arxiv: v1 [physics.soc-ph] 17 Oct 2013
|
|
- Laura Stephany Harrell
- 5 years ago
- Views:
Transcription
1 Emergene of Blind Area in Information Sreading arxiv:131707v1 [hyi.o-h] 17 Ot 2013 Zi-Ke Zhang 1,2,, Chu-Xu Zhang 1,3,, Xiao-Pu Han 1,2 and Chuang Liu 1,2 1 Intitute of Information Eonomy, Hangzhou Normal Univerity, Hangzhou, Peole eubli of China 2 Alibaba eearh Center for Comlexity Siene, Hangzhou Normal Univerity, Hangzhou, Peole eubli of China 3 Web Siene Center, Univerity of Eletroni Siene and Tehnology of China, Chengdu, Peole eubli of China Thee author ontributed equally to thi work liuhuang@hznu.edu.n Abtrat. eently, ontagion-baed (dieae, information, et.) reading on oial network ha been extenively tudied. In thi aer, other than traditional full interation, we rooe a artial interation baed reading model, onidering that the informed individual would tranmit information to only a ertain fration of their neighbor due to the tranmiion ability in real-world oial network. Simulation reult on three rereentative network (,, ) indiate that the reading effiieny i highly orrelated with the network heterogeneity. In addition, a eial henomenon, namely Information Blind Area where the network i earated by everal information-unreahable luter, will emerge from the reading roe. Furthermore, we alo find that the ize ditribution of uh information blind area obey ower-law-like ditribution, whih ha very imilar exonent with that of ite erolation. Detailed analye how that the ritial value i dereaing along with the network heterogeneity for the reading roe, whih i omlete the ontrary to that of random eletion. Moreover, the ritial value in the latter roe i alo larger than that of the former for the ame network. Thoe finding might hed ome light in in-deth undertanding the effet of network roertie on information reading.
2 Emergene of Blind Area in Information Sreading 2 1. Introdution With the advent of variou online Soial Networking Servie (SNS), the diemination of information through Internet, alo known a word-of-mouth or eer-to-eer reading, ha attrated muh attention for reearher in reent year [?,?]. Following the raid develoment of databae tehnology and omutational ower, variou reading henomena on large-ale oial network, uh a the new [?], rumor [?,?], innovation [?], behavior [?,?], ulture [?], viral marketing [?], et, an now be deely tudied in term of theoretial model a well a emirial analye. Generally, the information reading dynami i uually tudied under the framework of eidemi reading [?]. Therefore, in many tudie, the roe of information diffuion i regraded equally a the dieae roagation, whih inform agent to tranmit information to their neighbor via oial onnetion [?]. Among them, the Suetible-Infeted-eovered (SI) model i the mot ommonly ued method to deribe the information reading roe, where individual would loe interet of further ontribution due to a variety of le reditable fator, whih i very imilar to the tate of the SI model in eidemi reading. The interlay between the reading dynami and network truture i a key inight in the tudy on network reading dynami [?,?]. The network truture affet both the reading eed and revalene through feature uh a the hortet ath length, degree ditribution, degree orrelation, and o on. In addition, the uer bound of informed roortion i roved to be aroximate to 80% for the SI model on random network when the oulation ize i infinite [?]. Previou work have alo revealed that there indeed exit a roagation threhold of information reading on the mall-world network [?,?], and the reading i muh fater and broader than that on regular network for the exitene of the long-range edge[?]. Moreno et al. [?,?] tudied the rumor reading on ale-free network, and found that the exitene of hub node an enhane the reading eed rather than the influened oe. eently, there i a vat la of tudie fouing on the reading dynami on interonneted network [?], and there i a mixed hae below the ritial infetion trength in weakly ouled network [?]. Furthermore, ome intereting henomena are diovered baed on the information diffuion on real oial ytem, uh a the telehone interation [?,?], tweet [?,?] and [?]. Emirial reult indiate that the human ative attern [?,?] and the role of weak tie [?] would trongly affet the information reading. However, there are alo lenty of reearhe arguing that the underlying mehanim of information diffuion hould be fundamentally different from that of eidemi reading. Lü et al. [?] ummarized the ignifiant differene between them, and onluded that the information, by onidering the oial enhanement, would read more effetively in regular network than that in random network. Thi would to ome extent uort the real human exeriment reorted by Centola [?]. Mot theoretial model aumed that the informed agent would tranmit the information to all their neighbor [?,?] or jut one randomly hoen neighbor [?] in one ingle time te.
