arxiv: v1 [physics.soc-ph] 17 Oct 2013

Size: px
Start display at page:

Download "arxiv: v1 [physics.soc-ph] 17 Oct 2013"

Transcription

1 Emergene of Blind Area in Information Sreading arxiv:131707v1 [hyi.o-h] 17 Ot 2013 Zi-Ke Zhang 1,2,, Chu-Xu Zhang 1,3,, Xiao-Pu Han 1,2 and Chuang Liu 1,2 1 Intitute of Information Eonomy, Hangzhou Normal Univerity, Hangzhou, Peole eubli of China 2 Alibaba eearh Center for Comlexity Siene, Hangzhou Normal Univerity, Hangzhou, Peole eubli of China 3 Web Siene Center, Univerity of Eletroni Siene and Tehnology of China, Chengdu, Peole eubli of China Thee author ontributed equally to thi work liuhuang@hznu.edu.n Abtrat. eently, ontagion-baed (dieae, information, et.) reading on oial network ha been extenively tudied. In thi aer, other than traditional full interation, we rooe a artial interation baed reading model, onidering that the informed individual would tranmit information to only a ertain fration of their neighbor due to the tranmiion ability in real-world oial network. Simulation reult on three rereentative network (,, ) indiate that the reading effiieny i highly orrelated with the network heterogeneity. In addition, a eial henomenon, namely Information Blind Area where the network i earated by everal information-unreahable luter, will emerge from the reading roe. Furthermore, we alo find that the ize ditribution of uh information blind area obey ower-law-like ditribution, whih ha very imilar exonent with that of ite erolation. Detailed analye how that the ritial value i dereaing along with the network heterogeneity for the reading roe, whih i omlete the ontrary to that of random eletion. Moreover, the ritial value in the latter roe i alo larger than that of the former for the ame network. Thoe finding might hed ome light in in-deth undertanding the effet of network roertie on information reading.

2 Emergene of Blind Area in Information Sreading 2 1. Introdution With the advent of variou online Soial Networking Servie (SNS), the diemination of information through Internet, alo known a word-of-mouth or eer-to-eer reading, ha attrated muh attention for reearher in reent year [?,?]. Following the raid develoment of databae tehnology and omutational ower, variou reading henomena on large-ale oial network, uh a the new [?], rumor [?,?], innovation [?], behavior [?,?], ulture [?], viral marketing [?], et, an now be deely tudied in term of theoretial model a well a emirial analye. Generally, the information reading dynami i uually tudied under the framework of eidemi reading [?]. Therefore, in many tudie, the roe of information diffuion i regraded equally a the dieae roagation, whih inform agent to tranmit information to their neighbor via oial onnetion [?]. Among them, the Suetible-Infeted-eovered (SI) model i the mot ommonly ued method to deribe the information reading roe, where individual would loe interet of further ontribution due to a variety of le reditable fator, whih i very imilar to the tate of the SI model in eidemi reading. The interlay between the reading dynami and network truture i a key inight in the tudy on network reading dynami [?,?]. The network truture affet both the reading eed and revalene through feature uh a the hortet ath length, degree ditribution, degree orrelation, and o on. In addition, the uer bound of informed roortion i roved to be aroximate to 80% for the SI model on random network when the oulation ize i infinite [?]. Previou work have alo revealed that there indeed exit a roagation threhold of information reading on the mall-world network [?,?], and the reading i muh fater and broader than that on regular network for the exitene of the long-range edge[?]. Moreno et al. [?,?] tudied the rumor reading on ale-free network, and found that the exitene of hub node an enhane the reading eed rather than the influened oe. eently, there i a vat la of tudie fouing on the reading dynami on interonneted network [?], and there i a mixed hae below the ritial infetion trength in weakly ouled network [?]. Furthermore, ome intereting henomena are diovered baed on the information diffuion on real oial ytem, uh a the telehone interation [?,?], tweet [?,?] and [?]. Emirial reult indiate that the human ative attern [?,?] and the role of weak tie [?] would trongly affet the information reading. However, there are alo lenty of reearhe arguing that the underlying mehanim of information diffuion hould be fundamentally different from that of eidemi reading. Lü et al. [?] ummarized the ignifiant differene between them, and onluded that the information, by onidering the oial enhanement, would read more effetively in regular network than that in random network. Thi would to ome extent uort the real human exeriment reorted by Centola [?]. Mot theoretial model aumed that the informed agent would tranmit the information to all their neighbor [?,?] or jut one randomly hoen neighbor [?] in one ingle time te.

3 Emergene of Blind Area in Information Sreading 3 However, ine aing meage along would take a ereived tranmiion ot [?] in real oietie, the diffuion target would be eleted among individual with otential interet [?]. Thu, the information flow would travel through oial onnetion thereby deending on the roertie of oberved network [?]. In thi aer, we rooe a theoretial model with onidering the effet of artial interation, where the number of interated neighbor i in roortion to the reader degree. Simulation reult how that the reading roe erolate on all three laial network (, and network), whih i quite imilar with the ite erolation in tatitial hyi [?]. In addition, it i oberved that the erolation eak later on network than other two network, whih ould be regarded a a good exlanation of why information an read more widely on network. Furthermore, it i alo atonihing to find that the ize ditribution of unreahable luter, namely the Information Blind Area, exhibit the ower-law roerty with exonent γ = 2.9, whih i the univeral henomenon in the ommunity ditribution [?,?]. 2. The Model In thi aer, we onider a yntheti network G(N,E), where N i the number of node and E i the number of link, rereenting the individual and their interation, reetively. Analogou with the SI model, every individual would be and only be at one of the three following tate during the roe of information reading, Uninformed (S). The individual ha not yet reeived the information, and i analogou to the uetible tate of the SI model; Informed (I). The individual i aware of the information but ha not tranmitted it, and i analogou to the infeted tate in the SI model; Exhauted (). After tranmitting the information, the individual will robably loe interet and no longer tranmit it, thu i analogou to the reovered tate of the SI model. Subequently, we are mainly intereted in the effet of artial interation. That i to ay, eah infeted node, o-alled reader [?], will only influene a ertain fration of it neighbor. Thu, the model an be deribed a follow. Initially, one arbitrary node i randomly iked a the Information Seed (I-tate) and the ret remain uninformed (S-tate). Then, the eed will tranmit information to α fration of it neighbor and then beome exhauted (-tate), where α [0, 1]; For imliity, we aume that all individual fully trut their oial onnetion. Conequently, eah individual will arove it reader information one he reeive it; After aroval, he beome an informed individual or a reader (I-tate), and will tranmit the information to all α fration of her neighbor and beome exhauted (-tate);

