIMIZATION OF FUZZY RULE BASES USING CONTINUOUS ANT COLONY SYSTEM Had Nobahar

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

A Growing Network Model with High Hub Connectivity and Tunable Clustering Coefficient

A Growing Network Model with High Hub Connectivity and Tunable Clustering Coefficient Manuscrpt receved Aug. 23, 2007; revsed ov. 29, 2007 A Growng etwork Model wth Hgh Hub Connectvty and Tunable Clusterng Coeffcent YIHJIA TSAI, PIG-A HSIAO Department of Computer Scence and Informaton Engneerng

More information

PASSENGER FLOW ANALYSIS FOR TRAIN RESCHEDULING AND ITS EVALUTION

PASSENGER FLOW ANALYSIS FOR TRAIN RESCHEDULING AND ITS EVALUTION * * * Internatonal Symposum on Speed-up, Safety and Servce Technology for Ralway and Maglev Systems 009 (STECH 09) 009.6.6-9 Ngata JAAN ASSENGER FOW ANAYSIS FOR TRAIN RESCHEDUING AND ITS EVAUTION Shunch

More information

MULTIHOP wireless networks are a paradigm in wireless

MULTIHOP wireless networks are a paradigm in wireless 400 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 17, NO. 1, JANUARY 2018 Toward Optmal Dstrbuted Node Schedulng n a Multhop Wreless Network Through Local Votng Dmtros J. Vergados, Member, IEEE, Natala

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Integrated Congestion-Control Mechanism in Optical Burst Switching Networks

Integrated Congestion-Control Mechanism in Optical Burst Switching Networks Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subect matter experts for publcaton n the IEEE GLOBECOM 2005 proceedngs Integrated Congeston-Control Mechansm n Optcal Burst

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

PRÉSENTATIONS DE PROJETS

PRÉSENTATIONS DE PROJETS PRÉSENTATIONS DE PROJETS Rex Onlne (V. Atanasu) What s Rex? Rex s an onlne browser for collectons of wrtten documents [1]. Asde ths core functon t has however many other applcatons that make t nterestng

More information

REFRACTIVE INDEX SELECTION FOR POWDER MIXTURES

REFRACTIVE INDEX SELECTION FOR POWDER MIXTURES REFRACTIVE INDEX SELECTION FOR POWDER MIXTURES Laser dffracton s one of the most wdely used methods for partcle sze analyss of mcron and submcron sze powders and dspersons. It s quck and easy and provdes

More information

Optimized caching in systems with heterogeneous client populations

Optimized caching in systems with heterogeneous client populations Performance Evaluaton 42 (2000) 163 185 Optmzed cachng n systems wth heterogeneous clent populatons Derek L. Eager a,, Mchael C. Ferrs b, Mary K. Vernon b a Department of Computer Scence, Unversty of Saskatchewan,

More information

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm , pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information