3 Emergene of Blind Area in Information Sreading 3 However, ine aing meage along would take a ereived tranmiion ot [?] in real oietie, the diffuion target would be eleted among individual with otential interet [?]. Thu, the information flow would travel through oial onnetion thereby deending on the roertie of oberved network [?]. In thi aer, we rooe a theoretial model with onidering the effet of artial interation, where the number of interated neighbor i in roortion to the reader degree. Simulation reult how that the reading roe erolate on all three laial network (, and network), whih i quite imilar with the ite erolation in tatitial hyi [?]. In addition, it i oberved that the erolation eak later on network than other two network, whih ould be regarded a a good exlanation of why information an read more widely on network. Furthermore, it i alo atonihing to find that the ize ditribution of unreahable luter, namely the Information Blind Area, exhibit the ower-law roerty with exonent γ = 2.9, whih i the univeral henomenon in the ommunity ditribution [?,?]. 2. The Model In thi aer, we onider a yntheti network G(N,E), where N i the number of node and E i the number of link, rereenting the individual and their interation, reetively. Analogou with the SI model, every individual would be and only be at one of the three following tate during the roe of information reading, Uninformed (S). The individual ha not yet reeived the information, and i analogou to the uetible tate of the SI model; Informed (I). The individual i aware of the information but ha not tranmitted it, and i analogou to the infeted tate in the SI model; Exhauted (). After tranmitting the information, the individual will robably loe interet and no longer tranmit it, thu i analogou to the reovered tate of the SI model. Subequently, we are mainly intereted in the effet of artial interation. That i to ay, eah infeted node, o-alled reader [?], will only influene a ertain fration of it neighbor. Thu, the model an be deribed a follow. Initially, one arbitrary node i randomly iked a the Information Seed (I-tate) and the ret remain uninformed (S-tate). Then, the eed will tranmit information to α fration of it neighbor and then beome exhauted (-tate), where α [0, 1]; For imliity, we aume that all individual fully trut their oial onnetion. Conequently, eah individual will arove it reader information one he reeive it; After aroval, he beome an informed individual or a reader (I-tate), and will tranmit the information to all α fration of her neighbor and beome exhauted (-tate);
4 Emergene of Blind Area in Information Sreading 4 The above roe will reeat until there i no individual tranmitting the information any more. In thi model, the oular individual (node with large degree) tend to interat with more neighbor when they arove the information. However, ine there i tranmiion ot in the reading roe [?], that i to ay, individual would not be able to interat with all their own neighbour. Therefore, we rooe a tunable arameter α [0, 1], rereenting the interation trength. Thu, the number of neighbor, αk, will be informed i roortional to the reader degree k, negleting the neighbor tate. And the robability of eah neighbor of being eleted i 1 at eah k round, and the reeating eletion i rohibited. Figure 1 how the rooed reading rule. By etting α=, the informed node I 1 an only tranmit information to three neighbor, two uninformed node S 1, S 3 and one exhauted node 1. Therefore, The reent rule imlie a different feature of information reading, Partial Interation, whih i uually negleted in the tandard SI model and it variant for information reading. In addition, the immediate influene in the reent model orreond to the two arameter in traditional SI model, the infeted robability β and the reovered robability µ, are both equal to one in the rooed model. S 1 1 I 1 S 2 I 2 S 3 Figure 1. (Color online) Illutration of the reading rule in the rooed model with three uninformed node, S 1, S 2 and S 3, two informed node I 1 and I 2, and one exhauted node 1. Eah of them ha the ame robability 1 5 to reeive information from the informed node I 1 at eah round. When α=, only αk=3 node, e.g. S 1, S 3 and 1, will reeive information. To better invetigate the effet of the reent model, we erform analye on three kind of network: (i) network [?]: a random grah where N node onneted by E edge whih are hoen randomly from all the N(N 1)/2 oible edge; (ii) network [?]: a growing network where eah newly added node onnet to m old node by referential attahment mehanim; (iii) network [?]: andomly rehuffle link of a regular network with robability γ and reult in the mall-world network. A a onequene, we generate orreonding, and network with the ame
5 Emergene of Blind Area in Information Sreading 5 network ize N=10000, m=3, γ=0.5 and the average degree k =6. In addition, to alleviate the effet of randomly eleting the reading eed, all imulation reult are obtained by averaging over 1000 indeendent realization. 3. eult and Analyi 3.1. Exhauted ate Denote P() a the fration of exhauted node to the network ize, obviouly, larger P() at the table tate indiate broader information reading, and vie vere. To determine how the introdued arameter α affet the reading reult, we tart our analyi from oberving the relationhi between P() and α. Figure 2 how that, for all the three network, P() i monotonially inreaing with α, uggeting a oitive orrelation P() and α. A a onequene, in the following, we will ue P() intead of α to give omrehenive diuion. P() Figure 2. (Color online) The ratio of exhauted node P() a a funtion of α for three oberved network. Figure 3 reort the model reult. In Figure 3a, it how the dynami of P() on three different network with the fixed arameter α = It an be een that network yield the mot effiient reading a the larget P() at the table tate, while network exhibit the narrowet reading, and network tay moderately. Thi reult agree with reviou tudie [?]. In addition, the inet how the dynami differene of P() between two ontinuou time te, denoted a P() = P( t+1 ) P( t ), whih an be onidered a the reading eed. It indiate that information read fater at it initial tage while low down at later time te due to the influene of hub node. From the degree ditribution of Figure 3,