4 Emergene of Blind Area in Information Sreading 4 The above roe will reeat until there i no individual tranmitting the information any more. In thi model, the oular individual (node with large degree) tend to interat with more neighbor when they arove the information. However, ine there i tranmiion ot in the reading roe [?], that i to ay, individual would not be able to interat with all their own neighbour. Therefore, we rooe a tunable arameter α [0, 1], rereenting the interation trength. Thu, the number of neighbor, αk, will be informed i roortional to the reader degree k, negleting the neighbor tate. And the robability of eah neighbor of being eleted i 1 at eah k round, and the reeating eletion i rohibited. Figure 1 how the rooed reading rule. By etting α=, the informed node I 1 an only tranmit information to three neighbor, two uninformed node S 1, S 3 and one exhauted node 1. Therefore, The reent rule imlie a different feature of information reading, Partial Interation, whih i uually negleted in the tandard SI model and it variant for information reading. In addition, the immediate influene in the reent model orreond to the two arameter in traditional SI model, the infeted robability β and the reovered robability µ, are both equal to one in the rooed model. S 1 1 I 1 S 2 I 2 S 3 Figure 1. (Color online) Illutration of the reading rule in the rooed model with three uninformed node, S 1, S 2 and S 3, two informed node I 1 and I 2, and one exhauted node 1. Eah of them ha the ame robability 1 5 to reeive information from the informed node I 1 at eah round. When α=, only αk=3 node, e.g. S 1, S 3 and 1, will reeive information. To better invetigate the effet of the reent model, we erform analye on three kind of network: (i) network [?]: a random grah where N node onneted by E edge whih are hoen randomly from all the N(N 1)/2 oible edge; (ii) network [?]: a growing network where eah newly added node onnet to m old node by referential attahment mehanim; (iii) network [?]: andomly rehuffle link of a regular network with robability γ and reult in the mall-world network. A a onequene, we generate orreonding, and network with the ame

5 Emergene of Blind Area in Information Sreading 5 network ize N=10000, m=3, γ=0.5 and the average degree k =6. In addition, to alleviate the effet of randomly eleting the reading eed, all imulation reult are obtained by averaging over 1000 indeendent realization. 3. eult and Analyi 3.1. Exhauted ate Denote P() a the fration of exhauted node to the network ize, obviouly, larger P() at the table tate indiate broader information reading, and vie vere. To determine how the introdued arameter α affet the reading reult, we tart our analyi from oberving the relationhi between P() and α. Figure 2 how that, for all the three network, P() i monotonially inreaing with α, uggeting a oitive orrelation P() and α. A a onequene, in the following, we will ue P() intead of α to give omrehenive diuion. P() Figure 2. (Color online) The ratio of exhauted node P() a a funtion of α for three oberved network. Figure 3 reort the model reult. In Figure 3a, it how the dynami of P() on three different network with the fixed arameter α = It an be een that network yield the mot effiient reading a the larget P() at the table tate, while network exhibit the narrowet reading, and network tay moderately. Thi reult agree with reviou tudie [?]. In addition, the inet how the dynami differene of P() between two ontinuou time te, denoted a P() = P( t+1 ) P( t ), whih an be onidered a the reading eed. It indiate that information read fater at it initial tage while low down at later time te due to the influene of hub node. From the degree ditribution of Figure 3,

6 Emergene of Blind Area in Information Sreading 6 it an be een that network i ouied by more large-degree node than other two. Therefore, information reading on network i the fatet while lowet on network. Aording to the artial interation in the reent model, informed agent tranmit information to only a ertain fration of their neighbor. Conequently, there would be alo ome uninformed individual remaining without reeiving any new beaue they are urrounded by exhauted neighbor (ee Figure 4). Conidering that the reading roe may influene differently to different tye of node, we oberve the relationhi between exhauted rate P( k ) and node degree k of three network at the table tate (ee Figure 3b), where P( k ) i the ratio of the total number of exhauted node with degree k to the overall number of node with degree k. It learly how that P( k ) and k are aarently oitively orrelated, and node with maller degree have le robability to reeive information. Furthermore, Figure 3 dilay the degree ditribution of three network. In general, network how the owerlaw degree ditribution where mot node are of low degree but till a few hub node exit due to the rih-get-riher mehanim. Poion degree ditribution emerge in network beaue of urely random attahment. Comaratively, mot node in have moderate degree and only a few mall and large degree node (but le than thoe in network), reulting from the rewiring roe. In a word, the generally different fration of hub node (Figure 3) and different reading effet on different tye of node (Figure 3b) uort the reult of Figure 3a from the eretive of truture and funtion, reetively. P() P() t t (a) P( k ) k (b) (k) k () Figure 3. (Color online) The dynami of reading on three network. (a) Exhauted ratep()aafuntionofimulationtime. Ineti P()athefuntionofimulation time; (b) Exhauted rate a a funtion of the node degree; () Degree ditribution of three network in log-log ale. The arameter α i et to 0.35 for (a) and (b) Information Blind Area A an be een from Figure 3a, the exhauted rate i alway le than 1, uggeting that ome node will never be informed during the whole reading roe. Seifially, in