6 Emergene of Blind Area in Information Sreading 6 it an be een that network i ouied by more large-degree node than other two. Therefore, information reading on network i the fatet while lowet on network. Aording to the artial interation in the reent model, informed agent tranmit information to only a ertain fration of their neighbor. Conequently, there would be alo ome uninformed individual remaining without reeiving any new beaue they are urrounded by exhauted neighbor (ee Figure 4). Conidering that the reading roe may influene differently to different tye of node, we oberve the relationhi between exhauted rate P( k ) and node degree k of three network at the table tate (ee Figure 3b), where P( k ) i the ratio of the total number of exhauted node with degree k to the overall number of node with degree k. It learly how that P( k ) and k are aarently oitively orrelated, and node with maller degree have le robability to reeive information. Furthermore, Figure 3 dilay the degree ditribution of three network. In general, network how the owerlaw degree ditribution where mot node are of low degree but till a few hub node exit due to the rih-get-riher mehanim. Poion degree ditribution emerge in network beaue of urely random attahment. Comaratively, mot node in have moderate degree and only a few mall and large degree node (but le than thoe in network), reulting from the rewiring roe. In a word, the generally different fration of hub node (Figure 3) and different reading effet on different tye of node (Figure 3b) uort the reult of Figure 3a from the eretive of truture and funtion, reetively. P() P() t t (a) P( k ) k (b) (k) k () Figure 3. (Color online) The dynami of reading on three network. (a) Exhauted ratep()aafuntionofimulationtime. Ineti P()athefuntionofimulation time; (b) Exhauted rate a a funtion of the node degree; () Degree ditribution of three network in log-log ale. The arameter α i et to 0.35 for (a) and (b) Information Blind Area A an be een from Figure 3a, the exhauted rate i alway le than 1, uggeting that ome node will never be informed during the whole reading roe. Seifially, in
7 Emergene of Blind Area in Information Sreading 7 thi aer, we name the region onit of uh unreahable node a the Information Blind Area. Atually, Suh blind area emerge regularly due to the reading roe. Figure 4 how two tyial kind of information blind area. One i omoed by a ingle unformed node urrounded by exhauted neighbor and thu it ould not reeive new. A hown in Figure 4a, the uninformed node S 1 i enveloed by three exhauted node 1, 2 and 3, who would neither diretly tranmit information to S 1 nor allow the informed agent to ontat S 1. The other one i omoed of multile uninformed node onneted with eah other and urrounded together by exhauted node. Thu, the information will never be tranmitted to uh a luter a no ath i available. A hown infigure 4b, three uninformed node, S 1, S 2 and S 3, omoe a onneted luter whih i urrounded by five exhauted node, 1, 2, 3, 4 and 5. Sine no ingle uniformed node in thi luter an ae the outide information world, they have to aively kee blind for the reading information. 1 2 S 1 3 (a) 1 2 S 1 S S 3 (b) 4 Figure 4. (Color online) Illutration of two tyial kind of information blind area: (a) one ingle-node ae; and (b) examle of multile node. In order to deribe thoe two kind of information blind area more learly, we ondut exeriment with N=100 and k =6. Figure 5 how the viualization reult on the three rereentative network. It an be een that mot uninformed individual at table tate (Figure 5a, 5d, 5g) are generally mall-degree one, whih i onitent with reviou analyi in Setion 3.1. In addition, we alo how the two information blind area. The ingle-node ae i dilayed in Figure 5b, Figure 5e, Figure 5h. In Figure 5b, the uninformed individual #66 i urrounded by exhauted neighbor #7,
8 Emergene of Blind Area in Information Sreading 8 #10, #36, #71, #75 and #83. A a onequene, node #66 i revented from hearing new by it neighbor. Figure 5e and Figure 5h are imilar to that of Figure 5b. On the other hand, Figure 5, 5f, and 5i reort the information blind area of multi-node ae on, and network, reetively. A hown in Figure 5, three uninformed individual #49, #86 and #97 omoe a onneted luter, whih i urrounded by exhauted individual #1, #4, #7, #17, #18, #35, and #61. Therefore, all the node in thi relatively large area will not be informed and kee blind to read information. Similar henomena an alo be diovered in Figure 5f and Figure 5i on and network, reetively Sale-free Effet In thi etion, we hall exlain how uh blind area emerge from the eretive of ite erolation. Generally, in a tyial ite erolation ytem, eah node in the given network would be at one of two given tate: emty with robability or ouied with robability 1, and all the edge onneting with emty node are ut off. Previou tudie have roved that the ite erolation ytem would dilay a hae tranition henomenon from onneted hae to dionneted hae when grow to a ritial oint [?]. At thi oint, the behavior of the ratio of giant luter ize (the larget onneted luter) r g (r g = N g /N, where N g i the ize of the giant luter) indiate the network udden diintegration, and the aling ditribution of onneted luter would emerge [?,?,?,?,?]. Figure 6a-6 reetively how how r g hange aording to different, a well a the ritial oint (ee inet) in three different network (, and SW network) with the ame network ize N= Note that, the role of the emty node in ite erolation i quite imilar with that of the -tate individual in the reent model, where the information blind area are divided by thoe individual. Analogou with oberving the giant luter in ite erolation, we onequently alulate the ratio of the larget blind area ize r (r = N /N, where N i the ize of the larget information blind area) for variou exhautedrate [0,1]. ThereultarehowninFigure6d-6f,wheretheurveexhibit a very imilar trend with that of r g. In addition, we numerially alulate the threhold of both and, aording to the eak of the relative variane of the ize ditribution. We denote it by χ = N2 N 2 N, where N i the ize of eah onneted luter exet the giant one [?], for it would reult in large flutuation when or aroahe the ritial oint, and the inet of Figure 6a-6f how the orreonding reult. Furthermore, in different network (, and SW), we find good agreement between the ize ditribution of onneted luter and information blind area of the two reetive mode. Figure 6g-6i how that the ditribution of the onneted luter ize of the two model are oinident with almot the ame exonent -2.9 at their reetive ritial oint, indiating that they have very imilar ritial henomena. Deite thoe imilar roertie, we hould not regard the reent model a an equivalent roe a the ite erolation. One ignifiant differene between them