7 Emergene of Blind Area in Information Sreading 7 thi aer, we name the region onit of uh unreahable node a the Information Blind Area. Atually, Suh blind area emerge regularly due to the reading roe. Figure 4 how two tyial kind of information blind area. One i omoed by a ingle unformed node urrounded by exhauted neighbor and thu it ould not reeive new. A hown in Figure 4a, the uninformed node S 1 i enveloed by three exhauted node 1, 2 and 3, who would neither diretly tranmit information to S 1 nor allow the informed agent to ontat S 1. The other one i omoed of multile uninformed node onneted with eah other and urrounded together by exhauted node. Thu, the information will never be tranmitted to uh a luter a no ath i available. A hown infigure 4b, three uninformed node, S 1, S 2 and S 3, omoe a onneted luter whih i urrounded by five exhauted node, 1, 2, 3, 4 and 5. Sine no ingle uniformed node in thi luter an ae the outide information world, they have to aively kee blind for the reading information. 1 2 S 1 3 (a) 1 2 S 1 S S 3 (b) 4 Figure 4. (Color online) Illutration of two tyial kind of information blind area: (a) one ingle-node ae; and (b) examle of multile node. In order to deribe thoe two kind of information blind area more learly, we ondut exeriment with N=100 and k =6. Figure 5 how the viualization reult on the three rereentative network. It an be een that mot uninformed individual at table tate (Figure 5a, 5d, 5g) are generally mall-degree one, whih i onitent with reviou analyi in Setion 3.1. In addition, we alo how the two information blind area. The ingle-node ae i dilayed in Figure 5b, Figure 5e, Figure 5h. In Figure 5b, the uninformed individual #66 i urrounded by exhauted neighbor #7,

8 Emergene of Blind Area in Information Sreading 8 #10, #36, #71, #75 and #83. A a onequene, node #66 i revented from hearing new by it neighbor. Figure 5e and Figure 5h are imilar to that of Figure 5b. On the other hand, Figure 5, 5f, and 5i reort the information blind area of multi-node ae on, and network, reetively. A hown in Figure 5, three uninformed individual #49, #86 and #97 omoe a onneted luter, whih i urrounded by exhauted individual #1, #4, #7, #17, #18, #35, and #61. Therefore, all the node in thi relatively large area will not be informed and kee blind to read information. Similar henomena an alo be diovered in Figure 5f and Figure 5i on and network, reetively Sale-free Effet In thi etion, we hall exlain how uh blind area emerge from the eretive of ite erolation. Generally, in a tyial ite erolation ytem, eah node in the given network would be at one of two given tate: emty with robability or ouied with robability 1, and all the edge onneting with emty node are ut off. Previou tudie have roved that the ite erolation ytem would dilay a hae tranition henomenon from onneted hae to dionneted hae when grow to a ritial oint [?]. At thi oint, the behavior of the ratio of giant luter ize (the larget onneted luter) r g (r g = N g /N, where N g i the ize of the giant luter) indiate the network udden diintegration, and the aling ditribution of onneted luter would emerge [?,?,?,?,?]. Figure 6a-6 reetively how how r g hange aording to different, a well a the ritial oint (ee inet) in three different network (, and SW network) with the ame network ize N= Note that, the role of the emty node in ite erolation i quite imilar with that of the -tate individual in the reent model, where the information blind area are divided by thoe individual. Analogou with oberving the giant luter in ite erolation, we onequently alulate the ratio of the larget blind area ize r (r = N /N, where N i the ize of the larget information blind area) for variou exhautedrate [0,1]. ThereultarehowninFigure6d-6f,wheretheurveexhibit a very imilar trend with that of r g. In addition, we numerially alulate the threhold of both and, aording to the eak of the relative variane of the ize ditribution. We denote it by χ = N2 N 2 N, where N i the ize of eah onneted luter exet the giant one [?], for it would reult in large flutuation when or aroahe the ritial oint, and the inet of Figure 6a-6f how the orreonding reult. Furthermore, in different network (, and SW), we find good agreement between the ize ditribution of onneted luter and information blind area of the two reetive mode. Figure 6g-6i how that the ditribution of the onneted luter ize of the two model are oinident with almot the ame exonent -2.9 at their reetive ritial oint, indiating that they have very imilar ritial henomena. Deite thoe imilar roertie, we hould not regard the reent model a an equivalent roe a the ite erolation. One ignifiant differene between them

9 Emergene of Blind Area in Information Sreading 9 Figure 5. (Color online) Viualization of information blind area reulted from deigned exeriment. Yellow and blue irle rereent the uninformed and exhauted node, reetively. The ize of eah node i roortional to it degree. In addition, (a-) are the reult on network; (d-f) are the reult on network; (g-i) are the reult on network. i that, the node tate are hanged aording to the diffuion roe baed on the given network truture in the reading model, while the ite erolation roe only randomly label the node tate regardle of the network truture. Therefore, the ritial oint exhibit very differently for the two model. In the inet of Figure 6a-6, the ritial value follow > > for the ite erolation, while a omletely ooite equene for the rooed model a hown in the inet of Figure 6d-6f (that i < < ). For the random labeling roe, the more heterogeneou the

10 Emergene of Blind Area in Information Sreading 10 r g r () (a) (d) =5 0 =0.72 loe=-2.9 g (g) r g r () (b) 0 (e) =3 =0.78 loe=-2.9 g (h) r g r () () (f) g =1 =0 0 loe=-2.9 (i) Figure 6. (Color online) Comarion between the reent model and the ite erolation ytem. (a-) The relationhi between the ize of giant luter and emty robability. Inet how χ veru, and the eak i the ritial oint ; (d-f) The relationhi between the ize of the larget information blind area and the exhauted rate.inet how hi veru, and the eak i the ritial oint ; (g-i) The ize ditribution of onneted luter of the two model. network i, the larger the ritial oint will be, a there are more mall-degree node when eah one i treated equally. On the ontrary, if there exit ome large-degree node dominating the network enter, meage an be eaily read out via thoe ore node, hene the ritial oint will be maller for uh large heterogeneou network in the diffuion roe. Similar tatement an alo be alied in illutrating that, for the ame network, the ritial value of the interation model i alway maller than that of ite erolation, e.g. >, > and >. In a word, although the ite erolation rinile an not be fully rojeted to reading dynami, it till rovide a romiing and veratile tool to exlain the ritial henomenon of the emergene of