9 Emergene of Blind Area in Information Sreading 9 Figure 5. (Color online) Viualization of information blind area reulted from deigned exeriment. Yellow and blue irle rereent the uninformed and exhauted node, reetively. The ize of eah node i roortional to it degree. In addition, (a-) are the reult on network; (d-f) are the reult on network; (g-i) are the reult on network. i that, the node tate are hanged aording to the diffuion roe baed on the given network truture in the reading model, while the ite erolation roe only randomly label the node tate regardle of the network truture. Therefore, the ritial oint exhibit very differently for the two model. In the inet of Figure 6a-6, the ritial value follow > > for the ite erolation, while a omletely ooite equene for the rooed model a hown in the inet of Figure 6d-6f (that i < < ). For the random labeling roe, the more heterogeneou the
10 Emergene of Blind Area in Information Sreading 10 r g r () (a) (d) =5 0 =0.72 loe=-2.9 g (g) r g r () (b) 0 (e) =3 =0.78 loe=-2.9 g (h) r g r () () (f) g =1 =0 0 loe=-2.9 (i) Figure 6. (Color online) Comarion between the reent model and the ite erolation ytem. (a-) The relationhi between the ize of giant luter and emty robability. Inet how χ veru, and the eak i the ritial oint ; (d-f) The relationhi between the ize of the larget information blind area and the exhauted rate.inet how hi veru, and the eak i the ritial oint ; (g-i) The ize ditribution of onneted luter of the two model. network i, the larger the ritial oint will be, a there are more mall-degree node when eah one i treated equally. On the ontrary, if there exit ome large-degree node dominating the network enter, meage an be eaily read out via thoe ore node, hene the ritial oint will be maller for uh large heterogeneou network in the diffuion roe. Similar tatement an alo be alied in illutrating that, for the ame network, the ritial value of the interation model i alway maller than that of ite erolation, e.g. >, > and >. In a word, although the ite erolation rinile an not be fully rojeted to reading dynami, it till rovide a romiing and veratile tool to exlain the ritial henomenon of the emergene of
11 Emergene of Blind Area in Information Sreading 11 blind area in information reading. 4. Conluion & Diuion In thi aer, we have alied the artial interation effet in the laial SI model where three tye of node tate are onidered: (1) Uninformed (S); (2) Informed (I); (3) Exhauted (). Subequently, we adot it in an information reading enario, where the interation trength i roortional to eah reader degree. Numerial exeriment how that there i a learly oitive relationhi between the interation trength and final overage of reading. In addition, we find that the reading effet i highly influened by the network truture. One intereting roerty will reult from the reading roe, where the network i divided into everal informationunreahable area, namely Information Blind Area. Analyi reveal that a hae tranition of uh blind area ize ditribution will emerge when the fration of -tate individual grow to a ertain ritial oint. In ite of quite imilar reult from ite erolation analyi, detailed exeriment how that the diffuion roe i ignifiantly different from random eletion. Further numerial analye on three rereentative network (, and ) demontrate that, for the reading roe, the more heterogeneou the network i, the maller the ritial oint will be. By ontrat, the random labeling roe of ite erolation i omletely ooite. Moreover, the ritial value of network-baed diffuion i maller than that of urely random eletion. Thoe finding an be regarded a additional exlanation why mall-world network yield the mot effiient information/edemi reading in reviou tudie [?,?]. eently, the reearh of both ontagion-baed reading model and aliation ha attrated more and more attention [?,?]. Numerial reult in thi aer demontrate that, due to the variou network truture, there are alway unreahable individual. Human ommuniation attern analyi [?,?] would be a romiing method to hel in undertanding how to lighten the Dark Corner. In addition, ativation of Long-tail individual and rodut would alo enhane the effiieny of Information Filtering [?] in the era of big data to olve the old-tart dilemma [?,?]. Aknowledgment Thi work wa artially uorted by the National Natural Siene Foundation of China (Grant No , , , and ), the Zhejiang Provinial Natural Siene Foundation of China (Grant No. LY12A05003 and LQ13F030015), the EU FP7 Grant (rojet GOWTHCOM), the tart-u foundation and Pandeng rojet of Hangzhou Normal Univerity. eferene
Description of Traffic in ATM Networks by the First Erlang Formula
5th International Conferene on Information Tehnology and Appliation (ICITA 8) Deription of Traffi in ATM Network by the Firt Erlang Formula Erik Chromý, Matej Kavaký and Ivan Baroňák Abtrat In the paper
More informationKINEMATIC ANALYSIS OF VARIOUS ROBOT CONFIGURATIONS
International Reearh Journal of Engineering and Tehnology (IRJET) e-in: 39-6 Volume: 4 Iue: May -7 www.irjet.net p-in: 39-7 KINEMATI ANALYI OF VARIOU ROBOT ONFIGURATION Game R. U., Davkhare A. A., Pakhale..
More informationECE-320 Lab 2: Root Locus For Controller Design
ECE-320 Lab 2: Root Locu For Controller Deign In thi Lab you will exlore the ue of the root locu technique in deigning controller. The root locu indicate the oible location of the cloed loo ole of a ytem
More informationSoft Output Decoding Algorithm for Turbo Codes Implementation in Mobile Wi-Max Environment.
Available online at www.ciencedirect.com Procedia Technology 6 (202 ) 666 673 2nd International Conference on Communication, Comuting & Security [ICCCS-202] Soft Outut Decoding Algorithm for Turbo Code
More informationLecture 14: Minimum Spanning Tree I
COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce
More informationPERFORMANCE EVALUATION ISSUES OF QUERY PROCESSING THROUGH CLIENT SERVER ARCHITECTURE
Manih Srivatava et al./ International Journal of Comuter Science & Engineering Technology (IJCSET) PERFORMANCE EVALUATION ISSUES OF QUERY PROCESSING THROUGH CLIENT SERVER ARCHITECTURE Mr. Manih Srivatava
More informationShortest Paths in Directed Graphs
Shortet Path in Direted Graph Jonathan Turner January, 0 Thi note i adapted from Data Struture and Network Algorithm y Tarjan. Let G = (V, E) e a direted graph and let length e a real-valued funtion on
More informationEfficient Large-scale Content Distribution with Combination of CDN and P2P Networks
Vol.2, No.2, Aril, 2009 Efficient Large-cale Content Ditribution with Combination of CDN and P2P Network Hai Jiang 1, 2, Jun Li 1, Zhongcheng Li 1, and Xiangyu Bai 1, 2 1 Intitute of Comuting Technology,
More informationPerformance Evaluation of Content Distribution in Hybrid CDN-P2P Network
2008 Second International Conference on Future Generation Communication and Networking Performance Evaluation of Content Ditribution in Hybrid CDN-P2P Network Hai Jiang 1, 2, Jun Li 1, Zhongcheng Li 1,
More informationMacrohomogenous Li-Ion-Battery Modeling - Strengths and Limitations
Marohomogenou Li-Ion-Battery Modeling - Strength and Limitation Marku Lindner Chritian Wieer Adam Opel AG Sope Purpoe of the reearh: undertand and quantify impat of implifiation in marohomogeneou model
More informationA Service with Bounded Degradation in Quality-of-Service. Networks. University of Virginia. Charlottesville, VA 22903
To Aear: Proc. IEEE Infocom'95, Boton, Aril 1995. A Service with Bounded Degradation in Quality-of-Service Network Jorg Liebeherr Dongwei Liao Deartment of Comuter Science Univerity of Virginia Charlotteville,
More informationPruning Game Tree by Rollouts
Pruning Game Tree by Rollout Bojun Huang Mirooft Reearh bojhuang@mirooft.om Abtrat In thi paper we how that the α-β algorithm and it ueor MT-SSS*, a two lai minimax earh algorithm, an be implemented a
More informationRelayer Selection Strategies in Cellular Networks with Peer-to-Peer Relaying
Relayer Seletion Strategie in Cellular Network with Peer-to-Peer Relaying V. Sreng, H. Yanikomeroglu, and D. D. Faloner Broadband Communiation and Wirele Sytem (BCWS) Centre Dept. of Sytem and Computer
More informationPerformance Evaluation of TCP Implementations in OBS Networks
Performance Evaluation of TCP Imlementation in OB Network iang Yu y, Chunming Qiao y, Yong Liu Λ and Don Towley Λ y Deartment of Comuter cience and Engineering, tate Univerity of New York at Buffalo Λ
More informationResearch on Target Detection based on moving Image
International Journal of Science Vol.5 No.4 018 ISSN: 1813-4890 Reearch on Target Detection baed on moving Image Feiyan Wu 1, Xianwen Liao 1 Guangxi College and Univeritie Key Laboratory of Profeional
More informationHomework 4 Due Thursday Oct 7. CLRS 12-4 (number of binary trees) CLRS (rb insert implementation)
Homework 4 Due Thurday Oct 7 CLRS 12-4 (number of binary tree) CLRS 13.3-6 (rb inert imlementation) 1 Chater 13: Red-Black Tree A red-black tree i a node-colored BST. Each node i colored either black or
More informationBias Error Reduction of Digital Image Correlation Based on Kernel
Vol.81 (CST 15),.16- htt://dx.doi.org/1.1457/astl.15.81.4 Bias Error Redution of Digital Image Correlation Based on Kernel Huan Shen 1,, eize Zhang 1, and Xiang Shen 1 Energy and ower College, anjing Uniersity
More informationDeterministic Access for DSRC/802.11p Vehicular Safety Communication
eterminiti Ae for SRC/802.11p Vehiular Safety Communiation Jihene Rezgui, Soumaya Cheraoui, Omar Charoun INTERLAB Reearh Laboratory Univerité de Sherbrooe, Canada {jihene.rezgui, oumaya.heraoui, omar.haroun
More informationKinematic design of a double wishbone type front suspension mechanism using multi-objective optimization
5 th utralaian Congre on pplied Mehani, CM 2007 10-12 Deember 2007, Bribane, utralia Kinemati deign of a double wihbone tpe front upenion mehanim uing multi-objetive optimiation J. S. wang 1, S. R. Kim
More information1. Introduction. Abstract
Automati Ontology Derivation Uing Clutering for Image Claifiation 1 Latifur Khan and Lei Wang Department of Computer Siene Univerity of Texa at Dalla, TX 75083-0688 Email: [lkhan, leiwang]@utdalla.edu
More informationMAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc
MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic
More informationTransactions on the Multiversion B + -Tree
Tranaction on the Multiverion B + -Tree Tuukka Haaaalo Helinki Univerity of Technology Eoo, Finland thaaaa@c.hut.fi Seo Siu Univerity of Helinki Helinki, Finland iu@c.helinki.fi Ibrahim Jaluta Helinki
More informationISSN (Online), Volume 1, Special Issue 2(ICITET 15), March 2015 International Journal of Innovative Trends and Emerging Technologies
International Journal of Innovative Trend and Emerging Tehnologie ROBUST SCAN TECHNIQUE FOR SECURED AES AGAINST DIFFERENTIAL CRYPTANALYSIS BASED SIDE CHANNEL ATTACK A.TAMILARASAN 1, MR.A.ANBARASAN 2 1
More informationApproximate Labeling via the Primal-Dual Schema
Aroximate Labeling via the Primal-Dual Shema Nikos Komodakis and Georgios Tziritas Tehnial Reort CSD-TR-2005-01 February 1, 2005 Aroximate Labeling via the Primal-Dual Shema Nikos Komodakis and Georgios
More informationPerformance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks
Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity
More informationModeling of communication complexity in parallel computing