11 Emergene of Blind Area in Information Sreading 11 blind area in information reading. 4. Conluion & Diuion In thi aer, we have alied the artial interation effet in the laial SI model where three tye of node tate are onidered: (1) Uninformed (S); (2) Informed (I); (3) Exhauted (). Subequently, we adot it in an information reading enario, where the interation trength i roortional to eah reader degree. Numerial exeriment how that there i a learly oitive relationhi between the interation trength and final overage of reading. In addition, we find that the reading effet i highly influened by the network truture. One intereting roerty will reult from the reading roe, where the network i divided into everal informationunreahable area, namely Information Blind Area. Analyi reveal that a hae tranition of uh blind area ize ditribution will emerge when the fration of -tate individual grow to a ertain ritial oint. In ite of quite imilar reult from ite erolation analyi, detailed exeriment how that the diffuion roe i ignifiantly different from random eletion. Further numerial analye on three rereentative network (, and ) demontrate that, for the reading roe, the more heterogeneou the network i, the maller the ritial oint will be. By ontrat, the random labeling roe of ite erolation i omletely ooite. Moreover, the ritial value of network-baed diffuion i maller than that of urely random eletion. Thoe finding an be regarded a additional exlanation why mall-world network yield the mot effiient information/edemi reading in reviou tudie [?,?]. eently, the reearh of both ontagion-baed reading model and aliation ha attrated more and more attention [?,?]. Numerial reult in thi aer demontrate that, due to the variou network truture, there are alway unreahable individual. Human ommuniation attern analyi [?,?] would be a romiing method to hel in undertanding how to lighten the Dark Corner. In addition, ativation of Long-tail individual and rodut would alo enhane the effiieny of Information Filtering [?] in the era of big data to olve the old-tart dilemma [?,?]. Aknowledgment Thi work wa artially uorted by the National Natural Siene Foundation of China (Grant No , , , and ), the Zhejiang Provinial Natural Siene Foundation of China (Grant No. LY12A05003 and LQ13F030015), the EU FP7 Grant (rojet GOWTHCOM), the tart-u foundation and Pandeng rojet of Hangzhou Normal Univerity. eferene

Description of Traffic in ATM Networks by the First Erlang Formula

Description of Traffic in ATM Networks by the First Erlang Formula 5th International Conferene on Information Tehnology and Appliation (ICITA 8) Deription of Traffi in ATM Network by the Firt Erlang Formula Erik Chromý, Matej Kavaký and Ivan Baroňák Abtrat In the paper

More information

KINEMATIC ANALYSIS OF VARIOUS ROBOT CONFIGURATIONS

KINEMATIC ANALYSIS OF VARIOUS ROBOT CONFIGURATIONS International Reearh Journal of Engineering and Tehnology (IRJET) e-in: 39-6 Volume: 4 Iue: May -7 www.irjet.net p-in: 39-7 KINEMATI ANALYI OF VARIOU ROBOT ONFIGURATION Game R. U., Davkhare A. A., Pakhale..

More information

ECE-320 Lab 2: Root Locus For Controller Design

ECE-320 Lab 2: Root Locus For Controller Design ECE-320 Lab 2: Root Locu For Controller Deign In thi Lab you will exlore the ue of the root locu technique in deigning controller. The root locu indicate the oible location of the cloed loo ole of a ytem

More information

Soft Output Decoding Algorithm for Turbo Codes Implementation in Mobile Wi-Max Environment.

Soft Output Decoding Algorithm for Turbo Codes Implementation in Mobile Wi-Max Environment. Available online at www.ciencedirect.com Procedia Technology 6 (202 ) 666 673 2nd International Conference on Communication, Comuting & Security [ICCCS-202] Soft Outut Decoding Algorithm for Turbo Code

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

PERFORMANCE EVALUATION ISSUES OF QUERY PROCESSING THROUGH CLIENT SERVER ARCHITECTURE

PERFORMANCE EVALUATION ISSUES OF QUERY PROCESSING THROUGH CLIENT SERVER ARCHITECTURE Manih Srivatava et al./ International Journal of Comuter Science & Engineering Technology (IJCSET) PERFORMANCE EVALUATION ISSUES OF QUERY PROCESSING THROUGH CLIENT SERVER ARCHITECTURE Mr. Manih Srivatava

More information

Shortest Paths in Directed Graphs

Shortest Paths in Directed Graphs Shortet Path in Direted Graph Jonathan Turner January, 0 Thi note i adapted from Data Struture and Network Algorithm y Tarjan. Let G = (V, E) e a direted graph and let length e a real-valued funtion on

More information

Efficient Large-scale Content Distribution with Combination of CDN and P2P Networks

Efficient Large-scale Content Distribution with Combination of CDN and P2P Networks Vol.2, No.2, Aril, 2009 Efficient Large-cale Content Ditribution with Combination of CDN and P2P Network Hai Jiang 1, 2, Jun Li 1, Zhongcheng Li 1, and Xiangyu Bai 1, 2 1 Intitute of Comuting Technology,

More information

Performance Evaluation of Content Distribution in Hybrid CDN-P2P Network

Performance Evaluation of Content Distribution in Hybrid CDN-P2P Network 2008 Second International Conference on Future Generation Communication and Networking Performance Evaluation of Content Ditribution in Hybrid CDN-P2P Network Hai Jiang 1, 2, Jun Li 1, Zhongcheng Li 1,

More information

Macrohomogenous Li-Ion-Battery Modeling - Strengths and Limitations

Macrohomogenous Li-Ion-Battery Modeling - Strengths and Limitations Marohomogenou Li-Ion-Battery Modeling - Strength and Limitation Marku Lindner Chritian Wieer Adam Opel AG Sope Purpoe of the reearh: undertand and quantify impat of implifiation in marohomogeneou model

More information

A Service with Bounded Degradation in Quality-of-Service. Networks. University of Virginia. Charlottesville, VA 22903

A Service with Bounded Degradation in Quality-of-Service. Networks. University of Virginia. Charlottesville, VA 22903 To Aear: Proc. IEEE Infocom'95, Boton, Aril 1995. A Service with Bounded Degradation in Quality-of-Service Network Jorg Liebeherr Dongwei Liao Deartment of Comuter Science Univerity of Virginia Charlotteville,

More information

Pruning Game Tree by Rollouts

Pruning Game Tree by Rollouts Pruning Game Tree by Rollout Bojun Huang Mirooft Reearh bojhuang@mirooft.om Abtrat In thi paper we how that the α-β algorithm and it ueor MT-SSS*, a two lai minimax earh algorithm, an be implemented a

More information

Relayer Selection Strategies in Cellular Networks with Peer-to-Peer Relaying

Relayer Selection Strategies in Cellular Networks with Peer-to-Peer Relaying Relayer Seletion Strategie in Cellular Network with Peer-to-Peer Relaying V. Sreng, H. Yanikomeroglu, and D. D. Faloner Broadband Communiation and Wirele Sytem (BCWS) Centre Dept. of Sytem and Computer

More information

Performance Evaluation of TCP Implementations in OBS Networks

Performance Evaluation of TCP Implementations in OBS Networks Performance Evaluation of TCP Imlementation in OB Network iang Yu y, Chunming Qiao y, Yong Liu Λ and Don Towley Λ y Deartment of Comuter cience and Engineering, tate Univerity of New York at Buffalo Λ

More information

Research on Target Detection based on moving Image

Research on Target Detection based on moving Image International Journal of Science Vol.5 No.4 018 ISSN: 1813-4890 Reearch on Target Detection baed on moving Image Feiyan Wu 1, Xianwen Liao 1 Guangxi College and Univeritie Key Laboratory of Profeional

More information

Homework 4 Due Thursday Oct 7. CLRS 12-4 (number of binary trees) CLRS (rb insert implementation)

Homework 4 Due Thursday Oct 7. CLRS 12-4 (number of binary trees) CLRS (rb insert implementation) Homework 4 Due Thurday Oct 7 CLRS 12-4 (number of binary tree) CLRS 13.3-6 (rb inert imlementation) 1 Chater 13: Red-Black Tree A red-black tree i a node-colored BST. Each node i colored either black or

More information

Bias Error Reduction of Digital Image Correlation Based on Kernel

Bias Error Reduction of Digital Image Correlation Based on Kernel Vol.81 (CST 15),.16- htt://dx.doi.org/1.1457/astl.15.81.4 Bias Error Redution of Digital Image Correlation Based on Kernel Huan Shen 1,, eize Zhang 1, and Xiang Shen 1 Energy and ower College, anjing Uniersity

More information

Deterministic Access for DSRC/802.11p Vehicular Safety Communication

Deterministic Access for DSRC/802.11p Vehicular Safety Communication eterminiti Ae for SRC/802.11p Vehiular Safety Communiation Jihene Rezgui, Soumaya Cheraoui, Omar Charoun INTERLAB Reearh Laboratory Univerité de Sherbrooe, Canada {jihene.rezgui, oumaya.heraoui, omar.haroun

More information

Kinematic design of a double wishbone type front suspension mechanism using multi-objective optimization

Kinematic design of a double wishbone type front suspension mechanism using multi-objective optimization 5 th utralaian Congre on pplied Mehani, CM 2007 10-12 Deember 2007, Bribane, utralia Kinemati deign of a double wihbone tpe front upenion mehanim uing multi-objetive optimiation J. S. wang 1, S. R. Kim

More information

1. Introduction. Abstract

1. Introduction. Abstract Automati Ontology Derivation Uing Clutering for Image Claifiation 1 Latifur Khan and Lei Wang Department of Computer Siene Univerity of Texa at Dalla, TX 75083-0688 Email: [lkhan, leiwang]@utdalla.edu

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

Transactions on the Multiversion B + -Tree

Transactions on the Multiversion B + -Tree Tranaction on the Multiverion B + -Tree Tuukka Haaaalo Helinki Univerity of Technology Eoo, Finland thaaaa@c.hut.fi Seo Siu Univerity of Helinki Helinki, Finland iu@c.helinki.fi Ibrahim Jaluta Helinki

More information

ISSN (Online), Volume 1, Special Issue 2(ICITET 15), March 2015 International Journal of Innovative Trends and Emerging Technologies

ISSN (Online), Volume 1, Special Issue 2(ICITET 15), March 2015 International Journal of Innovative Trends and Emerging Technologies International Journal of Innovative Trend and Emerging Tehnologie ROBUST SCAN TECHNIQUE FOR SECURED AES AGAINST DIFFERENTIAL CRYPTANALYSIS BASED SIDE CHANNEL ATTACK A.TAMILARASAN 1, MR.A.ANBARASAN 2 1

More information

Approximate Labeling via the Primal-Dual Schema

Approximate Labeling via the Primal-Dual Schema Aroximate Labeling via the Primal-Dual Shema Nikos Komodakis and Georgios Tziritas Tehnial Reort CSD-TR-2005-01 February 1, 2005 Aroximate Labeling via the Primal-Dual Shema Nikos Komodakis and Georgios

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

Modeling of communication complexity in parallel computing

Modeling of communication complexity in parallel computing American Journal of Netork and Communication 2014; 3(5-1): 29-42 Publihed online July 30, 2014 (htt://.cienceublihinggrou.com/j/ajnc) doi: 10.11648/j.ajnc..2014030501.13 ISSN: 2326-893X (Print); ISSN:

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

Incorporating Speculative Execution into Scheduling of Control-flow Intensive Behavioral Descriptions

Incorporating Speculative Execution into Scheduling of Control-flow Intensive Behavioral Descriptions Inorporating Speulative Exeution into Sheduling of Control-flow Intenive Behavioral Deription Ganeh Lakhminarayana, Anand Raghunathan, and Niraj K. Jha Dept. of Eletrial Engineering C&C Reearh Laboratorie

More information

A Generic Model for Diagram Syntax and Semantics

A Generic Model for Diagram Syntax and Semantics A Generic Model for Diagram Syntax and Semantic BRTHOLD HOMANN Univerität Bremen MARK MINAS Univerität rlangen In thi extended abtract, we recall how the yntax of diagram i catured by the diagram editor

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

COURSEWORK 1 FOR INF2B: FINDING THE DISTANCE OF CLOSEST PAIRS OF POINTS ISSUED: 9FEBRUARY 2017

COURSEWORK 1 FOR INF2B: FINDING THE DISTANCE OF CLOSEST PAIRS OF POINTS ISSUED: 9FEBRUARY 2017 COURSEWORK 1 FOR INF2B: FINDING THE DISTANCE OF CLOSEST PAIRS OF POINTS ISSUED: 9FEBRUARY 2017 Submiion Deadline: The ourework onit of two part (of a different nature) relating to one problem. A hown below

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

arxiv: v3 [cs.db] 8 Oct 2016

arxiv: v3 [cs.db] 8 Oct 2016 Non-hierarchical Structure: How to Model and Index Overla? Faegheh Haibi Norwegian Univerity of Science and Technology faeghehh@idi.ntnu.no Svein Erik Bratberg Norwegian Univerity of Science and Technology

More information

Combined Radix-10 and Radix-16 Division Unit

Combined Radix-10 and Radix-16 Division Unit Combined adix- and adix-6 Diviion Unit Tomá ang and Alberto Nannarelli Dept. of Eletrial Engineering and Computer Siene, Univerity of California, Irvine, USA Dept. of Informati & Math. Modelling, Tehnial

More information

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt

More information

Parametric Micro-level Performance Models for Parallel Computing

Parametric Micro-level Performance Models for Parallel Computing Computer Siene Tehnial Report Computer Siene 12-5-1994 Parametri Miro-level Performane Model for Parallel Computing Youngtae Kim Iowa State Univerity Mark Fienup Iowa State Univerity Jeffrey S. Clary Iowa

More information

Efficient Image Alignment with Outlier Rejection

Efficient Image Alignment with Outlier Rejection ffiient Image Alignment with Outlier Rejetion Takahiro Ihikawa, Iain Matthew, and Simon aker CMU-RI-TR-02-27 Otober 31, 2002 Abtrat Image alignment i one of the mot widely ued tehnique in omuter viion.

More information

Laboratory Exercise 2

Laboratory Exercise 2 Laoratory Exercie Numer and Diplay Thi i an exercie in deigning cominational circuit that can perform inary-to-decimal numer converion and inary-coded-decimal (BCD) addition. Part I We wih to diplay on

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

An Evolutionary Multiple Heuristic with Genetic Local Search for Solving TSP

An Evolutionary Multiple Heuristic with Genetic Local Search for Solving TSP An Evolutionary Multiple Heuriti with Geneti Loal Searh for Solving TSP Peng Gang Ihiro Iimura 2 and Shigeru Nakayama 3 Department of Information and Computer Siene Faulty of Engineering Kagohima Univerity

More information

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term

More information

A note on degenerate and spectrally degenerate graphs

A note on degenerate and spectrally degenerate graphs A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove

More information

Inverse Kinematics 1 1/29/2018

Inverse Kinematics 1 1/29/2018 Invere Kinemati 1 Invere Kinemati 2 given the poe of the end effetor, find the joint variable that produe the end effetor poe for a -joint robot, given find 1 o R T 3 2 1,,,,, q q q q q q RPP + Spherial

More information

Delaunay Triangulation: Incremental Construction

Delaunay Triangulation: Incremental Construction Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )

More information

Scatterometry from crossed grating structures in different configurations

Scatterometry from crossed grating structures in different configurations Scatterometry from croed grating tructure in different configuration Thoma Schuter a, Stehan Rafler a, Wolfgang Oten a, Peter Reinig b, Thoma Hingt b a Intitut fuer Techniche Otik, Pfaffenwaldring 9, 70569

More information

A Study on Turbo Code Performance Based on AWGN Channel

A Study on Turbo Code Performance Based on AWGN Channel Proceeding of the 2nd International Conference on Comuter Science and Electronic Engineering (ICCSEE 2013 A Study on Turbo Code Performance Baed on AWGN Channel Peng Zhu, Jun Zhu, iang Liu Key Laboratory

More information

Performance analysis of hybrid (M/M/1 and M/M/m) client server model using Queuing theory

Performance analysis of hybrid (M/M/1 and M/M/m) client server model using Queuing theory International Journal of Electronic and Couter cience Engineering vailable Online at wwwijeceorg IN- 77-9 erforance analyi of hybrid M/M/ and M/M/ client erver odel uing ueuing theory atarhi Guta, Dr Rajan

More information

A Correlation-Based Fingerprint Verification System

A Correlation-Based Fingerprint Verification System A Correlation-Baed Fingerrint Verification Sytem Aker M. Bazen, Gerben T.B. Verwaaijen, Sabih H. Gerez, Leo P.J. Veelenturf and Berend Jan van der Zwaag Univerity of Twente, Deartment of Electrical Engineering,

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

Social Network Analysis Based on BSP Clustering Algorithm

Social Network Analysis Based on BSP Clustering Algorithm Communiations of the IIMA Volume 7 Issue 4 Artile 5 7 Soial Network Analysis Based on BSP Clustering Algorithm ong Shool of Business Administration China University of Petroleum Follow this and additional

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique 202 International Conference on Frontier in Handwriting Recognition Building a Compact On-line MRF Recognizer for Large Character Set uing Structured Dictionary Repreentation and Vector Quantization Technique

More information

Contents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course:

Contents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course: Content Shortet path Algorithm and Network 21/211 The hortet path problem: Statement Verion Application Algorithm (for ingle ource p problem) Reminder: relaxation, Dijktra, Variant of Dijktra, Bellman-Ford,

More information

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem

More information

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.