American Journal of Netork and Communication 2014; 3(5-1): 29-42 Publihed online July 30, 2014 (htt://.cienceublihinggrou.com/j/ajnc) doi: 10.11648/j.ajnc..2014030501.13 ISSN: 2326-893X (Print); ISSN:
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two
More informationIncorporating Speculative Execution into Scheduling of Control-flow Intensive Behavioral Descriptions
Inorporating Speulative Exeution into Sheduling of Control-flow Intenive Behavioral Deription Ganeh Lakhminarayana, Anand Raghunathan, and Niraj K. Jha Dept. of Eletrial Engineering C&C Reearh Laboratorie
More informationA Generic Model for Diagram Syntax and Semantics
A Generic Model for Diagram Syntax and Semantic BRTHOLD HOMANN Univerität Bremen MARK MINAS Univerität rlangen In thi extended abtract, we recall how the yntax of diagram i catured by the diagram editor
More informationMinimum congestion spanning trees in bipartite and random graphs
Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu
More informationRouting Definition 4.1
4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing
More informationCOURSEWORK 1 FOR INF2B: FINDING THE DISTANCE OF CLOSEST PAIRS OF POINTS ISSUED: 9FEBRUARY 2017
COURSEWORK 1 FOR INF2B: FINDING THE DISTANCE OF CLOSEST PAIRS OF POINTS ISSUED: 9FEBRUARY 2017 Submiion Deadline: The ourework onit of two part (of a different nature) relating to one problem. A hown below
More informationUniversität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.
Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut
More informationarxiv: v3 [cs.db] 8 Oct 2016
Non-hierarchical Structure: How to Model and Index Overla? Faegheh Haibi Norwegian Univerity of Science and Technology faeghehh@idi.ntnu.no Svein Erik Bratberg Norwegian Univerity of Science and Technology
More informationCombined Radix-10 and Radix-16 Division Unit
Combined adix- and adix-6 Diviion Unit Tomá ang and Alberto Nannarelli Dept. of Eletrial Engineering and Computer Siene, Univerity of California, Irvine, USA Dept. of Informati & Math. Modelling, Tehnial
More informationA SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS
A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt
More informationParametric Micro-level Performance Models for Parallel Computing
Computer Siene Tehnial Report Computer Siene 12-5-1994 Parametri Miro-level Performane Model for Parallel Computing Youngtae Kim Iowa State Univerity Mark Fienup Iowa State Univerity Jeffrey S. Clary Iowa
More informationEfficient Image Alignment with Outlier Rejection
ffiient Image Alignment with Outlier Rejetion Takahiro Ihikawa, Iain Matthew, and Simon aker CMU-RI-TR-02-27 Otober 31, 2002 Abtrat Image alignment i one of the mot widely ued tehnique in omuter viion.
More informationLaboratory Exercise 2
Laoratory Exercie Numer and Diplay Thi i an exercie in deigning cominational circuit that can perform inary-to-decimal numer converion and inary-coded-decimal (BCD) addition. Part I We wih to diplay on
More information1 The secretary problem
Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.
More informationAn Evolutionary Multiple Heuristic with Genetic Local Search for Solving TSP
An Evolutionary Multiple Heuriti with Geneti Loal Searh for Solving TSP Peng Gang Ihiro Iimura 2 and Shigeru Nakayama 3 Department of Information and Computer Siene Faulty of Engineering Kagohima Univerity
More informationTopics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X
Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term
More informationA note on degenerate and spectrally degenerate graphs
A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove
More informationInverse Kinematics 1 1/29/2018
Invere Kinemati 1 Invere Kinemati 2 given the poe of the end effetor, find the joint variable that produe the end effetor poe for a -joint robot, given find 1 o R T 3 2 1,,,,, q q q q q q RPP + Spherial
More informationDelaunay Triangulation: Incremental Construction
Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )
More informationScatterometry from crossed grating structures in different configurations
Scatterometry from croed grating tructure in different configuration Thoma Schuter a, Stehan Rafler a, Wolfgang Oten a, Peter Reinig b, Thoma Hingt b a Intitut fuer Techniche Otik, Pfaffenwaldring 9, 70569
More informationA Study on Turbo Code Performance Based on AWGN Channel
Proceeding of the 2nd International Conference on Comuter Science and Electronic Engineering (ICCSEE 2013 A Study on Turbo Code Performance Baed on AWGN Channel Peng Zhu, Jun Zhu, iang Liu Key Laboratory
More informationPerformance analysis of hybrid (M/M/1 and M/M/m) client server model using Queuing theory
International Journal of Electronic and Couter cience Engineering vailable Online at wwwijeceorg IN- 77-9 erforance analyi of hybrid M/M/ and M/M/ client erver odel uing ueuing theory atarhi Guta, Dr Rajan
More informationA Correlation-Based Fingerprint Verification System
A Correlation-Baed Fingerrint Verification Sytem Aker M. Bazen, Gerben T.B. Verwaaijen, Sabih H. Gerez, Leo P.J. Veelenturf and Berend Jan van der Zwaag Univerity of Twente, Deartment of Electrical Engineering,
More informationOperational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz
Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,
More informationSocial Network Analysis Based on BSP Clustering Algorithm
Communiations of the IIMA Volume 7 Issue 4 Artile 5 7 Soial Network Analysis Based on BSP Clustering Algorithm ong Shool of Business Administration China University of Petroleum Follow this and additional
More informationDAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications
DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu
More informationComputer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder
Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal
More informationKey Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.
Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in
More informationBuilding a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique
202 International Conference on Frontier in Handwriting Recognition Building a Compact On-line MRF Recognizer for Large Character Set uing Structured Dictionary Repreentation and Vector Quantization Technique
More informationContents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course:
Content Shortet path Algorithm and Network 21/211 The hortet path problem: Statement Verion Application Algorithm (for ingle ource p problem) Reminder: relaxation, Dijktra, Variant of Dijktra, Bellman-Ford,
More informationA System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems
International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem
More informationES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK
ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.
More informationOSI Model. SS7 Protocol Model. Application TCAP. Presentation Session Transport. ISDN-UP Null SCCP. Network. MTP Level 3 MTP Level 2 MTP Level 1
Direte Event Simulation of CCS7 DAP Benjamin, AE Krzeinki and S Staven Department of Computer Siene Univerity of Stellenboh 7600 Stellenboh, South Afria fbenj,aek,taveng@.un.a.za ABSTRACT: Complex imulation
More informationTAM 212 Worksheet 3. Solutions
Name: Group member: TAM 212 Workheet 3 Solution The workheet i concerned with the deign of the loop-the-loop for a roller coater ytem. Old loop deign: The firt generation of loop wa circular, a hown below.
More informationPressure characteristics of pneumatic driven microfluidic chip system adopting a stepper motor
5th International Conference on Meaurement, Intrumentation and Automation (ICMIA 216) Preure characteritic of neumatic driven microfluidic chi ytem adoting a teer motor Yunfeng Zhu1, a, Jinxian Wang1,b,Songjing
More informationFloating Point CORDIC Based Power Operation
Floating Point CORDIC Baed Power Operation Kazumi Malhan, Padmaja AVL Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland Univerity, Rocheter, MI e-mail: kmalhan@oakland.edu,
More informationRESEARCH ON A HEURISTIC SEARCHING ALGORITHM FOR ENERGY-AWARE ROUTING IN WIRELESS SENSOR NETWORKS
RESEARCH ON A HEURISTIC SEARCHING ALGORITHM FOR ENERGY-AWARE ROUTING IN WIRELESS SENSOR NETWORKS 1 HONGWEI CHEN, CHUNHUA ZHANG, *3 CHUNZHI WANG 1 Aoc. Prof., School of Comuter Science, Hubei Univerity
More informationA User-Attention Based Focus Detection Framework and Its Applications
A Uer-Attention Baed Focu Detection Framework and It Application Chia-Chiang Ho, Wen-Huang Cheng, Ting-Jian Pan, Ja-Ling Wu Communication and Multimedia Laboratory, Department of Computer Science and Information
More informationVisual Targeted Advertisement System Based on User Profiling and Content Consumption for Mobile Broadcasting Television
Viual Targeted Advertiement Sytem Baed on Uer Profiling and ontent onumption for Mobile Broadating Televiion Silvia Uribe Federio Alvarez Joé Manuel Menéndez Guillermo inero Abtrat ontent peronaliation
More informationBrief Announcement: Distributed 3/2-Approximation of the Diameter
Brief Announcement: Ditributed /2-Approximation of the Diameter Preliminary verion of a brief announcement to appear at DISC 14 Stephan Holzer MIT holzer@mit.edu David Peleg Weizmann Intitute david.peleg@weizmann.ac.il
More informationStress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling
Stre-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Menter F.R. ANSYS Germany GmbH Introduction It i oberved in many CFD imulation that RANS model how inherent technology limitation
More informationelse end while End References
621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized
More informationReconfigurable Shape-Adaptive Template Matching Architectures
Reonfigurable Shae-Adative Temlate Mathing Arhitetures Jörn Gause 1, Peter Y.K. Cheung 1, Wayne Luk 2 1 Deartment of Eletrial and Eletroni Engineering, Imerial College, London SW7 2BT, England. 2 Deartment
More informationReporting Checklist for Nature Neuroscience
Correponding Author: Manucript Number: Manucript Type: Jeremy Elman NNBC48172A Brief Communication Reporting Checklit for Nature Neurocience # Figure: 2 # Figure: 5 # Table: 6 # Video: 0 Thi checklit i
More informationTopics. FPGA Design EECE 277. Number Representation and Adders. Class Exercise. Laboratory Assignment #2
FPGA Deign EECE 277 Number Repreentation and Adder Dr. William H. Robinon Februar 2, 25 Topi There are kind of people in the world, thoe that undertand binar and thoe that don't. Unknown Adminitrative
More informationThe Association of System Performance Professionals
The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and
More informationMonte-Carlo optimizations for resource allocation problems in stochastic network systems
Monte-Carlo otimization for reource allocation roblem in tochatic network ytem Milo aukrecht Deartment of Comuter Science 5329 Sennott Square Univerity of Pittburgh milo@c.itt.edu Abtract Real-world ditributed
More informationExamples. Last Time. Speedup & Parallel Efficiency 200% Observations. Outline. Lecture 6. Queuing Commands Introduction to MPI
Lat ime Queuing Command Introduction to MPI Information Enquiry Baic Collective Communication Some embarraingly arallel examle Defined arallel efficiency & eedu Examle 03.c: Brute-force method to calculate