More information

OSI Model. SS7 Protocol Model. Application TCAP. Presentation Session Transport. ISDN-UP Null SCCP. Network. MTP Level 3 MTP Level 2 MTP Level 1

OSI Model. SS7 Protocol Model. Application TCAP. Presentation Session Transport. ISDN-UP Null SCCP. Network. MTP Level 3 MTP Level 2 MTP Level 1 Direte Event Simulation of CCS7 DAP Benjamin, AE Krzeinki and S Staven Department of Computer Siene Univerity of Stellenboh 7600 Stellenboh, South Afria fbenj,aek,taveng@.un.a.za ABSTRACT: Complex imulation

More information

TAM 212 Worksheet 3. Solutions

TAM 212 Worksheet 3. Solutions Name: Group member: TAM 212 Workheet 3 Solution The workheet i concerned with the deign of the loop-the-loop for a roller coater ytem. Old loop deign: The firt generation of loop wa circular, a hown below.

More information

Pressure characteristics of pneumatic driven microfluidic chip system adopting a stepper motor

Pressure characteristics of pneumatic driven microfluidic chip system adopting a stepper motor 5th International Conference on Meaurement, Intrumentation and Automation (ICMIA 216) Preure characteritic of neumatic driven microfluidic chi ytem adoting a teer motor Yunfeng Zhu1, a, Jinxian Wang1,b,Songjing

More information

Floating Point CORDIC Based Power Operation

Floating Point CORDIC Based Power Operation Floating Point CORDIC Baed Power Operation Kazumi Malhan, Padmaja AVL Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland Univerity, Rocheter, MI e-mail: kmalhan@oakland.edu,

More information

RESEARCH ON A HEURISTIC SEARCHING ALGORITHM FOR ENERGY-AWARE ROUTING IN WIRELESS SENSOR NETWORKS

RESEARCH ON A HEURISTIC SEARCHING ALGORITHM FOR ENERGY-AWARE ROUTING IN WIRELESS SENSOR NETWORKS RESEARCH ON A HEURISTIC SEARCHING ALGORITHM FOR ENERGY-AWARE ROUTING IN WIRELESS SENSOR NETWORKS 1 HONGWEI CHEN, CHUNHUA ZHANG, *3 CHUNZHI WANG 1 Aoc. Prof., School of Comuter Science, Hubei Univerity

More information

A User-Attention Based Focus Detection Framework and Its Applications

A User-Attention Based Focus Detection Framework and Its Applications A Uer-Attention Baed Focu Detection Framework and It Application Chia-Chiang Ho, Wen-Huang Cheng, Ting-Jian Pan, Ja-Ling Wu Communication and Multimedia Laboratory, Department of Computer Science and Information

More information

Visual Targeted Advertisement System Based on User Profiling and Content Consumption for Mobile Broadcasting Television

Visual Targeted Advertisement System Based on User Profiling and Content Consumption for Mobile Broadcasting Television Viual Targeted Advertiement Sytem Baed on Uer Profiling and ontent onumption for Mobile Broadating Televiion Silvia Uribe Federio Alvarez Joé Manuel Menéndez Guillermo inero Abtrat ontent peronaliation

More information

Brief Announcement: Distributed 3/2-Approximation of the Diameter

Brief Announcement: Distributed 3/2-Approximation of the Diameter Brief Announcement: Ditributed /2-Approximation of the Diameter Preliminary verion of a brief announcement to appear at DISC 14 Stephan Holzer MIT holzer@mit.edu David Peleg Weizmann Intitute david.peleg@weizmann.ac.il

More information

Stress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling

Stress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Stre-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Menter F.R. ANSYS Germany GmbH Introduction It i oberved in many CFD imulation that RANS model how inherent technology limitation

More information

else end while End References

else end while End References 621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized

More information

Reconfigurable Shape-Adaptive Template Matching Architectures

Reconfigurable Shape-Adaptive Template Matching Architectures Reonfigurable Shae-Adative Temlate Mathing Arhitetures Jörn Gause 1, Peter Y.K. Cheung 1, Wayne Luk 2 1 Deartment of Eletrial and Eletroni Engineering, Imerial College, London SW7 2BT, England. 2 Deartment

More information

Reporting Checklist for Nature Neuroscience

Reporting Checklist for Nature Neuroscience Correponding Author: Manucript Number: Manucript Type: Jeremy Elman NNBC48172A Brief Communication Reporting Checklit for Nature Neurocience # Figure: 2 # Figure: 5 # Table: 6 # Video: 0 Thi checklit i

More information

Topics. FPGA Design EECE 277. Number Representation and Adders. Class Exercise. Laboratory Assignment #2

Topics. FPGA Design EECE 277. Number Representation and Adders. Class Exercise. Laboratory Assignment #2 FPGA Deign EECE 277 Number Repreentation and Adder Dr. William H. Robinon Februar 2, 25 Topi There are kind of people in the world, thoe that undertand binar and thoe that don't. Unknown Adminitrative

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and

More information

Monte-Carlo optimizations for resource allocation problems in stochastic network systems

Monte-Carlo optimizations for resource allocation problems in stochastic network systems Monte-Carlo otimization for reource allocation roblem in tochatic network ytem Milo aukrecht Deartment of Comuter Science 5329 Sennott Square Univerity of Pittburgh milo@c.itt.edu Abtract Real-world ditributed

More information

Examples. Last Time. Speedup & Parallel Efficiency 200% Observations. Outline. Lecture 6. Queuing Commands Introduction to MPI

Examples. Last Time. Speedup & Parallel Efficiency 200% Observations. Outline. Lecture 6. Queuing Commands Introduction to MPI Lat ime Queuing Command Introduction to MPI Information Enquiry Baic Collective Communication Some embarraingly arallel examle Defined arallel efficiency & eedu Examle 03.c: Brute-force method to calculate

More information

Markov Random Fields in Image Segmentation

Markov Random Fields in Image Segmentation Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image

More information

Shortest Path Routing in Arbitrary Networks

Shortest Path Routing in Arbitrary Networks Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,

More information

Datum Transformations of NAV420 Reference Frames

Datum Transformations of NAV420 Reference Frames NA4CA Appliation Note Datum ranformation of NA4 Referene Frame Giri Baleri, Sr. Appliation Engineer Crobow ehnology, In. http://www.xbow.om hi appliation note explain how to onvert variou referene frame

More information

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov

More information

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online

More information

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

Randomized algorithms: Two examples and Yao s Minimax Principle

Randomized algorithms: Two examples and Yao s Minimax Principle Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum

More information

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial

More information

A study on turbo decoding iterative algorithms

A study on turbo decoding iterative algorithms Buletinul Ştiinţific al Univerităţii "Politehnica" din Timişoara Seria ELECTRONICĂ şi TELECOMUNICAŢII TRANSACTIONS on ELECTRONICS and COMMUNICATIONS Tom 49(63, Facicola 2, 2004 A tudy on turbo decoding

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

Growing Networks Through Random Walks Without Restarts

Growing Networks Through Random Walks Without Restarts Growing Network Through Random Walk Without Retart Bernardo Amorim, Daniel Figueiredo, Giulio Iacobelli, Giovanni Neglia To cite thi verion: Bernardo Amorim, Daniel Figueiredo, Giulio Iacobelli, Giovanni

More information

SPH3UW Unit 7.1 The Ray Model of Light Page 2 of 5. The accepted value for the speed of light inside a vacuum is c m which we usually

SPH3UW Unit 7.1 The Ray Model of Light Page 2 of 5. The accepted value for the speed of light inside a vacuum is c m which we usually SPH3UW Unit 7. The Ray Model of Light Page of 5 Note Phyi Tool box Ray light trael in traight path alled ray. Index of refration (n) i the ratio of the peed of light () in a auu to the peed of light in

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

Optimal Gossip with Direct Addressing

Optimal Gossip with Direct Addressing Optimal Goip with Direct Addreing Bernhard Haeupler Microoft Reearch 1065 La Avenida, Mountain View Mountain View, CA 94043 haeupler@c.cmu.edu Dahlia Malkhi Microoft Reearch 1065 La Avenida, Mountain View

More information

Chapter 7, Part B Sampling and Sampling Distributions

Chapter 7, Part B Sampling and Sampling Distributions Slides Preared by JOHN S. LOUCKS St. Edward s University Slide 1 Chater 7, Part B Samling and Samling Distributions Samling Distribution of Proerties of Point Estimators Other Samling Methods Slide 2 Samling

More information

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in

More information

The norm Package. November 15, Title Analysis of multivariate normal datasets with missing values

The norm Package. November 15, Title Analysis of multivariate normal datasets with missing values The norm Package November 15, 2003 Verion 1.0-9 Date 2002/05/06 Title Analyi of multivariate normal dataet with miing value Author Ported to R by Alvaro A. Novo . Original by Joeph

More information

High Throughput Turbo Decoder Design for GPP Platform

High Throughput Turbo Decoder Design for GPP Platform 1 7th International ICST Conference on Communication and Networing in China (CHINACOM) High Throughut Turbo Decoder Deign for GPP Platform Suiing Zhang, Rongrong Qian, Tao Peng Key Lab. Of Univeral Wirele

More information

A Layer-by-Layer Levenberg-Marquardt algorithm for Feedforward Multilayer Perceptron

A Layer-by-Layer Levenberg-Marquardt algorithm for Feedforward Multilayer Perceptron Al. Math. Inf. Sci. 6 No. S. 55S-5S () Alied Mathematic & Information Science An International Journal @ NSP Natural Science Publihing Cor. A Layer-by-Layer Levenberg-Marquardt algorithm for Feedforward

More information

Keywords: Defect detection, linear phased array transducer, parameter optimization, phased array ultrasonic B-mode imaging testing.

Keywords: Defect detection, linear phased array transducer, parameter optimization, phased array ultrasonic B-mode imaging testing. Send Order for Reprint to reprint@benthamcience.ae 488 The Open Automation and Control Sytem Journal, 2014, 6, 488-492 Open Acce Parameter Optimization of Linear Phaed Array Tranducer for Defect Detection

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

arxiv: v1 [cs.ds] 27 Feb 2018

arxiv: v1 [cs.ds] 27 Feb 2018 Incremental Strong Connectivity and 2-Connectivity in Directed Graph Louka Georgiadi 1, Giueppe F. Italiano 2, and Niko Parotidi 2 arxiv:1802.10189v1 [c.ds] 27 Feb 2018 1 Univerity of Ioannina, Greece.

More information

/06/$ IEEE 364

/06/$ IEEE 364 006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;

More information

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion

More information

Minimum Energy Reliable Paths Using Unreliable Wireless Links

Minimum Energy Reliable Paths Using Unreliable Wireless Links Minimum Energy Reliable Path Uing Unreliable Wirele Link Qunfeng Dong Department of Computer Science Univerity of Wiconin-Madion Madion, Wiconin 53706 qunfeng@c.wic.edu Micah Adler Department of Computer

More information

Analysis of slope stability

Analysis of slope stability Engineering manual No. 8 Updated: 02/2016 Analyi of lope tability Program: Slope tability File: Demo_manual_08.gt In thi engineering manual, we are going to how you how to verify the lope tability for

More information