More informationMarkov Random Fields in Image Segmentation
Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image
More informationShortest Path Routing in Arbitrary Networks
Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,
More informationDatum Transformations of NAV420 Reference Frames
NA4CA Appliation Note Datum ranformation of NA4 Referene Frame Giri Baleri, Sr. Appliation Engineer Crobow ehnology, In. http://www.xbow.om hi appliation note explain how to onvert variou referene frame
More informationManeuverable Relays to Improve Energy Efficiency in Sensor Networks
Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov
More information[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata
he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online
More informationLearning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract
CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and
More informationRandomized algorithms: Two examples and Yao s Minimax Principle
Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum
More informationKaren L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract
Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial
More informationA study on turbo decoding iterative algorithms
Buletinul Ştiinţific al Univerităţii "Politehnica" din Timişoara Seria ELECTRONICĂ şi TELECOMUNICAŢII TRANSACTIONS on ELECTRONICS and COMMUNICATIONS Tom 49(63, Facicola 2, 2004 A tudy on turbo decoding
More informationDistributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router
Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To
More informationGrowing Networks Through Random Walks Without Restarts
Growing Network Through Random Walk Without Retart Bernardo Amorim, Daniel Figueiredo, Giulio Iacobelli, Giovanni Neglia To cite thi verion: Bernardo Amorim, Daniel Figueiredo, Giulio Iacobelli, Giovanni
More informationSPH3UW Unit 7.1 The Ray Model of Light Page 2 of 5. The accepted value for the speed of light inside a vacuum is c m which we usually
SPH3UW Unit 7. The Ray Model of Light Page of 5 Note Phyi Tool box Ray light trael in traight path alled ray. Index of refration (n) i the ratio of the peed of light () in a auu to the peed of light in
More informationStochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang
Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,
More informationOptimal Gossip with Direct Addressing
Optimal Goip with Direct Addreing Bernhard Haeupler Microoft Reearch 1065 La Avenida, Mountain View Mountain View, CA 94043 haeupler@c.cmu.edu Dahlia Malkhi Microoft Reearch 1065 La Avenida, Mountain View
More informationChapter 7, Part B Sampling and Sampling Distributions
Slides Preared by JOHN S. LOUCKS St. Edward s University Slide 1 Chater 7, Part B Samling and Samling Distributions Samling Distribution of Proerties of Point Estimators Other Samling Methods Slide 2 Samling
More informationIncreasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment
Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in
More informationThe norm Package. November 15, Title Analysis of multivariate normal datasets with missing values
The norm Package November 15, 2003 Verion 1.0-9 Date 2002/05/06 Title Analyi of multivariate normal dataet with miing value Author Ported to R by Alvaro A. Novo . Original by Joeph
More informationHigh Throughput Turbo Decoder Design for GPP Platform
1 7th International ICST Conference on Communication and Networing in China (CHINACOM) High Throughut Turbo Decoder Deign for GPP Platform Suiing Zhang, Rongrong Qian, Tao Peng Key Lab. Of Univeral Wirele
More informationA Layer-by-Layer Levenberg-Marquardt algorithm for Feedforward Multilayer Perceptron
Al. Math. Inf. Sci. 6 No. S. 55S-5S () Alied Mathematic & Information Science An International Journal @ NSP Natural Science Publihing Cor. A Layer-by-Layer Levenberg-Marquardt algorithm for Feedforward
More informationKeywords: Defect detection, linear phased array transducer, parameter optimization, phased array ultrasonic B-mode imaging testing.
Send Order for Reprint to reprint@benthamcience.ae 488 The Open Automation and Control Sytem Journal, 2014, 6, 488-492 Open Acce Parameter Optimization of Linear Phaed Array Tranducer for Defect Detection
More informationHassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,
COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)
More informationarxiv: v1 [cs.ds] 27 Feb 2018
Incremental Strong Connectivity and 2-Connectivity in Directed Graph Louka Georgiadi 1, Giueppe F. Italiano 2, and Niko Parotidi 2 arxiv:1802.10189v1 [c.ds] 27 Feb 2018 1 Univerity of Ioannina, Greece.
More information/06/$ IEEE 364
006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;
More informationCalculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem
Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion
More informationMinimum Energy Reliable Paths Using Unreliable Wireless Links
Minimum Energy Reliable Path Uing Unreliable Wirele Link Qunfeng Dong Department of Computer Science Univerity of Wiconin-Madion Madion, Wiconin 53706 qunfeng@c.wic.edu Micah Adler Department of Computer
More informationAnalysis of slope stability
Engineering manual No. 8 Updated: 02/2016 Analyi of lope tability Program: Slope tability File: Demo_manual_08.gt In thi engineering manual, we are going to how you how to verify the lope tability for
More information